Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
E
edx-platform
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
edx
edx-platform
Commits
e557b5de
Commit
e557b5de
authored
Jul 28, 2014
by
Jason Bau
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Allow external_auth registrations to bypass PW complexity check
parent
4353e1e4
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
28 additions
and
4 deletions
+28
-4
common/djangoapps/student/tests/test_password_policy.py
+26
-3
common/djangoapps/student/views.py
+2
-1
No files found.
common/djangoapps/student/tests/test_password_policy.py
View file @
e557b5de
...
@@ -4,10 +4,14 @@ This test file will verify proper password policy enforcement, which is an optio
...
@@ -4,10 +4,14 @@ This test file will verify proper password policy enforcement, which is an optio
"""
"""
import
json
import
json
from
django.test
import
TestCase
from
django.test
import
TestCase
from
django.test.client
import
RequestFactory
from
django.core.urlresolvers
import
reverse
from
django.core.urlresolvers
import
reverse
from
mock
import
patch
from
django.utils.importlib
import
import_module
from
django.test.utils
import
override_settings
from
django.test.utils
import
override_settings
from
django.conf
import
settings
from
mock
import
patch
from
student.views
import
create_account
from
external_auth.models
import
ExternalAuthMap
@patch.dict
(
"django.conf.settings.FEATURES"
,
{
'ENFORCE_PASSWORD_POLICY'
:
True
})
@patch.dict
(
"django.conf.settings.FEATURES"
,
{
'ENFORCE_PASSWORD_POLICY'
:
True
})
class
TestPasswordPolicy
(
TestCase
):
class
TestPasswordPolicy
(
TestCase
):
...
@@ -17,7 +21,7 @@ class TestPasswordPolicy(TestCase):
...
@@ -17,7 +21,7 @@ class TestPasswordPolicy(TestCase):
def
setUp
(
self
):
def
setUp
(
self
):
super
(
TestPasswordPolicy
,
self
)
.
setUp
()
super
(
TestPasswordPolicy
,
self
)
.
setUp
()
self
.
url
=
reverse
(
'create_account'
)
self
.
url
=
reverse
(
'create_account'
)
self
.
request_factory
=
RequestFactory
()
self
.
url_params
=
{
self
.
url_params
=
{
'username'
:
'username'
,
'username'
:
'username'
,
'email'
:
'foo_bar@bar.com'
,
'email'
:
'foo_bar@bar.com'
,
...
@@ -237,6 +241,25 @@ class TestPasswordPolicy(TestCase):
...
@@ -237,6 +241,25 @@ class TestPasswordPolicy(TestCase):
obj
=
json
.
loads
(
response
.
content
)
obj
=
json
.
loads
(
response
.
content
)
self
.
assertTrue
(
obj
[
'success'
])
self
.
assertTrue
(
obj
[
'success'
])
@override_settings
(
PASSWORD_MIN_LENGTH
=
6
,
SESSION_ENGINE
=
'django.contrib.sessions.backends.cache'
)
def
test_ext_auth_password_length_too_short
(
self
):
"""
Tests that even if password policy is enforced, ext_auth registrations aren't subject to it
"""
self
.
url_params
[
'password'
]
=
'aaa'
# shouldn't pass validation
request
=
self
.
request_factory
.
post
(
self
.
url
,
self
.
url_params
)
# now indicate we are doing ext_auth by setting 'ExternalAuthMap' in the session.
request
.
session
=
import_module
(
settings
.
SESSION_ENGINE
)
.
SessionStore
()
# empty session
extauth
=
ExternalAuthMap
(
external_id
=
'withmap@stanford.edu'
,
external_email
=
'withmap@stanford.edu'
,
internal_password
=
self
.
url_params
[
'password'
],
external_domain
=
'shib:https://idp.stanford.edu/'
)
request
.
session
[
'ExternalAuthMap'
]
=
extauth
response
=
create_account
(
request
)
self
.
assertEqual
(
response
.
status_code
,
200
)
obj
=
json
.
loads
(
response
.
content
)
self
.
assertTrue
(
obj
[
'success'
])
class
TestUsernamePasswordNonmatch
(
TestCase
):
class
TestUsernamePasswordNonmatch
(
TestCase
):
"""
"""
...
...
common/djangoapps/student/views.py
View file @
e557b5de
...
@@ -1251,7 +1251,8 @@ def create_account(request, post_override=None): # pylint: disable-msg=too-many
...
@@ -1251,7 +1251,8 @@ def create_account(request, post_override=None): # pylint: disable-msg=too-many
return
JsonResponse
(
js
,
status
=
400
)
return
JsonResponse
(
js
,
status
=
400
)
# enforce password complexity as an optional feature
# enforce password complexity as an optional feature
if
settings
.
FEATURES
.
get
(
'ENFORCE_PASSWORD_POLICY'
,
False
):
# but not if we're doing ext auth b/c those pws never get used and are auto-generated so might not pass validation
if
settings
.
FEATURES
.
get
(
'ENFORCE_PASSWORD_POLICY'
,
False
)
and
not
DoExternalAuth
:
try
:
try
:
password
=
post_vars
[
'password'
]
password
=
post_vars
[
'password'
]
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment