|
|
@@ -58,7 +58,8 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
|
|
|
response = self.client.get(reverse('home'), follow=True, **headers)
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
- self.assertEqual(int(self.client.session.get('_auth_user_id')), self.user.pk, msg='Authentication failed')
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), self.user.pk, msg='Authentication failed')
|
|
|
|
|
|
@override_settings(
|
|
|
REMOTE_AUTH_ENABLED=True,
|
|
|
@@ -78,7 +79,8 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
|
|
|
response = self.client.get(reverse('home'), follow=True, **headers)
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
- self.assertEqual(int(self.client.session.get('_auth_user_id')), self.user.pk, msg='Authentication failed')
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), self.user.pk, msg='Authentication failed')
|
|
|
|
|
|
@override_settings(
|
|
|
REMOTE_AUTH_ENABLED=True,
|
|
|
@@ -102,7 +104,8 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
|
|
|
# Local user should have been automatically created
|
|
|
new_user = User.objects.get(username='remoteuser2')
|
|
|
- self.assertEqual(int(self.client.session.get('_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
|
|
|
@override_settings(
|
|
|
REMOTE_AUTH_ENABLED=True,
|
|
|
@@ -121,7 +124,8 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
self.assertTrue(settings.REMOTE_AUTH_ENABLED)
|
|
|
self.assertTrue(settings.REMOTE_AUTH_AUTO_CREATE_USER)
|
|
|
self.assertEqual(settings.REMOTE_AUTH_HEADER, 'HTTP_REMOTE_USER')
|
|
|
- self.assertEqual(settings.REMOTE_AUTH_DEFAULT_GROUPS, ['Group 1', 'Group 2'])
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_DEFAULT_GROUPS,
|
|
|
+ ['Group 1', 'Group 2'])
|
|
|
|
|
|
# Create required groups
|
|
|
groups = (
|
|
|
@@ -135,7 +139,8 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
new_user = User.objects.get(username='remoteuser2')
|
|
|
- self.assertEqual(int(self.client.session.get('_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
self.assertListEqual(
|
|
|
[groups[0], groups[1]],
|
|
|
list(new_user.groups.all())
|
|
|
@@ -144,7 +149,8 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
@override_settings(
|
|
|
REMOTE_AUTH_ENABLED=True,
|
|
|
REMOTE_AUTH_AUTO_CREATE_USER=True,
|
|
|
- REMOTE_AUTH_DEFAULT_PERMISSIONS={'dcim.add_site': None, 'dcim.change_site': None},
|
|
|
+ REMOTE_AUTH_DEFAULT_PERMISSIONS={
|
|
|
+ 'dcim.add_site': None, 'dcim.change_site': None},
|
|
|
LOGIN_REQUIRED=True
|
|
|
)
|
|
|
def test_remote_auth_default_permissions(self):
|
|
|
@@ -158,14 +164,102 @@ class ExternalAuthenticationTestCase(TestCase):
|
|
|
self.assertTrue(settings.REMOTE_AUTH_ENABLED)
|
|
|
self.assertTrue(settings.REMOTE_AUTH_AUTO_CREATE_USER)
|
|
|
self.assertEqual(settings.REMOTE_AUTH_HEADER, 'HTTP_REMOTE_USER')
|
|
|
- self.assertEqual(settings.REMOTE_AUTH_DEFAULT_PERMISSIONS, {'dcim.add_site': None, 'dcim.change_site': None})
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_DEFAULT_PERMISSIONS, {
|
|
|
+ 'dcim.add_site': None, 'dcim.change_site': None})
|
|
|
|
|
|
response = self.client.get(reverse('home'), follow=True, **headers)
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
new_user = User.objects.get(username='remoteuser2')
|
|
|
- self.assertEqual(int(self.client.session.get('_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
- self.assertTrue(new_user.has_perms(['dcim.add_site', 'dcim.change_site']))
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
+ self.assertTrue(new_user.has_perms(
|
|
|
+ ['dcim.add_site', 'dcim.change_site']))
|
|
|
+
|
|
|
+ @override_settings(
|
|
|
+ REMOTE_AUTH_ENABLED=True,
|
|
|
+ REMOTE_AUTH_AUTO_CREATE_USER=True,
|
|
|
+ REMOTE_AUTH_GROUP_SYNC_ENABLED=True,
|
|
|
+ LOGIN_REQUIRED=True
|
|
|
+ )
|
|
|
+ def test_remote_auth_remote_groups_default(self):
|
|
|
+ """
|
|
|
+ Test enabling remote authentication with group sync enabled with the default configuration.
|
|
|
+ """
|
|
|
+ headers = {
|
|
|
+ 'HTTP_REMOTE_USER': 'remoteuser2',
|
|
|
+ 'HTTP_REMOTE_USER_GROUP': 'Group 1|Group 2',
|
|
|
+ }
|
|
|
+
|
|
|
+ self.assertTrue(settings.REMOTE_AUTH_ENABLED)
|
|
|
+ self.assertTrue(settings.REMOTE_AUTH_AUTO_CREATE_USER)
|
|
|
+ self.assertTrue(settings.REMOTE_AUTH_GROUP_SYNC_ENABLED)
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_HEADER, 'HTTP_REMOTE_USER')
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_GROUP_HEADER,
|
|
|
+ 'HTTP_REMOTE_USER_GROUP')
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_GROUP_SEPARATOR, '|')
|
|
|
+
|
|
|
+ # Create required groups
|
|
|
+ groups = (
|
|
|
+ Group(name='Group 1'),
|
|
|
+ Group(name='Group 2'),
|
|
|
+ Group(name='Group 3'),
|
|
|
+ )
|
|
|
+ Group.objects.bulk_create(groups)
|
|
|
+
|
|
|
+ response = self.client.get(reverse('home'), follow=True, **headers)
|
|
|
+ self.assertEqual(response.status_code, 200)
|
|
|
+
|
|
|
+ new_user = User.objects.get(username='remoteuser2')
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
+ self.assertListEqual(
|
|
|
+ [groups[0], groups[1]],
|
|
|
+ list(new_user.groups.all())
|
|
|
+ )
|
|
|
+
|
|
|
+ @override_settings(
|
|
|
+ REMOTE_AUTH_ENABLED=True,
|
|
|
+ REMOTE_AUTH_AUTO_CREATE_USER=True,
|
|
|
+ REMOTE_AUTH_GROUP_SYNC_ENABLED=True,
|
|
|
+ REMOTE_AUTH_HEADER='HTTP_FOO',
|
|
|
+ REMOTE_AUTH_GROUP_HEADER='HTTP_BAR',
|
|
|
+ LOGIN_REQUIRED=True
|
|
|
+ )
|
|
|
+ def test_remote_auth_remote_groups_custom_header(self):
|
|
|
+ """
|
|
|
+ Test enabling remote authentication with group sync enabled with the default configuration.
|
|
|
+ """
|
|
|
+ headers = {
|
|
|
+ 'HTTP_FOO': 'remoteuser2',
|
|
|
+ 'HTTP_BAR': 'Group 1|Group 2',
|
|
|
+ }
|
|
|
+
|
|
|
+ self.assertTrue(settings.REMOTE_AUTH_ENABLED)
|
|
|
+ self.assertTrue(settings.REMOTE_AUTH_AUTO_CREATE_USER)
|
|
|
+ self.assertTrue(settings.REMOTE_AUTH_GROUP_SYNC_ENABLED)
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_HEADER, 'HTTP_FOO')
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_GROUP_HEADER, 'HTTP_BAR')
|
|
|
+ self.assertEqual(settings.REMOTE_AUTH_GROUP_SEPARATOR, '|')
|
|
|
+
|
|
|
+ # Create required groups
|
|
|
+ groups = (
|
|
|
+ Group(name='Group 1'),
|
|
|
+ Group(name='Group 2'),
|
|
|
+ Group(name='Group 3'),
|
|
|
+ )
|
|
|
+ Group.objects.bulk_create(groups)
|
|
|
+
|
|
|
+ response = self.client.get(reverse('home'), follow=True, **headers)
|
|
|
+ self.assertEqual(response.status_code, 200)
|
|
|
+
|
|
|
+ new_user = User.objects.get(username='remoteuser2')
|
|
|
+ self.assertEqual(int(self.client.session.get(
|
|
|
+ '_auth_user_id')), new_user.pk, msg='Authentication failed')
|
|
|
+ self.assertListEqual(
|
|
|
+ [groups[0], groups[1]],
|
|
|
+ list(new_user.groups.all())
|
|
|
+ )
|
|
|
|
|
|
|
|
|
class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
@@ -206,7 +300,8 @@ class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
def test_get_object(self):
|
|
|
|
|
|
# Attempt to retrieve object without permission
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.get(url, **self.header)
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
@@ -221,12 +316,14 @@ class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
obj_perm.object_types.add(ContentType.objects.get_for_model(Prefix))
|
|
|
|
|
|
# Retrieve permitted object
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.get(url, **self.header)
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
# Attempt to retrieve non-permitted object
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[3].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[3].pk})
|
|
|
response = self.client.get(url, **self.header)
|
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
|
|
@@ -292,7 +389,8 @@ class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
|
|
|
# Attempt to edit an object without permission
|
|
|
data = {'site': self.sites[0].pk}
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.patch(url, data, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
@@ -308,19 +406,22 @@ class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
|
|
|
# Attempt to edit a non-permitted object
|
|
|
data = {'site': self.sites[0].pk}
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[3].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[3].pk})
|
|
|
response = self.client.patch(url, data, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
|
|
# Edit a permitted object
|
|
|
data['status'] = 'reserved'
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.patch(url, data, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
# Attempt to modify a permitted object to a non-permitted object
|
|
|
data['site'] = self.sites[1].pk
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.patch(url, data, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
@@ -328,7 +429,8 @@ class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
def test_delete_object(self):
|
|
|
|
|
|
# Attempt to delete an object without permission
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.delete(url, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
@@ -343,11 +445,13 @@ class ObjectPermissionAPIViewTestCase(TestCase):
|
|
|
obj_perm.object_types.add(ContentType.objects.get_for_model(Prefix))
|
|
|
|
|
|
# Attempt to delete a non-permitted object
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[3].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[3].pk})
|
|
|
response = self.client.delete(url, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
|
|
# Delete a permitted object
|
|
|
- url = reverse('ipam-api:prefix-detail', kwargs={'pk': self.prefixes[0].pk})
|
|
|
+ url = reverse('ipam-api:prefix-detail',
|
|
|
+ kwargs={'pk': self.prefixes[0].pk})
|
|
|
response = self.client.delete(url, format='json', **self.header)
|
|
|
self.assertEqual(response.status_code, 204)
|