Ausgabe der neuen DB Einträge
This commit is contained in:
parent
bad48e1627
commit
cfbbb9ee3d
2399 changed files with 843193 additions and 43 deletions
|
|
@ -0,0 +1,748 @@
|
|||
# Copyright (c) Twisted Matrix Laboratories.
|
||||
# See LICENSE for details.
|
||||
|
||||
"""
|
||||
L{twisted.cred.strcred}.
|
||||
"""
|
||||
|
||||
from __future__ import absolute_import, division
|
||||
|
||||
import os
|
||||
|
||||
from twisted import plugin
|
||||
from twisted.trial import unittest
|
||||
from twisted.cred import credentials, checkers, error, strcred
|
||||
from twisted.plugins import cred_file, cred_anonymous, cred_unix
|
||||
from twisted.python import usage
|
||||
from twisted.python.compat import NativeStringIO
|
||||
from twisted.python.filepath import FilePath
|
||||
from twisted.python.fakepwd import UserDatabase
|
||||
from twisted.python.reflect import requireModule
|
||||
|
||||
try:
|
||||
import crypt
|
||||
except ImportError:
|
||||
crypt = None
|
||||
|
||||
try:
|
||||
import pwd
|
||||
except ImportError:
|
||||
pwd = None
|
||||
|
||||
try:
|
||||
import spwd
|
||||
except ImportError:
|
||||
spwd = None
|
||||
|
||||
|
||||
|
||||
def getInvalidAuthType():
|
||||
"""
|
||||
Helper method to produce an auth type that doesn't exist.
|
||||
"""
|
||||
invalidAuthType = 'ThisPluginDoesNotExist'
|
||||
while (invalidAuthType in
|
||||
[factory.authType for factory in strcred.findCheckerFactories()]):
|
||||
invalidAuthType += '_'
|
||||
return invalidAuthType
|
||||
|
||||
|
||||
|
||||
class PublicAPITests(unittest.TestCase):
|
||||
|
||||
def test_emptyDescription(self):
|
||||
"""
|
||||
The description string cannot be empty.
|
||||
"""
|
||||
iat = getInvalidAuthType()
|
||||
self.assertRaises(strcred.InvalidAuthType, strcred.makeChecker, iat)
|
||||
self.assertRaises(
|
||||
strcred.InvalidAuthType, strcred.findCheckerFactory, iat)
|
||||
|
||||
|
||||
def test_invalidAuthType(self):
|
||||
"""
|
||||
An unrecognized auth type raises an exception.
|
||||
"""
|
||||
iat = getInvalidAuthType()
|
||||
self.assertRaises(strcred.InvalidAuthType, strcred.makeChecker, iat)
|
||||
self.assertRaises(
|
||||
strcred.InvalidAuthType, strcred.findCheckerFactory, iat)
|
||||
|
||||
|
||||
|
||||
class StrcredFunctionsTests(unittest.TestCase):
|
||||
|
||||
def test_findCheckerFactories(self):
|
||||
"""
|
||||
L{strcred.findCheckerFactories} returns all available plugins.
|
||||
"""
|
||||
availablePlugins = list(strcred.findCheckerFactories())
|
||||
for plg in plugin.getPlugins(strcred.ICheckerFactory):
|
||||
self.assertIn(plg, availablePlugins)
|
||||
|
||||
|
||||
def test_findCheckerFactory(self):
|
||||
"""
|
||||
L{strcred.findCheckerFactory} returns the first plugin
|
||||
available for a given authentication type.
|
||||
"""
|
||||
self.assertIdentical(strcred.findCheckerFactory('file'),
|
||||
cred_file.theFileCheckerFactory)
|
||||
|
||||
|
||||
|
||||
class MemoryCheckerTests(unittest.TestCase):
|
||||
|
||||
def setUp(self):
|
||||
self.admin = credentials.UsernamePassword('admin', 'asdf')
|
||||
self.alice = credentials.UsernamePassword('alice', 'foo')
|
||||
self.badPass = credentials.UsernamePassword('alice', 'foobar')
|
||||
self.badUser = credentials.UsernamePassword('x', 'yz')
|
||||
self.checker = strcred.makeChecker('memory:admin:asdf:alice:foo')
|
||||
|
||||
|
||||
def test_isChecker(self):
|
||||
"""
|
||||
Verifies that strcred.makeChecker('memory') returns an object
|
||||
that implements the L{ICredentialsChecker} interface.
|
||||
"""
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(self.checker))
|
||||
self.assertIn(credentials.IUsernamePassword,
|
||||
self.checker.credentialInterfaces)
|
||||
|
||||
|
||||
def test_badFormatArgString(self):
|
||||
"""
|
||||
An argument string which does not contain user:pass pairs
|
||||
(i.e., an odd number of ':' characters) raises an exception.
|
||||
"""
|
||||
self.assertRaises(strcred.InvalidAuthArgumentString,
|
||||
strcred.makeChecker, 'memory:a:b:c')
|
||||
|
||||
|
||||
def test_memoryCheckerSucceeds(self):
|
||||
"""
|
||||
The checker works with valid credentials.
|
||||
"""
|
||||
def _gotAvatar(username):
|
||||
self.assertEqual(username, self.admin.username)
|
||||
return (self.checker
|
||||
.requestAvatarId(self.admin)
|
||||
.addCallback(_gotAvatar))
|
||||
|
||||
|
||||
def test_memoryCheckerFailsUsername(self):
|
||||
"""
|
||||
The checker fails with an invalid username.
|
||||
"""
|
||||
return self.assertFailure(self.checker.requestAvatarId(self.badUser),
|
||||
error.UnauthorizedLogin)
|
||||
|
||||
|
||||
def test_memoryCheckerFailsPassword(self):
|
||||
"""
|
||||
The checker fails with an invalid password.
|
||||
"""
|
||||
return self.assertFailure(self.checker.requestAvatarId(self.badPass),
|
||||
error.UnauthorizedLogin)
|
||||
|
||||
|
||||
|
||||
class AnonymousCheckerTests(unittest.TestCase):
|
||||
|
||||
def test_isChecker(self):
|
||||
"""
|
||||
Verifies that strcred.makeChecker('anonymous') returns an object
|
||||
that implements the L{ICredentialsChecker} interface.
|
||||
"""
|
||||
checker = strcred.makeChecker('anonymous')
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(checker))
|
||||
self.assertIn(credentials.IAnonymous, checker.credentialInterfaces)
|
||||
|
||||
|
||||
def testAnonymousAccessSucceeds(self):
|
||||
"""
|
||||
We can log in anonymously using this checker.
|
||||
"""
|
||||
checker = strcred.makeChecker('anonymous')
|
||||
request = checker.requestAvatarId(credentials.Anonymous())
|
||||
def _gotAvatar(avatar):
|
||||
self.assertIdentical(checkers.ANONYMOUS, avatar)
|
||||
return request.addCallback(_gotAvatar)
|
||||
|
||||
|
||||
|
||||
class UnixCheckerTests(unittest.TestCase):
|
||||
users = {
|
||||
'admin': 'asdf',
|
||||
'alice': 'foo',
|
||||
}
|
||||
|
||||
|
||||
def _spwd_getspnam(self, username):
|
||||
return spwd.struct_spwd((username,
|
||||
crypt.crypt(self.users[username], 'F/'),
|
||||
0, 0, 99999, 7, -1, -1, -1))
|
||||
|
||||
|
||||
def setUp(self):
|
||||
self.admin = credentials.UsernamePassword('admin', 'asdf')
|
||||
self.alice = credentials.UsernamePassword('alice', 'foo')
|
||||
self.badPass = credentials.UsernamePassword('alice', 'foobar')
|
||||
self.badUser = credentials.UsernamePassword('x', 'yz')
|
||||
self.checker = strcred.makeChecker('unix')
|
||||
self.adminBytes = credentials.UsernamePassword(b'admin', b'asdf')
|
||||
self.aliceBytes = credentials.UsernamePassword(b'alice', b'foo')
|
||||
self.badPassBytes = credentials.UsernamePassword(b'alice', b'foobar')
|
||||
self.badUserBytes = credentials.UsernamePassword(b'x', b'yz')
|
||||
self.checkerBytes = strcred.makeChecker('unix')
|
||||
|
||||
# Hack around the pwd and spwd modules, since we can't really
|
||||
# go about reading your /etc/passwd or /etc/shadow files
|
||||
if pwd:
|
||||
database = UserDatabase()
|
||||
for username, password in self.users.items():
|
||||
database.addUser(
|
||||
username, crypt.crypt(password, 'F/'),
|
||||
1000, 1000, username, '/home/' + username, '/bin/sh')
|
||||
self.patch(pwd, 'getpwnam', database.getpwnam)
|
||||
if spwd:
|
||||
self.patch(spwd, 'getspnam', self._spwd_getspnam)
|
||||
|
||||
|
||||
def test_isChecker(self):
|
||||
"""
|
||||
Verifies that strcred.makeChecker('unix') returns an object
|
||||
that implements the L{ICredentialsChecker} interface.
|
||||
"""
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(self.checker))
|
||||
self.assertIn(credentials.IUsernamePassword,
|
||||
self.checker.credentialInterfaces)
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(
|
||||
self.checkerBytes))
|
||||
self.assertIn(credentials.IUsernamePassword,
|
||||
self.checkerBytes.credentialInterfaces)
|
||||
|
||||
|
||||
def test_unixCheckerSucceeds(self):
|
||||
"""
|
||||
The checker works with valid credentials.
|
||||
"""
|
||||
def _gotAvatar(username):
|
||||
self.assertEqual(username, self.admin.username)
|
||||
return (self.checker
|
||||
.requestAvatarId(self.admin)
|
||||
.addCallback(_gotAvatar))
|
||||
|
||||
|
||||
def test_unixCheckerSucceedsBytes(self):
|
||||
"""
|
||||
The checker works with valid L{bytes} credentials.
|
||||
"""
|
||||
def _gotAvatar(username):
|
||||
self.assertEqual(username,
|
||||
self.adminBytes.username.decode("utf-8"))
|
||||
return (self.checkerBytes
|
||||
.requestAvatarId(self.adminBytes)
|
||||
.addCallback(_gotAvatar))
|
||||
|
||||
|
||||
def test_unixCheckerFailsUsername(self):
|
||||
"""
|
||||
The checker fails with an invalid username.
|
||||
"""
|
||||
return self.assertFailure(self.checker.requestAvatarId(self.badUser),
|
||||
error.UnauthorizedLogin)
|
||||
|
||||
|
||||
def test_unixCheckerFailsUsernameBytes(self):
|
||||
"""
|
||||
The checker fails with an invalid L{bytes} username.
|
||||
"""
|
||||
return self.assertFailure(self.checkerBytes.requestAvatarId(
|
||||
self.badUserBytes), error.UnauthorizedLogin)
|
||||
|
||||
|
||||
def test_unixCheckerFailsPassword(self):
|
||||
"""
|
||||
The checker fails with an invalid password.
|
||||
"""
|
||||
return self.assertFailure(self.checker.requestAvatarId(self.badPass),
|
||||
error.UnauthorizedLogin)
|
||||
|
||||
|
||||
def test_unixCheckerFailsPasswordBytes(self):
|
||||
"""
|
||||
The checker fails with an invalid L{bytes} password.
|
||||
"""
|
||||
return self.assertFailure(self.checkerBytes.requestAvatarId(
|
||||
self.badPassBytes), error.UnauthorizedLogin)
|
||||
|
||||
|
||||
if None in (pwd, spwd, crypt):
|
||||
availability = []
|
||||
for module, name in ((pwd, "pwd"), (spwd, "spwd"), (crypt, "crypt")):
|
||||
if module is None:
|
||||
availability += [name]
|
||||
for method in (test_unixCheckerSucceeds,
|
||||
test_unixCheckerSucceedsBytes,
|
||||
test_unixCheckerFailsUsername,
|
||||
test_unixCheckerFailsUsernameBytes,
|
||||
test_unixCheckerFailsPassword,
|
||||
test_unixCheckerFailsPasswordBytes):
|
||||
method.skip = ("Required module(s) are unavailable: " +
|
||||
", ".join(availability))
|
||||
|
||||
|
||||
class CryptTests(unittest.TestCase):
|
||||
"""
|
||||
L{crypt} has functions for encrypting password.
|
||||
"""
|
||||
if not crypt:
|
||||
skip = "Required module is unavailable: crypt"
|
||||
|
||||
def test_verifyCryptedPassword(self):
|
||||
"""
|
||||
L{cred_unix.verifyCryptedPassword}
|
||||
"""
|
||||
password = "sample password ^%$"
|
||||
|
||||
for salt in (None, "ab"):
|
||||
try:
|
||||
cryptedCorrect = crypt.crypt(password, salt)
|
||||
except TypeError:
|
||||
# Older Python versions would throw a TypeError if
|
||||
# a value of None was is used for the salt.
|
||||
# Newer Python versions allow it.
|
||||
continue
|
||||
cryptedIncorrect = "$1x1234"
|
||||
self.assertTrue(cred_unix.verifyCryptedPassword(cryptedCorrect,
|
||||
password))
|
||||
self.assertFalse(cred_unix.verifyCryptedPassword(cryptedIncorrect,
|
||||
password))
|
||||
|
||||
|
||||
# Python 3.3+ has crypt.METHOD_*, but not all
|
||||
# platforms implement all methods.
|
||||
for method in ("METHOD_SHA512", "METHOD_SHA256", "METHOD_MD5",
|
||||
"METHOD_CRYPT"):
|
||||
cryptMethod = getattr(crypt, method, None)
|
||||
if not cryptMethod:
|
||||
continue
|
||||
password = "interesting password xyz"
|
||||
crypted = crypt.crypt(password, cryptMethod)
|
||||
incorrectCrypted = crypted + "blahfooincorrect"
|
||||
result = cred_unix.verifyCryptedPassword(crypted, password)
|
||||
self.assertTrue(result)
|
||||
# Try to pass in bytes
|
||||
result = cred_unix.verifyCryptedPassword(crypted.encode("utf-8"),
|
||||
password.encode("utf-8"))
|
||||
self.assertTrue(result)
|
||||
result = cred_unix.verifyCryptedPassword(incorrectCrypted, password)
|
||||
self.assertFalse(result)
|
||||
# Try to pass in bytes
|
||||
result = cred_unix.verifyCryptedPassword(incorrectCrypted.encode("utf-8"),
|
||||
password.encode("utf-8"))
|
||||
self.assertFalse(result)
|
||||
|
||||
|
||||
|
||||
class FileDBCheckerTests(unittest.TestCase):
|
||||
"""
|
||||
C{--auth=file:...} file checker.
|
||||
"""
|
||||
|
||||
def setUp(self):
|
||||
self.admin = credentials.UsernamePassword(b'admin', b'asdf')
|
||||
self.alice = credentials.UsernamePassword(b'alice', b'foo')
|
||||
self.badPass = credentials.UsernamePassword(b'alice', b'foobar')
|
||||
self.badUser = credentials.UsernamePassword(b'x', b'yz')
|
||||
self.filename = self.mktemp()
|
||||
FilePath(self.filename).setContent(b'admin:asdf\nalice:foo\n')
|
||||
self.checker = strcred.makeChecker('file:' + self.filename)
|
||||
|
||||
|
||||
def _fakeFilename(self):
|
||||
filename = '/DoesNotExist'
|
||||
while os.path.exists(filename):
|
||||
filename += '_'
|
||||
return filename
|
||||
|
||||
|
||||
def test_isChecker(self):
|
||||
"""
|
||||
Verifies that strcred.makeChecker('memory') returns an object
|
||||
that implements the L{ICredentialsChecker} interface.
|
||||
"""
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(self.checker))
|
||||
self.assertIn(credentials.IUsernamePassword,
|
||||
self.checker.credentialInterfaces)
|
||||
|
||||
|
||||
def test_fileCheckerSucceeds(self):
|
||||
"""
|
||||
The checker works with valid credentials.
|
||||
"""
|
||||
def _gotAvatar(username):
|
||||
self.assertEqual(username, self.admin.username)
|
||||
return (self.checker
|
||||
.requestAvatarId(self.admin)
|
||||
.addCallback(_gotAvatar))
|
||||
|
||||
|
||||
def test_fileCheckerFailsUsername(self):
|
||||
"""
|
||||
The checker fails with an invalid username.
|
||||
"""
|
||||
return self.assertFailure(self.checker.requestAvatarId(self.badUser),
|
||||
error.UnauthorizedLogin)
|
||||
|
||||
|
||||
def test_fileCheckerFailsPassword(self):
|
||||
"""
|
||||
The checker fails with an invalid password.
|
||||
"""
|
||||
return self.assertFailure(self.checker.requestAvatarId(self.badPass),
|
||||
error.UnauthorizedLogin)
|
||||
|
||||
|
||||
def test_failsWithEmptyFilename(self):
|
||||
"""
|
||||
An empty filename raises an error.
|
||||
"""
|
||||
self.assertRaises(ValueError, strcred.makeChecker, 'file')
|
||||
self.assertRaises(ValueError, strcred.makeChecker, 'file:')
|
||||
|
||||
|
||||
def test_warnWithBadFilename(self):
|
||||
"""
|
||||
When the file auth plugin is given a file that doesn't exist, it
|
||||
should produce a warning.
|
||||
"""
|
||||
oldOutput = cred_file.theFileCheckerFactory.errorOutput
|
||||
newOutput = NativeStringIO()
|
||||
cred_file.theFileCheckerFactory.errorOutput = newOutput
|
||||
strcred.makeChecker('file:' + self._fakeFilename())
|
||||
cred_file.theFileCheckerFactory.errorOutput = oldOutput
|
||||
self.assertIn(cred_file.invalidFileWarning, newOutput.getvalue())
|
||||
|
||||
|
||||
|
||||
class SSHCheckerTests(unittest.TestCase):
|
||||
"""
|
||||
Tests for the C{--auth=sshkey:...} checker. The majority of the tests for the
|
||||
ssh public key database checker are in
|
||||
L{twisted.conch.test.test_checkers.SSHPublicKeyCheckerTestCase}.
|
||||
"""
|
||||
|
||||
skip = None
|
||||
|
||||
if requireModule('cryptography') is None:
|
||||
skip = 'cryptography is not available'
|
||||
|
||||
if requireModule('pyasn1') is None:
|
||||
skip = 'pyasn1 is not available'
|
||||
|
||||
|
||||
def test_isChecker(self):
|
||||
"""
|
||||
Verifies that strcred.makeChecker('sshkey') returns an object
|
||||
that implements the L{ICredentialsChecker} interface.
|
||||
"""
|
||||
sshChecker = strcred.makeChecker('sshkey')
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(sshChecker))
|
||||
self.assertIn(
|
||||
credentials.ISSHPrivateKey, sshChecker.credentialInterfaces)
|
||||
|
||||
|
||||
|
||||
class DummyOptions(usage.Options, strcred.AuthOptionMixin):
|
||||
"""
|
||||
Simple options for testing L{strcred.AuthOptionMixin}.
|
||||
"""
|
||||
|
||||
|
||||
|
||||
class CheckerOptionsTests(unittest.TestCase):
|
||||
|
||||
def test_createsList(self):
|
||||
"""
|
||||
The C{--auth} command line creates a list in the
|
||||
Options instance and appends values to it.
|
||||
"""
|
||||
options = DummyOptions()
|
||||
options.parseOptions(['--auth', 'memory'])
|
||||
self.assertEqual(len(options['credCheckers']), 1)
|
||||
options = DummyOptions()
|
||||
options.parseOptions(['--auth', 'memory', '--auth', 'memory'])
|
||||
self.assertEqual(len(options['credCheckers']), 2)
|
||||
|
||||
|
||||
def test_invalidAuthError(self):
|
||||
"""
|
||||
The C{--auth} command line raises an exception when it
|
||||
gets a parameter it doesn't understand.
|
||||
"""
|
||||
options = DummyOptions()
|
||||
# If someone adds a 'ThisPluginDoesNotExist' then this unit
|
||||
# test should still run.
|
||||
invalidParameter = getInvalidAuthType()
|
||||
self.assertRaises(
|
||||
usage.UsageError,
|
||||
options.parseOptions, ['--auth', invalidParameter])
|
||||
self.assertRaises(
|
||||
usage.UsageError,
|
||||
options.parseOptions, ['--help-auth-type', invalidParameter])
|
||||
|
||||
|
||||
def test_createsDictionary(self):
|
||||
"""
|
||||
The C{--auth} command line creates a dictionary mapping supported
|
||||
interfaces to the list of credentials checkers that support it.
|
||||
"""
|
||||
options = DummyOptions()
|
||||
options.parseOptions(['--auth', 'memory', '--auth', 'anonymous'])
|
||||
chd = options['credInterfaces']
|
||||
self.assertEqual(len(chd[credentials.IAnonymous]), 1)
|
||||
self.assertEqual(len(chd[credentials.IUsernamePassword]), 1)
|
||||
chdAnonymous = chd[credentials.IAnonymous][0]
|
||||
chdUserPass = chd[credentials.IUsernamePassword][0]
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(chdAnonymous))
|
||||
self.assertTrue(checkers.ICredentialsChecker.providedBy(chdUserPass))
|
||||
self.assertIn(credentials.IAnonymous,
|
||||
chdAnonymous.credentialInterfaces)
|
||||
self.assertIn(credentials.IUsernamePassword,
|
||||
chdUserPass.credentialInterfaces)
|
||||
|
||||
|
||||
def test_credInterfacesProvidesLists(self):
|
||||
"""
|
||||
When two C{--auth} arguments are passed along which support the same
|
||||
interface, a list with both is created.
|
||||
"""
|
||||
options = DummyOptions()
|
||||
options.parseOptions(['--auth', 'memory', '--auth', 'unix'])
|
||||
self.assertEqual(
|
||||
options['credCheckers'],
|
||||
options['credInterfaces'][credentials.IUsernamePassword])
|
||||
|
||||
|
||||
def test_listDoesNotDisplayDuplicates(self):
|
||||
"""
|
||||
The list for C{--help-auth} does not duplicate items.
|
||||
"""
|
||||
authTypes = []
|
||||
options = DummyOptions()
|
||||
for cf in options._checkerFactoriesForOptHelpAuth():
|
||||
self.assertNotIn(cf.authType, authTypes)
|
||||
authTypes.append(cf.authType)
|
||||
|
||||
|
||||
def test_displaysListCorrectly(self):
|
||||
"""
|
||||
The C{--help-auth} argument correctly displays all
|
||||
available authentication plugins, then exits.
|
||||
"""
|
||||
newStdout = NativeStringIO()
|
||||
options = DummyOptions()
|
||||
options.authOutput = newStdout
|
||||
self.assertRaises(SystemExit, options.parseOptions, ['--help-auth'])
|
||||
for checkerFactory in strcred.findCheckerFactories():
|
||||
self.assertIn(checkerFactory.authType, newStdout.getvalue())
|
||||
|
||||
|
||||
def test_displaysHelpCorrectly(self):
|
||||
"""
|
||||
The C{--help-auth-for} argument will correctly display the help file for a
|
||||
particular authentication plugin.
|
||||
"""
|
||||
newStdout = NativeStringIO()
|
||||
options = DummyOptions()
|
||||
options.authOutput = newStdout
|
||||
self.assertRaises(
|
||||
SystemExit, options.parseOptions, ['--help-auth-type', 'file'])
|
||||
for line in cred_file.theFileCheckerFactory.authHelp:
|
||||
if line.strip():
|
||||
self.assertIn(line.strip(), newStdout.getvalue())
|
||||
|
||||
|
||||
def test_unexpectedException(self):
|
||||
"""
|
||||
When the checker specified by C{--auth} raises an unexpected error, it
|
||||
should be caught and re-raised within a L{usage.UsageError}.
|
||||
"""
|
||||
options = DummyOptions()
|
||||
err = self.assertRaises(usage.UsageError, options.parseOptions,
|
||||
['--auth', 'file'])
|
||||
self.assertEqual(str(err),
|
||||
"Unexpected error: 'file' requires a filename")
|
||||
|
||||
|
||||
|
||||
class OptionsForUsernamePassword(usage.Options, strcred.AuthOptionMixin):
|
||||
supportedInterfaces = (credentials.IUsernamePassword,)
|
||||
|
||||
|
||||
|
||||
class OptionsForUsernameHashedPassword(usage.Options, strcred.AuthOptionMixin):
|
||||
supportedInterfaces = (credentials.IUsernameHashedPassword,)
|
||||
|
||||
|
||||
|
||||
class OptionsSupportsAllInterfaces(usage.Options, strcred.AuthOptionMixin):
|
||||
supportedInterfaces = None
|
||||
|
||||
|
||||
|
||||
class OptionsSupportsNoInterfaces(usage.Options, strcred.AuthOptionMixin):
|
||||
supportedInterfaces = []
|
||||
|
||||
|
||||
|
||||
class LimitingInterfacesTests(unittest.TestCase):
|
||||
"""
|
||||
Tests functionality that allows an application to limit the
|
||||
credential interfaces it can support. For the purposes of this
|
||||
test, we use IUsernameHashedPassword, although this will never
|
||||
really be used by the command line.
|
||||
|
||||
(I have, to date, not thought of a half-decent way for a user to
|
||||
specify a hash algorithm via the command-line. Nor do I think it's
|
||||
very useful.)
|
||||
|
||||
I should note that, at first, this test is counter-intuitive,
|
||||
because we're using the checker with a pre-defined hash function
|
||||
as the 'bad' checker. See the documentation for
|
||||
L{twisted.cred.checkers.FilePasswordDB.hash} for more details.
|
||||
"""
|
||||
|
||||
def setUp(self):
|
||||
self.filename = self.mktemp()
|
||||
with open(self.filename, 'wb') as f:
|
||||
f.write(b'admin:asdf\nalice:foo\n')
|
||||
self.goodChecker = checkers.FilePasswordDB(self.filename)
|
||||
self.badChecker = checkers.FilePasswordDB(
|
||||
self.filename, hash=self._hash)
|
||||
self.anonChecker = checkers.AllowAnonymousAccess()
|
||||
|
||||
|
||||
def _hash(self, networkUsername, networkPassword, storedPassword):
|
||||
"""
|
||||
A dumb hash that doesn't really do anything.
|
||||
"""
|
||||
return networkPassword
|
||||
|
||||
|
||||
def test_supportsInterface(self):
|
||||
"""
|
||||
The supportsInterface method behaves appropriately.
|
||||
"""
|
||||
options = OptionsForUsernamePassword()
|
||||
self.assertTrue(
|
||||
options.supportsInterface(credentials.IUsernamePassword))
|
||||
self.assertFalse(
|
||||
options.supportsInterface(credentials.IAnonymous))
|
||||
self.assertRaises(
|
||||
strcred.UnsupportedInterfaces, options.addChecker,
|
||||
self.anonChecker)
|
||||
|
||||
|
||||
def test_supportsAllInterfaces(self):
|
||||
"""
|
||||
The supportsInterface method behaves appropriately
|
||||
when the supportedInterfaces attribute is None.
|
||||
"""
|
||||
options = OptionsSupportsAllInterfaces()
|
||||
self.assertTrue(
|
||||
options.supportsInterface(credentials.IUsernamePassword))
|
||||
self.assertTrue(
|
||||
options.supportsInterface(credentials.IAnonymous))
|
||||
|
||||
|
||||
def test_supportsCheckerFactory(self):
|
||||
"""
|
||||
The supportsCheckerFactory method behaves appropriately.
|
||||
"""
|
||||
options = OptionsForUsernamePassword()
|
||||
fileCF = cred_file.theFileCheckerFactory
|
||||
anonCF = cred_anonymous.theAnonymousCheckerFactory
|
||||
self.assertTrue(options.supportsCheckerFactory(fileCF))
|
||||
self.assertFalse(options.supportsCheckerFactory(anonCF))
|
||||
|
||||
|
||||
def test_canAddSupportedChecker(self):
|
||||
"""
|
||||
When addChecker is called with a checker that implements at least one
|
||||
of the interfaces our application supports, it is successful.
|
||||
"""
|
||||
options = OptionsForUsernamePassword()
|
||||
options.addChecker(self.goodChecker)
|
||||
iface = options.supportedInterfaces[0]
|
||||
# Test that we did get IUsernamePassword
|
||||
self.assertIdentical(
|
||||
options['credInterfaces'][iface][0], self.goodChecker)
|
||||
self.assertIdentical(options['credCheckers'][0], self.goodChecker)
|
||||
# Test that we didn't get IUsernameHashedPassword
|
||||
self.assertEqual(len(options['credInterfaces'][iface]), 1)
|
||||
self.assertEqual(len(options['credCheckers']), 1)
|
||||
|
||||
|
||||
def test_failOnAddingUnsupportedChecker(self):
|
||||
"""
|
||||
When addChecker is called with a checker that does not implement any
|
||||
supported interfaces, it fails.
|
||||
"""
|
||||
options = OptionsForUsernameHashedPassword()
|
||||
self.assertRaises(strcred.UnsupportedInterfaces,
|
||||
options.addChecker, self.badChecker)
|
||||
|
||||
|
||||
def test_unsupportedInterfaceError(self):
|
||||
"""
|
||||
The C{--auth} command line raises an exception when it
|
||||
gets a checker we don't support.
|
||||
"""
|
||||
options = OptionsSupportsNoInterfaces()
|
||||
authType = cred_anonymous.theAnonymousCheckerFactory.authType
|
||||
self.assertRaises(
|
||||
usage.UsageError,
|
||||
options.parseOptions, ['--auth', authType])
|
||||
|
||||
|
||||
def test_helpAuthLimitsOutput(self):
|
||||
"""
|
||||
C{--help-auth} will only list checkers that purport to
|
||||
supply at least one of the credential interfaces our
|
||||
application can use.
|
||||
"""
|
||||
options = OptionsForUsernamePassword()
|
||||
for factory in options._checkerFactoriesForOptHelpAuth():
|
||||
invalid = True
|
||||
for interface in factory.credentialInterfaces:
|
||||
if options.supportsInterface(interface):
|
||||
invalid = False
|
||||
if invalid:
|
||||
raise strcred.UnsupportedInterfaces()
|
||||
|
||||
|
||||
def test_helpAuthTypeLimitsOutput(self):
|
||||
"""
|
||||
C{--help-auth-type} will display a warning if you get
|
||||
help for an authType that does not supply at least one of the
|
||||
credential interfaces our application can use.
|
||||
"""
|
||||
options = OptionsForUsernamePassword()
|
||||
# Find an interface that we can use for our test
|
||||
invalidFactory = None
|
||||
for factory in strcred.findCheckerFactories():
|
||||
if not options.supportsCheckerFactory(factory):
|
||||
invalidFactory = factory
|
||||
break
|
||||
self.assertNotIdentical(invalidFactory, None)
|
||||
# Capture output and make sure the warning is there
|
||||
newStdout = NativeStringIO()
|
||||
options.authOutput = newStdout
|
||||
self.assertRaises(SystemExit, options.parseOptions,
|
||||
['--help-auth-type', 'anonymous'])
|
||||
self.assertIn(strcred.notSupportedWarning, newStdout.getvalue())
|
||||
Loading…
Add table
Add a link
Reference in a new issue