From 08ead74d05e25f58c83712f6f8651484ddc983d0 Mon Sep 17 00:00:00 2001 From: Chris McDonough Date: Tue, 26 May 2009 00:44:17 +0000 Subject: Revert all work towards creating a "forbidden" API on the security policy; I'll do this work on the authchanges branch first. --- repoze/bfg/tests/test_security.py | 19 ------------------- 1 file changed, 19 deletions(-) (limited to 'repoze/bfg/tests/test_security.py') diff --git a/repoze/bfg/tests/test_security.py b/repoze/bfg/tests/test_security.py index b9f9624d4..03a466e7c 100644 --- a/repoze/bfg/tests/test_security.py +++ b/repoze/bfg/tests/test_security.py @@ -243,16 +243,6 @@ class TestACLSecurityPolicy(unittest.TestCase): result = policy.principals_allowed_by_permission(None, 'read') self.assertEqual(result, []) - def test_forbidden(self): - policy = self._makeOne(lambda *arg: None) - context = DummyContext() - request = DummyRequest({}) - response = policy.forbidden(context, request) - self.failUnless('401 Unauthorized' in response.app_iter[0]) - self.assertEqual(response.status, '401 Unauthorized') - self.assertEqual(len(response.headerlist), 2) - - class TestInheritingACLSecurityPolicy(unittest.TestCase): def setUp(self): cleanUp() @@ -440,15 +430,6 @@ class TestInheritingACLSecurityPolicy(unittest.TestCase): result = policy.authenticated_userid(request) self.assertEqual(result, None) - def test_forbidden(self): - policy = self._makeOne(lambda *arg: None) - context = DummyContext() - request = DummyRequest({}) - response = policy.forbidden(context, request) - self.failUnless('401 Unauthorized' in response.app_iter[0]) - self.assertEqual(response.status, '401 Unauthorized') - self.assertEqual(len(response.headerlist), 2) - class TestAllPermissionsList(unittest.TestCase): def setUp(self): cleanUp() -- cgit v1.2.3