321
290
if sys.platform == 'win32':
322
291
os.environ['BZR_HOME'] = \
323
292
r'C:\Documents and Settings\bogus\Application Data'
325
'C:/Documents and Settings/bogus/Application Data/bazaar/2.0'
327
self.bzr_home = '/home/bogus/.bazaar'
329
294
def test_config_dir(self):
330
self.assertEqual(config.config_dir(), self.bzr_home)
295
if sys.platform == 'win32':
296
self.assertEqual(config.config_dir(),
297
'C:/Documents and Settings/bogus/Application Data/bazaar/2.0')
299
self.assertEqual(config.config_dir(), '/home/bogus/.bazaar')
332
301
def test_config_filename(self):
333
self.assertEqual(config.config_filename(),
334
self.bzr_home + '/bazaar.conf')
302
if sys.platform == 'win32':
303
self.assertEqual(config.config_filename(),
304
'C:/Documents and Settings/bogus/Application Data/bazaar/2.0/bazaar.conf')
306
self.assertEqual(config.config_filename(),
307
'/home/bogus/.bazaar/bazaar.conf')
336
309
def test_branches_config_filename(self):
337
self.assertEqual(config.branches_config_filename(),
338
self.bzr_home + '/branches.conf')
310
if sys.platform == 'win32':
311
self.assertEqual(config.branches_config_filename(),
312
'C:/Documents and Settings/bogus/Application Data/bazaar/2.0/branches.conf')
314
self.assertEqual(config.branches_config_filename(),
315
'/home/bogus/.bazaar/branches.conf')
340
317
def test_locations_config_filename(self):
341
self.assertEqual(config.locations_config_filename(),
342
self.bzr_home + '/locations.conf')
344
def test_authentication_config_filename(self):
345
self.assertEqual(config.authentication_config_filename(),
346
self.bzr_home + '/authentication.conf')
349
class TestIniConfig(tests.TestCase):
318
if sys.platform == 'win32':
319
self.assertEqual(config.locations_config_filename(),
320
'C:/Documents and Settings/bogus/Application Data/bazaar/2.0/locations.conf')
322
self.assertEqual(config.locations_config_filename(),
323
'/home/bogus/.bazaar/locations.conf')
325
class TestIniConfig(TestCase):
351
327
def test_contructs(self):
352
328
my_config = config.IniBasedConfig("nothing")
1175
1107
self.assertEqual(value, 'value3-top')
1176
1108
value = tree_config.get_option('key3', 'SECTION')
1177
1109
self.assertEqual(value, 'value3-section')
1180
class TestTransportConfig(tests.TestCaseWithTransport):
1182
def test_get_value(self):
1183
"""Test that retreiving a value from a section is possible"""
1184
bzrdir_config = config.TransportConfig(transport.get_transport('.'),
1186
bzrdir_config.set_option('value', 'key', 'SECTION')
1187
bzrdir_config.set_option('value2', 'key2')
1188
bzrdir_config.set_option('value3-top', 'key3')
1189
bzrdir_config.set_option('value3-section', 'key3', 'SECTION')
1190
value = bzrdir_config.get_option('key', 'SECTION')
1191
self.assertEqual(value, 'value')
1192
value = bzrdir_config.get_option('key2')
1193
self.assertEqual(value, 'value2')
1194
self.assertEqual(bzrdir_config.get_option('non-existant'), None)
1195
value = bzrdir_config.get_option('non-existant', 'SECTION')
1196
self.assertEqual(value, None)
1197
value = bzrdir_config.get_option('non-existant', default='default')
1198
self.assertEqual(value, 'default')
1199
self.assertEqual(bzrdir_config.get_option('key2', 'NOSECTION'), None)
1200
value = bzrdir_config.get_option('key2', 'NOSECTION',
1202
self.assertEqual(value, 'default')
1203
value = bzrdir_config.get_option('key3')
1204
self.assertEqual(value, 'value3-top')
1205
value = bzrdir_config.get_option('key3', 'SECTION')
1206
self.assertEqual(value, 'value3-section')
1208
def test_set_unset_default_stack_on(self):
1209
my_dir = self.make_bzrdir('.')
1210
bzrdir_config = config.BzrDirConfig(my_dir.transport)
1211
self.assertIs(None, bzrdir_config.get_default_stack_on())
1212
bzrdir_config.set_default_stack_on('Foo')
1213
self.assertEqual('Foo', bzrdir_config._config.get_option(
1214
'default_stack_on'))
1215
self.assertEqual('Foo', bzrdir_config.get_default_stack_on())
1216
bzrdir_config.set_default_stack_on(None)
1217
self.assertIs(None, bzrdir_config.get_default_stack_on())
1220
class TestAuthenticationConfigFile(tests.TestCase):
1221
"""Test the authentication.conf file matching"""
1223
def _got_user_passwd(self, expected_user, expected_password,
1224
config, *args, **kwargs):
1225
credentials = config.get_credentials(*args, **kwargs)
1226
if credentials is None:
1230
user = credentials['user']
1231
password = credentials['password']
1232
self.assertEquals(expected_user, user)
1233
self.assertEquals(expected_password, password)
1235
def test_empty_config(self):
1236
conf = config.AuthenticationConfig(_file=StringIO())
1237
self.assertEquals({}, conf._get_config())
1238
self._got_user_passwd(None, None, conf, 'http', 'foo.net')
1240
def test_missing_auth_section_header(self):
1241
conf = config.AuthenticationConfig(_file=StringIO('foo = bar'))
1242
self.assertRaises(ValueError, conf.get_credentials, 'ftp', 'foo.net')
1244
def test_auth_section_header_not_closed(self):
1245
conf = config.AuthenticationConfig(_file=StringIO('[DEF'))
1246
self.assertRaises(errors.ParseConfigError, conf._get_config)
1248
def test_auth_value_not_boolean(self):
1249
conf = config.AuthenticationConfig(_file=StringIO(
1253
verify_certificates=askme # Error: Not a boolean
1255
self.assertRaises(ValueError, conf.get_credentials, 'ftp', 'foo.net')
1257
def test_auth_value_not_int(self):
1258
conf = config.AuthenticationConfig(_file=StringIO(
1262
port=port # Error: Not an int
1264
self.assertRaises(ValueError, conf.get_credentials, 'ftp', 'foo.net')
1266
def test_credentials_for_scheme_host(self):
1267
conf = config.AuthenticationConfig(_file=StringIO(
1268
"""# Identity on foo.net
1273
password=secret-pass
1276
self._got_user_passwd('joe', 'secret-pass', conf, 'ftp', 'foo.net')
1278
self._got_user_passwd(None, None, conf, 'http', 'foo.net')
1280
self._got_user_passwd(None, None, conf, 'ftp', 'bar.net')
1282
def test_credentials_for_host_port(self):
1283
conf = config.AuthenticationConfig(_file=StringIO(
1284
"""# Identity on foo.net
1290
password=secret-pass
1293
self._got_user_passwd('joe', 'secret-pass',
1294
conf, 'ftp', 'foo.net', port=10021)
1296
self._got_user_passwd(None, None, conf, 'ftp', 'foo.net')
1298
def test_for_matching_host(self):
1299
conf = config.AuthenticationConfig(_file=StringIO(
1300
"""# Identity on foo.net
1306
[sourceforge domain]
1313
self._got_user_passwd('georges', 'bendover',
1314
conf, 'bzr', 'foo.bzr.sf.net')
1316
self._got_user_passwd(None, None,
1317
conf, 'bzr', 'bbzr.sf.net')
1319
def test_for_matching_host_None(self):
1320
conf = config.AuthenticationConfig(_file=StringIO(
1321
"""# Identity on foo.net
1331
self._got_user_passwd('joe', 'joepass',
1332
conf, 'bzr', 'quux.net')
1333
# no host but different scheme
1334
self._got_user_passwd('georges', 'bendover',
1335
conf, 'ftp', 'quux.net')
1337
def test_credentials_for_path(self):
1338
conf = config.AuthenticationConfig(_file=StringIO(
1354
self._got_user_passwd(None, None,
1355
conf, 'http', host='bar.org', path='/dir3')
1357
self._got_user_passwd('georges', 'bendover',
1358
conf, 'http', host='bar.org', path='/dir2')
1360
self._got_user_passwd('jim', 'jimpass',
1361
conf, 'http', host='bar.org',path='/dir1/subdir')
1363
def test_credentials_for_user(self):
1364
conf = config.AuthenticationConfig(_file=StringIO(
1373
self._got_user_passwd('jim', 'jimpass',
1374
conf, 'http', 'bar.org')
1376
self._got_user_passwd('jim', 'jimpass',
1377
conf, 'http', 'bar.org', user='jim')
1378
# Don't get a different user if one is specified
1379
self._got_user_passwd(None, None,
1380
conf, 'http', 'bar.org', user='georges')
1382
def test_credentials_for_user_without_password(self):
1383
conf = config.AuthenticationConfig(_file=StringIO(
1390
# Get user but no password
1391
self._got_user_passwd('jim', None,
1392
conf, 'http', 'bar.org')
1394
def test_verify_certificates(self):
1395
conf = config.AuthenticationConfig(_file=StringIO(
1402
verify_certificates=False
1409
credentials = conf.get_credentials('https', 'bar.org')
1410
self.assertEquals(False, credentials.get('verify_certificates'))
1411
credentials = conf.get_credentials('https', 'foo.net')
1412
self.assertEquals(True, credentials.get('verify_certificates'))
1415
class TestAuthenticationConfig(tests.TestCase):
1416
"""Test AuthenticationConfig behaviour"""
1418
def _check_default_prompt(self, expected_prompt_format, scheme,
1419
host=None, port=None, realm=None, path=None):
1422
user, password = 'jim', 'precious'
1423
expected_prompt = expected_prompt_format % {
1424
'scheme': scheme, 'host': host, 'port': port,
1425
'user': user, 'realm': realm}
1427
stdout = tests.StringIOWrapper()
1428
ui.ui_factory = tests.TestUIFactory(stdin=password + '\n',
1430
# We use an empty conf so that the user is always prompted
1431
conf = config.AuthenticationConfig()
1432
self.assertEquals(password,
1433
conf.get_password(scheme, host, user, port=port,
1434
realm=realm, path=path))
1435
self.assertEquals(stdout.getvalue(), expected_prompt)
1437
def test_default_prompts(self):
1438
# HTTP prompts can't be tested here, see test_http.py
1439
self._check_default_prompt('FTP %(user)s@%(host)s password: ', 'ftp')
1440
self._check_default_prompt('FTP %(user)s@%(host)s:%(port)d password: ',
1443
self._check_default_prompt('SSH %(user)s@%(host)s:%(port)d password: ',
1445
# SMTP port handling is a bit special (it's handled if embedded in the
1447
# FIXME: should we: forbid that, extend it to other schemes, leave
1448
# things as they are that's fine thank you ?
1449
self._check_default_prompt('SMTP %(user)s@%(host)s password: ',
1451
self._check_default_prompt('SMTP %(user)s@%(host)s password: ',
1452
'smtp', host='bar.org:10025')
1453
self._check_default_prompt(
1454
'SMTP %(user)s@%(host)s:%(port)d password: ',
1457
def test_ssh_password_emits_warning(self):
1458
conf = config.AuthenticationConfig(_file=StringIO(
1466
entered_password = 'typed-by-hand'
1467
stdout = tests.StringIOWrapper()
1468
ui.ui_factory = tests.TestUIFactory(stdin=entered_password + '\n',
1471
# Since the password defined in the authentication config is ignored,
1472
# the user is prompted
1473
self.assertEquals(entered_password,
1474
conf.get_password('ssh', 'bar.org', user='jim'))
1475
self.assertContainsRe(
1476
self._get_log(keep_log_file=True),
1477
'password ignored in section \[ssh with password\]')
1479
def test_ssh_without_password_doesnt_emit_warning(self):
1480
conf = config.AuthenticationConfig(_file=StringIO(
1487
entered_password = 'typed-by-hand'
1488
stdout = tests.StringIOWrapper()
1489
ui.ui_factory = tests.TestUIFactory(stdin=entered_password + '\n',
1492
# Since the password defined in the authentication config is ignored,
1493
# the user is prompted
1494
self.assertEquals(entered_password,
1495
conf.get_password('ssh', 'bar.org', user='jim'))
1496
# No warning shoud be emitted since there is no password. We are only
1498
self.assertNotContainsRe(
1499
self._get_log(keep_log_file=True),
1500
'password ignored in section \[ssh with password\]')
1503
# FIXME: Once we have a way to declare authentication to all test servers, we
1504
# can implement generic tests.
1505
# test_user_password_in_url
1506
# test_user_in_url_password_from_config
1507
# test_user_in_url_password_prompted
1508
# test_user_in_config
1509
# test_user_getpass.getuser
1510
# test_user_prompted ?
1511
class TestAuthenticationRing(tests.TestCaseWithTransport):