tests.py 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212
  1. from django.core.exceptions import ImproperlyConfigured
  2. from django.core.handlers.wsgi import WSGIHandler, WSGIRequest, get_script_name
  3. from django.core.signals import request_finished, request_started
  4. from django.db import close_old_connections, connection
  5. from django.test import (
  6. RequestFactory, SimpleTestCase, TransactionTestCase, override_settings,
  7. )
  8. class HandlerTests(SimpleTestCase):
  9. def setUp(self):
  10. request_started.disconnect(close_old_connections)
  11. def tearDown(self):
  12. request_started.connect(close_old_connections)
  13. def test_middleware_initialized(self):
  14. handler = WSGIHandler()
  15. self.assertIsNotNone(handler._request_middleware)
  16. def test_bad_path_info(self):
  17. """
  18. A non-UTF-8 path populates PATH_INFO with an URL-encoded path and
  19. produces a 404.
  20. """
  21. environ = RequestFactory().get('/').environ
  22. environ['PATH_INFO'] = '\xed'
  23. handler = WSGIHandler()
  24. response = handler(environ, lambda *a, **k: None)
  25. # The path of the request will be encoded to '/%ED'.
  26. self.assertEqual(response.status_code, 404)
  27. def test_non_ascii_query_string(self):
  28. """
  29. Non-ASCII query strings are properly decoded (#20530, #22996).
  30. """
  31. environ = RequestFactory().get('/').environ
  32. raw_query_strings = [
  33. b'want=caf%C3%A9', # This is the proper way to encode 'café'
  34. b'want=caf\xc3\xa9', # UA forgot to quote bytes
  35. b'want=caf%E9', # UA quoted, but not in UTF-8
  36. b'want=caf\xe9', # UA forgot to convert Latin-1 to UTF-8 and to quote (typical of MSIE)
  37. ]
  38. got = []
  39. for raw_query_string in raw_query_strings:
  40. # Simulate http.server.BaseHTTPRequestHandler.parse_request handling of raw request
  41. environ['QUERY_STRING'] = str(raw_query_string, 'iso-8859-1')
  42. request = WSGIRequest(environ)
  43. got.append(request.GET['want'])
  44. # %E9 is converted to the unicode replacement character by parse_qsl
  45. self.assertEqual(got, ['café', 'café', 'caf\ufffd', 'café'])
  46. def test_non_ascii_cookie(self):
  47. """Non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
  48. environ = RequestFactory().get('/').environ
  49. raw_cookie = 'want="café"'.encode('utf-8').decode('iso-8859-1')
  50. environ['HTTP_COOKIE'] = raw_cookie
  51. request = WSGIRequest(environ)
  52. self.assertEqual(request.COOKIES['want'], "café")
  53. def test_invalid_unicode_cookie(self):
  54. """
  55. Invalid cookie content should result in an absent cookie, but not in a
  56. crash while trying to decode it (#23638).
  57. """
  58. environ = RequestFactory().get('/').environ
  59. environ['HTTP_COOKIE'] = 'x=W\x03c(h]\x8e'
  60. request = WSGIRequest(environ)
  61. # We don't test COOKIES content, as the result might differ between
  62. # Python version because parsing invalid content became stricter in
  63. # latest versions.
  64. self.assertIsInstance(request.COOKIES, dict)
  65. @override_settings(ROOT_URLCONF='handlers.urls')
  66. def test_invalid_multipart_boundary(self):
  67. """
  68. Invalid boundary string should produce a "Bad Request" response, not a
  69. server error (#23887).
  70. """
  71. environ = RequestFactory().post('/malformed_post/').environ
  72. environ['CONTENT_TYPE'] = 'multipart/form-data; boundary=WRONG\x07'
  73. handler = WSGIHandler()
  74. response = handler(environ, lambda *a, **k: None)
  75. # Expect "bad request" response
  76. self.assertEqual(response.status_code, 400)
  77. @override_settings(ROOT_URLCONF='handlers.urls', MIDDLEWARE=[])
  78. class TransactionsPerRequestTests(TransactionTestCase):
  79. available_apps = []
  80. def test_no_transaction(self):
  81. response = self.client.get('/in_transaction/')
  82. self.assertContains(response, 'False')
  83. def test_auto_transaction(self):
  84. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  85. try:
  86. connection.settings_dict['ATOMIC_REQUESTS'] = True
  87. response = self.client.get('/in_transaction/')
  88. finally:
  89. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  90. self.assertContains(response, 'True')
  91. def test_no_auto_transaction(self):
  92. old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
  93. try:
  94. connection.settings_dict['ATOMIC_REQUESTS'] = True
  95. response = self.client.get('/not_in_transaction/')
  96. finally:
  97. connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
  98. self.assertContains(response, 'False')
  99. @override_settings(ROOT_URLCONF='handlers.urls')
  100. class SignalsTests(SimpleTestCase):
  101. def setUp(self):
  102. self.signals = []
  103. self.signaled_environ = None
  104. request_started.connect(self.register_started)
  105. request_finished.connect(self.register_finished)
  106. def tearDown(self):
  107. request_started.disconnect(self.register_started)
  108. request_finished.disconnect(self.register_finished)
  109. def register_started(self, **kwargs):
  110. self.signals.append('started')
  111. self.signaled_environ = kwargs.get('environ')
  112. def register_finished(self, **kwargs):
  113. self.signals.append('finished')
  114. def test_request_signals(self):
  115. response = self.client.get('/regular/')
  116. self.assertEqual(self.signals, ['started', 'finished'])
  117. self.assertEqual(response.content, b"regular content")
  118. self.assertEqual(self.signaled_environ, response.wsgi_request.environ)
  119. def test_request_signals_streaming_response(self):
  120. response = self.client.get('/streaming/')
  121. self.assertEqual(self.signals, ['started'])
  122. self.assertEqual(b''.join(response.streaming_content), b"streaming content")
  123. self.assertEqual(self.signals, ['started', 'finished'])
  124. def empty_middleware(get_response):
  125. pass
  126. @override_settings(ROOT_URLCONF='handlers.urls')
  127. class HandlerRequestTests(SimpleTestCase):
  128. def test_suspiciousop_in_view_returns_400(self):
  129. response = self.client.get('/suspicious/')
  130. self.assertEqual(response.status_code, 400)
  131. def test_invalid_urls(self):
  132. response = self.client.get('~%A9helloworld')
  133. self.assertContains(response, '~%A9helloworld', status_code=404)
  134. response = self.client.get('d%aao%aaw%aan%aal%aao%aaa%aad%aa/')
  135. self.assertContains(response, 'd%AAo%AAw%AAn%AAl%AAo%AAa%AAd%AA', status_code=404)
  136. response = self.client.get('/%E2%99%E2%99%A5/')
  137. self.assertContains(response, '%E2%99\u2665', status_code=404)
  138. response = self.client.get('/%E2%98%8E%E2%A9%E2%99%A5/')
  139. self.assertContains(response, '\u260e%E2%A9\u2665', status_code=404)
  140. def test_environ_path_info_type(self):
  141. environ = RequestFactory().get('/%E2%A8%87%87%A5%E2%A8%A0').environ
  142. self.assertIsInstance(environ['PATH_INFO'], str)
  143. def test_handle_accepts_httpstatus_enum_value(self):
  144. def start_response(status, headers):
  145. start_response.status = status
  146. environ = RequestFactory().get('/httpstatus_enum/').environ
  147. WSGIHandler()(environ, start_response)
  148. self.assertEqual(start_response.status, '200 OK')
  149. @override_settings(MIDDLEWARE=['handlers.tests.empty_middleware'])
  150. def test_middleware_returns_none(self):
  151. msg = 'Middleware factory handlers.tests.empty_middleware returned None.'
  152. with self.assertRaisesMessage(ImproperlyConfigured, msg):
  153. self.client.get('/')
  154. class ScriptNameTests(SimpleTestCase):
  155. def test_get_script_name(self):
  156. # Regression test for #23173
  157. # Test first without PATH_INFO
  158. script_name = get_script_name({'SCRIPT_URL': '/foobar/'})
  159. self.assertEqual(script_name, '/foobar/')
  160. script_name = get_script_name({'SCRIPT_URL': '/foobar/', 'PATH_INFO': '/'})
  161. self.assertEqual(script_name, '/foobar')
  162. def test_get_script_name_double_slashes(self):
  163. """
  164. WSGI squashes multiple successive slashes in PATH_INFO, get_script_name
  165. should take that into account when forming SCRIPT_NAME (#17133).
  166. """
  167. script_name = get_script_name({
  168. 'SCRIPT_URL': '/mst/milestones//accounts/login//help',
  169. 'PATH_INFO': '/milestones/accounts/login/help',
  170. })
  171. self.assertEqual(script_name, '/mst')