tests.py 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. from __future__ import unicode_literals
  2. import logging
  3. import warnings
  4. from django.core import mail
  5. from django.test import TestCase, RequestFactory, override_settings
  6. from django.test.utils import patch_logger
  7. from django.utils.encoding import force_text
  8. from django.utils.log import (CallbackFilter, RequireDebugFalse,
  9. RequireDebugTrue)
  10. from django.utils.six import StringIO
  11. from admin_scripts.tests import AdminScriptTestCase
  12. from .logconfig import MyEmailBackend
  13. # logging config prior to using filter with mail_admins
  14. OLD_LOGGING = {
  15. 'version': 1,
  16. 'disable_existing_loggers': False,
  17. 'handlers': {
  18. 'mail_admins': {
  19. 'level': 'ERROR',
  20. 'class': 'django.utils.log.AdminEmailHandler'
  21. }
  22. },
  23. 'loggers': {
  24. 'django.request': {
  25. 'handlers': ['mail_admins'],
  26. 'level': 'ERROR',
  27. 'propagate': True,
  28. },
  29. }
  30. }
  31. class LoggingFiltersTest(TestCase):
  32. def test_require_debug_false_filter(self):
  33. """
  34. Test the RequireDebugFalse filter class.
  35. """
  36. filter_ = RequireDebugFalse()
  37. with self.settings(DEBUG=True):
  38. self.assertEqual(filter_.filter("record is not used"), False)
  39. with self.settings(DEBUG=False):
  40. self.assertEqual(filter_.filter("record is not used"), True)
  41. def test_require_debug_true_filter(self):
  42. """
  43. Test the RequireDebugTrue filter class.
  44. """
  45. filter_ = RequireDebugTrue()
  46. with self.settings(DEBUG=True):
  47. self.assertEqual(filter_.filter("record is not used"), True)
  48. with self.settings(DEBUG=False):
  49. self.assertEqual(filter_.filter("record is not used"), False)
  50. class DefaultLoggingTest(TestCase):
  51. def setUp(self):
  52. self.logger = logging.getLogger('django')
  53. self.old_stream = self.logger.handlers[0].stream
  54. def tearDown(self):
  55. self.logger.handlers[0].stream = self.old_stream
  56. def test_django_logger(self):
  57. """
  58. The 'django' base logger only output anything when DEBUG=True.
  59. """
  60. output = StringIO()
  61. self.logger.handlers[0].stream = output
  62. self.logger.error("Hey, this is an error.")
  63. self.assertEqual(output.getvalue(), '')
  64. with self.settings(DEBUG=True):
  65. self.logger.error("Hey, this is an error.")
  66. self.assertEqual(output.getvalue(), 'Hey, this is an error.\n')
  67. class WarningLoggerTests(TestCase):
  68. """
  69. Tests that warnings output for DeprecationWarnings is enabled
  70. and captured to the logging system
  71. """
  72. def setUp(self):
  73. # If tests are invoke with "-Wall" (or any -W flag actually) then
  74. # warning logging gets disabled (see django/conf/__init__.py). However,
  75. # these tests expect warnings to be logged, so manually force warnings
  76. # to the logs. Use getattr() here because the logging capture state is
  77. # undocumented and (I assume) brittle.
  78. self._old_capture_state = bool(getattr(logging, '_warnings_showwarning', False))
  79. logging.captureWarnings(True)
  80. # this convoluted setup is to avoid printing this deprecation to
  81. # stderr during test running - as the test runner forces deprecations
  82. # to be displayed at the global py.warnings level
  83. self.logger = logging.getLogger('py.warnings')
  84. self.outputs = []
  85. self.old_streams = []
  86. for handler in self.logger.handlers:
  87. self.old_streams.append(handler.stream)
  88. self.outputs.append(StringIO())
  89. handler.stream = self.outputs[-1]
  90. def tearDown(self):
  91. for i, handler in enumerate(self.logger.handlers):
  92. self.logger.handlers[i].stream = self.old_streams[i]
  93. # Reset warnings state.
  94. logging.captureWarnings(self._old_capture_state)
  95. @override_settings(DEBUG=True)
  96. def test_warnings_capture(self):
  97. warnings.warn('Foo Deprecated', DeprecationWarning)
  98. output = force_text(self.outputs[0].getvalue())
  99. self.assertTrue('Foo Deprecated' in output)
  100. def test_warnings_capture_debug_false(self):
  101. warnings.warn('Foo Deprecated', DeprecationWarning)
  102. output = force_text(self.outputs[0].getvalue())
  103. self.assertFalse('Foo Deprecated' in output)
  104. class CallbackFilterTest(TestCase):
  105. def test_sense(self):
  106. f_false = CallbackFilter(lambda r: False)
  107. f_true = CallbackFilter(lambda r: True)
  108. self.assertEqual(f_false.filter("record"), False)
  109. self.assertEqual(f_true.filter("record"), True)
  110. def test_passes_on_record(self):
  111. collector = []
  112. def _callback(record):
  113. collector.append(record)
  114. return True
  115. f = CallbackFilter(_callback)
  116. f.filter("a record")
  117. self.assertEqual(collector, ["a record"])
  118. class AdminEmailHandlerTest(TestCase):
  119. logger = logging.getLogger('django.request')
  120. def get_admin_email_handler(self, logger):
  121. # Inspired from views/views.py: send_log()
  122. # ensuring the AdminEmailHandler does not get filtered out
  123. # even with DEBUG=True.
  124. admin_email_handler = [
  125. h for h in logger.handlers
  126. if h.__class__.__name__ == "AdminEmailHandler"
  127. ][0]
  128. return admin_email_handler
  129. def test_fail_silently(self):
  130. admin_email_handler = self.get_admin_email_handler(self.logger)
  131. self.assertTrue(admin_email_handler.connection().fail_silently)
  132. @override_settings(
  133. ADMINS=(('whatever admin', 'admin@example.com'),),
  134. EMAIL_SUBJECT_PREFIX='-SuperAwesomeSubject-'
  135. )
  136. def test_accepts_args(self):
  137. """
  138. Ensure that user-supplied arguments and the EMAIL_SUBJECT_PREFIX
  139. setting are used to compose the email subject.
  140. Refs #16736.
  141. """
  142. message = "Custom message that says '%s' and '%s'"
  143. token1 = 'ping'
  144. token2 = 'pong'
  145. admin_email_handler = self.get_admin_email_handler(self.logger)
  146. # Backup then override original filters
  147. orig_filters = admin_email_handler.filters
  148. try:
  149. admin_email_handler.filters = []
  150. self.logger.error(message, token1, token2)
  151. self.assertEqual(len(mail.outbox), 1)
  152. self.assertEqual(mail.outbox[0].to, ['admin@example.com'])
  153. self.assertEqual(mail.outbox[0].subject,
  154. "-SuperAwesomeSubject-ERROR: Custom message that says 'ping' and 'pong'")
  155. finally:
  156. # Restore original filters
  157. admin_email_handler.filters = orig_filters
  158. @override_settings(
  159. ADMINS=(('whatever admin', 'admin@example.com'),),
  160. EMAIL_SUBJECT_PREFIX='-SuperAwesomeSubject-',
  161. INTERNAL_IPS=('127.0.0.1',),
  162. )
  163. def test_accepts_args_and_request(self):
  164. """
  165. Ensure that the subject is also handled if being
  166. passed a request object.
  167. """
  168. message = "Custom message that says '%s' and '%s'"
  169. token1 = 'ping'
  170. token2 = 'pong'
  171. admin_email_handler = self.get_admin_email_handler(self.logger)
  172. # Backup then override original filters
  173. orig_filters = admin_email_handler.filters
  174. try:
  175. admin_email_handler.filters = []
  176. rf = RequestFactory()
  177. request = rf.get('/')
  178. self.logger.error(message, token1, token2,
  179. extra={
  180. 'status_code': 403,
  181. 'request': request,
  182. }
  183. )
  184. self.assertEqual(len(mail.outbox), 1)
  185. self.assertEqual(mail.outbox[0].to, ['admin@example.com'])
  186. self.assertEqual(mail.outbox[0].subject,
  187. "-SuperAwesomeSubject-ERROR (internal IP): Custom message that says 'ping' and 'pong'")
  188. finally:
  189. # Restore original filters
  190. admin_email_handler.filters = orig_filters
  191. @override_settings(
  192. ADMINS=(('admin', 'admin@example.com'),),
  193. EMAIL_SUBJECT_PREFIX='',
  194. DEBUG=False,
  195. )
  196. def test_subject_accepts_newlines(self):
  197. """
  198. Ensure that newlines in email reports' subjects are escaped to avoid
  199. AdminErrorHandler to fail.
  200. Refs #17281.
  201. """
  202. message = 'Message \r\n with newlines'
  203. expected_subject = 'ERROR: Message \\r\\n with newlines'
  204. self.assertEqual(len(mail.outbox), 0)
  205. self.logger.error(message)
  206. self.assertEqual(len(mail.outbox), 1)
  207. self.assertFalse('\n' in mail.outbox[0].subject)
  208. self.assertFalse('\r' in mail.outbox[0].subject)
  209. self.assertEqual(mail.outbox[0].subject, expected_subject)
  210. @override_settings(
  211. ADMINS=(('admin', 'admin@example.com'),),
  212. EMAIL_SUBJECT_PREFIX='',
  213. DEBUG=False,
  214. )
  215. def test_truncate_subject(self):
  216. """
  217. RFC 2822's hard limit is 998 characters per line.
  218. So, minus "Subject: ", the actual subject must be no longer than 989
  219. characters.
  220. Refs #17281.
  221. """
  222. message = 'a' * 1000
  223. expected_subject = 'ERROR: aa' + 'a' * 980
  224. self.assertEqual(len(mail.outbox), 0)
  225. self.logger.error(message)
  226. self.assertEqual(len(mail.outbox), 1)
  227. self.assertEqual(mail.outbox[0].subject, expected_subject)
  228. @override_settings(
  229. ADMINS=(('admin', 'admin@example.com'),),
  230. DEBUG=False,
  231. )
  232. def test_uses_custom_email_backend(self):
  233. """
  234. Refs #19325
  235. """
  236. message = 'All work and no play makes Jack a dull boy'
  237. admin_email_handler = self.get_admin_email_handler(self.logger)
  238. mail_admins_called = {'called': False}
  239. def my_mail_admins(*args, **kwargs):
  240. connection = kwargs['connection']
  241. self.assertIsInstance(connection, MyEmailBackend)
  242. mail_admins_called['called'] = True
  243. # Monkeypatches
  244. orig_mail_admins = mail.mail_admins
  245. orig_email_backend = admin_email_handler.email_backend
  246. mail.mail_admins = my_mail_admins
  247. admin_email_handler.email_backend = (
  248. 'logging_tests.logconfig.MyEmailBackend')
  249. try:
  250. self.logger.error(message)
  251. self.assertTrue(mail_admins_called['called'])
  252. finally:
  253. # Revert Monkeypatches
  254. mail.mail_admins = orig_mail_admins
  255. admin_email_handler.email_backend = orig_email_backend
  256. class SettingsConfigTest(AdminScriptTestCase):
  257. """
  258. Test that accessing settings in a custom logging handler does not trigger
  259. a circular import error.
  260. """
  261. def setUp(self):
  262. log_config = """{
  263. 'version': 1,
  264. 'handlers': {
  265. 'custom_handler': {
  266. 'level': 'INFO',
  267. 'class': 'logging_tests.logconfig.MyHandler',
  268. }
  269. }
  270. }"""
  271. self.write_settings('settings.py', sdict={'LOGGING': log_config})
  272. def tearDown(self):
  273. self.remove_settings('settings.py')
  274. def test_circular_dependency(self):
  275. # validate is just an example command to trigger settings configuration
  276. out, err = self.run_manage(['validate'])
  277. self.assertNoOutput(err)
  278. self.assertOutput(out, "0 errors found")
  279. def dictConfig(config):
  280. dictConfig.called = True
  281. dictConfig.called = False
  282. class SetupConfigureLogging(TestCase):
  283. """
  284. Test that calling django.setup() initializes the logging configuration.
  285. """
  286. @override_settings(LOGGING_CONFIG='logging_tests.tests.dictConfig')
  287. def test_configure_initializes_logging(self):
  288. from django import setup
  289. setup()
  290. self.assertTrue(dictConfig.called)
  291. @override_settings(DEBUG=True)
  292. class SecurityLoggerTest(TestCase):
  293. urls = 'logging_tests.urls'
  294. def test_suspicious_operation_creates_log_message(self):
  295. with patch_logger('django.security.SuspiciousOperation', 'error') as calls:
  296. self.client.get('/suspicious/')
  297. self.assertEqual(len(calls), 1)
  298. self.assertEqual(calls[0], 'dubious')
  299. def test_suspicious_operation_uses_sublogger(self):
  300. with patch_logger('django.security.DisallowedHost', 'error') as calls:
  301. self.client.get('/suspicious_spec/')
  302. self.assertEqual(len(calls), 1)
  303. self.assertEqual(calls[0], 'dubious')
  304. @override_settings(
  305. ADMINS=(('admin', 'admin@example.com'),),
  306. DEBUG=False,
  307. )
  308. def test_suspicious_email_admins(self):
  309. self.client.get('/suspicious/')
  310. self.assertEqual(len(mail.outbox), 1)
  311. self.assertIn('path:/suspicious/,', mail.outbox[0].body)