diff options
author | Nathan Yergler <nathan@yergler.net> | 2011-11-26 15:32:35 -0800 |
---|---|---|
committer | Nathan Yergler <nathan@yergler.net> | 2011-11-26 15:32:35 -0800 |
commit | ca9ebfe2e05c83248d647b442ff29a9758a6a05c (patch) | |
tree | cc1a3cf8e6cb20066402e957656e93e061aff573 /mediagoblin/tests/test_csrf_middleware.py | |
parent | 91cf67385a78a59af7874df327b96f7ea0b4259b (diff) | |
download | mediagoblin-ca9ebfe2e05c83248d647b442ff29a9758a6a05c.tar.lz mediagoblin-ca9ebfe2e05c83248d647b442ff29a9758a6a05c.tar.xz mediagoblin-ca9ebfe2e05c83248d647b442ff29a9758a6a05c.zip |
Issue 680 Allow decorating views to prevent CSRF protection.
Diffstat (limited to 'mediagoblin/tests/test_csrf_middleware.py')
-rw-r--r-- | mediagoblin/tests/test_csrf_middleware.py | 21 |
1 files changed, 20 insertions, 1 deletions
diff --git a/mediagoblin/tests/test_csrf_middleware.py b/mediagoblin/tests/test_csrf_middleware.py index 691f10b9..c8fca23a 100644 --- a/mediagoblin/tests/test_csrf_middleware.py +++ b/mediagoblin/tests/test_csrf_middleware.py @@ -27,7 +27,7 @@ from mediagoblin import mg_globals def test_csrf_cookie_set(test_app): cookie_name = mg_globals.app_config['csrf_cookie_name'] - + # get login page response = test_app.get('/auth/login/') @@ -69,3 +69,22 @@ def test_csrf_token_must_match(test_app): mg_globals.app_config['csrf_cookie_name'])}, extra_environ={'gmg.verify_csrf': True}).\ status_int == 200 + +@setup_fresh_app +def test_csrf_exempt(test_app): + + # monkey with the views to decorate a known endpoint + import mediagoblin.auth.views + from mediagoblin.meddleware.csrf import csrf_exempt + + mediagoblin.auth.views.login = csrf_exempt( + mediagoblin.auth.views.login + ) + + # construct a request with no cookie or form token + assert test_app.post('/auth/login/', + extra_environ={'gmg.verify_csrf': True}, + expect_errors=False).status_int == 200 + + # restore the CSRF protection in case other tests expect it + mediagoblin.auth.views.login.csrf_enabled = True |