e516a2e801
* resolve session leak * cleanup session management functions
54 lines
1.7 KiB
Python
54 lines
1.7 KiB
Python
from pathlib import Path
|
|
|
|
from pytest import MonkeyPatch
|
|
|
|
from mealie.core import security
|
|
from mealie.core.config import get_app_settings
|
|
from mealie.core.dependencies import validate_file_token
|
|
from mealie.db.db_setup import session_context
|
|
from tests.utils.factories import random_string
|
|
|
|
|
|
def test_create_file_token():
|
|
file_path = Path(__file__).parent
|
|
file_token = security.create_file_token(file_path)
|
|
|
|
assert file_path == validate_file_token(file_token)
|
|
|
|
|
|
def test_ldap_authentication_mocked(monkeypatch: MonkeyPatch):
|
|
import ldap
|
|
|
|
user = random_string(10)
|
|
password = random_string(10)
|
|
bind_template = "cn={},dc=example,dc=com"
|
|
base_dn = "(dc=example,dc=com)"
|
|
monkeypatch.setenv("LDAP_AUTH_ENABLED", "true")
|
|
monkeypatch.setenv("LDAP_SERVER_URL", "") # Not needed due to mocking
|
|
monkeypatch.setenv("LDAP_BIND_TEMPLATE", bind_template)
|
|
monkeypatch.setenv("LDAP_BASE_DN", base_dn)
|
|
|
|
class LdapConnMock:
|
|
def simple_bind_s(self, dn, bind_pw):
|
|
assert dn == bind_template.format(user)
|
|
return bind_pw == password
|
|
|
|
def search_s(self, dn, scope, filter, attrlist):
|
|
assert attrlist == ["name", "mail"]
|
|
assert filter == f"(&(objectClass=user)(|(cn={user})(sAMAccountName={user})(mail={user})))"
|
|
assert dn == base_dn
|
|
assert scope == ldap.SCOPE_SUBTREE
|
|
return [()]
|
|
|
|
def ldap_initialize_mock(url):
|
|
assert url == ""
|
|
return LdapConnMock()
|
|
|
|
monkeypatch.setattr(ldap, "initialize", ldap_initialize_mock)
|
|
|
|
get_app_settings.cache_clear()
|
|
|
|
with session_context() as session:
|
|
result = security.authenticate_user(session, user, password)
|
|
|
|
assert result is False
|