test_validators.py 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. import os
  2. from django.contrib.auth import validators
  3. from django.contrib.auth.models import User
  4. from django.contrib.auth.password_validation import (
  5. CommonPasswordValidator, MinimumLengthValidator, NumericPasswordValidator,
  6. UserAttributeSimilarityValidator, get_default_password_validators,
  7. get_password_validators, password_changed,
  8. password_validators_help_text_html, password_validators_help_texts,
  9. validate_password,
  10. )
  11. from django.core.exceptions import ValidationError
  12. from django.db import models
  13. from django.test import TestCase, override_settings
  14. from django.test.utils import isolate_apps
  15. @override_settings(AUTH_PASSWORD_VALIDATORS=[
  16. {'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator'},
  17. {'NAME': 'django.contrib.auth.password_validation.MinimumLengthValidator', 'OPTIONS': {
  18. 'min_length': 12,
  19. }},
  20. ])
  21. class PasswordValidationTest(TestCase):
  22. def test_get_default_password_validators(self):
  23. validators = get_default_password_validators()
  24. self.assertEqual(len(validators), 2)
  25. self.assertEqual(validators[0].__class__.__name__, 'CommonPasswordValidator')
  26. self.assertEqual(validators[1].__class__.__name__, 'MinimumLengthValidator')
  27. self.assertEqual(validators[1].min_length, 12)
  28. def test_get_password_validators_custom(self):
  29. validator_config = [{'NAME': 'django.contrib.auth.password_validation.CommonPasswordValidator'}]
  30. validators = get_password_validators(validator_config)
  31. self.assertEqual(len(validators), 1)
  32. self.assertEqual(validators[0].__class__.__name__, 'CommonPasswordValidator')
  33. self.assertEqual(get_password_validators([]), [])
  34. def test_validate_password(self):
  35. self.assertIsNone(validate_password('sufficiently-long'))
  36. msg_too_short = 'This password is too short. It must contain at least 12 characters.'
  37. with self.assertRaises(ValidationError) as cm:
  38. validate_password('django4242')
  39. self.assertEqual(cm.exception.messages, [msg_too_short])
  40. self.assertEqual(cm.exception.error_list[0].code, 'password_too_short')
  41. with self.assertRaises(ValidationError) as cm:
  42. validate_password('password')
  43. self.assertEqual(cm.exception.messages, ['This password is too common.', msg_too_short])
  44. self.assertEqual(cm.exception.error_list[0].code, 'password_too_common')
  45. self.assertIsNone(validate_password('password', password_validators=[]))
  46. def test_password_changed(self):
  47. self.assertIsNone(password_changed('password'))
  48. def test_password_validators_help_texts(self):
  49. help_texts = password_validators_help_texts()
  50. self.assertEqual(len(help_texts), 2)
  51. self.assertIn('12 characters', help_texts[1])
  52. self.assertEqual(password_validators_help_texts(password_validators=[]), [])
  53. def test_password_validators_help_text_html(self):
  54. help_text = password_validators_help_text_html()
  55. self.assertEqual(help_text.count('<li>'), 2)
  56. self.assertIn('12 characters', help_text)
  57. @override_settings(AUTH_PASSWORD_VALIDATORS=[])
  58. def test_empty_password_validator_help_text_html(self):
  59. self.assertEqual(password_validators_help_text_html(), '')
  60. class MinimumLengthValidatorTest(TestCase):
  61. def test_validate(self):
  62. expected_error = "This password is too short. It must contain at least %d characters."
  63. self.assertIsNone(MinimumLengthValidator().validate('12345678'))
  64. self.assertIsNone(MinimumLengthValidator(min_length=3).validate('123'))
  65. with self.assertRaises(ValidationError) as cm:
  66. MinimumLengthValidator().validate('1234567')
  67. self.assertEqual(cm.exception.messages, [expected_error % 8])
  68. self.assertEqual(cm.exception.error_list[0].code, 'password_too_short')
  69. with self.assertRaises(ValidationError) as cm:
  70. MinimumLengthValidator(min_length=3).validate('12')
  71. self.assertEqual(cm.exception.messages, [expected_error % 3])
  72. def test_help_text(self):
  73. self.assertEqual(
  74. MinimumLengthValidator().get_help_text(),
  75. "Your password must contain at least 8 characters."
  76. )
  77. class UserAttributeSimilarityValidatorTest(TestCase):
  78. def test_validate(self):
  79. user = User.objects.create_user(
  80. username='testclient', password='password', email='testclient@example.com',
  81. first_name='Test', last_name='Client',
  82. )
  83. expected_error = "The password is too similar to the %s."
  84. self.assertIsNone(UserAttributeSimilarityValidator().validate('testclient'))
  85. with self.assertRaises(ValidationError) as cm:
  86. UserAttributeSimilarityValidator().validate('testclient', user=user),
  87. self.assertEqual(cm.exception.messages, [expected_error % "username"])
  88. self.assertEqual(cm.exception.error_list[0].code, 'password_too_similar')
  89. with self.assertRaises(ValidationError) as cm:
  90. UserAttributeSimilarityValidator().validate('example.com', user=user),
  91. self.assertEqual(cm.exception.messages, [expected_error % "email address"])
  92. with self.assertRaises(ValidationError) as cm:
  93. UserAttributeSimilarityValidator(
  94. user_attributes=['first_name'],
  95. max_similarity=0.3,
  96. ).validate('testclient', user=user)
  97. self.assertEqual(cm.exception.messages, [expected_error % "first name"])
  98. # max_similarity=1 doesn't allow passwords that are identical to the
  99. # attribute's value.
  100. with self.assertRaises(ValidationError) as cm:
  101. UserAttributeSimilarityValidator(
  102. user_attributes=['first_name'],
  103. max_similarity=1,
  104. ).validate(user.first_name, user=user)
  105. self.assertEqual(cm.exception.messages, [expected_error % "first name"])
  106. # max_similarity=0 rejects all passwords.
  107. with self.assertRaises(ValidationError) as cm:
  108. UserAttributeSimilarityValidator(
  109. user_attributes=['first_name'],
  110. max_similarity=0,
  111. ).validate('XXX', user=user)
  112. self.assertEqual(cm.exception.messages, [expected_error % "first name"])
  113. # Passes validation.
  114. self.assertIsNone(
  115. UserAttributeSimilarityValidator(user_attributes=['first_name']).validate('testclient', user=user)
  116. )
  117. @isolate_apps('auth_tests')
  118. def test_validate_property(self):
  119. class TestUser(models.Model):
  120. pass
  121. @property
  122. def username(self):
  123. return 'foobar'
  124. with self.assertRaises(ValidationError) as cm:
  125. UserAttributeSimilarityValidator().validate('foobar', user=TestUser()),
  126. self.assertEqual(cm.exception.messages, ['The password is too similar to the username.'])
  127. def test_help_text(self):
  128. self.assertEqual(
  129. UserAttributeSimilarityValidator().get_help_text(),
  130. "Your password can't be too similar to your other personal information."
  131. )
  132. class CommonPasswordValidatorTest(TestCase):
  133. def test_validate(self):
  134. expected_error = "This password is too common."
  135. self.assertIsNone(CommonPasswordValidator().validate('a-safe-password'))
  136. with self.assertRaises(ValidationError) as cm:
  137. CommonPasswordValidator().validate('godzilla')
  138. self.assertEqual(cm.exception.messages, [expected_error])
  139. def test_validate_custom_list(self):
  140. path = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'common-passwords-custom.txt')
  141. validator = CommonPasswordValidator(password_list_path=path)
  142. expected_error = "This password is too common."
  143. self.assertIsNone(validator.validate('a-safe-password'))
  144. with self.assertRaises(ValidationError) as cm:
  145. validator.validate('from-my-custom-list')
  146. self.assertEqual(cm.exception.messages, [expected_error])
  147. self.assertEqual(cm.exception.error_list[0].code, 'password_too_common')
  148. def test_help_text(self):
  149. self.assertEqual(
  150. CommonPasswordValidator().get_help_text(),
  151. "Your password can't be a commonly used password."
  152. )
  153. class NumericPasswordValidatorTest(TestCase):
  154. def test_validate(self):
  155. expected_error = "This password is entirely numeric."
  156. self.assertIsNone(NumericPasswordValidator().validate('a-safe-password'))
  157. with self.assertRaises(ValidationError) as cm:
  158. NumericPasswordValidator().validate('42424242')
  159. self.assertEqual(cm.exception.messages, [expected_error])
  160. self.assertEqual(cm.exception.error_list[0].code, 'password_entirely_numeric')
  161. def test_help_text(self):
  162. self.assertEqual(
  163. NumericPasswordValidator().get_help_text(),
  164. "Your password can't be entirely numeric."
  165. )
  166. class UsernameValidatorsTests(TestCase):
  167. def test_unicode_validator(self):
  168. valid_usernames = ['joe', 'René', 'ᴮᴵᴳᴮᴵᴿᴰ', 'أحمد']
  169. invalid_usernames = [
  170. "o'connell", "عبد ال",
  171. "zerowidth\u200Bspace", "nonbreaking\u00A0space",
  172. "en\u2013dash",
  173. ]
  174. v = validators.UnicodeUsernameValidator()
  175. for valid in valid_usernames:
  176. v(valid)
  177. for invalid in invalid_usernames:
  178. with self.assertRaises(ValidationError):
  179. v(invalid)
  180. def test_ascii_validator(self):
  181. valid_usernames = ['glenn', 'GLEnN', 'jean-marc']
  182. invalid_usernames = ["o'connell", 'Éric', 'jean marc', "أحمد"]
  183. v = validators.ASCIIUsernameValidator()
  184. for valid in valid_usernames:
  185. v(valid)
  186. for invalid in invalid_usernames:
  187. with self.assertRaises(ValidationError):
  188. v(invalid)