tests.py 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233
  1. # -*- coding: utf-8 -*-
  2. from __future__ import unicode_literals
  3. import unittest
  4. from django.core.exceptions import ImproperlyConfigured
  5. from django.core.handlers.wsgi import WSGIHandler, WSGIRequest, get_script_name
  6. from django.core.signals import request_finished, request_started
  7. from django.db import close_old_connections, connection
  8. from django.test import (
  9. RequestFactory, SimpleTestCase, TransactionTestCase, override_settings,
  10. )
  11. from django.utils import six
  12. from django.utils.encoding import force_str
  13. try:
  14. from http import HTTPStatus
  15. except ImportError: # Python < 3.5
  16. HTTPStatus = None
  17. class HandlerTests(SimpleTestCase):
  18. def setUp(self):
  19. request_started.disconnect(close_old_connections)
  20. def tearDown(self):
  21. request_started.connect(close_old_connections)
  22. def test_middleware_initialized(self):
  23. handler = WSGIHandler()
  24. self.assertIsNotNone(handler._request_middleware)
  25. def test_bad_path_info(self):
  26. """Tests for bug #15672 ('request' referenced before assignment)"""
  27. environ = RequestFactory().get('/').environ
  28. environ['PATH_INFO'] = b'\xed' if six.PY2 else '\xed'
  29. handler = WSGIHandler()
  30. response = handler(environ, lambda *a, **k: None)
  31. self.assertEqual(response.status_code, 400)
  32. def test_non_ascii_query_string(self):
  33. """
  34. Test that non-ASCII query strings are properly decoded (#20530, #22996).
  35. """
  36. environ = RequestFactory().get('/').environ
  37. raw_query_strings = [
  38. b'want=caf%C3%A9', # This is the proper way to encode 'café'
  39. b'want=caf\xc3\xa9', # UA forgot to quote bytes
  40. b'want=caf%E9', # UA quoted, but not in UTF-8
  41. b'want=caf\xe9', # UA forgot to convert Latin-1 to UTF-8 and to quote (typical of MSIE)
  42. ]
  43. got = []
  44. for raw_query_string in raw_query_strings:
  45. if six.PY3:
  46. # Simulate http.server.BaseHTTPRequestHandler.parse_request handling of raw request
  47. environ['QUERY_STRING'] = str(raw_query_string, 'iso-8859-1')
  48. else:
  49. environ['QUERY_STRING'] = raw_query_string
  50. request = WSGIRequest(environ)
  51. got.append(request.GET['want'])
  52. if six.PY2:
  53. self.assertListEqual(got, ['café', 'café', 'café', 'café'])
  54. else:
  55. # On Python 3, %E9 is converted to the unicode replacement character by parse_qsl
  56. self.assertListEqual(got, ['café', 'café', 'caf\ufffd', 'café'])
  57. def test_non_ascii_cookie(self):
  58. """Test that non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
  59. environ = RequestFactory().get('/').environ
  60. raw_cookie = 'want="café"'
  61. if six.PY3:
  62. raw_cookie = raw_cookie.encode('utf-8').decode('iso-8859-1')
  63. environ['HTTP_COOKIE'] = raw_cookie
  64. request = WSGIRequest(environ)
  65. # If would be nicer if request.COOKIES returned unicode values.
  66. # However the current cookie parser doesn't do this and fixing it is
  67. # much more work than fixing #20557. Feel free to remove force_str()!
  68. self.assertEqual(request.COOKIES['want'], force_str("café"))
  69. def test_invalid_unicode_cookie(self):
  70. """
  71. Invalid cookie content should result in an absent cookie, but not in a
  72. crash while trying to decode it (#23638).
  73. """
  74. environ = RequestFactory().get('/').environ
  75. environ['HTTP_COOKIE'] = 'x=W\x03c(h]\x8e'
  76. request = WSGIRequest(environ)
  77. # We don't test COOKIES content, as the result might differ between
  78. # Python version because parsing invalid content became stricter in
  79. # latest versions.
  80. self.assertIsInstance(request.COOKIES, dict)
  81. @override_settings(ROOT_URLCONF='handlers.urls')
  82. def test_invalid_multipart_boundary(self):
  83. """
  84. Invalid boundary string should produce a "Bad Request" response, not a
  85. server error (#23887).
  86. """
  87. environ = RequestFactory().post('/malformed_post/').environ
  88. environ['CONTENT_TYPE'] = 'multipart/form-data; boundary=WRONG\x07'
  89. handler = WSGIHandler()
  90. response = handler(environ, lambda *a, **k: None)
  91. # Expect "bad request" response
  92. self.assertEqual(response.status_code, 400)
  93. @override_settings(ROOT_URLCONF='handlers.urls')
  94. class TransactionsPerRequestTests(TransactionTestCase):
  95. available_apps = []
  96. def test_no_transaction(self):
  97. response = self.client.get('/in_transaction/')
  98. self.assertContains(response, 'False')
  99. def test_auto_transaction(self):
  100. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  101. try:
  102. connection.settings_dict['ATOMIC_REQUESTS'] = True
  103. response = self.client.get('/in_transaction/')
  104. finally:
  105. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  106. self.assertContains(response, 'True')
  107. def test_no_auto_transaction(self):
  108. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  109. try:
  110. connection.settings_dict['ATOMIC_REQUESTS'] = True
  111. response = self.client.get('/not_in_transaction/')
  112. finally:
  113. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  114. self.assertContains(response, 'False')
  115. @override_settings(ROOT_URLCONF='handlers.urls')
  116. class SignalsTests(SimpleTestCase):
  117. def setUp(self):
  118. self.signals = []
  119. self.signaled_environ = None
  120. request_started.connect(self.register_started)
  121. request_finished.connect(self.register_finished)
  122. def tearDown(self):
  123. request_started.disconnect(self.register_started)
  124. request_finished.disconnect(self.register_finished)
  125. def register_started(self, **kwargs):
  126. self.signals.append('started')
  127. self.signaled_environ = kwargs.get('environ')
  128. def register_finished(self, **kwargs):
  129. self.signals.append('finished')
  130. def test_request_signals(self):
  131. response = self.client.get('/regular/')
  132. self.assertEqual(self.signals, ['started', 'finished'])
  133. self.assertEqual(response.content, b"regular content")
  134. self.assertEqual(self.signaled_environ, response.wsgi_request.environ)
  135. def test_request_signals_streaming_response(self):
  136. response = self.client.get('/streaming/')
  137. self.assertEqual(self.signals, ['started'])
  138. self.assertEqual(b''.join(response.streaming_content), b"streaming content")
  139. self.assertEqual(self.signals, ['started', 'finished'])
  140. def empty_middleware(get_response):
  141. pass
  142. @override_settings(ROOT_URLCONF='handlers.urls')
  143. class HandlerRequestTests(SimpleTestCase):
  144. def test_suspiciousop_in_view_returns_400(self):
  145. response = self.client.get('/suspicious/')
  146. self.assertEqual(response.status_code, 400)
  147. def test_invalid_urls(self):
  148. response = self.client.get('~%A9helloworld')
  149. self.assertContains(response, '~%A9helloworld', status_code=404)
  150. response = self.client.get('d%aao%aaw%aan%aal%aao%aaa%aad%aa/')
  151. self.assertContains(response, 'd%AAo%AAw%AAn%AAl%AAo%AAa%AAd%AA', status_code=404)
  152. response = self.client.get('/%E2%99%E2%99%A5/')
  153. self.assertContains(response, '%E2%99\u2665', status_code=404)
  154. response = self.client.get('/%E2%98%8E%E2%A9%E2%99%A5/')
  155. self.assertContains(response, '\u260e%E2%A9\u2665', status_code=404)
  156. def test_environ_path_info_type(self):
  157. environ = RequestFactory().get('/%E2%A8%87%87%A5%E2%A8%A0').environ
  158. self.assertIsInstance(environ['PATH_INFO'], six.text_type)
  159. @unittest.skipIf(HTTPStatus is None, 'HTTPStatus only exists on Python 3.5+')
  160. def test_handle_accepts_httpstatus_enum_value(self):
  161. def start_response(status, headers):
  162. start_response.status = status
  163. environ = RequestFactory().get('/httpstatus_enum/').environ
  164. WSGIHandler()(environ, start_response)
  165. self.assertEqual(start_response.status, '200 OK')
  166. @override_settings(MIDDLEWARE=['handlers.tests.empty_middleware'])
  167. def test_middleware_returns_none(self):
  168. msg = 'Middleware factory handlers.tests.empty_middleware returned None.'
  169. with self.assertRaisesMessage(ImproperlyConfigured, msg):
  170. self.client.get('/')
  171. class ScriptNameTests(SimpleTestCase):
  172. def test_get_script_name(self):
  173. # Regression test for #23173
  174. # Test first without PATH_INFO
  175. script_name = get_script_name({'SCRIPT_URL': '/foobar/'})
  176. self.assertEqual(script_name, '/foobar/')
  177. script_name = get_script_name({'SCRIPT_URL': '/foobar/', 'PATH_INFO': '/'})
  178. self.assertEqual(script_name, '/foobar')
  179. def test_get_script_name_double_slashes(self):
  180. """
  181. WSGI squashes multiple successive slashes in PATH_INFO, get_script_name
  182. should take that into account when forming SCRIPT_NAME (#17133).
  183. """
  184. script_name = get_script_name({
  185. 'SCRIPT_URL': '/mst/milestones//accounts/login//help',
  186. 'PATH_INFO': '/milestones/accounts/login/help',
  187. })
  188. self.assertEqual(script_name, '/mst')