tests.py 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131
  1. # coding: utf-8
  2. from __future__ import unicode_literals
  3. from django.core.handlers.wsgi import WSGIHandler, WSGIRequest
  4. from django.core.signals import request_started, request_finished
  5. from django.db import close_old_connections, connection
  6. from django.test import RequestFactory, TestCase, TransactionTestCase
  7. from django.test.utils import override_settings
  8. from django.utils.encoding import force_str
  9. from django.utils import six
  10. class HandlerTests(TestCase):
  11. def setUp(self):
  12. request_started.disconnect(close_old_connections)
  13. def tearDown(self):
  14. request_started.connect(close_old_connections)
  15. # Mangle settings so the handler will fail
  16. @override_settings(MIDDLEWARE_CLASSES=42)
  17. def test_lock_safety(self):
  18. """
  19. Tests for bug #11193 (errors inside middleware shouldn't leave
  20. the initLock locked).
  21. """
  22. # Try running the handler, it will fail in load_middleware
  23. handler = WSGIHandler()
  24. self.assertEqual(handler.initLock.locked(), False)
  25. with self.assertRaises(Exception):
  26. handler(None, None)
  27. self.assertEqual(handler.initLock.locked(), False)
  28. def test_bad_path_info(self):
  29. """Tests for bug #15672 ('request' referenced before assignment)"""
  30. environ = RequestFactory().get('/').environ
  31. environ['PATH_INFO'] = b'\xed' if six.PY2 else '\xed'
  32. handler = WSGIHandler()
  33. response = handler(environ, lambda *a, **k: None)
  34. self.assertEqual(response.status_code, 400)
  35. def test_non_ascii_query_string(self):
  36. """Test that non-ASCII query strings are properly decoded (#20530)."""
  37. environ = RequestFactory().get('/').environ
  38. raw_query_string = 'want=café'
  39. if six.PY3:
  40. raw_query_string = raw_query_string.encode('utf-8').decode('iso-8859-1')
  41. environ['QUERY_STRING'] = raw_query_string
  42. request = WSGIRequest(environ)
  43. self.assertEqual(request.GET['want'], "café")
  44. def test_non_ascii_cookie(self):
  45. """Test that non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
  46. environ = RequestFactory().get('/').environ
  47. raw_cookie = 'want="café"'
  48. if six.PY3:
  49. raw_cookie = raw_cookie.encode('utf-8').decode('iso-8859-1')
  50. environ['HTTP_COOKIE'] = raw_cookie
  51. request = WSGIRequest(environ)
  52. # If would be nicer if request.COOKIES returned unicode values.
  53. # However the current cookie parser doesn't do this and fixing it is
  54. # much more work than fixing #20557. Feel free to remove force_str()!
  55. self.assertEqual(request.COOKIES['want'], force_str("café"))
  56. class TransactionsPerRequestTests(TransactionTestCase):
  57. available_apps = []
  58. urls = 'handlers.urls'
  59. def test_no_transaction(self):
  60. response = self.client.get('/in_transaction/')
  61. self.assertContains(response, 'False')
  62. def test_auto_transaction(self):
  63. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  64. try:
  65. connection.settings_dict['ATOMIC_REQUESTS'] = True
  66. response = self.client.get('/in_transaction/')
  67. finally:
  68. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  69. self.assertContains(response, 'True')
  70. def test_no_auto_transaction(self):
  71. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  72. try:
  73. connection.settings_dict['ATOMIC_REQUESTS'] = True
  74. response = self.client.get('/not_in_transaction/')
  75. finally:
  76. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  77. self.assertContains(response, 'False')
  78. class SignalsTests(TestCase):
  79. urls = 'handlers.urls'
  80. def setUp(self):
  81. self.signals = []
  82. request_started.connect(self.register_started)
  83. request_finished.connect(self.register_finished)
  84. def tearDown(self):
  85. request_started.disconnect(self.register_started)
  86. request_finished.disconnect(self.register_finished)
  87. def register_started(self, **kwargs):
  88. self.signals.append('started')
  89. def register_finished(self, **kwargs):
  90. self.signals.append('finished')
  91. def test_request_signals(self):
  92. response = self.client.get('/regular/')
  93. self.assertEqual(self.signals, ['started', 'finished'])
  94. self.assertEqual(response.content, b"regular content")
  95. def test_request_signals_streaming_response(self):
  96. response = self.client.get('/streaming/')
  97. self.assertEqual(self.signals, ['started'])
  98. self.assertEqual(b''.join(response.streaming_content), b"streaming content")
  99. self.assertEqual(self.signals, ['started', 'finished'])
  100. class HandlerSuspiciousOpsTest(TestCase):
  101. urls = 'handlers.urls'
  102. def test_suspiciousop_in_view_returns_400(self):
  103. response = self.client.get('/suspicious/')
  104. self.assertEqual(response.status_code, 400)