[server/test] fix random error in unittest_security
When entering a new Connection, we cache the user and its 'login'
attribute (with no permissions checking).
This test makes 'CWUser.login' unreadable by guests, and then proceeds
to make sure the 'anon' user can actually not read any 'login'
attribute. However, due to the above cnx initialization, anon's login
is actually cached, hence readable. This happens to make the test fail
sometimes depending on the order in which CWUser entities are returned,
because one of them has .complete() called, which as a side effect sets
the attribute cache to None for unreadable attributes.
Call .complete() on both entities to reset the login cache. While this
is still highly debatable, at least it's consistent.
# copyright 2003-2014 LOGILAB S.A. (Paris, FRANCE), all rights reserved.
# contact http://www.logilab.fr/ -- mailto:contact@logilab.fr
#
# This file is part of CubicWeb.
#
# CubicWeb is free software: you can redistribute it and/or modify it under the
# terms of the GNU Lesser General Public License as published by the Free
# Software Foundation, either version 2.1 of the License, or (at your option)
# any later version.
#
# CubicWeb is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
# FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
# details.
#
# You should have received a copy of the GNU Lesser General Public License along
# with CubicWeb. If not, see <http://www.gnu.org/licenses/>.
import re
import sys
from logilab.common.testlib import unittest_main
from cubicweb import Forbidden
from cubicweb.devtools.testlib import CubicWebTC
from cubicweb.view import StartupView
from cubicweb.web import Redirect
class ErrorViewTC(CubicWebTC):
def setUp(self):
super(ErrorViewTC, self).setUp()
self.vreg.config['submit-mail'] = "test@logilab.fr"
self.vreg.config['print-traceback'] = "yes"
def test_error_generation(self):
"""
tests
"""
class MyWrongView(StartupView):
__regid__ = 'my-view'
def call(self):
raise ValueError('This is wrong')
with self.temporary_appobjects(MyWrongView):
with self.admin_access.web_request() as req:
try:
self.view('my-view', req=req)
except Exception as e:
req.data['excinfo'] = sys.exc_info()
req.data['ex'] = e
html = self.view('error', req=req)
self.failUnless(re.search(r'^<input name="__signature" type="hidden" '
'value="[0-9a-f]{32}" />$',
html.source, re.M))
def test_error_submit_nosig(self):
"""
tests that the reportbug controller refuses submission if
there is not content signature
"""
with self.admin_access.web_request() as req:
req.form = {'description': u'toto'}
with self.assertRaises(Forbidden) as cm:
self.ctrl_publish(req, 'reportbug')
def test_error_submit_wrongsig(self):
"""
tests that the reportbug controller refuses submission if the
content signature is invalid
"""
with self.admin_access.web_request() as req:
req.form = {'__signature': 'X',
'description': u'toto'}
with self.assertRaises(Forbidden) as cm:
self.ctrl_publish(req, 'reportbug')
def test_error_submit_ok(self):
"""
tests that the reportbug controller accept the email submission if the
content signature is valid
"""
with self.admin_access.web_request() as req:
sign = self.vreg.config.sign_text('toto')
req.form = {'__signature': sign,
'description': u'toto'}
with self.assertRaises(Redirect) as cm:
self.ctrl_publish(req, 'reportbug')
if __name__ == '__main__':
unittest_main()