tests.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608
  1. import logging
  2. from contextlib import contextmanager
  3. from io import StringIO
  4. from admin_scripts.tests import AdminScriptTestCase
  5. from django.conf import settings
  6. from django.core import mail
  7. from django.core.exceptions import PermissionDenied
  8. from django.core.files.temp import NamedTemporaryFile
  9. from django.core.management import color
  10. from django.http.multipartparser import MultiPartParserError
  11. from django.test import RequestFactory, SimpleTestCase, override_settings
  12. from django.test.utils import LoggingCaptureMixin
  13. from django.utils.log import (
  14. DEFAULT_LOGGING, AdminEmailHandler, CallbackFilter, RequireDebugFalse,
  15. RequireDebugTrue, ServerFormatter,
  16. )
  17. from django.views.debug import ExceptionReporter
  18. from . import views
  19. from .logconfig import MyEmailBackend
  20. # logging config prior to using filter with mail_admins
  21. OLD_LOGGING = {
  22. 'version': 1,
  23. 'disable_existing_loggers': False,
  24. 'handlers': {
  25. 'mail_admins': {
  26. 'level': 'ERROR',
  27. 'class': 'django.utils.log.AdminEmailHandler'
  28. }
  29. },
  30. 'loggers': {
  31. 'django.request': {
  32. 'handlers': ['mail_admins'],
  33. 'level': 'ERROR',
  34. 'propagate': True,
  35. },
  36. }
  37. }
  38. class LoggingFiltersTest(SimpleTestCase):
  39. def test_require_debug_false_filter(self):
  40. """
  41. Test the RequireDebugFalse filter class.
  42. """
  43. filter_ = RequireDebugFalse()
  44. with self.settings(DEBUG=True):
  45. self.assertIs(filter_.filter("record is not used"), False)
  46. with self.settings(DEBUG=False):
  47. self.assertIs(filter_.filter("record is not used"), True)
  48. def test_require_debug_true_filter(self):
  49. """
  50. Test the RequireDebugTrue filter class.
  51. """
  52. filter_ = RequireDebugTrue()
  53. with self.settings(DEBUG=True):
  54. self.assertIs(filter_.filter("record is not used"), True)
  55. with self.settings(DEBUG=False):
  56. self.assertIs(filter_.filter("record is not used"), False)
  57. class SetupDefaultLoggingMixin:
  58. @classmethod
  59. def setUpClass(cls):
  60. super().setUpClass()
  61. cls._logging = settings.LOGGING
  62. logging.config.dictConfig(DEFAULT_LOGGING)
  63. @classmethod
  64. def tearDownClass(cls):
  65. super().tearDownClass()
  66. logging.config.dictConfig(cls._logging)
  67. class DefaultLoggingTests(SetupDefaultLoggingMixin, LoggingCaptureMixin, SimpleTestCase):
  68. def test_django_logger(self):
  69. """
  70. The 'django' base logger only output anything when DEBUG=True.
  71. """
  72. self.logger.error("Hey, this is an error.")
  73. self.assertEqual(self.logger_output.getvalue(), '')
  74. with self.settings(DEBUG=True):
  75. self.logger.error("Hey, this is an error.")
  76. self.assertEqual(self.logger_output.getvalue(), 'Hey, this is an error.\n')
  77. @override_settings(DEBUG=True)
  78. def test_django_logger_warning(self):
  79. self.logger.warning('warning')
  80. self.assertEqual(self.logger_output.getvalue(), 'warning\n')
  81. @override_settings(DEBUG=True)
  82. def test_django_logger_info(self):
  83. self.logger.info('info')
  84. self.assertEqual(self.logger_output.getvalue(), 'info\n')
  85. @override_settings(DEBUG=True)
  86. def test_django_logger_debug(self):
  87. self.logger.debug('debug')
  88. self.assertEqual(self.logger_output.getvalue(), '')
  89. class LoggingAssertionMixin:
  90. def assertLogsRequest(self, url, level, msg, status_code, logger='django.request', exc_class=None):
  91. with self.assertLogs(logger, level) as cm:
  92. try:
  93. self.client.get(url)
  94. except views.UncaughtException:
  95. pass
  96. self.assertEqual(
  97. len(cm.records), 1,
  98. "Wrong number of calls for logger %r in %r level." % (logger, level)
  99. )
  100. record = cm.records[0]
  101. self.assertEqual(record.getMessage(), msg)
  102. self.assertEqual(record.status_code, status_code)
  103. if exc_class:
  104. self.assertIsNotNone(record.exc_info)
  105. self.assertEqual(record.exc_info[0], exc_class)
  106. @override_settings(DEBUG=True, ROOT_URLCONF='logging_tests.urls')
  107. class HandlerLoggingTests(SetupDefaultLoggingMixin, LoggingAssertionMixin, LoggingCaptureMixin, SimpleTestCase):
  108. def test_page_found_no_warning(self):
  109. self.client.get('/innocent/')
  110. self.assertEqual(self.logger_output.getvalue(), '')
  111. def test_redirect_no_warning(self):
  112. self.client.get('/redirect/')
  113. self.assertEqual(self.logger_output.getvalue(), '')
  114. def test_page_not_found_warning(self):
  115. self.assertLogsRequest(
  116. url='/does_not_exist/',
  117. level='WARNING',
  118. status_code=404,
  119. msg='Not Found: /does_not_exist/',
  120. )
  121. def test_page_not_found_raised(self):
  122. self.assertLogsRequest(
  123. url='/does_not_exist_raised/',
  124. level='WARNING',
  125. status_code=404,
  126. msg='Not Found: /does_not_exist_raised/',
  127. )
  128. def test_uncaught_exception(self):
  129. self.assertLogsRequest(
  130. url='/uncaught_exception/',
  131. level='ERROR',
  132. status_code=500,
  133. msg='Internal Server Error: /uncaught_exception/',
  134. exc_class=views.UncaughtException,
  135. )
  136. def test_internal_server_error(self):
  137. self.assertLogsRequest(
  138. url='/internal_server_error/',
  139. level='ERROR',
  140. status_code=500,
  141. msg='Internal Server Error: /internal_server_error/',
  142. )
  143. def test_internal_server_error_599(self):
  144. self.assertLogsRequest(
  145. url='/internal_server_error/?status=599',
  146. level='ERROR',
  147. status_code=599,
  148. msg='Unknown Status Code: /internal_server_error/',
  149. )
  150. def test_permission_denied(self):
  151. self.assertLogsRequest(
  152. url='/permission_denied/',
  153. level='WARNING',
  154. status_code=403,
  155. msg='Forbidden (Permission denied): /permission_denied/',
  156. exc_class=PermissionDenied,
  157. )
  158. def test_multi_part_parser_error(self):
  159. self.assertLogsRequest(
  160. url='/multi_part_parser_error/',
  161. level='WARNING',
  162. status_code=400,
  163. msg='Bad request (Unable to parse request body): /multi_part_parser_error/',
  164. exc_class=MultiPartParserError,
  165. )
  166. @override_settings(
  167. DEBUG=True,
  168. USE_I18N=True,
  169. LANGUAGES=[('en', 'English')],
  170. MIDDLEWARE=[
  171. 'django.middleware.locale.LocaleMiddleware',
  172. 'django.middleware.common.CommonMiddleware',
  173. ],
  174. ROOT_URLCONF='logging_tests.urls_i18n',
  175. )
  176. class I18nLoggingTests(SetupDefaultLoggingMixin, LoggingCaptureMixin, SimpleTestCase):
  177. def test_i18n_page_found_no_warning(self):
  178. self.client.get('/exists/')
  179. self.client.get('/en/exists/')
  180. self.assertEqual(self.logger_output.getvalue(), '')
  181. def test_i18n_page_not_found_warning(self):
  182. self.client.get('/this_does_not/')
  183. self.client.get('/en/nor_this/')
  184. self.assertEqual(self.logger_output.getvalue(), 'Not Found: /this_does_not/\nNot Found: /en/nor_this/\n')
  185. class CallbackFilterTest(SimpleTestCase):
  186. def test_sense(self):
  187. f_false = CallbackFilter(lambda r: False)
  188. f_true = CallbackFilter(lambda r: True)
  189. self.assertEqual(f_false.filter("record"), False)
  190. self.assertEqual(f_true.filter("record"), True)
  191. def test_passes_on_record(self):
  192. collector = []
  193. def _callback(record):
  194. collector.append(record)
  195. return True
  196. f = CallbackFilter(_callback)
  197. f.filter("a record")
  198. self.assertEqual(collector, ["a record"])
  199. class AdminEmailHandlerTest(SimpleTestCase):
  200. logger = logging.getLogger('django')
  201. request_factory = RequestFactory()
  202. def get_admin_email_handler(self, logger):
  203. # AdminEmailHandler does not get filtered out
  204. # even with DEBUG=True.
  205. return [
  206. h for h in logger.handlers
  207. if h.__class__.__name__ == "AdminEmailHandler"
  208. ][0]
  209. def test_fail_silently(self):
  210. admin_email_handler = self.get_admin_email_handler(self.logger)
  211. self.assertTrue(admin_email_handler.connection().fail_silently)
  212. @override_settings(
  213. ADMINS=[('whatever admin', 'admin@example.com')],
  214. EMAIL_SUBJECT_PREFIX='-SuperAwesomeSubject-'
  215. )
  216. def test_accepts_args(self):
  217. """
  218. User-supplied arguments and the EMAIL_SUBJECT_PREFIX setting are used
  219. to compose the email subject (#16736).
  220. """
  221. message = "Custom message that says '%s' and '%s'"
  222. token1 = 'ping'
  223. token2 = 'pong'
  224. admin_email_handler = self.get_admin_email_handler(self.logger)
  225. # Backup then override original filters
  226. orig_filters = admin_email_handler.filters
  227. try:
  228. admin_email_handler.filters = []
  229. self.logger.error(message, token1, token2)
  230. self.assertEqual(len(mail.outbox), 1)
  231. self.assertEqual(mail.outbox[0].to, ['admin@example.com'])
  232. self.assertEqual(mail.outbox[0].subject,
  233. "-SuperAwesomeSubject-ERROR: Custom message that says 'ping' and 'pong'")
  234. finally:
  235. # Restore original filters
  236. admin_email_handler.filters = orig_filters
  237. @override_settings(
  238. ADMINS=[('whatever admin', 'admin@example.com')],
  239. EMAIL_SUBJECT_PREFIX='-SuperAwesomeSubject-',
  240. INTERNAL_IPS=['127.0.0.1'],
  241. )
  242. def test_accepts_args_and_request(self):
  243. """
  244. The subject is also handled if being passed a request object.
  245. """
  246. message = "Custom message that says '%s' and '%s'"
  247. token1 = 'ping'
  248. token2 = 'pong'
  249. admin_email_handler = self.get_admin_email_handler(self.logger)
  250. # Backup then override original filters
  251. orig_filters = admin_email_handler.filters
  252. try:
  253. admin_email_handler.filters = []
  254. request = self.request_factory.get('/')
  255. self.logger.error(
  256. message, token1, token2,
  257. extra={
  258. 'status_code': 403,
  259. 'request': request,
  260. }
  261. )
  262. self.assertEqual(len(mail.outbox), 1)
  263. self.assertEqual(mail.outbox[0].to, ['admin@example.com'])
  264. self.assertEqual(mail.outbox[0].subject,
  265. "-SuperAwesomeSubject-ERROR (internal IP): Custom message that says 'ping' and 'pong'")
  266. finally:
  267. # Restore original filters
  268. admin_email_handler.filters = orig_filters
  269. @override_settings(
  270. ADMINS=[('admin', 'admin@example.com')],
  271. EMAIL_SUBJECT_PREFIX='',
  272. DEBUG=False,
  273. )
  274. def test_subject_accepts_newlines(self):
  275. """
  276. Newlines in email reports' subjects are escaped to prevent
  277. AdminErrorHandler from failing (#17281).
  278. """
  279. message = 'Message \r\n with newlines'
  280. expected_subject = 'ERROR: Message \\r\\n with newlines'
  281. self.assertEqual(len(mail.outbox), 0)
  282. self.logger.error(message)
  283. self.assertEqual(len(mail.outbox), 1)
  284. self.assertNotIn('\n', mail.outbox[0].subject)
  285. self.assertNotIn('\r', mail.outbox[0].subject)
  286. self.assertEqual(mail.outbox[0].subject, expected_subject)
  287. @override_settings(
  288. ADMINS=[('admin', 'admin@example.com')],
  289. DEBUG=False,
  290. )
  291. def test_uses_custom_email_backend(self):
  292. """
  293. Refs #19325
  294. """
  295. message = 'All work and no play makes Jack a dull boy'
  296. admin_email_handler = self.get_admin_email_handler(self.logger)
  297. mail_admins_called = {'called': False}
  298. def my_mail_admins(*args, **kwargs):
  299. connection = kwargs['connection']
  300. self.assertIsInstance(connection, MyEmailBackend)
  301. mail_admins_called['called'] = True
  302. # Monkeypatches
  303. orig_mail_admins = mail.mail_admins
  304. orig_email_backend = admin_email_handler.email_backend
  305. mail.mail_admins = my_mail_admins
  306. admin_email_handler.email_backend = (
  307. 'logging_tests.logconfig.MyEmailBackend')
  308. try:
  309. self.logger.error(message)
  310. self.assertTrue(mail_admins_called['called'])
  311. finally:
  312. # Revert Monkeypatches
  313. mail.mail_admins = orig_mail_admins
  314. admin_email_handler.email_backend = orig_email_backend
  315. @override_settings(
  316. ADMINS=[('whatever admin', 'admin@example.com')],
  317. )
  318. def test_emit_non_ascii(self):
  319. """
  320. #23593 - AdminEmailHandler should allow Unicode characters in the
  321. request.
  322. """
  323. handler = self.get_admin_email_handler(self.logger)
  324. record = self.logger.makeRecord('name', logging.ERROR, 'function', 'lno', 'message', None, None)
  325. url_path = '/º'
  326. record.request = self.request_factory.get(url_path)
  327. handler.emit(record)
  328. self.assertEqual(len(mail.outbox), 1)
  329. msg = mail.outbox[0]
  330. self.assertEqual(msg.to, ['admin@example.com'])
  331. self.assertEqual(msg.subject, "[Django] ERROR (EXTERNAL IP): message")
  332. self.assertIn("Report at %s" % url_path, msg.body)
  333. @override_settings(
  334. MANAGERS=[('manager', 'manager@example.com')],
  335. DEBUG=False,
  336. )
  337. def test_customize_send_mail_method(self):
  338. class ManagerEmailHandler(AdminEmailHandler):
  339. def send_mail(self, subject, message, *args, **kwargs):
  340. mail.mail_managers(subject, message, *args, connection=self.connection(), **kwargs)
  341. handler = ManagerEmailHandler()
  342. record = self.logger.makeRecord('name', logging.ERROR, 'function', 'lno', 'message', None, None)
  343. self.assertEqual(len(mail.outbox), 0)
  344. handler.emit(record)
  345. self.assertEqual(len(mail.outbox), 1)
  346. self.assertEqual(mail.outbox[0].to, ['manager@example.com'])
  347. @override_settings(ALLOWED_HOSTS='example.com')
  348. def test_disallowed_host_doesnt_crash(self):
  349. admin_email_handler = self.get_admin_email_handler(self.logger)
  350. old_include_html = admin_email_handler.include_html
  351. # Text email
  352. admin_email_handler.include_html = False
  353. try:
  354. self.client.get('/', HTTP_HOST='evil.com')
  355. finally:
  356. admin_email_handler.include_html = old_include_html
  357. # HTML email
  358. admin_email_handler.include_html = True
  359. try:
  360. self.client.get('/', HTTP_HOST='evil.com')
  361. finally:
  362. admin_email_handler.include_html = old_include_html
  363. def test_default_exception_reporter_class(self):
  364. admin_email_handler = self.get_admin_email_handler(self.logger)
  365. self.assertEqual(admin_email_handler.reporter_class, ExceptionReporter)
  366. @override_settings(ADMINS=[('A.N.Admin', 'admin@example.com')])
  367. def test_custom_exception_reporter_is_used(self):
  368. record = self.logger.makeRecord('name', logging.ERROR, 'function', 'lno', 'message', None, None)
  369. record.request = self.request_factory.get('/')
  370. handler = AdminEmailHandler(reporter_class='logging_tests.logconfig.CustomExceptionReporter')
  371. handler.emit(record)
  372. self.assertEqual(len(mail.outbox), 1)
  373. msg = mail.outbox[0]
  374. self.assertEqual(msg.body, 'message\n\ncustom traceback text')
  375. class SettingsConfigTest(AdminScriptTestCase):
  376. """
  377. Accessing settings in a custom logging handler does not trigger
  378. a circular import error.
  379. """
  380. def setUp(self):
  381. super().setUp()
  382. log_config = """{
  383. 'version': 1,
  384. 'handlers': {
  385. 'custom_handler': {
  386. 'level': 'INFO',
  387. 'class': 'logging_tests.logconfig.MyHandler',
  388. }
  389. }
  390. }"""
  391. self.write_settings('settings.py', sdict={'LOGGING': log_config})
  392. def test_circular_dependency(self):
  393. # validate is just an example command to trigger settings configuration
  394. out, err = self.run_manage(['check'])
  395. self.assertNoOutput(err)
  396. self.assertOutput(out, "System check identified no issues (0 silenced).")
  397. def dictConfig(config):
  398. dictConfig.called = True
  399. dictConfig.called = False
  400. class SetupConfigureLogging(SimpleTestCase):
  401. """
  402. Calling django.setup() initializes the logging configuration.
  403. """
  404. @override_settings(
  405. LOGGING_CONFIG='logging_tests.tests.dictConfig',
  406. LOGGING=OLD_LOGGING,
  407. )
  408. def test_configure_initializes_logging(self):
  409. from django import setup
  410. setup()
  411. self.assertTrue(dictConfig.called)
  412. @override_settings(DEBUG=True, ROOT_URLCONF='logging_tests.urls')
  413. class SecurityLoggerTest(LoggingAssertionMixin, SimpleTestCase):
  414. def test_suspicious_operation_creates_log_message(self):
  415. self.assertLogsRequest(
  416. url='/suspicious/',
  417. level='ERROR',
  418. msg='dubious',
  419. status_code=400,
  420. logger='django.security.SuspiciousOperation',
  421. )
  422. def test_suspicious_operation_uses_sublogger(self):
  423. self.assertLogsRequest(
  424. url='/suspicious_spec/',
  425. level='ERROR',
  426. msg='dubious',
  427. status_code=400,
  428. logger='django.security.DisallowedHost',
  429. )
  430. @override_settings(
  431. ADMINS=[('admin', 'admin@example.com')],
  432. DEBUG=False,
  433. )
  434. def test_suspicious_email_admins(self):
  435. self.client.get('/suspicious/')
  436. self.assertEqual(len(mail.outbox), 1)
  437. self.assertIn('Report at /suspicious/', mail.outbox[0].body)
  438. class SettingsCustomLoggingTest(AdminScriptTestCase):
  439. """
  440. Using a logging defaults are still applied when using a custom
  441. callable in LOGGING_CONFIG (i.e., logging.config.fileConfig).
  442. """
  443. def setUp(self):
  444. super().setUp()
  445. logging_conf = """
  446. [loggers]
  447. keys=root
  448. [handlers]
  449. keys=stream
  450. [formatters]
  451. keys=simple
  452. [logger_root]
  453. handlers=stream
  454. [handler_stream]
  455. class=StreamHandler
  456. formatter=simple
  457. args=(sys.stdout,)
  458. [formatter_simple]
  459. format=%(message)s
  460. """
  461. self.temp_file = NamedTemporaryFile()
  462. self.temp_file.write(logging_conf.encode())
  463. self.temp_file.flush()
  464. self.write_settings('settings.py', sdict={
  465. 'LOGGING_CONFIG': '"logging.config.fileConfig"',
  466. 'LOGGING': 'r"%s"' % self.temp_file.name,
  467. })
  468. def tearDown(self):
  469. self.temp_file.close()
  470. def test_custom_logging(self):
  471. out, err = self.run_manage(['check'])
  472. self.assertNoOutput(err)
  473. self.assertOutput(out, "System check identified no issues (0 silenced).")
  474. class LogFormattersTests(SimpleTestCase):
  475. def test_server_formatter_styles(self):
  476. color_style = color.make_style('')
  477. formatter = ServerFormatter()
  478. formatter.style = color_style
  479. log_msg = 'log message'
  480. status_code_styles = [
  481. (200, 'HTTP_SUCCESS'),
  482. (100, 'HTTP_INFO'),
  483. (304, 'HTTP_NOT_MODIFIED'),
  484. (300, 'HTTP_REDIRECT'),
  485. (404, 'HTTP_NOT_FOUND'),
  486. (400, 'HTTP_BAD_REQUEST'),
  487. (500, 'HTTP_SERVER_ERROR'),
  488. ]
  489. for status_code, style in status_code_styles:
  490. record = logging.makeLogRecord({'msg': log_msg, 'status_code': status_code})
  491. self.assertEqual(formatter.format(record), getattr(color_style, style)(log_msg))
  492. record = logging.makeLogRecord({'msg': log_msg})
  493. self.assertEqual(formatter.format(record), log_msg)
  494. def test_server_formatter_default_format(self):
  495. server_time = '2016-09-25 10:20:30'
  496. log_msg = 'log message'
  497. logger = logging.getLogger('django.server')
  498. @contextmanager
  499. def patch_django_server_logger():
  500. old_stream = logger.handlers[0].stream
  501. new_stream = StringIO()
  502. logger.handlers[0].stream = new_stream
  503. yield new_stream
  504. logger.handlers[0].stream = old_stream
  505. with patch_django_server_logger() as logger_output:
  506. logger.info(log_msg, extra={'server_time': server_time})
  507. self.assertEqual('[%s] %s\n' % (server_time, log_msg), logger_output.getvalue())
  508. with patch_django_server_logger() as logger_output:
  509. logger.info(log_msg)
  510. self.assertRegex(logger_output.getvalue(), r'^\[[-:,.\s\d]+\] %s' % log_msg)