123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210 |
- # -*- coding: utf-8 -*-
- from __future__ import unicode_literals
- from django.core.handlers.wsgi import WSGIHandler, WSGIRequest, get_script_name
- from django.core.signals import request_finished, request_started
- from django.db import close_old_connections, connection
- from django.test import (
- RequestFactory, SimpleTestCase, TransactionTestCase, override_settings,
- )
- from django.utils import six
- from django.utils.encoding import force_str
- class HandlerTests(SimpleTestCase):
- def setUp(self):
- request_started.disconnect(close_old_connections)
- def tearDown(self):
- request_started.connect(close_old_connections)
- def test_middleware_initialized(self):
- handler = WSGIHandler()
- self.assertIsNotNone(handler._request_middleware)
- def test_bad_path_info(self):
- """Tests for bug #15672 ('request' referenced before assignment)"""
- environ = RequestFactory().get('/').environ
- environ['PATH_INFO'] = b'\xed' if six.PY2 else '\xed'
- handler = WSGIHandler()
- response = handler(environ, lambda *a, **k: None)
- self.assertEqual(response.status_code, 400)
- def test_non_ascii_query_string(self):
- """
- Test that non-ASCII query strings are properly decoded (#20530, #22996).
- """
- environ = RequestFactory().get('/').environ
- raw_query_strings = [
- b'want=caf%C3%A9', # This is the proper way to encode 'café'
- b'want=caf\xc3\xa9', # UA forgot to quote bytes
- b'want=caf%E9', # UA quoted, but not in UTF-8
- b'want=caf\xe9', # UA forgot to convert Latin-1 to UTF-8 and to quote (typical of MSIE)
- ]
- got = []
- for raw_query_string in raw_query_strings:
- if six.PY3:
- # Simulate http.server.BaseHTTPRequestHandler.parse_request handling of raw request
- environ['QUERY_STRING'] = str(raw_query_string, 'iso-8859-1')
- else:
- environ['QUERY_STRING'] = raw_query_string
- request = WSGIRequest(environ)
- got.append(request.GET['want'])
- if six.PY2:
- self.assertListEqual(got, ['café', 'café', 'café', 'café'])
- else:
- # On Python 3, %E9 is converted to the unicode replacement character by parse_qsl
- self.assertListEqual(got, ['café', 'café', 'caf\ufffd', 'café'])
- def test_non_ascii_cookie(self):
- """Test that non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
- environ = RequestFactory().get('/').environ
- raw_cookie = 'want="café"'
- if six.PY3:
- raw_cookie = raw_cookie.encode('utf-8').decode('iso-8859-1')
- environ['HTTP_COOKIE'] = raw_cookie
- request = WSGIRequest(environ)
- # If would be nicer if request.COOKIES returned unicode values.
- # However the current cookie parser doesn't do this and fixing it is
- # much more work than fixing #20557. Feel free to remove force_str()!
- self.assertEqual(request.COOKIES['want'], force_str("café"))
- def test_invalid_unicode_cookie(self):
- """
- Invalid cookie content should result in an absent cookie, but not in a
- crash while trying to decode it (#23638).
- """
- environ = RequestFactory().get('/').environ
- environ['HTTP_COOKIE'] = 'x=W\x03c(h]\x8e'
- request = WSGIRequest(environ)
- # We don't test COOKIES content, as the result might differ between
- # Python version because parsing invalid content became stricter in
- # latest versions.
- self.assertIsInstance(request.COOKIES, dict)
- @override_settings(ROOT_URLCONF='handlers.urls')
- def test_invalid_multipart_boundary(self):
- """
- Invalid boundary string should produce a "Bad Request" response, not a
- server error (#23887).
- """
- environ = RequestFactory().post('/malformed_post/').environ
- environ['CONTENT_TYPE'] = 'multipart/form-data; boundary=WRONG\x07'
- handler = WSGIHandler()
- response = handler(environ, lambda *a, **k: None)
- # Expect "bad request" response
- self.assertEqual(response.status_code, 400)
- @override_settings(ROOT_URLCONF='handlers.urls')
- class TransactionsPerRequestTests(TransactionTestCase):
- available_apps = []
- def test_no_transaction(self):
- response = self.client.get('/in_transaction/')
- self.assertContains(response, 'False')
- def test_auto_transaction(self):
- old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
- try:
- connection.settings_dict['ATOMIC_REQUESTS'] = True
- response = self.client.get('/in_transaction/')
- finally:
- connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
- self.assertContains(response, 'True')
- def test_no_auto_transaction(self):
- old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
- try:
- connection.settings_dict['ATOMIC_REQUESTS'] = True
- response = self.client.get('/not_in_transaction/')
- finally:
- connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
- self.assertContains(response, 'False')
- @override_settings(ROOT_URLCONF='handlers.urls')
- class SignalsTests(SimpleTestCase):
- def setUp(self):
- self.signals = []
- self.signaled_environ = None
- request_started.connect(self.register_started)
- request_finished.connect(self.register_finished)
- def tearDown(self):
- request_started.disconnect(self.register_started)
- request_finished.disconnect(self.register_finished)
- def register_started(self, **kwargs):
- self.signals.append('started')
- self.signaled_environ = kwargs.get('environ')
- def register_finished(self, **kwargs):
- self.signals.append('finished')
- def test_request_signals(self):
- response = self.client.get('/regular/')
- self.assertEqual(self.signals, ['started', 'finished'])
- self.assertEqual(response.content, b"regular content")
- self.assertEqual(self.signaled_environ, response.wsgi_request.environ)
- def test_request_signals_streaming_response(self):
- response = self.client.get('/streaming/')
- self.assertEqual(self.signals, ['started'])
- self.assertEqual(b''.join(response.streaming_content), b"streaming content")
- self.assertEqual(self.signals, ['started', 'finished'])
- @override_settings(ROOT_URLCONF='handlers.urls')
- class HandlerSuspiciousOpsTest(SimpleTestCase):
- def test_suspiciousop_in_view_returns_400(self):
- response = self.client.get('/suspicious/')
- self.assertEqual(response.status_code, 400)
- @override_settings(ROOT_URLCONF='handlers.urls')
- class HandlerNotFoundTest(SimpleTestCase):
- def test_invalid_urls(self):
- response = self.client.get('~%A9helloworld')
- self.assertContains(response, '~%A9helloworld', status_code=404)
- response = self.client.get('d%aao%aaw%aan%aal%aao%aaa%aad%aa/')
- self.assertContains(response, 'd%AAo%AAw%AAn%AAl%AAo%AAa%AAd%AA', status_code=404)
- response = self.client.get('/%E2%99%E2%99%A5/')
- self.assertContains(response, '%E2%99\u2665', status_code=404)
- response = self.client.get('/%E2%98%8E%E2%A9%E2%99%A5/')
- self.assertContains(response, '\u260e%E2%A9\u2665', status_code=404)
- def test_environ_path_info_type(self):
- environ = RequestFactory().get('/%E2%A8%87%87%A5%E2%A8%A0').environ
- self.assertIsInstance(environ['PATH_INFO'], six.text_type)
- class ScriptNameTests(SimpleTestCase):
- def test_get_script_name(self):
- # Regression test for #23173
- # Test first without PATH_INFO
- script_name = get_script_name({'SCRIPT_URL': '/foobar/'})
- self.assertEqual(script_name, '/foobar/')
- script_name = get_script_name({'SCRIPT_URL': '/foobar/', 'PATH_INFO': '/'})
- self.assertEqual(script_name, '/foobar')
- def test_get_script_name_double_slashes(self):
- """
- WSGI squashes multiple successive slashes in PATH_INFO, get_script_name
- should take that into account when forming SCRIPT_NAME (#17133).
- """
- script_name = get_script_name({
- 'SCRIPT_URL': '/mst/milestones//accounts/login//help',
- 'PATH_INFO': '/milestones/accounts/login/help',
- })
- self.assertEqual(script_name, '/mst')
|