Author: jacob
Date: 2008-09-02 16:10:00 -0500 (Tue, 02 Sep 2008)
New Revision: 8877

Modified:
   django/branches/0.91-bugfixes/django/contrib/admin/templates/admin/login.html
   django/branches/0.91-bugfixes/django/contrib/admin/views/decorators.py
   django/branches/0.95-bugfixes/django/contrib/admin/templates/admin/login.html
   django/branches/0.95-bugfixes/django/contrib/admin/views/decorators.py
   django/branches/0.96-bugfixes/django/contrib/admin/templates/admin/login.html
   django/branches/0.96-bugfixes/django/contrib/admin/views/decorators.py
   django/trunk/django/contrib/admin/sites.py
   django/trunk/django/contrib/admin/templates/admin/login.html
   django/trunk/django/contrib/admin/views/decorators.py
   django/trunk/tests/regressiontests/admin_views/tests.py
Log:
Security fix. Announcement forthcoming.


Modified: 
django/branches/0.91-bugfixes/django/contrib/admin/templates/admin/login.html
===================================================================
--- 
django/branches/0.91-bugfixes/django/contrib/admin/templates/admin/login.html   
    2008-09-02 20:06:04 UTC (rev 8876)
+++ 
django/branches/0.91-bugfixes/django/contrib/admin/templates/admin/login.html   
    2008-09-02 21:10:00 UTC (rev 8877)
@@ -17,7 +17,6 @@
 <p class="aligned">
 <label for="id_password">{% trans 'Password:' %}</label> <input 
type="password" name="password" id="id_password" />
 <input type="hidden" name="this_is_the_login_form" value="1" />
-<input type="hidden" name="post_data" value="{{ post_data }}" />{% comment %} 
<span class="help">{% trans 'Have you <a href="/password_reset/">forgotten your 
password</a>?' %}</span>{% endcomment %}
 </p>
 
 <div class="aligned ">

Modified: django/branches/0.91-bugfixes/django/contrib/admin/views/decorators.py
===================================================================
--- django/branches/0.91-bugfixes/django/contrib/admin/views/decorators.py      
2008-09-02 20:06:04 UTC (rev 8876)
+++ django/branches/0.91-bugfixes/django/contrib/admin/views/decorators.py      
2008-09-02 21:10:00 UTC (rev 8877)
@@ -4,42 +4,19 @@
 from django.utils import httpwrappers
 from django.utils.html import escape
 from django.utils.translation import gettext_lazy
-import base64, datetime, md5
-import cPickle as pickle
+import base64, datetime
 
 ERROR_MESSAGE = gettext_lazy("Please enter a correct username and password. 
Note that both fields are case-sensitive.")
 LOGIN_FORM_KEY = 'this_is_the_login_form'
 
 def _display_login_form(request, error_message=''):
     request.session.set_test_cookie()
-    if request.POST and request.POST.has_key('post_data'):
-        # User has failed login BUT has previously saved post data.
-        post_data = request.POST['post_data']
-    elif request.POST:
-        # User's session must have expired; save their post data.
-        post_data = _encode_post_data(request.POST)
-    else:
-        post_data = _encode_post_data({})
     return render_to_response('admin/login', {
         'title': _('Log in'),
         'app_path': escape(request.path),
-        'post_data': post_data,
         'error_message': error_message
     }, context_instance=DjangoContext(request))
 
-def _encode_post_data(post_data):
-    pickled = pickle.dumps(post_data)
-    pickled_md5 = md5.new(pickled + SECRET_KEY).hexdigest()
-    return base64.encodestring(pickled + pickled_md5)
-
-def _decode_post_data(encoded_data):
-    encoded_data = base64.decodestring(encoded_data)
-    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
-    if md5.new(pickled + SECRET_KEY).hexdigest() != tamper_check:
-        from django.core.exceptions import SuspiciousOperation
-        raise SuspiciousOperation, "User may have tampered with session 
cookie."
-    return pickle.loads(pickled)
-
 def staff_member_required(view_func):
     """
     Decorator for views that checks that the user is logged in and is a staff
@@ -48,10 +25,6 @@
     def _checklogin(request, *args, **kwargs):
         if not request.user.is_anonymous() and request.user.is_staff:
             # The user is valid. Continue to the admin page.
-            if request.POST.has_key('post_data'):
-                # User must have re-authenticated through a different window
-                # or tab.
-                request.POST = _decode_post_data(request.POST['post_data'])
             return view_func(request, *args, **kwargs)
 
         assert hasattr(request, 'session'), "The Django admin requires session 
middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 
'django.middleware.sessions.SessionMiddleware'."
@@ -59,7 +32,7 @@
         # If this isn't already the login page, display it.
         if not request.POST.has_key(LOGIN_FORM_KEY):
             if request.POST:
-                message = _("Please log in again, because your session has 
expired. Don't worry: Your submission has been saved.")
+                message = _("Please log in again, because your session has 
expired.")
             else:
                 message = ""
             return _display_login_form(request, message)
@@ -91,16 +64,7 @@
                 request.session[users.SESSION_KEY] = user.id
                 user.last_login = datetime.datetime.now()
                 user.save()
-                if request.POST.has_key('post_data'):
-                    post_data = _decode_post_data(request.POST['post_data'])
-                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
-                        # overwrite request.POST with the saved post_data, and 
continue
-                        request.POST = post_data
-                        request.user = user
-                        return view_func(request, *args, **kwargs)
-                    else:
-                        request.session.delete_test_cookie()
-                        return httpwrappers.HttpResponseRedirect(request.path)
+                return httpwrappers.HttpResponseRedirect(request.path)
             else:
                 return _display_login_form(request, ERROR_MESSAGE)
 

Modified: 
django/branches/0.95-bugfixes/django/contrib/admin/templates/admin/login.html
===================================================================
--- 
django/branches/0.95-bugfixes/django/contrib/admin/templates/admin/login.html   
    2008-09-02 20:06:04 UTC (rev 8876)
+++ 
django/branches/0.95-bugfixes/django/contrib/admin/templates/admin/login.html   
    2008-09-02 21:10:00 UTC (rev 8877)
@@ -19,7 +19,6 @@
   <div class="form-row">
     <label for="id_password">{% trans 'Password:' %}</label> <input 
type="password" name="password" id="id_password" />
     <input type="hidden" name="this_is_the_login_form" value="1" />
-    <input type="hidden" name="post_data" value="{{ post_data }}" /> {% 
comment %}<span class="help">{% trans 'Have you <a 
href="/password_reset/">forgotten your password</a>?' %}</span>{% endcomment %}
   </div>
   <div class="submit-row">
     <label>&nbsp;</label><input type="submit" value="{% trans 'Log in' %}" />

Modified: django/branches/0.95-bugfixes/django/contrib/admin/views/decorators.py
===================================================================
--- django/branches/0.95-bugfixes/django/contrib/admin/views/decorators.py      
2008-09-02 20:06:04 UTC (rev 8876)
+++ django/branches/0.95-bugfixes/django/contrib/admin/views/decorators.py      
2008-09-02 21:10:00 UTC (rev 8877)
@@ -5,42 +5,19 @@
 from django.shortcuts import render_to_response
 from django.utils.html import escape
 from django.utils.translation import gettext_lazy
-import base64, datetime, md5
-import cPickle as pickle
+import base64, datetime
 
 ERROR_MESSAGE = gettext_lazy("Please enter a correct username and password. 
Note that both fields are case-sensitive.")
 LOGIN_FORM_KEY = 'this_is_the_login_form'
 
 def _display_login_form(request, error_message=''):
     request.session.set_test_cookie()
-    if request.POST and request.POST.has_key('post_data'):
-        # User has failed login BUT has previously saved post data.
-        post_data = request.POST['post_data']
-    elif request.POST:
-        # User's session must have expired; save their post data.
-        post_data = _encode_post_data(request.POST)
-    else:
-        post_data = _encode_post_data({})
     return render_to_response('admin/login.html', {
         'title': _('Log in'),
         'app_path': escape(request.path),
-        'post_data': post_data,
         'error_message': error_message
     }, context_instance=template.RequestContext(request))
 
-def _encode_post_data(post_data):
-    pickled = pickle.dumps(post_data)
-    pickled_md5 = md5.new(pickled + settings.SECRET_KEY).hexdigest()
-    return base64.encodestring(pickled + pickled_md5)
-
-def _decode_post_data(encoded_data):
-    encoded_data = base64.decodestring(encoded_data)
-    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
-    if md5.new(pickled + settings.SECRET_KEY).hexdigest() != tamper_check:
-        from django.core.exceptions import SuspiciousOperation
-        raise SuspiciousOperation, "User may have tampered with session 
cookie."
-    return pickle.loads(pickled)
-
 def staff_member_required(view_func):
     """
     Decorator for views that checks that the user is logged in and is a staff
@@ -49,10 +26,6 @@
     def _checklogin(request, *args, **kwargs):
         if request.user.is_authenticated() and request.user.is_staff:
             # The user is valid. Continue to the admin page.
-            if request.POST.has_key('post_data'):
-                # User must have re-authenticated through a different window
-                # or tab.
-                request.POST = _decode_post_data(request.POST['post_data'])
             return view_func(request, *args, **kwargs)
 
         assert hasattr(request, 'session'), "The Django admin requires session 
middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 
'django.contrib.sessions.middleware.SessionMiddleware'."
@@ -60,7 +33,7 @@
         # If this isn't already the login page, display it.
         if not request.POST.has_key(LOGIN_FORM_KEY):
             if request.POST:
-                message = _("Please log in again, because your session has 
expired. Don't worry: Your submission has been saved.")
+                message = _("Please log in again, because your session has 
expired.")
             else:
                 message = ""
             return _display_login_form(request, message)
@@ -93,16 +66,7 @@
                 # TODO: set last_login with an event.
                 user.last_login = datetime.datetime.now()
                 user.save()
-                if request.POST.has_key('post_data'):
-                    post_data = _decode_post_data(request.POST['post_data'])
-                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
-                        # overwrite request.POST with the saved post_data, and 
continue
-                        request.POST = post_data
-                        request.user = user
-                        return view_func(request, *args, **kwargs)
-                    else:
-                        request.session.delete_test_cookie()
-                        return http.HttpResponseRedirect(request.path)
+                return http.HttpResponseRedirect(request.path)
             else:
                 return _display_login_form(request, ERROR_MESSAGE)
 

Modified: 
django/branches/0.96-bugfixes/django/contrib/admin/templates/admin/login.html
===================================================================
--- 
django/branches/0.96-bugfixes/django/contrib/admin/templates/admin/login.html   
    2008-09-02 20:06:04 UTC (rev 8876)
+++ 
django/branches/0.96-bugfixes/django/contrib/admin/templates/admin/login.html   
    2008-09-02 21:10:00 UTC (rev 8877)
@@ -19,7 +19,6 @@
   <div class="form-row">
     <label for="id_password">{% trans 'Password:' %}</label> <input 
type="password" name="password" id="id_password" />
     <input type="hidden" name="this_is_the_login_form" value="1" />
-    <input type="hidden" name="post_data" value="{{ post_data }}" /> {#<span 
class="help">{% trans 'Have you <a href="/password_reset/">forgotten your 
password</a>?' %}</span>#}
   </div>
   <div class="submit-row">
     <label>&nbsp;</label><input type="submit" value="{% trans 'Log in' %}" />

Modified: django/branches/0.96-bugfixes/django/contrib/admin/views/decorators.py
===================================================================
--- django/branches/0.96-bugfixes/django/contrib/admin/views/decorators.py      
2008-09-02 20:06:04 UTC (rev 8876)
+++ django/branches/0.96-bugfixes/django/contrib/admin/views/decorators.py      
2008-09-02 21:10:00 UTC (rev 8877)
@@ -5,42 +5,19 @@
 from django.shortcuts import render_to_response
 from django.utils.html import escape
 from django.utils.translation import gettext_lazy
-import base64, datetime, md5
-import cPickle as pickle
+import base64, datetime
 
 ERROR_MESSAGE = gettext_lazy("Please enter a correct username and password. 
Note that both fields are case-sensitive.")
 LOGIN_FORM_KEY = 'this_is_the_login_form'
 
 def _display_login_form(request, error_message=''):
     request.session.set_test_cookie()
-    if request.POST and request.POST.has_key('post_data'):
-        # User has failed login BUT has previously saved post data.
-        post_data = request.POST['post_data']
-    elif request.POST:
-        # User's session must have expired; save their post data.
-        post_data = _encode_post_data(request.POST)
-    else:
-        post_data = _encode_post_data({})
     return render_to_response('admin/login.html', {
         'title': _('Log in'),
         'app_path': escape(request.path),
-        'post_data': post_data,
         'error_message': error_message
     }, context_instance=template.RequestContext(request))
 
-def _encode_post_data(post_data):
-    pickled = pickle.dumps(post_data)
-    pickled_md5 = md5.new(pickled + settings.SECRET_KEY).hexdigest()
-    return base64.encodestring(pickled + pickled_md5)
-
-def _decode_post_data(encoded_data):
-    encoded_data = base64.decodestring(encoded_data)
-    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
-    if md5.new(pickled + settings.SECRET_KEY).hexdigest() != tamper_check:
-        from django.core.exceptions import SuspiciousOperation
-        raise SuspiciousOperation, "User may have tampered with session 
cookie."
-    return pickle.loads(pickled)
-
 def staff_member_required(view_func):
     """
     Decorator for views that checks that the user is logged in and is a staff
@@ -49,10 +26,6 @@
     def _checklogin(request, *args, **kwargs):
         if request.user.is_authenticated() and request.user.is_staff:
             # The user is valid. Continue to the admin page.
-            if request.POST.has_key('post_data'):
-                # User must have re-authenticated through a different window
-                # or tab.
-                request.POST = _decode_post_data(request.POST['post_data'])
             return view_func(request, *args, **kwargs)
 
         assert hasattr(request, 'session'), "The Django admin requires session 
middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 
'django.contrib.sessions.middleware.SessionMiddleware'."
@@ -60,7 +33,7 @@
         # If this isn't already the login page, display it.
         if not request.POST.has_key(LOGIN_FORM_KEY):
             if request.POST:
-                message = _("Please log in again, because your session has 
expired. Don't worry: Your submission has been saved.")
+                message = _("Please log in again, because your session has 
expired.")
             else:
                 message = ""
             return _display_login_form(request, message)
@@ -93,16 +66,7 @@
                 # TODO: set last_login with an event.
                 user.last_login = datetime.datetime.now()
                 user.save()
-                if request.POST.has_key('post_data'):
-                    post_data = _decode_post_data(request.POST['post_data'])
-                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
-                        # overwrite request.POST with the saved post_data, and 
continue
-                        request.POST = post_data
-                        request.user = user
-                        return view_func(request, *args, **kwargs)
-                    else:
-                        request.session.delete_test_cookie()
-                        return http.HttpResponseRedirect(request.path)
+                return http.HttpResponseRedirect(request.path)
             else:
                 return _display_login_form(request, ERROR_MESSAGE)
 

Modified: django/trunk/django/contrib/admin/sites.py
===================================================================
--- django/trunk/django/contrib/admin/sites.py  2008-09-02 20:06:04 UTC (rev 
8876)
+++ django/trunk/django/contrib/admin/sites.py  2008-09-02 21:10:00 UTC (rev 
8877)
@@ -1,7 +1,5 @@
 import base64
-import cPickle as pickle
 import re
-
 from django import http, template
 from django.contrib.admin import ModelAdmin
 from django.contrib.auth import authenticate, login
@@ -24,19 +22,6 @@
 class NotRegistered(Exception):
     pass
 
-def _encode_post_data(post_data):
-    pickled = pickle.dumps(post_data)
-    pickled_md5 = md5_constructor(pickled + settings.SECRET_KEY).hexdigest()
-    return base64.encodestring(pickled + pickled_md5)
-
-def _decode_post_data(encoded_data):
-    encoded_data = base64.decodestring(encoded_data)
-    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
-    if md5_constructor(pickled + settings.SECRET_KEY).hexdigest() != 
tamper_check:
-        from django.core.exceptions import SuspiciousOperation
-        raise SuspiciousOperation, "User may have tampered with session 
cookie."
-    return pickle.loads(pickled)
-
 class AdminSite(object):
     """
     An AdminSite object encapsulates an instance of the Django admin 
application, ready
@@ -239,7 +224,7 @@
         # If this isn't already the login page, display it.
         if not request.POST.has_key(LOGIN_FORM_KEY):
             if request.POST:
-                message = _("Please log in again, because your session has 
expired. Don't worry: Your submission has been saved.")
+                message = _("Please log in again, because your session has 
expired.")
             else:
                 message = ""
             return self.display_login_form(request, message)
@@ -275,15 +260,7 @@
         else:
             if user.is_active and user.is_staff:
                 login(request, user)
-                if request.POST.has_key('post_data'):
-                    post_data = _decode_post_data(request.POST['post_data'])
-                    if post_data and not post_data.has_key(LOGIN_FORM_KEY):
-                        # overwrite request.POST with the saved post_data, and 
continue
-                        request.POST = post_data
-                        request.user = user
-                        return self.root(request, 
request.path.split(self.root_path)[-1])
-                    else:
-                        return 
http.HttpResponseRedirect(request.get_full_path())
+                return http.HttpResponseRedirect(request.get_full_path())
             else:
                 return self.display_login_form(request, ERROR_MESSAGE)
     login = never_cache(login)
@@ -345,19 +322,9 @@
 
     def display_login_form(self, request, error_message='', 
extra_context=None):
         request.session.set_test_cookie()
-        if request.POST and request.POST.has_key('post_data'):
-            # User has failed login BUT has previously saved post data.
-            post_data = request.POST['post_data']
-        elif request.POST:
-            # User's session must have expired; save their post data.
-            post_data = _encode_post_data(request.POST)
-        else:
-            post_data = _encode_post_data({})
-
         context = {
             'title': _('Log in'),
             'app_path': request.get_full_path(),
-            'post_data': post_data,
             'error_message': error_message,
             'root_path': self.root_path,
         }

Modified: django/trunk/django/contrib/admin/templates/admin/login.html
===================================================================
--- django/trunk/django/contrib/admin/templates/admin/login.html        
2008-09-02 20:06:04 UTC (rev 8876)
+++ django/trunk/django/contrib/admin/templates/admin/login.html        
2008-09-02 21:10:00 UTC (rev 8877)
@@ -21,7 +21,6 @@
   <div class="form-row">
     <label for="id_password">{% trans 'Password:' %}</label> <input 
type="password" name="password" id="id_password" />
     <input type="hidden" name="this_is_the_login_form" value="1" />
-    <input type="hidden" name="post_data" value="{{ post_data }}" /> {#<span 
class="help">{% trans 'Have you <a href="/password_reset/">forgotten your 
password</a>?' %}</span>#}
   </div>
   <div class="submit-row">
     <label>&nbsp;</label><input type="submit" value="{% trans 'Log in' %}" />

Modified: django/trunk/django/contrib/admin/views/decorators.py
===================================================================
--- django/trunk/django/contrib/admin/views/decorators.py       2008-09-02 
20:06:04 UTC (rev 8876)
+++ django/trunk/django/contrib/admin/views/decorators.py       2008-09-02 
21:10:00 UTC (rev 8877)
@@ -1,5 +1,4 @@
 import base64
-import cPickle as pickle
 try:
     from functools import wraps
 except ImportError:
@@ -11,41 +10,18 @@
 from django.contrib.auth import authenticate, login
 from django.shortcuts import render_to_response
 from django.utils.translation import ugettext_lazy, ugettext as _
-from django.utils.hashcompat import md5_constructor
 
 ERROR_MESSAGE = ugettext_lazy("Please enter a correct username and password. 
Note that both fields are case-sensitive.")
 LOGIN_FORM_KEY = 'this_is_the_login_form'
 
 def _display_login_form(request, error_message=''):
     request.session.set_test_cookie()
-    if request.POST and 'post_data' in request.POST:
-        # User has failed login BUT has previously saved post data.
-        post_data = request.POST['post_data']
-    elif request.POST:
-        # User's session must have expired; save their post data.
-        post_data = _encode_post_data(request.POST)
-    else:
-        post_data = _encode_post_data({})
     return render_to_response('admin/login.html', {
         'title': _('Log in'),
         'app_path': request.get_full_path(),
-        'post_data': post_data,
         'error_message': error_message
     }, context_instance=template.RequestContext(request))
 
-def _encode_post_data(post_data):
-    pickled = pickle.dumps(post_data)
-    pickled_md5 = md5_constructor(pickled + settings.SECRET_KEY).hexdigest()
-    return base64.encodestring(pickled + pickled_md5)
-
-def _decode_post_data(encoded_data):
-    encoded_data = base64.decodestring(encoded_data)
-    pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
-    if md5_constructor(pickled + settings.SECRET_KEY).hexdigest() != 
tamper_check:
-        from django.core.exceptions import SuspiciousOperation
-        raise SuspiciousOperation, "User may have tampered with session 
cookie."
-    return pickle.loads(pickled)
-
 def staff_member_required(view_func):
     """
     Decorator for views that checks that the user is logged in and is a staff
@@ -54,10 +30,6 @@
     def _checklogin(request, *args, **kwargs):
         if request.user.is_authenticated() and request.user.is_staff:
             # The user is valid. Continue to the admin page.
-            if 'post_data' in request.POST:
-                # User must have re-authenticated through a different window
-                # or tab.
-                request.POST = _decode_post_data(request.POST['post_data'])
             return view_func(request, *args, **kwargs)
 
         assert hasattr(request, 'session'), "The Django admin requires session 
middleware to be installed. Edit your MIDDLEWARE_CLASSES setting to insert 
'django.contrib.sessions.middleware.SessionMiddleware'."
@@ -65,7 +37,7 @@
         # If this isn't already the login page, display it.
         if LOGIN_FORM_KEY not in request.POST:
             if request.POST:
-                message = _("Please log in again, because your session has 
expired. Don't worry: Your submission has been saved.")
+                message = _("Please log in again, because your session has 
expired.")
             else:
                 message = ""
             return _display_login_form(request, message)
@@ -98,16 +70,7 @@
         else:
             if user.is_active and user.is_staff:
                 login(request, user)
-                # TODO: set last_login with an event.
-                if 'post_data' in request.POST:
-                    post_data = _decode_post_data(request.POST['post_data'])
-                    if post_data and LOGIN_FORM_KEY not in post_data:
-                        # overwrite request.POST with the saved post_data, and 
continue
-                        request.POST = post_data
-                        request.user = user
-                        return view_func(request, *args, **kwargs)
-                    else:
-                        return 
http.HttpResponseRedirect(request.get_full_path())
+                return http.HttpResponseRedirect(request.get_full_path())
             else:
                 return _display_login_form(request, ERROR_MESSAGE)
 

Modified: django/trunk/tests/regressiontests/admin_views/tests.py
===================================================================
--- django/trunk/tests/regressiontests/admin_views/tests.py     2008-09-02 
20:06:04 UTC (rev 8876)
+++ django/trunk/tests/regressiontests/admin_views/tests.py     2008-09-02 
21:10:00 UTC (rev 8877)
@@ -4,7 +4,7 @@
 from django.contrib.auth.models import User, Permission
 from django.contrib.contenttypes.models import ContentType
 from django.contrib.admin.models import LogEntry
-from django.contrib.admin.sites import LOGIN_FORM_KEY, _encode_post_data
+from django.contrib.admin.sites import LOGIN_FORM_KEY
 from django.contrib.admin.util import quote
 from django.utils.html import escape
 
@@ -136,31 +136,31 @@
             Section._meta.get_delete_permission()))
 
         # login POST dicts
-        self.super_login = {'post_data': _encode_post_data({}),
+        self.super_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'super',
                      'password': 'secret'}
-        self.super_email_login = {'post_data': _encode_post_data({}),
+        self.super_email_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': '[EMAIL PROTECTED]',
                      'password': 'secret'}
-        self.super_email_bad_login = {'post_data': _encode_post_data({}),
+        self.super_email_bad_login = {
                       LOGIN_FORM_KEY: 1,
                       'username': '[EMAIL PROTECTED]',
                       'password': 'notsecret'}
-        self.adduser_login = {'post_data': _encode_post_data({}),
+        self.adduser_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'adduser',
                      'password': 'secret'}
-        self.changeuser_login = {'post_data': _encode_post_data({}),
+        self.changeuser_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'changeuser',
                      'password': 'secret'}
-        self.deleteuser_login = {'post_data': _encode_post_data({}),
+        self.deleteuser_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'deleteuser',
                      'password': 'secret'}
-        self.joepublic_login = {'post_data': _encode_post_data({}),
+        self.joepublic_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'joepublic',
                      'password': 'secret'}
@@ -271,17 +271,6 @@
         self.failUnlessEqual(Article.objects.all().count(), 3)
         self.client.get('/test_admin/admin/logout/')
 
-        # Check and make sure that if user expires, data still persists
-        post = self.client.post('/test_admin/admin/admin_views/article/add/', 
add_dict)
-        self.assertContains(post, 'Please log in again, because your session 
has expired.')
-        self.super_login['post_data'] = _encode_post_data(add_dict)
-        post = self.client.post('/test_admin/admin/admin_views/article/add/', 
self.super_login)
-        # make sure the view removes test cookie
-        self.failUnlessEqual(self.client.session.test_cookie_worked(), False)
-        self.assertRedirects(post, '/test_admin/admin/admin_views/article/')
-        self.failUnlessEqual(Article.objects.all().count(), 4)
-        self.client.get('/test_admin/admin/logout/')
-
         # 8509 - if a normal user is already logged in, it is possible
         # to change user into the superuser without error
         login = self.client.login(username='joepublic', password='secret')
@@ -489,31 +478,31 @@
 
     def setUp(self):
         # login POST dicts
-        self.super_login = {'post_data': _encode_post_data({}),
+        self.super_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'super',
                      'password': 'secret'}
-        self.super_email_login = {'post_data': _encode_post_data({}),
+        self.super_email_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': '[EMAIL PROTECTED]',
                      'password': 'secret'}
-        self.super_email_bad_login = {'post_data': _encode_post_data({}),
+        self.super_email_bad_login = {
                       LOGIN_FORM_KEY: 1,
                       'username': '[EMAIL PROTECTED]',
                       'password': 'notsecret'}
-        self.adduser_login = {'post_data': _encode_post_data({}),
+        self.adduser_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'adduser',
                      'password': 'secret'}
-        self.changeuser_login = {'post_data': _encode_post_data({}),
+        self.changeuser_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'changeuser',
                      'password': 'secret'}
-        self.deleteuser_login = {'post_data': _encode_post_data({}),
+        self.deleteuser_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'deleteuser',
                      'password': 'secret'}
-        self.joepublic_login = {'post_data': _encode_post_data({}),
+        self.joepublic_login = {
                      LOGIN_FORM_KEY: 1,
                      'username': 'joepublic',
                      'password': 'secret'}
@@ -597,17 +586,6 @@
         # Login.context is a list of context dicts we just need to check the 
first one.
         self.assert_(login.context[0].get('error_message'))
 
-        # Check and make sure that if user expires, data still persists
-        data = {'foo': 'bar'}
-        post = self.client.post('/test_admin/admin/secure-view/', data)
-        self.assertContains(post, 'Please log in again, because your session 
has expired.')
-        self.super_login['post_data'] = _encode_post_data(data)
-        post = self.client.post('/test_admin/admin/secure-view/', 
self.super_login)
-        # make sure the view removes test cookie
-        self.failUnlessEqual(self.client.session.test_cookie_worked(), False)
-        self.assertContains(post, "{'foo': 'bar'}")
-        self.client.get('/test_admin/admin/logout/')
-                
         # 8509 - if a normal user is already logged in, it is possible
         # to change user into the superuser without error
         login = self.client.login(username='joepublic', password='secret')


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/django-updates?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to