-
Notifications
You must be signed in to change notification settings - Fork 23
/
Copy pathtest_middleware.py
160 lines (131 loc) · 6.07 KB
/
test_middleware.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
import json
from typing import Any
from unittest import mock
from django.contrib.auth import get_user_model
from django.contrib.auth.models import AnonymousUser
from django.core.exceptions import ImproperlyConfigured, PermissionDenied
from django.http import HttpResponse
from django.test import RequestFactory, TestCase
from jwt import exceptions
from request_token.middleware import RequestTokenMiddleware
from request_token.models import RequestToken
from request_token.settings import JWT_QUERYSTRING_ARG
class MockSession:
"""Fake Session model used to support `session_key` property."""
@property
def session_key(self):
return "foobar"
class MiddlewareTests(TestCase):
"""RequestTokenMiddleware tests."""
def setUp(self):
self.user = get_user_model().objects.create_user("zoidberg")
self.factory = RequestFactory()
self.middleware = RequestTokenMiddleware(get_response=lambda r: HttpResponse())
self.token = RequestToken.objects.create_token(scope="foo")
self.default_payload = {JWT_QUERYSTRING_ARG: self.token.jwt()}
def get_request(self):
request = self.factory.get(f"/?{JWT_QUERYSTRING_ARG}={self.token.jwt()}")
request.user = self.user
request.session = MockSession()
return request
def post_request(self):
request = self.factory.post("/", self.default_payload)
request.user = self.user
request.session = MockSession()
return request
def post_request_with_JSON(self, payload: Any):
data = json.dumps(payload)
request = self.factory.post("/", data, "application/json")
request.user = self.user
request.session = MockSession()
return request
def test_process_request_assertions(self):
request = self.factory.get("/")
self.assertRaises(ImproperlyConfigured, self.middleware, request)
request.user = AnonymousUser()
self.assertRaises(ImproperlyConfigured, self.middleware, request)
request.session = MockSession()
self.middleware(request)
self.assertFalse(hasattr(request, "token"))
def test_process_request_without_token(self):
request = self.factory.get("/")
request.user = AnonymousUser()
request.session = MockSession()
self.middleware(request)
self.assertFalse(hasattr(request, "token"))
def test_process_GET_request_with_valid_token(self):
request = self.get_request()
self.middleware(request)
self.assertEqual(request.token, self.token)
def test_process_POST_request_with_valid_token(self):
request = self.post_request()
self.middleware(request)
self.assertEqual(request.token, self.token)
def test_process_POST_request_with_valid_token_with_json(self):
request = self.post_request_with_JSON(self.default_payload)
self.middleware(request)
self.assertEqual(request.token, self.token)
def test_process_AJAX_request_with_array(self):
"""Test for issue #50."""
request = self.post_request_with_JSON([1])
self.middleware(request)
self.assertFalse(hasattr(request, "token"))
def test_process_request_not_allowed(self):
# PUT requests won't decode the token
request = self.factory.put("/?rt=foo")
request.user = self.user
request.session = MockSession()
response = self.middleware(request)
self.assertFalse(hasattr(request, "token"))
self.assertEqual(response.status_code, 200)
@mock.patch("request_token.middleware.logger")
def test_process_request_token_error(self, mock_logger):
# token decode error - request passes through _without_ a token
request = self.factory.get("/?rt=foo")
request.user = self.user
request.session = MockSession()
self.middleware(request)
self.assertIsNone(request.token)
self.assertEqual(mock_logger.exception.call_count, 1)
@mock.patch("request_token.middleware.logger")
def test_process_request_token_does_not_exist(self, mock_logger):
request = self.get_request()
self.token.delete()
self.middleware(request)
self.assertIsNone(request.token)
self.assertEqual(mock_logger.exception.call_count, 1)
def test_process_exception(self):
request = self.get_request()
request.token = self.token
exception = exceptions.InvalidTokenError("bar")
with self.assertRaises(PermissionDenied):
response = self.middleware.process_exception(request, exception)
self.assertEqual(response.status_code, 403)
self.assertEqual(response.reason_phrase, str(exception))
# no request token = no error log
del request.token
with self.assertRaises(PermissionDenied):
response = self.middleware.process_exception(request, exception)
self.assertEqual(response.status_code, 403)
self.assertEqual(response.reason_phrase, str(exception))
# round it out with a non-token error
response = self.middleware.process_exception(request, Exception("foo"))
self.assertIsNone(response)
def test_extract_json_token__array(self):
"""Test for issue #51."""
request = self.post_request_with_JSON(["foo"])
middleware = RequestTokenMiddleware(lambda r: HttpResponse())
self.assertIsNone(middleware.extract_ajax_token(request))
def test_extract_json_token(self):
request = self.post_request_with_JSON(self.default_payload)
middleware = RequestTokenMiddleware(lambda r: HttpResponse())
self.assertEqual(middleware.extract_ajax_token(request), self.token.jwt())
def test_extract_ajax_token_catches_unicode_error(self):
request = self.factory.post(
"/", data=b"\xa0", content_type="application/json" # Invalid UTF-8 data
)
request.user = self.user
request.session = MockSession()
middleware = RequestTokenMiddleware(get_response=lambda r: HttpResponse())
result = middleware.extract_ajax_token(request)
self.assertIsNone(result)