[CalendarServer-changes] [2003]
CalendarServer/branches/release/CalendarServer-1.1-dev/twistedcaldav
/directory/test/test_digest.py
source_changes at macosforge.org
source_changes at macosforge.org
Wed Nov 7 16:44:48 PST 2007
Revision: 2003
http://trac.macosforge.org/projects/calendarserver/changeset/2003
Author: wsanchez at apple.com
Date: 2007-11-07 16:44:47 -0800 (Wed, 07 Nov 2007)
Log Message:
-----------
Pulled up r1911 from trunk.
Modified Paths:
--------------
CalendarServer/branches/release/CalendarServer-1.1-dev/twistedcaldav/directory/test/test_digest.py
Modified: CalendarServer/branches/release/CalendarServer-1.1-dev/twistedcaldav/directory/test/test_digest.py
===================================================================
--- CalendarServer/branches/release/CalendarServer-1.1-dev/twistedcaldav/directory/test/test_digest.py 2007-10-30 18:42:26 UTC (rev 2002)
+++ CalendarServer/branches/release/CalendarServer-1.1-dev/twistedcaldav/directory/test/test_digest.py 2007-11-08 00:44:47 UTC (rev 2003)
@@ -157,7 +157,7 @@
self.getDigestResponse(challenge, "00000001"),
)
- creds = factory.decode(clientResponse, _trivial_GET)
+ creds = factory.decode(clientResponse, _trivial_GET())
self.failUnless(creds.checkPassword('password'))
def test_multiResponse(self):
@@ -174,7 +174,7 @@
self.getDigestResponse(challenge, "00000001"),
)
- creds = factory.decode(clientResponse, _trivial_GET)
+ creds = factory.decode(clientResponse, _trivial_GET())
self.failUnless(creds.checkPassword('password'))
clientResponse = authRequest2[ctr] % (
@@ -182,7 +182,7 @@
self.getDigestResponse(challenge, "00000002"),
)
- creds = factory.decode(clientResponse, _trivial_GET)
+ creds = factory.decode(clientResponse, _trivial_GET())
self.failUnless(creds.checkPassword('password'))
def test_failsWithDifferentMethod(self):
@@ -214,14 +214,14 @@
e = self.assertRaises(error.LoginFailed,
factory.decode,
namelessAuthRequest,
- _trivial_GET)
+ _trivial_GET())
self.assertEquals(str(e), "Invalid response, no username given.")
# Check for an empty username
e = self.assertRaises(error.LoginFailed,
factory.decode,
namelessAuthRequest + ',username=""',
- _trivial_GET)
+ _trivial_GET())
self.assertEquals(str(e), "Invalid response, no username given.")
def test_noNonce(self):
@@ -233,7 +233,7 @@
e = self.assertRaises(error.LoginFailed,
factory.decode,
'realm="Test",username="Foo",opaque="bar"',
- _trivial_GET)
+ _trivial_GET())
self.assertEquals(str(e), "Invalid response, no nonce given.")
def test_emptyAttribute(self):
@@ -247,7 +247,7 @@
e = self.assertRaises(error.LoginFailed,
factory.decode,
emtpyAttributeAuthRequest,
- _trivial_GET)
+ _trivial_GET())
self.assertEquals(str(e), "Invalid response, no username given.")
def test_checkHash(self):
@@ -264,7 +264,7 @@
self.getDigestResponse(challenge, "00000001"),
)
- creds = factory.decode(clientResponse, _trivial_GET)
+ creds = factory.decode(clientResponse, _trivial_GET())
self.failUnless(creds.checkHash(
md5.md5('username:test realm:password').hexdigest()))
@@ -295,15 +295,15 @@
self.getDigestResponse(challenge, "00000002"),
)
- factory.decode(clientResponse1, _trivial_GET)
- factory.decode(clientResponse2, _trivial_GET)
+ factory.decode(clientResponse1, _trivial_GET())
+ factory.decode(clientResponse2, _trivial_GET())
if challenge.get('qop') is not None:
self.assertRaises(
error.LoginFailed,
factory.decode,
clientResponse2,
- _trivial_GET
+ _trivial_GET()
)
challenge = factory.getChallenge(clientAddress)
@@ -317,12 +317,12 @@
challenge['nonce'],
self.getDigestResponse(challenge, "00000002"),
)
- factory.decode(clientResponse1, _trivial_GET)
+ factory.decode(clientResponse1, _trivial_GET())
self.assertRaises(
error.LoginFailed,
factory.decode,
clientResponse3,
- _trivial_GET
+ _trivial_GET()
)
def test_invalidNonce(self):
@@ -345,17 +345,17 @@
self.getDigestResponse(challenge, "00000001"),
)
+ request = _trivial_GET()
self.assertRaises(
error.LoginFailed,
factory.decode,
clientResponse,
- _trivial_GET
+ request
)
factory.invalidate(factory.generateNonce())
- response = UnauthorizedResponse({"Digest":factory}, _trivial_GET.remoteAddr)
+ response = UnauthorizedResponse({"Digest":factory}, request.remoteAddr)
wwwhdrs = response.headers.getHeader("www-authenticate")[0][1]
- self.assertTrue('stale' not in wwwhdrs, msg="No stale parameter in Digest WWW-Authenticate headers: %s" % (wwwhdrs,))
test_invalidNonce.todo = "No stale parameter assertion intermittently fails"
@@ -378,16 +378,17 @@
self.getDigestResponse(challenge, "00000001"),
)
+ request = _trivial_GET()
self.assertRaises(
error.LoginFailed,
factory.decode,
clientResponse,
- _trivial_GET
+ request
)
- response = UnauthorizedResponse({"Digest":factory}, _trivial_GET.remoteAddr)
+ response = UnauthorizedResponse({"Digest":factory}, request.remoteAddr)
wwwhdrs = response.headers.getHeader("www-authenticate")[0][1]
- self.assertTrue('stale' not in wwwhdrs, msg="No stale parameter in Digest WWW-Authenticate headers: %s" % (wwwhdrs,))
+ self.assertTrue('stale' not in wwwhdrs, msg="Stale parameter in Digest WWW-Authenticate headers: %s" % (wwwhdrs,))
test_incompatibleClientIp.todo = "No stale parameter assertion intermittently fails"
@@ -412,14 +413,15 @@
self.getDigestResponse(challenge, "00000001"),
)
+ request = _trivial_GET()
self.assertRaises(
error.LoginFailed,
factory.decode,
clientResponse,
- _trivial_GET
+ request
)
- response = UnauthorizedResponse({"Digest":factory}, _trivial_GET.remoteAddr)
+ response = UnauthorizedResponse({"Digest":factory}, request.remoteAddr)
wwwhdrs = response.headers.getHeader("www-authenticate")[0][1]
self.assertTrue('stale' in wwwhdrs, msg="No stale parameter in Digest WWW-Authenticate headers: %s" % (wwwhdrs,))
self.assertEquals(wwwhdrs['stale'], 'true', msg="stale parameter not set to true in Digest WWW-Authenticate headers: %s" % (wwwhdrs,))
@@ -452,5 +454,6 @@
test_incompatibleCalcHA1Options.todo = "No stale parameter assertion intermittently fails"
+def _trivial_GET():
+ return SimpleRequest(None, 'GET', '/')
-_trivial_GET = SimpleRequest(None, 'GET', '/')
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.macosforge.org/pipermail/calendarserver-changes/attachments/20071107/4be9bef6/attachment-0001.html
More information about the calendarserver-changes
mailing list