2
0

tests.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596
  1. import logging
  2. from contextlib import contextmanager
  3. from io import StringIO
  4. from admin_scripts.tests import AdminScriptTestCase
  5. from django.conf import settings
  6. from django.core import mail
  7. from django.core.exceptions import PermissionDenied
  8. from django.core.files.temp import NamedTemporaryFile
  9. from django.core.management import color
  10. from django.http.multipartparser import MultiPartParserError
  11. from django.test import RequestFactory, SimpleTestCase, override_settings
  12. from django.test.utils import LoggingCaptureMixin
  13. from django.utils.log import (
  14. DEFAULT_LOGGING, AdminEmailHandler, CallbackFilter, RequireDebugFalse,
  15. RequireDebugTrue, ServerFormatter,
  16. )
  17. from . import views
  18. from .logconfig import MyEmailBackend
  19. # logging config prior to using filter with mail_admins
  20. OLD_LOGGING = {
  21. 'version': 1,
  22. 'disable_existing_loggers': False,
  23. 'handlers': {
  24. 'mail_admins': {
  25. 'level': 'ERROR',
  26. 'class': 'django.utils.log.AdminEmailHandler'
  27. }
  28. },
  29. 'loggers': {
  30. 'django.request': {
  31. 'handlers': ['mail_admins'],
  32. 'level': 'ERROR',
  33. 'propagate': True,
  34. },
  35. }
  36. }
  37. class LoggingFiltersTest(SimpleTestCase):
  38. def test_require_debug_false_filter(self):
  39. """
  40. Test the RequireDebugFalse filter class.
  41. """
  42. filter_ = RequireDebugFalse()
  43. with self.settings(DEBUG=True):
  44. self.assertIs(filter_.filter("record is not used"), False)
  45. with self.settings(DEBUG=False):
  46. self.assertIs(filter_.filter("record is not used"), True)
  47. def test_require_debug_true_filter(self):
  48. """
  49. Test the RequireDebugTrue filter class.
  50. """
  51. filter_ = RequireDebugTrue()
  52. with self.settings(DEBUG=True):
  53. self.assertIs(filter_.filter("record is not used"), True)
  54. with self.settings(DEBUG=False):
  55. self.assertIs(filter_.filter("record is not used"), False)
  56. class SetupDefaultLoggingMixin:
  57. @classmethod
  58. def setUpClass(cls):
  59. super().setUpClass()
  60. cls._logging = settings.LOGGING
  61. logging.config.dictConfig(DEFAULT_LOGGING)
  62. @classmethod
  63. def tearDownClass(cls):
  64. super().tearDownClass()
  65. logging.config.dictConfig(cls._logging)
  66. class DefaultLoggingTests(SetupDefaultLoggingMixin, LoggingCaptureMixin, SimpleTestCase):
  67. def test_django_logger(self):
  68. """
  69. The 'django' base logger only output anything when DEBUG=True.
  70. """
  71. self.logger.error("Hey, this is an error.")
  72. self.assertEqual(self.logger_output.getvalue(), '')
  73. with self.settings(DEBUG=True):
  74. self.logger.error("Hey, this is an error.")
  75. self.assertEqual(self.logger_output.getvalue(), 'Hey, this is an error.\n')
  76. @override_settings(DEBUG=True)
  77. def test_django_logger_warning(self):
  78. self.logger.warning('warning')
  79. self.assertEqual(self.logger_output.getvalue(), 'warning\n')
  80. @override_settings(DEBUG=True)
  81. def test_django_logger_info(self):
  82. self.logger.info('info')
  83. self.assertEqual(self.logger_output.getvalue(), 'info\n')
  84. @override_settings(DEBUG=True)
  85. def test_django_logger_debug(self):
  86. self.logger.debug('debug')
  87. self.assertEqual(self.logger_output.getvalue(), '')
  88. class LoggingAssertionMixin(object):
  89. def assertLogsRequest(self, url, level, msg, status_code, logger='django.request', exc_class=None):
  90. with self.assertLogs(logger, level) as cm:
  91. try:
  92. self.client.get(url)
  93. except views.UncaughtException:
  94. pass
  95. self.assertEqual(
  96. len(cm.records), 1,
  97. "Wrong number of calls for logger %r in %r level." % (logger, level)
  98. )
  99. record = cm.records[0]
  100. self.assertEqual(record.getMessage(), msg)
  101. self.assertEqual(record.status_code, status_code)
  102. if exc_class:
  103. self.assertIsNotNone(record.exc_info)
  104. self.assertEqual(record.exc_info[0], exc_class)
  105. @override_settings(DEBUG=True, ROOT_URLCONF='logging_tests.urls')
  106. class HandlerLoggingTests(SetupDefaultLoggingMixin, LoggingAssertionMixin, LoggingCaptureMixin, SimpleTestCase):
  107. def test_page_found_no_warning(self):
  108. self.client.get('/innocent/')
  109. self.assertEqual(self.logger_output.getvalue(), '')
  110. def test_redirect_no_warning(self):
  111. self.client.get('/redirect/')
  112. self.assertEqual(self.logger_output.getvalue(), '')
  113. def test_page_not_found_warning(self):
  114. self.assertLogsRequest(
  115. url='/does_not_exist/',
  116. level='WARNING',
  117. status_code=404,
  118. msg='Not Found: /does_not_exist/',
  119. )
  120. def test_page_not_found_raised(self):
  121. self.assertLogsRequest(
  122. url='/does_not_exist_raised/',
  123. level='WARNING',
  124. status_code=404,
  125. msg='Not Found: /does_not_exist_raised/',
  126. )
  127. def test_uncaught_exception(self):
  128. self.assertLogsRequest(
  129. url='/uncaught_exception/',
  130. level='ERROR',
  131. status_code=500,
  132. msg='Internal Server Error: /uncaught_exception/',
  133. exc_class=views.UncaughtException,
  134. )
  135. def test_internal_server_error(self):
  136. self.assertLogsRequest(
  137. url='/internal_server_error/',
  138. level='ERROR',
  139. status_code=500,
  140. msg='Internal Server Error: /internal_server_error/',
  141. )
  142. def test_internal_server_error_599(self):
  143. self.assertLogsRequest(
  144. url='/internal_server_error/?status=599',
  145. level='ERROR',
  146. status_code=599,
  147. msg='Unknown Status Code: /internal_server_error/',
  148. )
  149. def test_permission_denied(self):
  150. self.assertLogsRequest(
  151. url='/permission_denied/',
  152. level='WARNING',
  153. status_code=403,
  154. msg='Forbidden (Permission denied): /permission_denied/',
  155. exc_class=PermissionDenied,
  156. )
  157. def test_multi_part_parser_error(self):
  158. self.assertLogsRequest(
  159. url='/multi_part_parser_error/',
  160. level='WARNING',
  161. status_code=400,
  162. msg='Bad request (Unable to parse request body): /multi_part_parser_error/',
  163. exc_class=MultiPartParserError,
  164. )
  165. @override_settings(
  166. DEBUG=True,
  167. USE_I18N=True,
  168. LANGUAGES=[('en', 'English')],
  169. MIDDLEWARE=[
  170. 'django.middleware.locale.LocaleMiddleware',
  171. 'django.middleware.common.CommonMiddleware',
  172. ],
  173. ROOT_URLCONF='logging_tests.urls_i18n',
  174. )
  175. class I18nLoggingTests(SetupDefaultLoggingMixin, LoggingCaptureMixin, SimpleTestCase):
  176. def test_i18n_page_found_no_warning(self):
  177. self.client.get('/exists/')
  178. self.client.get('/en/exists/')
  179. self.assertEqual(self.logger_output.getvalue(), '')
  180. def test_i18n_page_not_found_warning(self):
  181. self.client.get('/this_does_not/')
  182. self.client.get('/en/nor_this/')
  183. self.assertEqual(self.logger_output.getvalue(), 'Not Found: /this_does_not/\nNot Found: /en/nor_this/\n')
  184. class CallbackFilterTest(SimpleTestCase):
  185. def test_sense(self):
  186. f_false = CallbackFilter(lambda r: False)
  187. f_true = CallbackFilter(lambda r: True)
  188. self.assertEqual(f_false.filter("record"), False)
  189. self.assertEqual(f_true.filter("record"), True)
  190. def test_passes_on_record(self):
  191. collector = []
  192. def _callback(record):
  193. collector.append(record)
  194. return True
  195. f = CallbackFilter(_callback)
  196. f.filter("a record")
  197. self.assertEqual(collector, ["a record"])
  198. class AdminEmailHandlerTest(SimpleTestCase):
  199. logger = logging.getLogger('django')
  200. def get_admin_email_handler(self, logger):
  201. # AdminEmailHandler does not get filtered out
  202. # even with DEBUG=True.
  203. admin_email_handler = [
  204. h for h in logger.handlers
  205. if h.__class__.__name__ == "AdminEmailHandler"
  206. ][0]
  207. return admin_email_handler
  208. def test_fail_silently(self):
  209. admin_email_handler = self.get_admin_email_handler(self.logger)
  210. self.assertTrue(admin_email_handler.connection().fail_silently)
  211. @override_settings(
  212. ADMINS=[('whatever admin', 'admin@example.com')],
  213. EMAIL_SUBJECT_PREFIX='-SuperAwesomeSubject-'
  214. )
  215. def test_accepts_args(self):
  216. """
  217. User-supplied arguments and the EMAIL_SUBJECT_PREFIX setting are used
  218. to compose the email subject (#16736).
  219. """
  220. message = "Custom message that says '%s' and '%s'"
  221. token1 = 'ping'
  222. token2 = 'pong'
  223. admin_email_handler = self.get_admin_email_handler(self.logger)
  224. # Backup then override original filters
  225. orig_filters = admin_email_handler.filters
  226. try:
  227. admin_email_handler.filters = []
  228. self.logger.error(message, token1, token2)
  229. self.assertEqual(len(mail.outbox), 1)
  230. self.assertEqual(mail.outbox[0].to, ['admin@example.com'])
  231. self.assertEqual(mail.outbox[0].subject,
  232. "-SuperAwesomeSubject-ERROR: Custom message that says 'ping' and 'pong'")
  233. finally:
  234. # Restore original filters
  235. admin_email_handler.filters = orig_filters
  236. @override_settings(
  237. ADMINS=[('whatever admin', 'admin@example.com')],
  238. EMAIL_SUBJECT_PREFIX='-SuperAwesomeSubject-',
  239. INTERNAL_IPS=['127.0.0.1'],
  240. )
  241. def test_accepts_args_and_request(self):
  242. """
  243. The subject is also handled if being passed a request object.
  244. """
  245. message = "Custom message that says '%s' and '%s'"
  246. token1 = 'ping'
  247. token2 = 'pong'
  248. admin_email_handler = self.get_admin_email_handler(self.logger)
  249. # Backup then override original filters
  250. orig_filters = admin_email_handler.filters
  251. try:
  252. admin_email_handler.filters = []
  253. rf = RequestFactory()
  254. request = rf.get('/')
  255. self.logger.error(
  256. message, token1, token2,
  257. extra={
  258. 'status_code': 403,
  259. 'request': request,
  260. }
  261. )
  262. self.assertEqual(len(mail.outbox), 1)
  263. self.assertEqual(mail.outbox[0].to, ['admin@example.com'])
  264. self.assertEqual(mail.outbox[0].subject,
  265. "-SuperAwesomeSubject-ERROR (internal IP): Custom message that says 'ping' and 'pong'")
  266. finally:
  267. # Restore original filters
  268. admin_email_handler.filters = orig_filters
  269. @override_settings(
  270. ADMINS=[('admin', 'admin@example.com')],
  271. EMAIL_SUBJECT_PREFIX='',
  272. DEBUG=False,
  273. )
  274. def test_subject_accepts_newlines(self):
  275. """
  276. Newlines in email reports' subjects are escaped to prevent
  277. AdminErrorHandler from failing (#17281).
  278. """
  279. message = 'Message \r\n with newlines'
  280. expected_subject = 'ERROR: Message \\r\\n with newlines'
  281. self.assertEqual(len(mail.outbox), 0)
  282. self.logger.error(message)
  283. self.assertEqual(len(mail.outbox), 1)
  284. self.assertNotIn('\n', mail.outbox[0].subject)
  285. self.assertNotIn('\r', mail.outbox[0].subject)
  286. self.assertEqual(mail.outbox[0].subject, expected_subject)
  287. @override_settings(
  288. ADMINS=[('admin', 'admin@example.com')],
  289. DEBUG=False,
  290. )
  291. def test_uses_custom_email_backend(self):
  292. """
  293. Refs #19325
  294. """
  295. message = 'All work and no play makes Jack a dull boy'
  296. admin_email_handler = self.get_admin_email_handler(self.logger)
  297. mail_admins_called = {'called': False}
  298. def my_mail_admins(*args, **kwargs):
  299. connection = kwargs['connection']
  300. self.assertIsInstance(connection, MyEmailBackend)
  301. mail_admins_called['called'] = True
  302. # Monkeypatches
  303. orig_mail_admins = mail.mail_admins
  304. orig_email_backend = admin_email_handler.email_backend
  305. mail.mail_admins = my_mail_admins
  306. admin_email_handler.email_backend = (
  307. 'logging_tests.logconfig.MyEmailBackend')
  308. try:
  309. self.logger.error(message)
  310. self.assertTrue(mail_admins_called['called'])
  311. finally:
  312. # Revert Monkeypatches
  313. mail.mail_admins = orig_mail_admins
  314. admin_email_handler.email_backend = orig_email_backend
  315. @override_settings(
  316. ADMINS=[('whatever admin', 'admin@example.com')],
  317. )
  318. def test_emit_non_ascii(self):
  319. """
  320. #23593 - AdminEmailHandler should allow Unicode characters in the
  321. request.
  322. """
  323. handler = self.get_admin_email_handler(self.logger)
  324. record = self.logger.makeRecord('name', logging.ERROR, 'function', 'lno', 'message', None, None)
  325. rf = RequestFactory()
  326. url_path = '/º'
  327. record.request = rf.get(url_path)
  328. handler.emit(record)
  329. self.assertEqual(len(mail.outbox), 1)
  330. msg = mail.outbox[0]
  331. self.assertEqual(msg.to, ['admin@example.com'])
  332. self.assertEqual(msg.subject, "[Django] ERROR (EXTERNAL IP): message")
  333. self.assertIn("Report at %s" % url_path, msg.body)
  334. @override_settings(
  335. MANAGERS=[('manager', 'manager@example.com')],
  336. DEBUG=False,
  337. )
  338. def test_customize_send_mail_method(self):
  339. class ManagerEmailHandler(AdminEmailHandler):
  340. def send_mail(self, subject, message, *args, **kwargs):
  341. mail.mail_managers(subject, message, *args, connection=self.connection(), **kwargs)
  342. handler = ManagerEmailHandler()
  343. record = self.logger.makeRecord('name', logging.ERROR, 'function', 'lno', 'message', None, None)
  344. self.assertEqual(len(mail.outbox), 0)
  345. handler.emit(record)
  346. self.assertEqual(len(mail.outbox), 1)
  347. self.assertEqual(mail.outbox[0].to, ['manager@example.com'])
  348. @override_settings(ALLOWED_HOSTS='example.com')
  349. def test_disallowed_host_doesnt_crash(self):
  350. admin_email_handler = self.get_admin_email_handler(self.logger)
  351. old_include_html = admin_email_handler.include_html
  352. # Text email
  353. admin_email_handler.include_html = False
  354. try:
  355. self.client.get('/', HTTP_HOST='evil.com')
  356. finally:
  357. admin_email_handler.include_html = old_include_html
  358. # HTML email
  359. admin_email_handler.include_html = True
  360. try:
  361. self.client.get('/', HTTP_HOST='evil.com')
  362. finally:
  363. admin_email_handler.include_html = old_include_html
  364. class SettingsConfigTest(AdminScriptTestCase):
  365. """
  366. Accessing settings in a custom logging handler does not trigger
  367. a circular import error.
  368. """
  369. def setUp(self):
  370. log_config = """{
  371. 'version': 1,
  372. 'handlers': {
  373. 'custom_handler': {
  374. 'level': 'INFO',
  375. 'class': 'logging_tests.logconfig.MyHandler',
  376. }
  377. }
  378. }"""
  379. self.write_settings('settings.py', sdict={'LOGGING': log_config})
  380. def tearDown(self):
  381. self.remove_settings('settings.py')
  382. def test_circular_dependency(self):
  383. # validate is just an example command to trigger settings configuration
  384. out, err = self.run_manage(['check'])
  385. self.assertNoOutput(err)
  386. self.assertOutput(out, "System check identified no issues (0 silenced).")
  387. def dictConfig(config):
  388. dictConfig.called = True
  389. dictConfig.called = False
  390. class SetupConfigureLogging(SimpleTestCase):
  391. """
  392. Calling django.setup() initializes the logging configuration.
  393. """
  394. @override_settings(
  395. LOGGING_CONFIG='logging_tests.tests.dictConfig',
  396. LOGGING=OLD_LOGGING,
  397. )
  398. def test_configure_initializes_logging(self):
  399. from django import setup
  400. setup()
  401. self.assertTrue(dictConfig.called)
  402. @override_settings(DEBUG=True, ROOT_URLCONF='logging_tests.urls')
  403. class SecurityLoggerTest(LoggingAssertionMixin, SimpleTestCase):
  404. def test_suspicious_operation_creates_log_message(self):
  405. self.assertLogsRequest(
  406. url='/suspicious/',
  407. level='ERROR',
  408. msg='dubious',
  409. status_code=400,
  410. logger='django.security.SuspiciousOperation',
  411. )
  412. def test_suspicious_operation_uses_sublogger(self):
  413. self.assertLogsRequest(
  414. url='/suspicious_spec/',
  415. level='ERROR',
  416. msg='dubious',
  417. status_code=400,
  418. logger='django.security.DisallowedHost',
  419. )
  420. @override_settings(
  421. ADMINS=[('admin', 'admin@example.com')],
  422. DEBUG=False,
  423. )
  424. def test_suspicious_email_admins(self):
  425. self.client.get('/suspicious/')
  426. self.assertEqual(len(mail.outbox), 1)
  427. self.assertIn('Report at /suspicious/', mail.outbox[0].body)
  428. class SettingsCustomLoggingTest(AdminScriptTestCase):
  429. """
  430. Using a logging defaults are still applied when using a custom
  431. callable in LOGGING_CONFIG (i.e., logging.config.fileConfig).
  432. """
  433. def setUp(self):
  434. logging_conf = """
  435. [loggers]
  436. keys=root
  437. [handlers]
  438. keys=stream
  439. [formatters]
  440. keys=simple
  441. [logger_root]
  442. handlers=stream
  443. [handler_stream]
  444. class=StreamHandler
  445. formatter=simple
  446. args=(sys.stdout,)
  447. [formatter_simple]
  448. format=%(message)s
  449. """
  450. self.temp_file = NamedTemporaryFile()
  451. self.temp_file.write(logging_conf.encode())
  452. self.temp_file.flush()
  453. sdict = {'LOGGING_CONFIG': '"logging.config.fileConfig"',
  454. 'LOGGING': 'r"%s"' % self.temp_file.name}
  455. self.write_settings('settings.py', sdict=sdict)
  456. def tearDown(self):
  457. self.temp_file.close()
  458. self.remove_settings('settings.py')
  459. def test_custom_logging(self):
  460. out, err = self.run_manage(['check'])
  461. self.assertNoOutput(err)
  462. self.assertOutput(out, "System check identified no issues (0 silenced).")
  463. class LogFormattersTests(SimpleTestCase):
  464. def test_server_formatter_styles(self):
  465. color_style = color.make_style('')
  466. formatter = ServerFormatter()
  467. formatter.style = color_style
  468. log_msg = 'log message'
  469. status_code_styles = [
  470. (200, 'HTTP_SUCCESS'),
  471. (100, 'HTTP_INFO'),
  472. (304, 'HTTP_NOT_MODIFIED'),
  473. (300, 'HTTP_REDIRECT'),
  474. (404, 'HTTP_NOT_FOUND'),
  475. (400, 'HTTP_BAD_REQUEST'),
  476. (500, 'HTTP_SERVER_ERROR'),
  477. ]
  478. for status_code, style in status_code_styles:
  479. record = logging.makeLogRecord({'msg': log_msg, 'status_code': status_code})
  480. self.assertEqual(formatter.format(record), getattr(color_style, style)(log_msg))
  481. record = logging.makeLogRecord({'msg': log_msg})
  482. self.assertEqual(formatter.format(record), log_msg)
  483. def test_server_formatter_default_format(self):
  484. server_time = '2016-09-25 10:20:30'
  485. log_msg = 'log message'
  486. logger = logging.getLogger('django.server')
  487. @contextmanager
  488. def patch_django_server_logger():
  489. old_stream = logger.handlers[0].stream
  490. new_stream = StringIO()
  491. logger.handlers[0].stream = new_stream
  492. yield new_stream
  493. logger.handlers[0].stream = old_stream
  494. with patch_django_server_logger() as logger_output:
  495. logger.info(log_msg, extra={'server_time': server_time})
  496. self.assertEqual('[%s] %s\n' % (server_time, log_msg), logger_output.getvalue())
  497. with patch_django_server_logger() as logger_output:
  498. logger.info(log_msg)
  499. self.assertRegex(logger_output.getvalue(), r'^\[[-:,.\s\d]+\] %s' % log_msg)