Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
E
edx-platform
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
edx
edx-platform
Commits
7f5c54dd
Commit
7f5c54dd
authored
Mar 17, 2015
by
brianhw
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Revert "Remove use of to_deprecated_string in sandbox regex check."
parent
8b190da9
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
3 additions
and
7 deletions
+3
-7
common/djangoapps/util/sandboxing.py
+1
-1
common/djangoapps/util/tests/test_sandboxing.py
+2
-6
No files found.
common/djangoapps/util/sandboxing.py
View file @
7f5c54dd
...
...
@@ -25,7 +25,7 @@ def can_execute_unsafe_code(course_id):
# To others using this: the code as-is is brittle and likely to be changed in the future,
# as per the TODO, so please consider carefully before adding more values to COURSES_WITH_UNSAFE_CODE
for
regex
in
getattr
(
settings
,
'COURSES_WITH_UNSAFE_CODE'
,
[]):
if
re
.
match
(
regex
,
unicode
(
course_id
)):
if
re
.
match
(
regex
,
course_id
.
to_deprecated_string
(
)):
return
True
return
False
...
...
common/djangoapps/util/tests/test_sandboxing.py
View file @
7f5c54dd
...
...
@@ -3,7 +3,6 @@ Tests for sandboxing.py in util app
"""
from
django.test
import
TestCase
from
opaque_keys.edx.locator
import
LibraryLocator
from
util.sandboxing
import
can_execute_unsafe_code
from
django.test.utils
import
override_settings
from
opaque_keys.edx.locations
import
SlashSeparatedCourseKey
...
...
@@ -13,13 +12,12 @@ class SandboxingTest(TestCase):
"""
Test sandbox whitelisting
"""
@override_settings
(
COURSES_WITH_UNSAFE_CODE
=
[
'edX/full/.*'
,
'library:v1-edX+.*'
])
@override_settings
(
COURSES_WITH_UNSAFE_CODE
=
[
'edX/full/.*'
])
def
test_sandbox_exclusion
(
self
):
"""
Test to make sure that a non-match returns false
"""
self
.
assertFalse
(
can_execute_unsafe_code
(
SlashSeparatedCourseKey
(
'edX'
,
'notful'
,
'empty'
)))
self
.
assertFalse
(
can_execute_unsafe_code
(
LibraryLocator
(
'edY'
,
'test_bank'
)))
@override_settings
(
COURSES_WITH_UNSAFE_CODE
=
[
'edX/full/.*'
])
def
test_sandbox_inclusion
(
self
):
...
...
@@ -28,12 +26,10 @@ class SandboxingTest(TestCase):
"""
self
.
assertTrue
(
can_execute_unsafe_code
(
SlashSeparatedCourseKey
(
'edX'
,
'full'
,
'2012_Fall'
)))
self
.
assertTrue
(
can_execute_unsafe_code
(
SlashSeparatedCourseKey
(
'edX'
,
'full'
,
'2013_Spring'
)))
self
.
assertFalse
(
can_execute_unsafe_code
(
LibraryLocator
(
'edX'
,
'test_bank'
)))
def
test_course
like
s_with_unsafe_code_default
(
self
):
def
test_courses_with_unsafe_code_default
(
self
):
"""
Test that the default setting for COURSES_WITH_UNSAFE_CODE is an empty setting, e.g. we don't use @override_settings in these tests
"""
self
.
assertFalse
(
can_execute_unsafe_code
(
SlashSeparatedCourseKey
(
'edX'
,
'full'
,
'2012_Fall'
)))
self
.
assertFalse
(
can_execute_unsafe_code
(
SlashSeparatedCourseKey
(
'edX'
,
'full'
,
'2013_Spring'
)))
self
.
assertFalse
(
can_execute_unsafe_code
(
LibraryLocator
(
'edX'
,
'test_bank'
)))
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment