mirror of
https://github.com/django/django.git
synced 2025-06-03 10:39:12 +00:00
Fixed some failing tests due to creation of HttpRequest._is_secure() methods in [17209]
git-svn-id: http://code.djangoproject.com/svn/django/trunk@17212 bcc190cf-cafb-0310-a4f2-bffc1f526a37
This commit is contained in:
parent
1b312edbeb
commit
6cca104be0
@ -43,7 +43,7 @@ class TestingHttpRequest(HttpRequest):
|
|||||||
more easily
|
more easily
|
||||||
"""
|
"""
|
||||||
def is_secure(self):
|
def is_secure(self):
|
||||||
return getattr(self, '_is_secure', False)
|
return getattr(self, '_is_secure_override', False)
|
||||||
|
|
||||||
class CsrfViewMiddlewareTest(TestCase):
|
class CsrfViewMiddlewareTest(TestCase):
|
||||||
# The csrf token is potentially from an untrusted source, so could have
|
# The csrf token is potentially from an untrusted source, so could have
|
||||||
@ -259,7 +259,7 @@ class CsrfViewMiddlewareTest(TestCase):
|
|||||||
Test that a POST HTTPS request with a bad referer is rejected
|
Test that a POST HTTPS request with a bad referer is rejected
|
||||||
"""
|
"""
|
||||||
req = self._get_POST_request_with_token()
|
req = self._get_POST_request_with_token()
|
||||||
req._is_secure = True
|
req._is_secure_override = True
|
||||||
req.META['HTTP_HOST'] = 'www.example.com'
|
req.META['HTTP_HOST'] = 'www.example.com'
|
||||||
req.META['HTTP_REFERER'] = 'https://www.evil.org/somepage'
|
req.META['HTTP_REFERER'] = 'https://www.evil.org/somepage'
|
||||||
req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})
|
req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})
|
||||||
@ -271,7 +271,7 @@ class CsrfViewMiddlewareTest(TestCase):
|
|||||||
Test that a POST HTTPS request with a good referer is accepted
|
Test that a POST HTTPS request with a good referer is accepted
|
||||||
"""
|
"""
|
||||||
req = self._get_POST_request_with_token()
|
req = self._get_POST_request_with_token()
|
||||||
req._is_secure = True
|
req._is_secure_override = True
|
||||||
req.META['HTTP_HOST'] = 'www.example.com'
|
req.META['HTTP_HOST'] = 'www.example.com'
|
||||||
req.META['HTTP_REFERER'] = 'https://www.example.com/somepage'
|
req.META['HTTP_REFERER'] = 'https://www.example.com/somepage'
|
||||||
req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})
|
req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})
|
||||||
@ -284,7 +284,7 @@ class CsrfViewMiddlewareTest(TestCase):
|
|||||||
"""
|
"""
|
||||||
# See ticket #15617
|
# See ticket #15617
|
||||||
req = self._get_POST_request_with_token()
|
req = self._get_POST_request_with_token()
|
||||||
req._is_secure = True
|
req._is_secure_override = True
|
||||||
req.META['HTTP_HOST'] = 'www.example.com'
|
req.META['HTTP_HOST'] = 'www.example.com'
|
||||||
req.META['HTTP_REFERER'] = 'https://www.example.com'
|
req.META['HTTP_REFERER'] = 'https://www.example.com'
|
||||||
req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})
|
req2 = CsrfViewMiddleware().process_view(req, post_form_view, (), {})
|
||||||
|
Loading…
x
Reference in New Issue
Block a user