def test_auth_good_legacy_mode(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request(REQUEST_METHOD="GET", PATH_INFO="/legacy") params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing", qop=None) self.failIf("qop" in params) self.assertNotEquals(policy._authenticate(request, params), None)
def test_auth_good_get_with_vars(self): pwdhash = calculate_pwdhash("tester", "testing", "test") policy = DigestAuthenticationPolicy("test", get_pwdhash=lambda u, r: pwdhash) request = make_request(REQUEST_METHOD="GET", PATH_INFO="/hi?who=me") params = get_challenge(policy, request) build_response(params, request, "tester", "testing") self.assertNotEquals(policy.authenticated_userid(request), None)
def test_auth_with_different_realm(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request() params = get_challenge(policy, request) params["realm"] = "other-realm" build_response(params, request, "tester", "testing") self.assertEquals(policy.authenticated_userid(request), None)
def test_auth_good_post(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request(REQUEST_METHOD="POST", PATH_INFO="/do/stuff") params = get_challenge(policy, request) build_response(params, request, "tester", "testing") self.assertNotEquals(policy.authenticated_userid(request), None)
def test_remember_with_next_nonce(self): policy = DigestAuthenticationPolicy("test", nonce_manager=EasyNonceManager()) request = make_request() params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing") headers = policy.remember(request, "tester") self.assertEquals(headers[0][0], "Authentication-Info")
def test_auth_with_invalid_content_md5(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request(REQUEST_METHOD="GET", PATH_INFO="/authint", HTTP_CONTENT_MD5="1B2M2Y8AsgTpgAmY7PhCfg==") params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing", qop="auth-int") request["HTTP_CONTENT_MD5"] = "8baNZjN6gc+g0gdhccuiqA==" self.assertEquals(policy._authenticate(request, params), False)
def test_auth_with_failed_password_lookup(self): policy = DigestAuthenticationPolicy("test", get_pwdhash=lambda u, r: None) request = make_request() params = get_challenge(policy, request) build_response(params, request, "tester", "testing") self.assertEquals(policy.unauthenticated_userid(request), "tester") self.assertEquals(policy.authenticated_userid(request), None)
def test_challenge(self): policy = DigestAuthenticationPolicy("test") request = make_request() response = policy.challenge_view(request) response = get_response(response, request) self.failUnless(response.startswith("401 Unauthorized")) self.failUnless("WWW-Authenticate: Digest" in response)
def test_auth_good_authint_mode(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request(REQUEST_METHOD="GET", PATH_INFO="/authint", HTTP_CONTENT_MD5="1B2M2Y8AsgTpgAmY7PhCfg==") params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing", qop="auth-int") self.assertNotEquals(policy._authenticate(request, params), None)
def test_identify_with_mismatched_uri(self): policy = DigestAuthenticationPolicy("test") request = make_request(PATH_INFO="/path_one") params = get_challenge(policy, request) build_response(params, request, "tester", "testing") self.assertNotEquals(policy.unauthenticated_userid(request), None) request["PATH_INFO"] = "/path_two" self.assertEquals(policy.unauthenticated_userid(request), None)
def test_challenge_with_extra_domains(self): policy = DigestAuthenticationPolicy("test", domain="http://example.com") request = make_request() app = policy.challenge_view(request) self.assertNotEqual(app, None) response = get_response(app, request) self.failUnless(response.startswith("401 Unauthorized")) self.failUnless("http://example.com" in response)
def test_auth_with_missing_nonce(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request() params = get_challenge(policy, request) build_response(params, request, "tester", "testing") authz = request.environ["HTTP_AUTHORIZATION"] authz = authz.replace(" nonce", " notanonce") request.environ["HTTP_AUTHORIZATION"] = authz self.assertEquals(policy.unauthenticated_userid(request), None) self.assertRaises(KeyError, policy._authenticate, params, request)
def test_auth_with_bad_digest_response(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request() params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing") authz = request.environ["HTTP_AUTHORIZATION"] authz = authz.replace(params["response"], "WRONG") request.environ["HTTP_AUTHORIZATION"] = authz params["response"] += "WRONG" self.assertEquals(policy.authenticated_userid(request), None)
def test_challenge_with_stale_nonce(self): policy = DigestAuthenticationPolicy("test") request = make_request() # Identify with a bad nonce to mark it as stale. params = get_challenge(policy, request) params["nonce"] += "STALE" params = build_response(params, request, "tester", "testing") self.assertEquals(policy.unauthenticated_userid(request), None) # The challenge should then include stale=TRUE app = policy.challenge_view(request) self.assertNotEqual(app, None) response = get_response(app, request) self.failUnless(response.startswith("401 Unauthorized")) self.failUnless('stale="TRUE"' in response)
def test_auth_with_unknown_qop(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request() params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing") params["qop"] = "super-duper" self.assertRaises(ValueError, policy._authenticate, request, params)
def test_from_settings(self): def ref(class_name): return __name__ + ":" + class_name policy = DigestAuthenticationPolicy.from_settings( realm="test", nonce_manager=ref("EasyNonceManager"), domain="http://example.com", get_pwdhash=ref("get_pwdhash"), get_password=ref("get_password")) self.assertEquals(policy.realm, "test") self.assertEquals(policy.domain, "http://example.com") self.failUnless(isinstance(policy.nonce_manager, EasyNonceManager)) self.failUnless(policy.get_pwdhash is get_pwdhash) self.failUnless(policy.get_password is get_password)
def test_rfc2617_example(self): password = "******" params = { "username": "******", "realm": "*****@*****.**", "nonce": "dcd98b7102dd2f0e8b11d0f600bfb0c093", "uri": "/dir/index.html", "qop": "auth", "nc": "00000001", "cnonce": "0a4f113b", "opaque": "5ccc069c403ebaf9f0171e9517f40e41", } policy = DigestAuthenticationPolicy("*****@*****.**", EasyNonceManager(), get_password=lambda u: password) # Calculate the response according to the RFC example parameters. request = make_request(REQUEST_METHOD="GET", PATH_INFO="/dir/index.html") resp = calculate_digest_response(params, request, password=password) # Check that it's as expected from the RFC example section. self.assertEquals(resp, "6629fae49393a05397450978507c4ef1") # Check that we can auth using it. params["response"] = resp set_authz_header(request, params) self.assertEquals(policy.unauthenticated_userid(request), "Mufasa") self.assertEquals(policy.authenticated_userid(request), "Mufasa")
def test_rfc2617_example(self): password = "******" params = {"username": "******", "realm": "*****@*****.**", "nonce": "dcd98b7102dd2f0e8b11d0f600bfb0c093", "uri": "/dir/index.html", "qop": "auth", "nc": "00000001", "cnonce": "0a4f113b", "opaque": "5ccc069c403ebaf9f0171e9517f40e41"} policy = DigestAuthenticationPolicy("*****@*****.**", EasyNonceManager(), get_password=lambda u: password) # Calculate the response according to the RFC example parameters. request = make_request(REQUEST_METHOD="GET", PATH_INFO="/dir/index.html") resp = calculate_digest_response(params, request, password=password) # Check that it's as expected from the RFC example section. self.assertEquals(resp, "6629fae49393a05397450978507c4ef1") # Check that we can auth using it. params["response"] = resp set_authz_header(request, params) self.assertEquals(policy.unauthenticated_userid(request), "Mufasa") self.assertEquals(policy.authenticated_userid(request), "Mufasa")
def test_from_settings(self): def ref(class_name): return __name__ + ":" + class_name policy = DigestAuthenticationPolicy.from_settings( realm="test", nonce_manager=ref("EasyNonceManager"), domain="http://example.com", get_pwdhash=ref("get_pwdhash"), get_password=ref("get_password"), ) self.assertEquals(policy.realm, "test") self.assertEquals(policy.domain, "http://example.com") self.failUnless(isinstance(policy.nonce_manager, EasyNonceManager)) self.failUnless(policy.get_pwdhash is get_pwdhash) self.failUnless(policy.get_password is get_password)
def test_identify_with_bad_noncecount(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request(REQUEST_METHOD="GET", PATH_INFO="/one") # Do an initial auth to get the nonce. params = get_challenge(policy, request) build_response(params, request, "tester", "testing", nc="01") self.assertNotEquals(policy.unauthenticated_userid(request), None) # Authing without increasing nc will fail. request = make_request(REQUEST_METHOD="GET", PATH_INFO="/two") build_response(params, request, "tester", "testing", nc="01") self.assertEquals(policy.unauthenticated_userid(request), None) # Authing with a badly-formed nc will fail request = make_request(REQUEST_METHOD="GET", PATH_INFO="/two") build_response(params, request, "tester", "testing", nc="02XXX") self.assertEquals(policy.unauthenticated_userid(request), None) # Authing with a badly-formed nc will fail request = make_request(REQUEST_METHOD="GET", PATH_INFO="/two") build_response(params, request, "tester", "testing", nc="02XXX") self.assertEquals(policy.unauthenticated_userid(request), None) # Authing with increasing nc will succeed. request = make_request(REQUEST_METHOD="GET", PATH_INFO="/two") build_response(params, request, "tester", "testing", nc="02") self.assertNotEquals(policy.unauthenticated_userid(request), None)
def test_identify_with_no_authz(self): policy = DigestAuthenticationPolicy("test") request = make_request() self.assertEquals(policy.unauthenticated_userid(request), None)
def test_remember_with_no_next_nonce(self): policy = DigestAuthenticationPolicy("test") request = make_request() params = get_challenge(policy, request) params = build_response(params, request, "tester", "testing") self.assertEquals(policy.remember(request, "tester"), None)
def test_identify_with_invalid_params(self): policy = DigestAuthenticationPolicy("test") request = make_request(HTTP_AUTHORIZATION="Digest realm=Sync") self.assertEquals(policy.unauthenticated_userid(request), None)
def test_identify_with_non_digest_authz(self): policy = DigestAuthenticationPolicy("test") request = make_request(HTTP_AUTHORIZATION="Basic lalalala") self.assertEquals(policy.unauthenticated_userid(request), None) request = make_request(HTTP_AUTHORIZATION="BrowserID assertion=1234") self.assertEquals(policy.unauthenticated_userid(request), None)
def test_auth_with_no_password_callbacks(self): policy = DigestAuthenticationPolicy("test") request = make_request() params = get_challenge(policy, request) build_response(params, request, "tester", "testing") self.assertEquals(policy.authenticated_userid(request), None)
def test_remember_with_no_authorization(self): policy = DigestAuthenticationPolicy("test") request = make_request() self.assertEquals(policy.remember(request, "user"), None)
def test_auth_with_no_identity(self): policy = DigestAuthenticationPolicy("test", get_password=lambda u: "testing") request = make_request() self.assertEquals(policy.authenticated_userid(request), None)