From 4edb8881357e043fd7ea15efeb2d592c9fb55efc Mon Sep 17 00:00:00 2001 From: Justin Choquette Date: Tue, 7 Jun 2022 16:07:54 -0400 Subject: Laas Dashboard Front End Improvements Change-Id: Ib9aa21747bd57faef94db7795cd89119ad4b0a9d Signed-off-by: Justin Choquette --- src/api/tests/test_models_unittest.py | 2 +- src/api/views.py | 6 +++++- 2 files changed, 6 insertions(+), 2 deletions(-) (limited to 'src/api') diff --git a/src/api/tests/test_models_unittest.py b/src/api/tests/test_models_unittest.py index 2a6fa0b..2dee29b 100644 --- a/src/api/tests/test_models_unittest.py +++ b/src/api/tests/test_models_unittest.py @@ -116,7 +116,7 @@ class ValidBookingCreatesValidJob(TestCase): count = hostprofile.interfaceprofile.all().count() for i in range(count): network_struct.append([]) - while(nets): + while (nets): index = len(nets) % count network_struct[index].append(nets.pop()) diff --git a/src/api/views.py b/src/api/views.py index 1516374..ffa9b3f 100644 --- a/src/api/views.py +++ b/src/api/views.py @@ -430,7 +430,11 @@ def auth_and_log(request, endpoint): token = Token.objects.get(key=user_token) except Token.DoesNotExist: token = None - response = HttpResponse('Unauthorized', status=401) + # Added logic to detect malformed token + if len(str(user_token)) != 40: + response = HttpResponse('Malformed Token', status=401) + else: + response = HttpResponse('Unauthorized', status=401) x_forwarded_for = request.META.get('HTTP_X_FORWARDED_FOR') if x_forwarded_for: -- cgit 1.2.3-korg