summaryrefslogtreecommitdiff
path: root/src/mailman/utilities/tests/test_passwords.py
diff options
context:
space:
mode:
authorBarry Warsaw2012-01-01 14:13:46 -0500
committerBarry Warsaw2012-01-01 14:13:46 -0500
commitea48a9360f0c0e0d1974fdcdce6b31821818ee76 (patch)
treebc1b230b020d8954ccbafa57508f441b50c4f961 /src/mailman/utilities/tests/test_passwords.py
parentd1352a018ccc979303fee1d67dca8ee6a588ec69 (diff)
downloadmailman-ea48a9360f0c0e0d1974fdcdce6b31821818ee76.tar.gz
mailman-ea48a9360f0c0e0d1974fdcdce6b31821818ee76.tar.zst
mailman-ea48a9360f0c0e0d1974fdcdce6b31821818ee76.zip
Diffstat (limited to 'src/mailman/utilities/tests/test_passwords.py')
-rw-r--r--src/mailman/utilities/tests/test_passwords.py204
1 files changed, 0 insertions, 204 deletions
diff --git a/src/mailman/utilities/tests/test_passwords.py b/src/mailman/utilities/tests/test_passwords.py
deleted file mode 100644
index 058cf97de..000000000
--- a/src/mailman/utilities/tests/test_passwords.py
+++ /dev/null
@@ -1,204 +0,0 @@
-# Copyright (C) 2007-2011 by the Free Software Foundation, Inc.
-#
-# This file is part of GNU Mailman.
-#
-# GNU Mailman is free software: you can redistribute it and/or modify it under
-# the terms of the GNU General Public License as published by the Free
-# Software Foundation, either version 3 of the License, or (at your option)
-# any later version.
-#
-# GNU Mailman is distributed in the hope that it will be useful, but WITHOUT
-# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
-# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
-# more details.
-#
-# You should have received a copy of the GNU General Public License along with
-# GNU Mailman. If not, see <http://www.gnu.org/licenses/>.
-
-"""Unit tests for the passwords module."""
-
-from __future__ import absolute_import, unicode_literals
-
-__metaclass__ = type
-__all__ = [
- ]
-
-
-import unittest
-
-from itertools import izip_longest
-
-from mailman.config import config
-from mailman.core import errors
-from mailman.testing.layers import ConfigLayer
-from mailman.utilities import passwords
-
-
-
-class PasswordsTestBase:
- scheme = None
-
- def setUp(self):
- # passwords; 8-bit or unicode strings; ascii or binary
- self.pw8a = b'abc'
- self.pw8b = b'abc\xc3\xbf' # 'abc\xff'
- self.pwub = b'abc\xff'
- # bad password; 8-bit or unicode; ascii or binary
- self.bad8a = b'xyz'
- self.bad8b = b'xyz\xc3\xbf' # 'xyz\xff'
- self.badub = b'xyz\xff'
-
- def test_passwords(self):
- unless = self.failUnless
- failif = self.failIf
- secret = passwords.make_secret(self.pw8a, self.scheme)
- unless(passwords.check_response(secret, self.pw8a))
- failif(passwords.check_response(secret, self.bad8a))
-
- def test_passwords_with_funky_chars(self):
- unless = self.failUnless
- failif = self.failIf
- secret = passwords.make_secret(self.pw8b, self.scheme)
- unless(passwords.check_response(secret, self.pw8b))
- failif(passwords.check_response(secret, self.bad8b))
-
- def test_unicode_passwords_with_funky_chars(self):
- unless = self.failUnless
- failif = self.failIf
- secret = passwords.make_secret(self.pwub, self.scheme)
- unless(passwords.check_response(secret, self.pwub))
- failif(passwords.check_response(secret, self.badub))
-
-
-
-class TestBogusPasswords(PasswordsTestBase, unittest.TestCase):
- scheme = -1
-
- def test_passwords(self):
- self.assertRaises(errors.BadPasswordSchemeError,
- passwords.make_secret, self.pw8a, self.scheme)
-
- def test_passwords_with_funky_chars(self):
- self.assertRaises(errors.BadPasswordSchemeError,
- passwords.make_secret, self.pw8b, self.scheme)
-
- def test_unicode_passwords_with_funky_chars(self):
- self.assertRaises(errors.BadPasswordSchemeError,
- passwords.make_secret, self.pwub, self.scheme)
-
-
-
-class TestNonePasswords(PasswordsTestBase, unittest.TestCase):
- scheme = passwords.Schemes.no_scheme
-
- def test_passwords(self):
- failif = self.failIf
- secret = passwords.make_secret(self.pw8a, self.scheme)
- failif(passwords.check_response(secret, self.pw8a))
- failif(passwords.check_response(secret, self.bad8a))
-
- def test_passwords_with_funky_chars(self):
- failif = self.failIf
- secret = passwords.make_secret(self.pw8b, self.scheme)
- failif(passwords.check_response(secret, self.pw8b))
- failif(passwords.check_response(secret, self.bad8b))
-
- def test_unicode_passwords_with_funky_chars(self):
- failif = self.failIf
- secret = passwords.make_secret(self.pwub, self.scheme)
- failif(passwords.check_response(secret, self.pwub))
- failif(passwords.check_response(secret, self.badub))
-
-
-
-class TestCleartextPasswords(PasswordsTestBase, unittest.TestCase):
- scheme = passwords.Schemes.cleartext
-
-
-class TestSHAPasswords(PasswordsTestBase, unittest.TestCase):
- scheme = passwords.Schemes.sha
-
-
-class TestSSHAPasswords(PasswordsTestBase, unittest.TestCase):
- scheme = passwords.Schemes.ssha
-
-
-class TestPBKDF2Passwords(PasswordsTestBase, unittest.TestCase):
- scheme = passwords.Schemes.pbkdf2
-
-
-
-class TestSchemeLookup(unittest.TestCase):
- def test_scheme_name_lookup(self):
- unless = self.failUnless
- unless(passwords.lookup_scheme('NONE') is passwords.Schemes.no_scheme)
- unless(passwords.lookup_scheme('CLEARTEXT') is
- passwords.Schemes.cleartext)
- unless(passwords.lookup_scheme('SHA') is passwords.Schemes.sha)
- unless(passwords.lookup_scheme('SSHA') is passwords.Schemes.ssha)
- unless(passwords.lookup_scheme('PBKDF2') is passwords.Schemes.pbkdf2)
- unless(passwords.lookup_scheme(' -bogus- ') is None)
-
-
-
-# See itertools doc page examples.
-def _grouper(seq):
- args = [iter(seq)] * 2
- return list(izip_longest(*args))
-
-
-class TestPasswordGeneration(unittest.TestCase):
- layer = ConfigLayer
-
- def test_default_user_friendly_password_length(self):
- self.assertEqual(len(passwords.make_user_friendly_password()),
- int(config.passwords.password_length))
-
- def test_provided_user_friendly_password_length(self):
- self.assertEqual(len(passwords.make_user_friendly_password(12)), 12)
-
- def test_provided_odd_user_friendly_password_length(self):
- self.assertEqual(len(passwords.make_user_friendly_password(15)), 15)
-
- def test_user_friendly_password(self):
- password = passwords.make_user_friendly_password()
- for pair in _grouper(password):
- # There will always be one vowel and one non-vowel.
- vowel = (pair[0] if pair[0] in 'aeiou' else pair[1])
- consonant = (pair[0] if pair[0] not in 'aeiou' else pair[1])
- self.assertTrue(vowel in 'aeiou', vowel)
- self.assertTrue(consonant not in 'aeiou', consonant)
-
- def test_encrypt_password_plaintext_default_scheme(self):
- # Test that a plain text password gets encrypted.
- self.assertEqual(passwords.encrypt_password('abc'),
- '{CLEARTEXT}abc')
-
- def test_encrypt_password_plaintext(self):
- # Test that a plain text password gets encrypted with the given scheme.
- scheme = passwords.Schemes.sha
- self.assertEqual(passwords.encrypt_password('abc', scheme),
- '{SHA}qZk-NkcGgWq6PiVxeFDCbJzQ2J0=')
-
- def test_encrypt_password_plaintext_by_scheme_name(self):
- # Test that a plain text password gets encrypted with the given
- # scheme, which is given by name.
- self.assertEqual(passwords.encrypt_password('abc', 'cleartext'),
- '{CLEARTEXT}abc')
-
- def test_encrypt_password_already_encrypted_default_scheme(self):
- # Test that a password which is already encrypted is return unchanged.
- self.assertEqual(passwords.encrypt_password('{SHA}abc'), '{SHA}abc')
-
- def test_encrypt_password_already_encrypted(self):
- # Test that a password which is already encrypted is return unchanged,
- # ignoring any requested scheme.
- scheme = passwords.Schemes.cleartext
- self.assertEqual(passwords.encrypt_password('{SHA}abc', scheme),
- '{SHA}abc')
-
- def test_encrypt_password_password_value_error(self):
- self.assertRaises(ValueError, passwords.encrypt_password, 7)
-
- def test_encrypt_password_scheme_value_error(self):
- self.assertRaises(ValueError, passwords.encrypt_password, 'abc', 'foo')