mirror of
				https://github.com/django/django.git
				synced 2025-10-26 07:06:08 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			665 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			665 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| from django.conf import settings
 | |
| from django.core.checks.messages import Error, Warning
 | |
| from django.core.checks.security import base, csrf, sessions
 | |
| from django.core.management.utils import get_random_secret_key
 | |
| from django.test import SimpleTestCase
 | |
| from django.test.utils import override_settings
 | |
| 
 | |
| 
 | |
| class CheckSessionCookieSecureTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_SECURE=False,
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=[],
 | |
|     )
 | |
|     def test_session_cookie_secure_with_installed_app(self):
 | |
|         """
 | |
|         Warn if SESSION_COOKIE_SECURE is off and "django.contrib.sessions" is
 | |
|         in INSTALLED_APPS.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W010])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_SECURE="1",
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=[],
 | |
|     )
 | |
|     def test_session_cookie_secure_with_installed_app_truthy(self):
 | |
|         """SESSION_COOKIE_SECURE must be boolean."""
 | |
|         self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W010])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_SECURE=False,
 | |
|         INSTALLED_APPS=[],
 | |
|         MIDDLEWARE=["django.contrib.sessions.middleware.SessionMiddleware"],
 | |
|     )
 | |
|     def test_session_cookie_secure_with_middleware(self):
 | |
|         """
 | |
|         Warn if SESSION_COOKIE_SECURE is off and
 | |
|         "django.contrib.sessions.middleware.SessionMiddleware" is in
 | |
|         MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W011])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_SECURE=False,
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=["django.contrib.sessions.middleware.SessionMiddleware"],
 | |
|     )
 | |
|     def test_session_cookie_secure_both(self):
 | |
|         """
 | |
|         If SESSION_COOKIE_SECURE is off and we find both the session app and
 | |
|         the middleware, provide one common warning.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W012])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_SECURE=True,
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=["django.contrib.sessions.middleware.SessionMiddleware"],
 | |
|     )
 | |
|     def test_session_cookie_secure_true(self):
 | |
|         """
 | |
|         If SESSION_COOKIE_SECURE is on, there's no warning about it.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_secure(None), [])
 | |
| 
 | |
| 
 | |
| class CheckSessionCookieHttpOnlyTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_HTTPONLY=False,
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=[],
 | |
|     )
 | |
|     def test_session_cookie_httponly_with_installed_app(self):
 | |
|         """
 | |
|         Warn if SESSION_COOKIE_HTTPONLY is off and "django.contrib.sessions"
 | |
|         is in INSTALLED_APPS.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W013])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_HTTPONLY="1",
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=[],
 | |
|     )
 | |
|     def test_session_cookie_httponly_with_installed_app_truthy(self):
 | |
|         """SESSION_COOKIE_HTTPONLY must be boolean."""
 | |
|         self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W013])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_HTTPONLY=False,
 | |
|         INSTALLED_APPS=[],
 | |
|         MIDDLEWARE=["django.contrib.sessions.middleware.SessionMiddleware"],
 | |
|     )
 | |
|     def test_session_cookie_httponly_with_middleware(self):
 | |
|         """
 | |
|         Warn if SESSION_COOKIE_HTTPONLY is off and
 | |
|         "django.contrib.sessions.middleware.SessionMiddleware" is in
 | |
|         MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W014])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_HTTPONLY=False,
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=["django.contrib.sessions.middleware.SessionMiddleware"],
 | |
|     )
 | |
|     def test_session_cookie_httponly_both(self):
 | |
|         """
 | |
|         If SESSION_COOKIE_HTTPONLY is off and we find both the session app and
 | |
|         the middleware, provide one common warning.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W015])
 | |
| 
 | |
|     @override_settings(
 | |
|         SESSION_COOKIE_HTTPONLY=True,
 | |
|         INSTALLED_APPS=["django.contrib.sessions"],
 | |
|         MIDDLEWARE=["django.contrib.sessions.middleware.SessionMiddleware"],
 | |
|     )
 | |
|     def test_session_cookie_httponly_true(self):
 | |
|         """
 | |
|         If SESSION_COOKIE_HTTPONLY is on, there's no warning about it.
 | |
|         """
 | |
|         self.assertEqual(sessions.check_session_cookie_httponly(None), [])
 | |
| 
 | |
| 
 | |
| class CheckCSRFMiddlewareTest(SimpleTestCase):
 | |
|     @override_settings(MIDDLEWARE=[])
 | |
|     def test_no_csrf_middleware(self):
 | |
|         """
 | |
|         Warn if CsrfViewMiddleware isn't in MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(csrf.check_csrf_middleware(None), [csrf.W003])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"])
 | |
|     def test_with_csrf_middleware(self):
 | |
|         self.assertEqual(csrf.check_csrf_middleware(None), [])
 | |
| 
 | |
| 
 | |
| class CheckCSRFCookieSecureTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
 | |
|         CSRF_COOKIE_SECURE=False,
 | |
|     )
 | |
|     def test_with_csrf_cookie_secure_false(self):
 | |
|         """
 | |
|         Warn if CsrfViewMiddleware is in MIDDLEWARE but
 | |
|         CSRF_COOKIE_SECURE isn't True.
 | |
|         """
 | |
|         self.assertEqual(csrf.check_csrf_cookie_secure(None), [csrf.W016])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
 | |
|         CSRF_COOKIE_SECURE="1",
 | |
|     )
 | |
|     def test_with_csrf_cookie_secure_truthy(self):
 | |
|         """CSRF_COOKIE_SECURE must be boolean."""
 | |
|         self.assertEqual(csrf.check_csrf_cookie_secure(None), [csrf.W016])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
 | |
|         CSRF_USE_SESSIONS=True,
 | |
|         CSRF_COOKIE_SECURE=False,
 | |
|     )
 | |
|     def test_use_sessions_with_csrf_cookie_secure_false(self):
 | |
|         """
 | |
|         No warning if CSRF_COOKIE_SECURE isn't True while CSRF_USE_SESSIONS
 | |
|         is True.
 | |
|         """
 | |
|         self.assertEqual(csrf.check_csrf_cookie_secure(None), [])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=[], CSRF_COOKIE_SECURE=False)
 | |
|     def test_with_csrf_cookie_secure_false_no_middleware(self):
 | |
|         """
 | |
|         No warning if CsrfViewMiddleware isn't in MIDDLEWARE, even if
 | |
|         CSRF_COOKIE_SECURE is False.
 | |
|         """
 | |
|         self.assertEqual(csrf.check_csrf_cookie_secure(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
 | |
|         CSRF_COOKIE_SECURE=True,
 | |
|     )
 | |
|     def test_with_csrf_cookie_secure_true(self):
 | |
|         self.assertEqual(csrf.check_csrf_cookie_secure(None), [])
 | |
| 
 | |
| 
 | |
| class CheckSecurityMiddlewareTest(SimpleTestCase):
 | |
|     @override_settings(MIDDLEWARE=[])
 | |
|     def test_no_security_middleware(self):
 | |
|         """
 | |
|         Warn if SecurityMiddleware isn't in MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(base.check_security_middleware(None), [base.W001])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=["django.middleware.security.SecurityMiddleware"])
 | |
|     def test_with_security_middleware(self):
 | |
|         self.assertEqual(base.check_security_middleware(None), [])
 | |
| 
 | |
| 
 | |
| class CheckStrictTransportSecurityTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_HSTS_SECONDS=0,
 | |
|     )
 | |
|     def test_no_sts(self):
 | |
|         """
 | |
|         Warn if SECURE_HSTS_SECONDS isn't > 0.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts(None), [base.W004])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=[], SECURE_HSTS_SECONDS=0)
 | |
|     def test_no_sts_no_middleware(self):
 | |
|         """
 | |
|         Don't warn if SECURE_HSTS_SECONDS isn't > 0 and SecurityMiddleware isn't
 | |
|         installed.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_HSTS_SECONDS=3600,
 | |
|     )
 | |
|     def test_with_sts(self):
 | |
|         self.assertEqual(base.check_sts(None), [])
 | |
| 
 | |
| 
 | |
| class CheckStrictTransportSecuritySubdomainsTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_HSTS_INCLUDE_SUBDOMAINS=False,
 | |
|         SECURE_HSTS_SECONDS=3600,
 | |
|     )
 | |
|     def test_no_sts_subdomains(self):
 | |
|         """
 | |
|         Warn if SECURE_HSTS_INCLUDE_SUBDOMAINS isn't True.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts_include_subdomains(None), [base.W005])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=[],
 | |
|         SECURE_HSTS_INCLUDE_SUBDOMAINS=False,
 | |
|         SECURE_HSTS_SECONDS=3600,
 | |
|     )
 | |
|     def test_no_sts_subdomains_no_middleware(self):
 | |
|         """
 | |
|         Don't warn if SecurityMiddleware isn't installed.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts_include_subdomains(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_SSL_REDIRECT=False,
 | |
|         SECURE_HSTS_SECONDS=None,
 | |
|     )
 | |
|     def test_no_sts_subdomains_no_seconds(self):
 | |
|         """
 | |
|         Don't warn if SECURE_HSTS_SECONDS isn't set.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts_include_subdomains(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_HSTS_INCLUDE_SUBDOMAINS=True,
 | |
|         SECURE_HSTS_SECONDS=3600,
 | |
|     )
 | |
|     def test_with_sts_subdomains(self):
 | |
|         self.assertEqual(base.check_sts_include_subdomains(None), [])
 | |
| 
 | |
| 
 | |
| class CheckStrictTransportSecurityPreloadTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_HSTS_PRELOAD=False,
 | |
|         SECURE_HSTS_SECONDS=3600,
 | |
|     )
 | |
|     def test_no_sts_preload(self):
 | |
|         """
 | |
|         Warn if SECURE_HSTS_PRELOAD isn't True.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts_preload(None), [base.W021])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=[], SECURE_HSTS_PRELOAD=False, SECURE_HSTS_SECONDS=3600
 | |
|     )
 | |
|     def test_no_sts_preload_no_middleware(self):
 | |
|         """
 | |
|         Don't warn if SecurityMiddleware isn't installed.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts_preload(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_SSL_REDIRECT=False,
 | |
|         SECURE_HSTS_SECONDS=None,
 | |
|     )
 | |
|     def test_no_sts_preload_no_seconds(self):
 | |
|         """
 | |
|         Don't warn if SECURE_HSTS_SECONDS isn't set.
 | |
|         """
 | |
|         self.assertEqual(base.check_sts_preload(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_HSTS_PRELOAD=True,
 | |
|         SECURE_HSTS_SECONDS=3600,
 | |
|     )
 | |
|     def test_with_sts_preload(self):
 | |
|         self.assertEqual(base.check_sts_preload(None), [])
 | |
| 
 | |
| 
 | |
| class CheckXFrameOptionsMiddlewareTest(SimpleTestCase):
 | |
|     @override_settings(MIDDLEWARE=[])
 | |
|     def test_middleware_not_installed(self):
 | |
|         """
 | |
|         Warn if XFrameOptionsMiddleware isn't in MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(base.check_xframe_options_middleware(None), [base.W002])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.clickjacking.XFrameOptionsMiddleware"]
 | |
|     )
 | |
|     def test_middleware_installed(self):
 | |
|         self.assertEqual(base.check_xframe_options_middleware(None), [])
 | |
| 
 | |
| 
 | |
| class CheckXFrameOptionsDenyTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.clickjacking.XFrameOptionsMiddleware"],
 | |
|         X_FRAME_OPTIONS="SAMEORIGIN",
 | |
|     )
 | |
|     def test_x_frame_options_not_deny(self):
 | |
|         """
 | |
|         Warn if XFrameOptionsMiddleware is in MIDDLEWARE but
 | |
|         X_FRAME_OPTIONS isn't 'DENY'.
 | |
|         """
 | |
|         self.assertEqual(base.check_xframe_deny(None), [base.W019])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=[], X_FRAME_OPTIONS="SAMEORIGIN")
 | |
|     def test_middleware_not_installed(self):
 | |
|         """
 | |
|         No error if XFrameOptionsMiddleware isn't in MIDDLEWARE even if
 | |
|         X_FRAME_OPTIONS isn't 'DENY'.
 | |
|         """
 | |
|         self.assertEqual(base.check_xframe_deny(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.clickjacking.XFrameOptionsMiddleware"],
 | |
|         X_FRAME_OPTIONS="DENY",
 | |
|     )
 | |
|     def test_xframe_deny(self):
 | |
|         self.assertEqual(base.check_xframe_deny(None), [])
 | |
| 
 | |
| 
 | |
| class CheckContentTypeNosniffTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_CONTENT_TYPE_NOSNIFF=False,
 | |
|     )
 | |
|     def test_no_content_type_nosniff(self):
 | |
|         """
 | |
|         Warn if SECURE_CONTENT_TYPE_NOSNIFF isn't True.
 | |
|         """
 | |
|         self.assertEqual(base.check_content_type_nosniff(None), [base.W006])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=[], SECURE_CONTENT_TYPE_NOSNIFF=False)
 | |
|     def test_no_content_type_nosniff_no_middleware(self):
 | |
|         """
 | |
|         Don't warn if SECURE_CONTENT_TYPE_NOSNIFF isn't True and
 | |
|         SecurityMiddleware isn't in MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(base.check_content_type_nosniff(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_CONTENT_TYPE_NOSNIFF=True,
 | |
|     )
 | |
|     def test_with_content_type_nosniff(self):
 | |
|         self.assertEqual(base.check_content_type_nosniff(None), [])
 | |
| 
 | |
| 
 | |
| class CheckSSLRedirectTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_SSL_REDIRECT=False,
 | |
|     )
 | |
|     def test_no_ssl_redirect(self):
 | |
|         """
 | |
|         Warn if SECURE_SSL_REDIRECT isn't True.
 | |
|         """
 | |
|         self.assertEqual(base.check_ssl_redirect(None), [base.W008])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=[], SECURE_SSL_REDIRECT=False)
 | |
|     def test_no_ssl_redirect_no_middleware(self):
 | |
|         """
 | |
|         Don't warn if SECURE_SSL_REDIRECT is False and SecurityMiddleware isn't
 | |
|         installed.
 | |
|         """
 | |
|         self.assertEqual(base.check_ssl_redirect(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_SSL_REDIRECT=True,
 | |
|     )
 | |
|     def test_with_ssl_redirect(self):
 | |
|         self.assertEqual(base.check_ssl_redirect(None), [])
 | |
| 
 | |
| 
 | |
| class CheckSecretKeyTest(SimpleTestCase):
 | |
|     @override_settings(SECRET_KEY=("abcdefghijklmnopqrstuvwx" * 2) + "ab")
 | |
|     def test_okay_secret_key(self):
 | |
|         self.assertEqual(len(settings.SECRET_KEY), base.SECRET_KEY_MIN_LENGTH)
 | |
|         self.assertGreater(
 | |
|             len(set(settings.SECRET_KEY)), base.SECRET_KEY_MIN_UNIQUE_CHARACTERS
 | |
|         )
 | |
|         self.assertEqual(base.check_secret_key(None), [])
 | |
| 
 | |
|     @override_settings(SECRET_KEY="")
 | |
|     def test_empty_secret_key(self):
 | |
|         self.assertEqual(base.check_secret_key(None), [base.W009])
 | |
| 
 | |
|     @override_settings(SECRET_KEY=None)
 | |
|     def test_missing_secret_key(self):
 | |
|         del settings.SECRET_KEY
 | |
|         self.assertEqual(base.check_secret_key(None), [base.W009])
 | |
| 
 | |
|     @override_settings(SECRET_KEY=None)
 | |
|     def test_none_secret_key(self):
 | |
|         self.assertEqual(base.check_secret_key(None), [base.W009])
 | |
| 
 | |
|     @override_settings(
 | |
|         SECRET_KEY=base.SECRET_KEY_INSECURE_PREFIX + get_random_secret_key()
 | |
|     )
 | |
|     def test_insecure_secret_key(self):
 | |
|         self.assertEqual(base.check_secret_key(None), [base.W009])
 | |
| 
 | |
|     @override_settings(SECRET_KEY=("abcdefghijklmnopqrstuvwx" * 2) + "a")
 | |
|     def test_low_length_secret_key(self):
 | |
|         self.assertEqual(len(settings.SECRET_KEY), base.SECRET_KEY_MIN_LENGTH - 1)
 | |
|         self.assertEqual(base.check_secret_key(None), [base.W009])
 | |
| 
 | |
|     @override_settings(SECRET_KEY="abcd" * 20)
 | |
|     def test_low_entropy_secret_key(self):
 | |
|         self.assertGreater(len(settings.SECRET_KEY), base.SECRET_KEY_MIN_LENGTH)
 | |
|         self.assertLess(
 | |
|             len(set(settings.SECRET_KEY)), base.SECRET_KEY_MIN_UNIQUE_CHARACTERS
 | |
|         )
 | |
|         self.assertEqual(base.check_secret_key(None), [base.W009])
 | |
| 
 | |
| 
 | |
| class CheckSecretKeyFallbacksTest(SimpleTestCase):
 | |
|     @override_settings(SECRET_KEY_FALLBACKS=[("abcdefghijklmnopqrstuvwx" * 2) + "ab"])
 | |
|     def test_okay_secret_key_fallbacks(self):
 | |
|         self.assertEqual(
 | |
|             len(settings.SECRET_KEY_FALLBACKS[0]),
 | |
|             base.SECRET_KEY_MIN_LENGTH,
 | |
|         )
 | |
|         self.assertGreater(
 | |
|             len(set(settings.SECRET_KEY_FALLBACKS[0])),
 | |
|             base.SECRET_KEY_MIN_UNIQUE_CHARACTERS,
 | |
|         )
 | |
|         self.assertEqual(base.check_secret_key_fallbacks(None), [])
 | |
| 
 | |
|     def test_no_secret_key_fallbacks(self):
 | |
|         with self.settings(SECRET_KEY_FALLBACKS=None):
 | |
|             del settings.SECRET_KEY_FALLBACKS
 | |
|             self.assertEqual(
 | |
|                 base.check_secret_key_fallbacks(None),
 | |
|                 [
 | |
|                     Warning(base.W025.msg % "SECRET_KEY_FALLBACKS", id=base.W025.id),
 | |
|                 ],
 | |
|             )
 | |
| 
 | |
|     @override_settings(
 | |
|         SECRET_KEY_FALLBACKS=[base.SECRET_KEY_INSECURE_PREFIX + get_random_secret_key()]
 | |
|     )
 | |
|     def test_insecure_secret_key_fallbacks(self):
 | |
|         self.assertEqual(
 | |
|             base.check_secret_key_fallbacks(None),
 | |
|             [
 | |
|                 Warning(base.W025.msg % "SECRET_KEY_FALLBACKS[0]", id=base.W025.id),
 | |
|             ],
 | |
|         )
 | |
| 
 | |
|     @override_settings(SECRET_KEY_FALLBACKS=[("abcdefghijklmnopqrstuvwx" * 2) + "a"])
 | |
|     def test_low_length_secret_key_fallbacks(self):
 | |
|         self.assertEqual(
 | |
|             len(settings.SECRET_KEY_FALLBACKS[0]),
 | |
|             base.SECRET_KEY_MIN_LENGTH - 1,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             base.check_secret_key_fallbacks(None),
 | |
|             [
 | |
|                 Warning(base.W025.msg % "SECRET_KEY_FALLBACKS[0]", id=base.W025.id),
 | |
|             ],
 | |
|         )
 | |
| 
 | |
|     @override_settings(SECRET_KEY_FALLBACKS=["abcd" * 20])
 | |
|     def test_low_entropy_secret_key_fallbacks(self):
 | |
|         self.assertGreater(
 | |
|             len(settings.SECRET_KEY_FALLBACKS[0]),
 | |
|             base.SECRET_KEY_MIN_LENGTH,
 | |
|         )
 | |
|         self.assertLess(
 | |
|             len(set(settings.SECRET_KEY_FALLBACKS[0])),
 | |
|             base.SECRET_KEY_MIN_UNIQUE_CHARACTERS,
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             base.check_secret_key_fallbacks(None),
 | |
|             [
 | |
|                 Warning(base.W025.msg % "SECRET_KEY_FALLBACKS[0]", id=base.W025.id),
 | |
|             ],
 | |
|         )
 | |
| 
 | |
|     @override_settings(
 | |
|         SECRET_KEY_FALLBACKS=[
 | |
|             ("abcdefghijklmnopqrstuvwx" * 2) + "ab",
 | |
|             "badkey",
 | |
|         ]
 | |
|     )
 | |
|     def test_multiple_keys(self):
 | |
|         self.assertEqual(
 | |
|             base.check_secret_key_fallbacks(None),
 | |
|             [
 | |
|                 Warning(base.W025.msg % "SECRET_KEY_FALLBACKS[1]", id=base.W025.id),
 | |
|             ],
 | |
|         )
 | |
| 
 | |
|     @override_settings(
 | |
|         SECRET_KEY_FALLBACKS=[
 | |
|             ("abcdefghijklmnopqrstuvwx" * 2) + "ab",
 | |
|             "badkey1",
 | |
|             "badkey2",
 | |
|         ]
 | |
|     )
 | |
|     def test_multiple_bad_keys(self):
 | |
|         self.assertEqual(
 | |
|             base.check_secret_key_fallbacks(None),
 | |
|             [
 | |
|                 Warning(base.W025.msg % "SECRET_KEY_FALLBACKS[1]", id=base.W025.id),
 | |
|                 Warning(base.W025.msg % "SECRET_KEY_FALLBACKS[2]", id=base.W025.id),
 | |
|             ],
 | |
|         )
 | |
| 
 | |
| 
 | |
| class CheckDebugTest(SimpleTestCase):
 | |
|     @override_settings(DEBUG=True)
 | |
|     def test_debug_true(self):
 | |
|         """
 | |
|         Warn if DEBUG is True.
 | |
|         """
 | |
|         self.assertEqual(base.check_debug(None), [base.W018])
 | |
| 
 | |
|     @override_settings(DEBUG=False)
 | |
|     def test_debug_false(self):
 | |
|         self.assertEqual(base.check_debug(None), [])
 | |
| 
 | |
| 
 | |
| class CheckAllowedHostsTest(SimpleTestCase):
 | |
|     @override_settings(ALLOWED_HOSTS=[])
 | |
|     def test_allowed_hosts_empty(self):
 | |
|         self.assertEqual(base.check_allowed_hosts(None), [base.W020])
 | |
| 
 | |
|     @override_settings(ALLOWED_HOSTS=[".example.com"])
 | |
|     def test_allowed_hosts_set(self):
 | |
|         self.assertEqual(base.check_allowed_hosts(None), [])
 | |
| 
 | |
| 
 | |
| class CheckReferrerPolicyTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_REFERRER_POLICY=None,
 | |
|     )
 | |
|     def test_no_referrer_policy(self):
 | |
|         self.assertEqual(base.check_referrer_policy(None), [base.W022])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=[], SECURE_REFERRER_POLICY=None)
 | |
|     def test_no_referrer_policy_no_middleware(self):
 | |
|         """
 | |
|         Don't warn if SECURE_REFERRER_POLICY is None and SecurityMiddleware
 | |
|         isn't in MIDDLEWARE.
 | |
|         """
 | |
|         self.assertEqual(base.check_referrer_policy(None), [])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=["django.middleware.security.SecurityMiddleware"])
 | |
|     def test_with_referrer_policy(self):
 | |
|         tests = (
 | |
|             "strict-origin",
 | |
|             "strict-origin,origin",
 | |
|             "strict-origin, origin",
 | |
|             ["strict-origin", "origin"],
 | |
|             ("strict-origin", "origin"),
 | |
|         )
 | |
|         for value in tests:
 | |
|             with self.subTest(value=value), override_settings(
 | |
|                 SECURE_REFERRER_POLICY=value
 | |
|             ):
 | |
|                 self.assertEqual(base.check_referrer_policy(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_REFERRER_POLICY="invalid-value",
 | |
|     )
 | |
|     def test_with_invalid_referrer_policy(self):
 | |
|         self.assertEqual(base.check_referrer_policy(None), [base.E023])
 | |
| 
 | |
| 
 | |
| def failure_view_with_invalid_signature():
 | |
|     pass
 | |
| 
 | |
| 
 | |
| class CSRFFailureViewTest(SimpleTestCase):
 | |
|     @override_settings(CSRF_FAILURE_VIEW="")
 | |
|     def test_failure_view_import_error(self):
 | |
|         self.assertEqual(
 | |
|             csrf.check_csrf_failure_view(None),
 | |
|             [
 | |
|                 Error(
 | |
|                     "The CSRF failure view '' could not be imported.",
 | |
|                     id="security.E102",
 | |
|                 )
 | |
|             ],
 | |
|         )
 | |
| 
 | |
|     @override_settings(
 | |
|         CSRF_FAILURE_VIEW=(
 | |
|             "check_framework.test_security.failure_view_with_invalid_signature"
 | |
|         ),
 | |
|     )
 | |
|     def test_failure_view_invalid_signature(self):
 | |
|         msg = (
 | |
|             "The CSRF failure view "
 | |
|             "'check_framework.test_security.failure_view_with_invalid_signature' "
 | |
|             "does not take the correct number of arguments."
 | |
|         )
 | |
|         self.assertEqual(
 | |
|             csrf.check_csrf_failure_view(None),
 | |
|             [Error(msg, id="security.E101")],
 | |
|         )
 | |
| 
 | |
| 
 | |
| class CheckCrossOriginOpenerPolicyTest(SimpleTestCase):
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_CROSS_ORIGIN_OPENER_POLICY=None,
 | |
|     )
 | |
|     def test_no_coop(self):
 | |
|         self.assertEqual(base.check_cross_origin_opener_policy(None), [])
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=["django.middleware.security.SecurityMiddleware"])
 | |
|     def test_with_coop(self):
 | |
|         tests = ["same-origin", "same-origin-allow-popups", "unsafe-none"]
 | |
|         for value in tests:
 | |
|             with self.subTest(value=value), override_settings(
 | |
|                 SECURE_CROSS_ORIGIN_OPENER_POLICY=value,
 | |
|             ):
 | |
|                 self.assertEqual(base.check_cross_origin_opener_policy(None), [])
 | |
| 
 | |
|     @override_settings(
 | |
|         MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
 | |
|         SECURE_CROSS_ORIGIN_OPENER_POLICY="invalid-value",
 | |
|     )
 | |
|     def test_with_invalid_coop(self):
 | |
|         self.assertEqual(base.check_cross_origin_opener_policy(None), [base.E024])
 |