Commit 3303fb12 by Carson Gee

Review fixes

parent 082f20db
...@@ -8,6 +8,7 @@ import StringIO ...@@ -8,6 +8,7 @@ import StringIO
import unittest import unittest
from django.conf import settings from django.conf import settings
from django.contrib.auth import SESSION_KEY
from django.contrib.auth.models import AnonymousUser, User from django.contrib.auth.models import AnonymousUser, User
from django.contrib.sessions.middleware import SessionMiddleware from django.contrib.sessions.middleware import SessionMiddleware
from django.core.urlresolvers import reverse from django.core.urlresolvers import reverse
...@@ -170,7 +171,7 @@ class SSLClientTest(TestCase): ...@@ -170,7 +171,7 @@ class SSLClientTest(TestCase):
reverse('dashboard'), follow=True, reverse('dashboard'), follow=True,
SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL)) SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL))
self.assertIn(reverse('dashboard'), response['location']) self.assertIn(reverse('dashboard'), response['location'])
self.assertIn('_auth_user_id', self.client.session) self.assertIn(SESSION_KEY, self.client.session)
@unittest.skipUnless(settings.ROOT_URLCONF == 'lms.urls', 'Test only valid in lms') @unittest.skipUnless(settings.ROOT_URLCONF == 'lms.urls', 'Test only valid in lms')
@override_settings(FEATURES=FEATURES_WITH_SSL_AUTH_IMMEDIATE_SIGNUP) @override_settings(FEATURES=FEATURES_WITH_SSL_AUTH_IMMEDIATE_SIGNUP)
...@@ -183,7 +184,7 @@ class SSLClientTest(TestCase): ...@@ -183,7 +184,7 @@ class SSLClientTest(TestCase):
reverse('register_user'), follow=True, reverse('register_user'), follow=True,
SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL)) SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL))
self.assertIn(reverse('dashboard'), response['location']) self.assertIn(reverse('dashboard'), response['location'])
self.assertIn('_auth_user_id', self.client.session) self.assertIn(SESSION_KEY, self.client.session)
@unittest.skipUnless(settings.ROOT_URLCONF == 'cms.urls', 'Test only valid in cms') @unittest.skipUnless(settings.ROOT_URLCONF == 'cms.urls', 'Test only valid in cms')
@override_settings(FEATURES=FEATURES_WITH_SSL_AUTH_IMMEDIATE_SIGNUP) @override_settings(FEATURES=FEATURES_WITH_SSL_AUTH_IMMEDIATE_SIGNUP)
...@@ -199,7 +200,7 @@ class SSLClientTest(TestCase): ...@@ -199,7 +200,7 @@ class SSLClientTest(TestCase):
reverse('signup'), follow=True, reverse('signup'), follow=True,
SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL)) SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL))
# assert that we are logged in # assert that we are logged in
self.assertIn('_auth_user_id', self.client.session) self.assertIn(SESSION_KEY, self.client.session)
# Now that we are logged in, make sure we don't see the registration page # Now that we are logged in, make sure we don't see the registration page
with self.assertRaisesRegexp(InsufficientSpecificationError, with self.assertRaisesRegexp(InsufficientSpecificationError,
...@@ -225,7 +226,7 @@ class SSLClientTest(TestCase): ...@@ -225,7 +226,7 @@ class SSLClientTest(TestCase):
reverse('signin_user'), follow=True, reverse('signin_user'), follow=True,
SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL)) SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL))
self.assertIn(reverse('dashboard'), response['location']) self.assertIn(reverse('dashboard'), response['location'])
self.assertIn('_auth_user_id', self.client.session) self.assertIn(SESSION_KEY, self.client.session)
@unittest.skipUnless(settings.ROOT_URLCONF == 'lms.urls', 'Test only valid in lms') @unittest.skipUnless(settings.ROOT_URLCONF == 'lms.urls', 'Test only valid in lms')
...@@ -246,11 +247,10 @@ class SSLClientTest(TestCase): ...@@ -246,11 +247,10 @@ class SSLClientTest(TestCase):
user.save() user.save()
# Make sure we can still login # Make sure we can still login
response = self.client.get( self.client.get(
reverse('signin_user'), follow=True, reverse('signin_user'), follow=True,
SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL)) SSL_CLIENT_S_DN=self.AUTH_DN.format(self.USER_NAME, self.USER_EMAIL))
print(response) self.assertIn(SESSION_KEY, self.client.session)
self.assertIn('_auth_user_id', self.client.session)
@unittest.skipUnless(settings.ROOT_URLCONF == 'lms.urls', 'Test only valid in lms') @unittest.skipUnless(settings.ROOT_URLCONF == 'lms.urls', 'Test only valid in lms')
@override_settings(FEATURES=FEATURES_WITHOUT_SSL_AUTH) @override_settings(FEATURES=FEATURES_WITHOUT_SSL_AUTH)
......
...@@ -197,7 +197,7 @@ def _external_login_or_signup(request, ...@@ -197,7 +197,7 @@ def _external_login_or_signup(request,
elif uses_certs: elif uses_certs:
# Certificates are trusted, so just link the user and log the action # Certificates are trusted, so just link the user and log the action
user = internal_user user = internal_user
user.backend = 'django.contrib.auth.backens.ModelBackend' user.backend = 'django.contrib.auth.backends.ModelBackend'
AUDIT_LOG.info('Linked user "%s" logged in via SSL certificate', user.email) AUDIT_LOG.info('Linked user "%s" logged in via SSL certificate', user.email)
else: else:
user = authenticate(username=uname, password=eamap.internal_password, request=request) user = authenticate(username=uname, password=eamap.internal_password, request=request)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment