aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'okupy/tests/unit/test_secondary_password.py')
-rw-r--r--okupy/tests/unit/test_secondary_password.py34
1 files changed, 17 insertions, 17 deletions
diff --git a/okupy/tests/unit/test_secondary_password.py b/okupy/tests/unit/test_secondary_password.py
index ff0a794..b9fbc38 100644
--- a/okupy/tests/unit/test_secondary_password.py
+++ b/okupy/tests/unit/test_secondary_password.py
@@ -22,7 +22,7 @@ class SecondaryPassword(TestCase):
def setUp(self):
self.mockldap.start()
- self.ldapobject = self.mockldap[settings.AUTH_LDAP_SERVER_URI]
+ self.ldapobj = self.mockldap[settings.AUTH_LDAP_SERVER_URI]
def tearDown(self):
self.mockldap.stop()
@@ -38,39 +38,39 @@ class SecondaryPassword(TestCase):
set_secondary_password(request, 'ldaptest')
self.assertEqual(len(ldap_users(
'alice',
- directory=self.ldapobject.directory)[1]['userPassword']), 2)
+ directory=self.ldapobj.directory)[1]['userPassword']), 2)
def test_remove_leftovers_before_adding_secondary_password(self):
leftover = ldap_md5_crypt.encrypt('leftover_password')
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(leftover)
request = set_request(uri='/', user=vars.USER_ALICE)
set_secondary_password(request, 'ldaptest')
self.assertNotIn(leftover, ldap_users(
- 'alice', directory=self.ldapobject.directory)[1]['userPassword'])
+ 'alice', directory=self.ldapobj.directory)[1]['userPassword'])
def test_dont_remove_primary_password_while_cleaning_leftovers(self):
leftover = ldap_md5_crypt.encrypt('leftover_password')
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(leftover)
request = set_request(uri='/', user=vars.USER_ALICE)
set_secondary_password(request, 'ldaptest')
self.assertTrue(ldap_md5_crypt.verify(
'ldaptest', ldap_users(
'alice',
- directory=self.ldapobject.directory)[1]['userPassword'][0]))
+ directory=self.ldapobj.directory)[1]['userPassword'][0]))
def test_dont_remove_unknown_hashes_while_cleaning_leftovers(self):
leftover = ldap_md5_crypt.encrypt('leftover_password')
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(leftover)
leftover2 = 'plain_leftover2'
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(leftover2)
request = set_request(uri='/', user=vars.USER_ALICE)
set_secondary_password(request, 'ldaptest')
self.assertIn(leftover2, ldap_users(
- 'alice', directory=self.ldapobject.directory)[1]['userPassword'])
+ 'alice', directory=self.ldapobj.directory)[1]['userPassword'])
def test_session_and_ldap_secondary_passwords_match(self):
request = set_request(uri='/', user=vars.USER_ALICE)
@@ -79,26 +79,26 @@ class SecondaryPassword(TestCase):
request.session['secondary_password'], 48)),
ldap_users(
'alice',
- directory=self.ldapobject.directory)[1]['userPassword'][1]))
+ directory=self.ldapobj.directory)[1]['userPassword'][1]))
def test_remove_secondary_password_from_ldap(self):
secondary_password = Random.get_random_bytes(48)
secondary_password_crypt = ldap_md5_crypt.encrypt(b64encode(
secondary_password))
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(secondary_password_crypt)
request = set_request(uri='/', user=vars.USER_ALICE)
request.session['secondary_password'] = cipher.encrypt(
secondary_password)
remove_secondary_password(request)
self.assertNotIn(secondary_password_crypt, ldap_users(
- 'alice', directory=self.ldapobject.directory)[1]['userPassword'])
+ 'alice', directory=self.ldapobj.directory)[1]['userPassword'])
def test_dont_remove_primary_password_when_removing_secondary_passwd(self):
secondary_password = Random.get_random_bytes(48)
secondary_password_crypt = ldap_md5_crypt.encrypt(b64encode(
secondary_password))
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(secondary_password_crypt)
request = set_request(uri='/', user=vars.USER_ALICE)
request.session['secondary_password'] = cipher.encrypt(
@@ -106,19 +106,19 @@ class SecondaryPassword(TestCase):
remove_secondary_password(request)
self.assertTrue(ldap_md5_crypt.verify('ldaptest', ldap_users(
'alice',
- directory=self.ldapobject.directory)[1]['userPassword'][0]))
+ directory=self.ldapobj.directory)[1]['userPassword'][0]))
def test_dont_remove_unknown_hashes_when_removing_secondary_password(self):
secondary_password = Random.get_random_bytes(48)
secondary_password_crypt = ldap_md5_crypt.encrypt(b64encode(
secondary_password))
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append('unknown_hash')
- self.ldapobject.directory[ldap_users('alice')[0]][
+ self.ldapobj.directory[ldap_users('alice')[0]][
'userPassword'].append(secondary_password_crypt)
request = set_request(uri='/', user=vars.USER_ALICE)
request.session['secondary_password'] = cipher.encrypt(
secondary_password)
remove_secondary_password(request)
self.assertIn('unknown_hash', ldap_users(
- 'alice', directory=self.ldapobject.directory)[1]['userPassword'])
+ 'alice', directory=self.ldapobj.directory)[1]['userPassword'])