diff options
author | <> | 2003-01-02 05:25:50 +0000 |
---|---|---|
committer | <> | 2003-01-02 05:25:50 +0000 |
commit | b132a73f15e432eaf43310fce9196ca0c0651465 (patch) | |
tree | c15f816ba7c4de99fef510e3bd75af0890d47441 /tests/test_security_mgr.py | |
download | mailman2-b132a73f15e432eaf43310fce9196ca0c0651465.tar.gz mailman2-b132a73f15e432eaf43310fce9196ca0c0651465.tar.xz mailman2-b132a73f15e432eaf43310fce9196ca0c0651465.zip |
This commit was manufactured by cvs2svn to create branch
'Release_2_1-maint'.
Diffstat (limited to 'tests/test_security_mgr.py')
-rw-r--r-- | tests/test_security_mgr.py | 261 |
1 files changed, 261 insertions, 0 deletions
diff --git a/tests/test_security_mgr.py b/tests/test_security_mgr.py new file mode 100644 index 00000000..451e6bbd --- /dev/null +++ b/tests/test_security_mgr.py @@ -0,0 +1,261 @@ +# Copyright (C) 2001 by the Free Software Foundation, Inc. +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License +# as published by the Free Software Foundation; either version 2 +# of the License, or (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + +"""Unit tests for Mailman/SecurityManager.py +""" + +import os +import unittest +import errno +import md5 +import sha +import Cookie +try: + import crypt +except ImportError: + crypt = None +from cStringIO import StringIO + +from Mailman import mm_cfg +from Mailman import Utils +from Mailman import Errors + +from TestBase import TestBase + + + +def password(plaintext): + return sha.new(plaintext).hexdigest() + + + +class TestSecurityManager(TestBase): + def test_init_vars(self): + eq = self.assertEqual + eq(self._mlist.mod_password, None) + eq(self._mlist.passwords, {}) + + def test_auth_context_info_authuser(self): + mlist = self._mlist + self.assertRaises(TypeError, mlist.AuthContextInfo, mm_cfg.AuthUser) + # Add a member + mlist.addNewMember('aperson@dom.ain', password='xxXXxx') + self.assertEqual( + mlist.AuthContextInfo(mm_cfg.AuthUser, 'aperson@dom.ain'), + ('_xtest+user+aperson--at--dom.ain', 'xxXXxx')) + + def test_auth_context_moderator(self): + mlist = self._mlist + mlist.mod_password = 'yyYYyy' + self.assertEqual( + mlist.AuthContextInfo(mm_cfg.AuthListModerator), + ('_xtest+moderator', 'yyYYyy')) + + def test_auth_context_admin(self): + mlist = self._mlist + mlist.password = 'zzZZzz' + self.assertEqual( + mlist.AuthContextInfo(mm_cfg.AuthListAdmin), + ('_xtest+admin', 'zzZZzz')) + + def test_auth_context_site(self): + mlist = self._mlist + mlist.password = 'aaAAaa' + self.assertEqual( + mlist.AuthContextInfo(mm_cfg.AuthSiteAdmin), + ('_xtest+admin', 'aaAAaa')) + + def test_auth_context_huh(self): + self.assertEqual( + self._mlist.AuthContextInfo('foo'), + (None, None)) + + + +class TestAuthenticate(TestBase): + def setUp(self): + TestBase.setUp(self) + Utils.set_global_password('bbBBbb', siteadmin=1) + Utils.set_global_password('ccCCcc', siteadmin=0) + + def tearDown(self): + try: + os.unlink(mm_cfg.SITE_PW_FILE) + except OSError, e: + if e.errno <> errno.ENOENT: raise + try: + os.unlink(mm_cfg.LISTCREATOR_PW_FILE) + except OSError, e: + if e.errno <> errno.ENOENT: raise + TestBase.tearDown(self) + + def test_auth_creator(self): + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthCreator], 'ccCCcc'), mm_cfg.AuthCreator) + + def test_auth_creator_unauth(self): + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthCreator], 'xxxxxx'), mm_cfg.UnAuthorized) + + def test_auth_site_admin(self): + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthSiteAdmin], 'bbBBbb'), mm_cfg.AuthSiteAdmin) + + def test_auth_site_admin_unauth(self): + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthSiteAdmin], 'xxxxxx'), mm_cfg.UnAuthorized) + + def test_list_admin(self): + self._mlist.password = password('ttTTtt') + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthListAdmin], 'ttTTtt'), mm_cfg.AuthListAdmin) + + def test_list_admin_unauth(self): + self._mlist.password = password('ttTTtt') + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthListAdmin], 'xxxxxx'), mm_cfg.UnAuthorized) + + def test_list_admin_upgrade(self): + eq = self.assertEqual + mlist = self._mlist + mlist.password = md5.new('ssSSss').digest() + eq(mlist.Authenticate( + [mm_cfg.AuthListAdmin], 'ssSSss'), mm_cfg.AuthListAdmin) + eq(mlist.password, password('ssSSss')) + # Test crypt upgrades if crypt is supported + if crypt: + mlist.password = crypt.crypt('rrRRrr', 'zc') + eq(self._mlist.Authenticate( + [mm_cfg.AuthListAdmin], 'rrRRrr'), mm_cfg.AuthListAdmin) + eq(mlist.password, password('rrRRrr')) + + def test_list_admin_oldstyle_unauth(self): + eq = self.assertEqual + mlist = self._mlist + mlist.password = md5.new('ssSSss').digest() + eq(mlist.Authenticate( + [mm_cfg.AuthListAdmin], 'xxxxxx'), mm_cfg.UnAuthorized) + eq(mlist.password, md5.new('ssSSss').digest()) + # Test crypt upgrades if crypt is supported + if crypt: + mlist.password = crypted = crypt.crypt('rrRRrr', 'zc') + eq(self._mlist.Authenticate( + [mm_cfg.AuthListAdmin], 'xxxxxx'), mm_cfg.UnAuthorized) + eq(mlist.password, crypted) + + def test_list_moderator(self): + self._mlist.mod_password = password('mmMMmm') + self.assertEqual(self._mlist.Authenticate( + [mm_cfg.AuthListModerator], 'mmMMmm'), mm_cfg.AuthListModerator) + + def test_user(self): + mlist = self._mlist + mlist.addNewMember('aperson@dom.ain', password='nosrepa') + self.assertEqual(mlist.Authenticate( + [mm_cfg.AuthUser], 'nosrepa', 'aperson@dom.ain'), mm_cfg.AuthUser) + + def test_wrong_user(self): + mlist = self._mlist + mlist.addNewMember('aperson@dom.ain', password='nosrepa') + self.assertRaises(Errors.NotAMemberError, mlist.Authenticate, + [mm_cfg.AuthUser], 'nosrepa', 'bperson@dom.ain') + + def test_no_user(self): + mlist = self._mlist + mlist.addNewMember('aperson@dom.ain', password='nosrepa') + self.assertRaises(TypeError, mlist.Authenticate, + [mm_cfg.AuthUser], 'nosrepa') + + def test_user_unauth(self): + mlist = self._mlist + mlist.addNewMember('aperson@dom.ain', password='nosrepa') + self.assertEqual(mlist.Authenticate( + [mm_cfg.AuthUser], 'xxxxxx', 'aperson@dom.ain'), + mm_cfg.UnAuthorized) + + def test_value_error(self): + self.assertRaises(ValueError, self._mlist.Authenticate, + ['spooge'], 'xxxxxx', 'zperson@dom.ain') + + + +class TestWebAuthenticate(TestBase): + def setUp(self): + TestBase.setUp(self) + Utils.set_global_password('bbBBbb', siteadmin=1) + Utils.set_global_password('ccCCcc', siteadmin=0) + mlist = self._mlist + mlist.mod_password = password('abcdefg') + mlist.addNewMember('aperson@dom.ain', password='qqQQqq') + # Set up the cookie data + sfp = StringIO() + print >> sfp, mlist.MakeCookie(mm_cfg.AuthSiteAdmin) + # AuthCreator isn't handled in AuthContextInfo() + print >> sfp, mlist.MakeCookie(mm_cfg.AuthListAdmin) + print >> sfp, mlist.MakeCookie(mm_cfg.AuthListModerator) + print >> sfp, mlist.MakeCookie(mm_cfg.AuthUser, 'aperson@dom.ain') + os.environ['HTTP_COOKIE'] = sfp.getvalue() + + def tearDown(self): + try: + os.unlink(mm_cfg.SITE_PW_FILE) + except OSError, e: + if e.errno <> errno.ENOENT: raise + try: + os.unlink(mm_cfg.LISTCREATOR_PW_FILE) + except OSError, e: + if e.errno <> errno.ENOENT: raise + TestBase.tearDown(self) + + def test_auth_site_admin(self): + self.assertEqual(self._mlist.WebAuthenticate( + [mm_cfg.AuthSiteAdmin], 'xxxxxx'), 1) + + def test_list_admin(self): + self.assertEqual(self._mlist.WebAuthenticate( + [mm_cfg.AuthListAdmin], 'xxxxxx'), 1) + + def test_list_moderator(self): + self.assertEqual(self._mlist.WebAuthenticate( + [mm_cfg.AuthListModerator], 'xxxxxx'), 1) + + def test_user(self): + self.assertEqual(self._mlist.WebAuthenticate( + [mm_cfg.AuthUser], 'xxxxxx'), 1) + + def test_not_a_user(self): + self._mlist.removeMember('aperson@dom.ain') + self.assertEqual(self._mlist.WebAuthenticate( + [mm_cfg.AuthUser], 'xxxxxx', 'aperson@dom.ain'), 0) + + + +# TBD: Tests for MakeCookie(), ZapCookie(), CheckCookie() -- although the +# latter is implicitly tested by testing WebAuthenticate() above. + + + +def suite(): + suite = unittest.TestSuite() + suite.addTest(unittest.makeSuite(TestSecurityManager)) + suite.addTest(unittest.makeSuite(TestAuthenticate)) + suite.addTest(unittest.makeSuite(TestWebAuthenticate)) + return suite + + + +if __name__ == '__main__': + unittest.main(defaultTest='suite') |