123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183 |
- from asgiref.sync import sync_to_async
- from django.conf import settings
- from django.contrib.auth import aget_user, get_user, get_user_model
- from django.contrib.auth.models import AnonymousUser, User
- from django.core.exceptions import ImproperlyConfigured
- from django.db import IntegrityError
- from django.http import HttpRequest
- from django.test import TestCase, override_settings
- from django.utils import translation
- from .models import CustomUser
- class BasicTestCase(TestCase):
- def test_user(self):
- "Users can be created and can set their password"
- u = User.objects.create_user("testuser", "test@example.com", "testpw")
- self.assertTrue(u.has_usable_password())
- self.assertFalse(u.check_password("bad"))
- self.assertTrue(u.check_password("testpw"))
- # Check we can manually set an unusable password
- u.set_unusable_password()
- u.save()
- self.assertFalse(u.check_password("testpw"))
- self.assertFalse(u.has_usable_password())
- u.set_password("testpw")
- self.assertTrue(u.check_password("testpw"))
- u.set_password(None)
- self.assertFalse(u.has_usable_password())
- # Check username getter
- self.assertEqual(u.get_username(), "testuser")
- # Check authentication/permissions
- self.assertFalse(u.is_anonymous)
- self.assertTrue(u.is_authenticated)
- self.assertFalse(u.is_staff)
- self.assertTrue(u.is_active)
- self.assertFalse(u.is_superuser)
- # Check API-based user creation with no password
- u2 = User.objects.create_user("testuser2", "test2@example.com")
- self.assertFalse(u2.has_usable_password())
- def test_unicode_username(self):
- User.objects.create_user("jörg")
- User.objects.create_user("Григорий")
- # Two equivalent Unicode normalized usernames are duplicates.
- omega_username = "iamtheΩ" # U+03A9 GREEK CAPITAL LETTER OMEGA
- ohm_username = "iamtheΩ" # U+2126 OHM SIGN
- User.objects.create_user(ohm_username)
- with self.assertRaises(IntegrityError):
- User.objects.create_user(omega_username)
- def test_user_no_email(self):
- "Users can be created without an email"
- cases = [
- {},
- {"email": ""},
- {"email": None},
- ]
- for i, kwargs in enumerate(cases):
- with self.subTest(**kwargs):
- u = User.objects.create_user("testuser{}".format(i), **kwargs)
- self.assertEqual(u.email, "")
- def test_superuser(self):
- "Check the creation and properties of a superuser"
- super = User.objects.create_superuser("super", "super@example.com", "super")
- self.assertTrue(super.is_superuser)
- self.assertTrue(super.is_active)
- self.assertTrue(super.is_staff)
- def test_superuser_no_email_or_password(self):
- cases = [
- {},
- {"email": ""},
- {"email": None},
- {"password": None},
- ]
- for i, kwargs in enumerate(cases):
- with self.subTest(**kwargs):
- superuser = User.objects.create_superuser("super{}".format(i), **kwargs)
- self.assertEqual(superuser.email, "")
- self.assertFalse(superuser.has_usable_password())
- def test_get_user_model(self):
- "The current user model can be retrieved"
- self.assertEqual(get_user_model(), User)
- @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser")
- def test_swappable_user(self):
- "The current user model can be swapped out for another"
- self.assertEqual(get_user_model(), CustomUser)
- with self.assertRaises(AttributeError):
- User.objects.all()
- @override_settings(AUTH_USER_MODEL="badsetting")
- def test_swappable_user_bad_setting(self):
- "The alternate user setting must point to something in the format app.model"
- msg = "AUTH_USER_MODEL must be of the form 'app_label.model_name'"
- with self.assertRaisesMessage(ImproperlyConfigured, msg):
- get_user_model()
- @override_settings(AUTH_USER_MODEL="thismodel.doesntexist")
- def test_swappable_user_nonexistent_model(self):
- "The current user model must point to an installed model"
- msg = (
- "AUTH_USER_MODEL refers to model 'thismodel.doesntexist' "
- "that has not been installed"
- )
- with self.assertRaisesMessage(ImproperlyConfigured, msg):
- get_user_model()
- def test_user_verbose_names_translatable(self):
- "Default User model verbose names are translatable (#19945)"
- with translation.override("en"):
- self.assertEqual(User._meta.verbose_name, "user")
- self.assertEqual(User._meta.verbose_name_plural, "users")
- with translation.override("es"):
- self.assertEqual(User._meta.verbose_name, "usuario")
- self.assertEqual(User._meta.verbose_name_plural, "usuarios")
- class TestGetUser(TestCase):
- def test_get_user_anonymous(self):
- request = HttpRequest()
- request.session = self.client.session
- user = get_user(request)
- self.assertIsInstance(user, AnonymousUser)
- async def test_aget_user_anonymous(self):
- request = HttpRequest()
- request.session = await self.client.asession()
- user = await aget_user(request)
- self.assertIsInstance(user, AnonymousUser)
- def test_get_user(self):
- created_user = User.objects.create_user(
- "testuser", "test@example.com", "testpw"
- )
- self.client.login(username="testuser", password="testpw")
- request = HttpRequest()
- request.session = self.client.session
- user = get_user(request)
- self.assertIsInstance(user, User)
- self.assertEqual(user.username, created_user.username)
- def test_get_user_fallback_secret(self):
- created_user = User.objects.create_user(
- "testuser", "test@example.com", "testpw"
- )
- self.client.login(username="testuser", password="testpw")
- request = HttpRequest()
- request.session = self.client.session
- prev_session_key = request.session.session_key
- with override_settings(
- SECRET_KEY="newsecret",
- SECRET_KEY_FALLBACKS=[settings.SECRET_KEY],
- ):
- user = get_user(request)
- self.assertIsInstance(user, User)
- self.assertEqual(user.username, created_user.username)
- self.assertNotEqual(request.session.session_key, prev_session_key)
- # Remove the fallback secret.
- # The session hash should be updated using the current secret.
- with override_settings(SECRET_KEY="newsecret"):
- user = get_user(request)
- self.assertIsInstance(user, User)
- self.assertEqual(user.username, created_user.username)
- async def test_aget_user(self):
- created_user = await sync_to_async(User.objects.create_user)(
- "testuser", "test@example.com", "testpw"
- )
- await self.client.alogin(username="testuser", password="testpw")
- request = HttpRequest()
- request.session = await self.client.asession()
- user = await aget_user(request)
- self.assertIsInstance(user, User)
- self.assertEqual(user.username, created_user.username)
|