This file is indexed.

/usr/lib/python2.7/dist-packages/django_openid_auth/tests/test_admin.py is in python-django-auth-openid 0.5-2.1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
# django-openid-auth -  OpenID integration for django.contrib.auth
#
# Copyright (C) 2009-2013 Canonical Ltd.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
#
# * Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# * Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in the
# documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
# 'AS IS' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
"""
Tests for the django_openid_auth Admin login form replacement.
"""

import os
import unittest

from django.conf import settings
from django.contrib.auth.models import User, AnonymousUser

settings.OPENID_USE_AS_ADMIN_LOGIN = True
from django_openid_auth import admin

from django.test import TestCase


def create_user(is_staff=False, authenticated=True):
    """
    Create and return a user, either the AnonymousUser or a normal Django user,
    setting the is_staff attribute if appropriate.
    """
    if not authenticated:
        return AnonymousUser()
    else:
        user = User(
            username=u'testing', email='testing@example.com',
            is_staff=is_staff)
        user.set_password(u'test')
        user.save()


class SiteAdminTests(TestCase):
    """
    TestCase for accessing /admin/ when the django_openid_auth form replacement
    is in use.
    """

    def test_admin_site_with_openid_login_authenticated_non_staff(self):
        """
        If the request has an authenticated user, who is not flagged as a
        staff member, then they get a failure response.
        """
        create_user()
        self.client.login(username='testing', password='test')
        response = self.client.get('/admin/')
        self.assertEqual(302, response.status_code)
        self.assertEqual('http://testserver/admin/login/?next=/admin/',
                         response['Location'])

    def test_admin_site_with_openid_login_non_authenticated_user(self):
        """
        Unauthenticated users accessing the admin page should be directed to
        the OpenID login url.
        """
        response = self.client.get('/admin/')
        self.assertEqual(302, response.status_code)
        self.assertEqual('http://testserver/admin/login/?next=/admin/',
                         response['Location'])


def suite():
    return unittest.TestLoader().loadTestsFromName(__name__)