test_http.py 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. # -*- encoding: utf-8 -*-
  2. from __future__ import unicode_literals
  3. import sys
  4. import unittest
  5. from datetime import datetime
  6. from django.test import ignore_warnings
  7. from django.utils import http, six
  8. from django.utils.datastructures import MultiValueDict
  9. from django.utils.deprecation import RemovedInDjango21Warning
  10. class TestUtilsHttp(unittest.TestCase):
  11. def test_urlencode(self):
  12. # 2-tuples (the norm)
  13. result = http.urlencode((('a', 1), ('b', 2), ('c', 3)))
  14. self.assertEqual(result, 'a=1&b=2&c=3')
  15. # A dictionary
  16. result = http.urlencode({'a': 1, 'b': 2, 'c': 3})
  17. acceptable_results = [
  18. # Need to allow all of these as dictionaries have to be treated as
  19. # unordered
  20. 'a=1&b=2&c=3',
  21. 'a=1&c=3&b=2',
  22. 'b=2&a=1&c=3',
  23. 'b=2&c=3&a=1',
  24. 'c=3&a=1&b=2',
  25. 'c=3&b=2&a=1'
  26. ]
  27. self.assertIn(result, acceptable_results)
  28. result = http.urlencode({'a': [1, 2]}, doseq=False)
  29. self.assertEqual(result, 'a=%5B%271%27%2C+%272%27%5D')
  30. result = http.urlencode({'a': [1, 2]}, doseq=True)
  31. self.assertEqual(result, 'a=1&a=2')
  32. result = http.urlencode({'a': []}, doseq=True)
  33. self.assertEqual(result, '')
  34. # A MultiValueDict
  35. result = http.urlencode(MultiValueDict({
  36. 'name': ['Adrian', 'Simon'],
  37. 'position': ['Developer']
  38. }), doseq=True)
  39. acceptable_results = [
  40. # MultiValueDicts are similarly unordered
  41. 'name=Adrian&name=Simon&position=Developer',
  42. 'position=Developer&name=Adrian&name=Simon'
  43. ]
  44. self.assertIn(result, acceptable_results)
  45. def test_base36(self):
  46. # reciprocity works
  47. for n in [0, 1, 1000, 1000000]:
  48. self.assertEqual(n, http.base36_to_int(http.int_to_base36(n)))
  49. if six.PY2:
  50. self.assertEqual(sys.maxint, http.base36_to_int(http.int_to_base36(sys.maxint)))
  51. # bad input
  52. with self.assertRaises(ValueError):
  53. http.int_to_base36(-1)
  54. if six.PY2:
  55. with self.assertRaises(ValueError):
  56. http.int_to_base36(sys.maxint + 1)
  57. for n in ['1', 'foo', {1: 2}, (1, 2, 3), 3.141]:
  58. with self.assertRaises(TypeError):
  59. http.int_to_base36(n)
  60. for n in ['#', ' ']:
  61. with self.assertRaises(ValueError):
  62. http.base36_to_int(n)
  63. for n in [123, {1: 2}, (1, 2, 3), 3.141]:
  64. with self.assertRaises(TypeError):
  65. http.base36_to_int(n)
  66. # more explicit output testing
  67. for n, b36 in [(0, '0'), (1, '1'), (42, '16'), (818469960, 'django')]:
  68. self.assertEqual(http.int_to_base36(n), b36)
  69. self.assertEqual(http.base36_to_int(b36), n)
  70. def test_is_safe_url(self):
  71. bad_urls = (
  72. 'http://example.com',
  73. 'http:///example.com',
  74. 'https://example.com',
  75. 'ftp://example.com',
  76. r'\\example.com',
  77. r'\\\example.com',
  78. r'/\\/example.com',
  79. r'\\\example.com',
  80. r'\\example.com',
  81. r'\\//example.com',
  82. r'/\/example.com',
  83. r'\/example.com',
  84. r'/\example.com',
  85. 'http:///example.com',
  86. 'http:/\//example.com',
  87. 'http:\/example.com',
  88. 'http:/\example.com',
  89. 'javascript:alert("XSS")',
  90. '\njavascript:alert(x)',
  91. '\x08//example.com',
  92. r'http://otherserver\@example.com',
  93. r'http:\\testserver\@example.com',
  94. r'http://testserver\me:pass@example.com',
  95. r'http://testserver\@example.com',
  96. r'http:\\testserver\confirm\me@example.com',
  97. '\n',
  98. )
  99. for bad_url in bad_urls:
  100. with ignore_warnings(category=RemovedInDjango21Warning):
  101. self.assertFalse(http.is_safe_url(bad_url, host='testserver'), "%s should be blocked" % bad_url)
  102. self.assertFalse(
  103. http.is_safe_url(bad_url, allowed_hosts={'testserver', 'testserver2'}),
  104. "%s should be blocked" % bad_url,
  105. )
  106. good_urls = (
  107. '/view/?param=http://example.com',
  108. '/view/?param=https://example.com',
  109. '/view?param=ftp://example.com',
  110. 'view/?param=//example.com',
  111. 'https://testserver/',
  112. 'HTTPS://testserver/',
  113. '//testserver/',
  114. 'http://testserver/confirm?email=me@example.com',
  115. '/url%20with%20spaces/',
  116. )
  117. for good_url in good_urls:
  118. with ignore_warnings(category=RemovedInDjango21Warning):
  119. self.assertTrue(http.is_safe_url(good_url, host='testserver'), "%s should be allowed" % good_url)
  120. self.assertTrue(
  121. http.is_safe_url(good_url, allowed_hosts={'otherserver', 'testserver'}),
  122. "%s should be allowed" % good_url,
  123. )
  124. if six.PY2:
  125. # Check binary URLs, regression tests for #26308
  126. self.assertTrue(
  127. http.is_safe_url(b'https://testserver/', allowed_hosts={'testserver'}),
  128. "binary URLs should be allowed on Python 2"
  129. )
  130. self.assertFalse(http.is_safe_url(b'\x08//example.com', allowed_hosts={'testserver'}))
  131. self.assertTrue(http.is_safe_url('àview/'.encode('utf-8'), allowed_hosts={'testserver'}))
  132. self.assertFalse(http.is_safe_url('àview'.encode('latin-1'), allowed_hosts={'testserver'}))
  133. # Valid basic auth credentials are allowed.
  134. self.assertTrue(http.is_safe_url(r'http://user:pass@testserver/', allowed_hosts={'user:pass@testserver'}))
  135. # A path without host is allowed.
  136. self.assertTrue(http.is_safe_url('/confirm/me@example.com'))
  137. # Basic auth without host is not allowed.
  138. self.assertFalse(http.is_safe_url(r'http://testserver\@example.com'))
  139. def test_is_safe_url_secure_param_https_urls(self):
  140. secure_urls = (
  141. 'https://example.com/p',
  142. 'HTTPS://example.com/p',
  143. '/view/?param=http://example.com',
  144. )
  145. for url in secure_urls:
  146. self.assertTrue(http.is_safe_url(url, allowed_hosts={'example.com'}, require_https=True))
  147. def test_is_safe_url_secure_param_non_https_urls(self):
  148. not_secure_urls = (
  149. 'http://example.com/p',
  150. 'ftp://example.com/p',
  151. '//example.com/p',
  152. )
  153. for url in not_secure_urls:
  154. self.assertFalse(http.is_safe_url(url, allowed_hosts={'example.com'}, require_https=True))
  155. def test_urlsafe_base64_roundtrip(self):
  156. bytestring = b'foo'
  157. encoded = http.urlsafe_base64_encode(bytestring)
  158. decoded = http.urlsafe_base64_decode(encoded)
  159. self.assertEqual(bytestring, decoded)
  160. def test_urlquote(self):
  161. self.assertEqual(http.urlquote('Paris & Orl\xe9ans'), 'Paris%20%26%20Orl%C3%A9ans')
  162. self.assertEqual(http.urlquote('Paris & Orl\xe9ans', safe="&"), 'Paris%20&%20Orl%C3%A9ans')
  163. self.assertEqual(http.urlunquote('Paris%20%26%20Orl%C3%A9ans'), 'Paris & Orl\xe9ans')
  164. self.assertEqual(http.urlunquote('Paris%20&%20Orl%C3%A9ans'), 'Paris & Orl\xe9ans')
  165. self.assertEqual(http.urlquote_plus('Paris & Orl\xe9ans'), 'Paris+%26+Orl%C3%A9ans')
  166. self.assertEqual(http.urlquote_plus('Paris & Orl\xe9ans', safe="&"), 'Paris+&+Orl%C3%A9ans')
  167. self.assertEqual(http.urlunquote_plus('Paris+%26+Orl%C3%A9ans'), 'Paris & Orl\xe9ans')
  168. self.assertEqual(http.urlunquote_plus('Paris+&+Orl%C3%A9ans'), 'Paris & Orl\xe9ans')
  169. def test_is_same_domain_good(self):
  170. for pair in (
  171. ('example.com', 'example.com'),
  172. ('example.com', '.example.com'),
  173. ('foo.example.com', '.example.com'),
  174. ('example.com:8888', 'example.com:8888'),
  175. ('example.com:8888', '.example.com:8888'),
  176. ('foo.example.com:8888', '.example.com:8888'),
  177. ):
  178. self.assertTrue(http.is_same_domain(*pair))
  179. def test_is_same_domain_bad(self):
  180. for pair in (
  181. ('example2.com', 'example.com'),
  182. ('foo.example.com', 'example.com'),
  183. ('example.com:9999', 'example.com:8888'),
  184. ):
  185. self.assertFalse(http.is_same_domain(*pair))
  186. class ETagProcessingTests(unittest.TestCase):
  187. def test_parsing(self):
  188. self.assertEqual(
  189. http.parse_etags(r'"" , "etag", "e\\tag", W/"weak"'),
  190. ['""', '"etag"', r'"e\\tag"', 'W/"weak"']
  191. )
  192. self.assertEqual(http.parse_etags('*'), ['*'])
  193. # Ignore RFC 2616 ETags that are invalid according to RFC 7232.
  194. self.assertEqual(http.parse_etags(r'"etag", "e\"t\"ag"'), ['"etag"'])
  195. def test_quoting(self):
  196. self.assertEqual(http.quote_etag('etag'), '"etag"') # unquoted
  197. self.assertEqual(http.quote_etag('"etag"'), '"etag"') # quoted
  198. self.assertEqual(http.quote_etag('W/"etag"'), 'W/"etag"') # quoted, weak
  199. class HttpDateProcessingTests(unittest.TestCase):
  200. def test_http_date(self):
  201. t = 1167616461.0
  202. self.assertEqual(http.http_date(t), 'Mon, 01 Jan 2007 01:54:21 GMT')
  203. def test_cookie_date(self):
  204. t = 1167616461.0
  205. self.assertEqual(http.cookie_date(t), 'Mon, 01-Jan-2007 01:54:21 GMT')
  206. def test_parsing_rfc1123(self):
  207. parsed = http.parse_http_date('Sun, 06 Nov 1994 08:49:37 GMT')
  208. self.assertEqual(datetime.utcfromtimestamp(parsed), datetime(1994, 11, 6, 8, 49, 37))
  209. def test_parsing_rfc850(self):
  210. parsed = http.parse_http_date('Sunday, 06-Nov-94 08:49:37 GMT')
  211. self.assertEqual(datetime.utcfromtimestamp(parsed), datetime(1994, 11, 6, 8, 49, 37))
  212. def test_parsing_asctime(self):
  213. parsed = http.parse_http_date('Sun Nov 6 08:49:37 1994')
  214. self.assertEqual(datetime.utcfromtimestamp(parsed), datetime(1994, 11, 6, 8, 49, 37))