From 7eeaf8a5f693578bc78a538e3a009fc87578348f Mon Sep 17 00:00:00 2001 From: NavaL Date: Fri, 28 Oct 2016 18:30:19 +0200 Subject: adding custom messages per types of auth errors #795 --- service/test/unit/test_authentication.py | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) (limited to 'service/test/unit/test_authentication.py') diff --git a/service/test/unit/test_authentication.py b/service/test/unit/test_authentication.py index 90ef0a7c..3e1b4a10 100644 --- a/service/test/unit/test_authentication.py +++ b/service/test/unit/test_authentication.py @@ -32,7 +32,11 @@ class AuthenticatorTest(unittest.TestCase): mock_bonafide_session.authenticate = Mock(side_effect=SRPAuthError()) with patch('pixelated.authentication.Session', return_value=mock_bonafide_session): with self.assertRaises(UnauthorizedLogin): - yield auth.authenticate('username', 'password') + try: + yield auth.authenticate('username', 'password') + except UnauthorizedLogin as e: + self.assertEqual("User typed wrong password/username combination.", e.message) + raise @inlineCallbacks def test_domain_name_is_stripped_before_making_bonafide_srp_auth(self): @@ -74,7 +78,11 @@ class AuthenticatorTest(unittest.TestCase): username_with_wrong_domain = '%s@%s' % (username_without_domain, 'wrongdomain.org') auth = Authenticator(self._leap_provider) with self.assertRaises(UnauthorizedLogin): - auth.clean_username(username_with_wrong_domain) + try: + auth.clean_username(username_with_wrong_domain) + except UnauthorizedLogin as e: + self.assertEqual("User typed a wrong domain.", e.message) + raise def test_username_with_domain(self): auth = Authenticator(self._leap_provider) -- cgit v1.2.3