test_basic.py 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164
  1. from django.conf import settings
  2. from django.contrib.auth import get_user, get_user_model
  3. from django.contrib.auth.models import AnonymousUser, User
  4. from django.core.exceptions import ImproperlyConfigured
  5. from django.db import IntegrityError
  6. from django.http import HttpRequest
  7. from django.test import TestCase, override_settings
  8. from django.utils import translation
  9. from .models import CustomUser
  10. class BasicTestCase(TestCase):
  11. def test_user(self):
  12. "Users can be created and can set their password"
  13. u = User.objects.create_user("testuser", "test@example.com", "testpw")
  14. self.assertTrue(u.has_usable_password())
  15. self.assertFalse(u.check_password("bad"))
  16. self.assertTrue(u.check_password("testpw"))
  17. # Check we can manually set an unusable password
  18. u.set_unusable_password()
  19. u.save()
  20. self.assertFalse(u.check_password("testpw"))
  21. self.assertFalse(u.has_usable_password())
  22. u.set_password("testpw")
  23. self.assertTrue(u.check_password("testpw"))
  24. u.set_password(None)
  25. self.assertFalse(u.has_usable_password())
  26. # Check username getter
  27. self.assertEqual(u.get_username(), "testuser")
  28. # Check authentication/permissions
  29. self.assertFalse(u.is_anonymous)
  30. self.assertTrue(u.is_authenticated)
  31. self.assertFalse(u.is_staff)
  32. self.assertTrue(u.is_active)
  33. self.assertFalse(u.is_superuser)
  34. # Check API-based user creation with no password
  35. u2 = User.objects.create_user("testuser2", "test2@example.com")
  36. self.assertFalse(u2.has_usable_password())
  37. def test_unicode_username(self):
  38. User.objects.create_user("jörg")
  39. User.objects.create_user("Григорий")
  40. # Two equivalent Unicode normalized usernames are duplicates.
  41. omega_username = "iamtheΩ" # U+03A9 GREEK CAPITAL LETTER OMEGA
  42. ohm_username = "iamtheΩ" # U+2126 OHM SIGN
  43. User.objects.create_user(ohm_username)
  44. with self.assertRaises(IntegrityError):
  45. User.objects.create_user(omega_username)
  46. def test_user_no_email(self):
  47. "Users can be created without an email"
  48. cases = [
  49. {},
  50. {"email": ""},
  51. {"email": None},
  52. ]
  53. for i, kwargs in enumerate(cases):
  54. with self.subTest(**kwargs):
  55. u = User.objects.create_user("testuser{}".format(i), **kwargs)
  56. self.assertEqual(u.email, "")
  57. def test_superuser(self):
  58. "Check the creation and properties of a superuser"
  59. super = User.objects.create_superuser("super", "super@example.com", "super")
  60. self.assertTrue(super.is_superuser)
  61. self.assertTrue(super.is_active)
  62. self.assertTrue(super.is_staff)
  63. def test_superuser_no_email_or_password(self):
  64. cases = [
  65. {},
  66. {"email": ""},
  67. {"email": None},
  68. {"password": None},
  69. ]
  70. for i, kwargs in enumerate(cases):
  71. with self.subTest(**kwargs):
  72. superuser = User.objects.create_superuser("super{}".format(i), **kwargs)
  73. self.assertEqual(superuser.email, "")
  74. self.assertFalse(superuser.has_usable_password())
  75. def test_get_user_model(self):
  76. "The current user model can be retrieved"
  77. self.assertEqual(get_user_model(), User)
  78. @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser")
  79. def test_swappable_user(self):
  80. "The current user model can be swapped out for another"
  81. self.assertEqual(get_user_model(), CustomUser)
  82. with self.assertRaises(AttributeError):
  83. User.objects.all()
  84. @override_settings(AUTH_USER_MODEL="badsetting")
  85. def test_swappable_user_bad_setting(self):
  86. "The alternate user setting must point to something in the format app.model"
  87. msg = "AUTH_USER_MODEL must be of the form 'app_label.model_name'"
  88. with self.assertRaisesMessage(ImproperlyConfigured, msg):
  89. get_user_model()
  90. @override_settings(AUTH_USER_MODEL="thismodel.doesntexist")
  91. def test_swappable_user_nonexistent_model(self):
  92. "The current user model must point to an installed model"
  93. msg = (
  94. "AUTH_USER_MODEL refers to model 'thismodel.doesntexist' "
  95. "that has not been installed"
  96. )
  97. with self.assertRaisesMessage(ImproperlyConfigured, msg):
  98. get_user_model()
  99. def test_user_verbose_names_translatable(self):
  100. "Default User model verbose names are translatable (#19945)"
  101. with translation.override("en"):
  102. self.assertEqual(User._meta.verbose_name, "user")
  103. self.assertEqual(User._meta.verbose_name_plural, "users")
  104. with translation.override("es"):
  105. self.assertEqual(User._meta.verbose_name, "usuario")
  106. self.assertEqual(User._meta.verbose_name_plural, "usuarios")
  107. class TestGetUser(TestCase):
  108. def test_get_user_anonymous(self):
  109. request = HttpRequest()
  110. request.session = self.client.session
  111. user = get_user(request)
  112. self.assertIsInstance(user, AnonymousUser)
  113. def test_get_user(self):
  114. created_user = User.objects.create_user(
  115. "testuser", "test@example.com", "testpw"
  116. )
  117. self.client.login(username="testuser", password="testpw")
  118. request = HttpRequest()
  119. request.session = self.client.session
  120. user = get_user(request)
  121. self.assertIsInstance(user, User)
  122. self.assertEqual(user.username, created_user.username)
  123. def test_get_user_fallback_secret(self):
  124. created_user = User.objects.create_user(
  125. "testuser", "test@example.com", "testpw"
  126. )
  127. self.client.login(username="testuser", password="testpw")
  128. request = HttpRequest()
  129. request.session = self.client.session
  130. prev_session_key = request.session.session_key
  131. with override_settings(
  132. SECRET_KEY="newsecret",
  133. SECRET_KEY_FALLBACKS=[settings.SECRET_KEY],
  134. ):
  135. user = get_user(request)
  136. self.assertIsInstance(user, User)
  137. self.assertEqual(user.username, created_user.username)
  138. self.assertNotEqual(request.session.session_key, prev_session_key)
  139. # Remove the fallback secret.
  140. # The session hash should be updated using the current secret.
  141. with override_settings(SECRET_KEY="newsecret"):
  142. user = get_user(request)
  143. self.assertIsInstance(user, User)
  144. self.assertEqual(user.username, created_user.username)