tests.py 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
  1. # -*- coding: utf-8 -*-
  2. from __future__ import unicode_literals
  3. from django.core.handlers.wsgi import WSGIHandler, WSGIRequest, get_script_name
  4. from django.core.signals import request_finished, request_started
  5. from django.db import close_old_connections, connection
  6. from django.test import (
  7. RequestFactory, SimpleTestCase, TransactionTestCase, override_settings,
  8. )
  9. from django.utils import six
  10. from django.utils.encoding import force_str
  11. class HandlerTests(SimpleTestCase):
  12. def setUp(self):
  13. request_started.disconnect(close_old_connections)
  14. def tearDown(self):
  15. request_started.connect(close_old_connections)
  16. def test_middleware_initialized(self):
  17. handler = WSGIHandler()
  18. self.assertIsNotNone(handler._request_middleware)
  19. def test_bad_path_info(self):
  20. """Tests for bug #15672 ('request' referenced before assignment)"""
  21. environ = RequestFactory().get('/').environ
  22. environ['PATH_INFO'] = b'\xed' if six.PY2 else '\xed'
  23. handler = WSGIHandler()
  24. response = handler(environ, lambda *a, **k: None)
  25. self.assertEqual(response.status_code, 400)
  26. def test_non_ascii_query_string(self):
  27. """
  28. Test that non-ASCII query strings are properly decoded (#20530, #22996).
  29. """
  30. environ = RequestFactory().get('/').environ
  31. raw_query_strings = [
  32. b'want=caf%C3%A9', # This is the proper way to encode 'café'
  33. b'want=caf\xc3\xa9', # UA forgot to quote bytes
  34. b'want=caf%E9', # UA quoted, but not in UTF-8
  35. b'want=caf\xe9', # UA forgot to convert Latin-1 to UTF-8 and to quote (typical of MSIE)
  36. ]
  37. got = []
  38. for raw_query_string in raw_query_strings:
  39. if six.PY3:
  40. # Simulate http.server.BaseHTTPRequestHandler.parse_request handling of raw request
  41. environ['QUERY_STRING'] = str(raw_query_string, 'iso-8859-1')
  42. else:
  43. environ['QUERY_STRING'] = raw_query_string
  44. request = WSGIRequest(environ)
  45. got.append(request.GET['want'])
  46. if six.PY2:
  47. self.assertListEqual(got, ['café', 'café', 'café', 'café'])
  48. else:
  49. # On Python 3, %E9 is converted to the unicode replacement character by parse_qsl
  50. self.assertListEqual(got, ['café', 'café', 'caf\ufffd', 'café'])
  51. def test_non_ascii_cookie(self):
  52. """Test that non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
  53. environ = RequestFactory().get('/').environ
  54. raw_cookie = 'want="café"'
  55. if six.PY3:
  56. raw_cookie = raw_cookie.encode('utf-8').decode('iso-8859-1')
  57. environ['HTTP_COOKIE'] = raw_cookie
  58. request = WSGIRequest(environ)
  59. # If would be nicer if request.COOKIES returned unicode values.
  60. # However the current cookie parser doesn't do this and fixing it is
  61. # much more work than fixing #20557. Feel free to remove force_str()!
  62. self.assertEqual(request.COOKIES['want'], force_str("café"))
  63. def test_invalid_unicode_cookie(self):
  64. """
  65. Invalid cookie content should result in an absent cookie, but not in a
  66. crash while trying to decode it (#23638).
  67. """
  68. environ = RequestFactory().get('/').environ
  69. environ['HTTP_COOKIE'] = 'x=W\x03c(h]\x8e'
  70. request = WSGIRequest(environ)
  71. # We don't test COOKIES content, as the result might differ between
  72. # Python version because parsing invalid content became stricter in
  73. # latest versions.
  74. self.assertIsInstance(request.COOKIES, dict)
  75. @override_settings(ROOT_URLCONF='handlers.urls')
  76. def test_invalid_multipart_boundary(self):
  77. """
  78. Invalid boundary string should produce a "Bad Request" response, not a
  79. server error (#23887).
  80. """
  81. environ = RequestFactory().post('/malformed_post/').environ
  82. environ['CONTENT_TYPE'] = 'multipart/form-data; boundary=WRONG\x07'
  83. handler = WSGIHandler()
  84. response = handler(environ, lambda *a, **k: None)
  85. # Expect "bad request" response
  86. self.assertEqual(response.status_code, 400)
  87. @override_settings(ROOT_URLCONF='handlers.urls')
  88. class TransactionsPerRequestTests(TransactionTestCase):
  89. available_apps = []
  90. def test_no_transaction(self):
  91. response = self.client.get('/in_transaction/')
  92. self.assertContains(response, 'False')
  93. def test_auto_transaction(self):
  94. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  95. try:
  96. connection.settings_dict['ATOMIC_REQUESTS'] = True
  97. response = self.client.get('/in_transaction/')
  98. finally:
  99. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  100. self.assertContains(response, 'True')
  101. def test_no_auto_transaction(self):
  102. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  103. try:
  104. connection.settings_dict['ATOMIC_REQUESTS'] = True
  105. response = self.client.get('/not_in_transaction/')
  106. finally:
  107. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  108. self.assertContains(response, 'False')
  109. @override_settings(ROOT_URLCONF='handlers.urls')
  110. class SignalsTests(SimpleTestCase):
  111. def setUp(self):
  112. self.signals = []
  113. self.signaled_environ = None
  114. request_started.connect(self.register_started)
  115. request_finished.connect(self.register_finished)
  116. def tearDown(self):
  117. request_started.disconnect(self.register_started)
  118. request_finished.disconnect(self.register_finished)
  119. def register_started(self, **kwargs):
  120. self.signals.append('started')
  121. self.signaled_environ = kwargs.get('environ')
  122. def register_finished(self, **kwargs):
  123. self.signals.append('finished')
  124. def test_request_signals(self):
  125. response = self.client.get('/regular/')
  126. self.assertEqual(self.signals, ['started', 'finished'])
  127. self.assertEqual(response.content, b"regular content")
  128. self.assertEqual(self.signaled_environ, response.wsgi_request.environ)
  129. def test_request_signals_streaming_response(self):
  130. response = self.client.get('/streaming/')
  131. self.assertEqual(self.signals, ['started'])
  132. self.assertEqual(b''.join(response.streaming_content), b"streaming content")
  133. self.assertEqual(self.signals, ['started', 'finished'])
  134. @override_settings(ROOT_URLCONF='handlers.urls')
  135. class HandlerSuspiciousOpsTest(SimpleTestCase):
  136. def test_suspiciousop_in_view_returns_400(self):
  137. response = self.client.get('/suspicious/')
  138. self.assertEqual(response.status_code, 400)
  139. @override_settings(ROOT_URLCONF='handlers.urls')
  140. class HandlerNotFoundTest(SimpleTestCase):
  141. def test_invalid_urls(self):
  142. response = self.client.get('~%A9helloworld')
  143. self.assertContains(response, '~%A9helloworld', status_code=404)
  144. response = self.client.get('d%aao%aaw%aan%aal%aao%aaa%aad%aa/')
  145. self.assertContains(response, 'd%AAo%AAw%AAn%AAl%AAo%AAa%AAd%AA', status_code=404)
  146. response = self.client.get('/%E2%99%E2%99%A5/')
  147. self.assertContains(response, '%E2%99\u2665', status_code=404)
  148. response = self.client.get('/%E2%98%8E%E2%A9%E2%99%A5/')
  149. self.assertContains(response, '\u260e%E2%A9\u2665', status_code=404)
  150. def test_environ_path_info_type(self):
  151. environ = RequestFactory().get('/%E2%A8%87%87%A5%E2%A8%A0').environ
  152. self.assertIsInstance(environ['PATH_INFO'], six.text_type)
  153. class ScriptNameTests(SimpleTestCase):
  154. def test_get_script_name(self):
  155. # Regression test for #23173
  156. # Test first without PATH_INFO
  157. script_name = get_script_name({'SCRIPT_URL': '/foobar/'})
  158. self.assertEqual(script_name, '/foobar/')
  159. script_name = get_script_name({'SCRIPT_URL': '/foobar/', 'PATH_INFO': '/'})
  160. self.assertEqual(script_name, '/foobar')
  161. def test_get_script_name_double_slashes(self):
  162. """
  163. WSGI squashes multiple successive slashes in PATH_INFO, get_script_name
  164. should take that into account when forming SCRIPT_NAME (#17133).
  165. """
  166. script_name = get_script_name({
  167. 'SCRIPT_URL': '/mst/milestones//accounts/login//help',
  168. 'PATH_INFO': '/milestones/accounts/login/help',
  169. })
  170. self.assertEqual(script_name, '/mst')