mirror of
				https://github.com/django/django.git
				synced 2025-10-30 17:16:10 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			221 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			221 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| import unittest
 | |
| 
 | |
| from django.core.exceptions import ImproperlyConfigured
 | |
| from django.core.handlers.wsgi import WSGIHandler, WSGIRequest, get_script_name
 | |
| from django.core.signals import request_finished, request_started
 | |
| from django.db import close_old_connections, connection
 | |
| from django.test import (
 | |
|     RequestFactory, SimpleTestCase, TransactionTestCase, override_settings,
 | |
| )
 | |
| 
 | |
| try:
 | |
|     from http import HTTPStatus
 | |
| except ImportError:  # Python < 3.5
 | |
|     HTTPStatus = None
 | |
| 
 | |
| 
 | |
| class HandlerTests(SimpleTestCase):
 | |
| 
 | |
|     def setUp(self):
 | |
|         request_started.disconnect(close_old_connections)
 | |
| 
 | |
|     def tearDown(self):
 | |
|         request_started.connect(close_old_connections)
 | |
| 
 | |
|     def test_middleware_initialized(self):
 | |
|         handler = WSGIHandler()
 | |
|         self.assertIsNotNone(handler._request_middleware)
 | |
| 
 | |
|     def test_bad_path_info(self):
 | |
|         """
 | |
|         A non-UTF-8 path populates PATH_INFO with an URL-encoded path and
 | |
|         produces a 404.
 | |
|         """
 | |
|         environ = RequestFactory().get('/').environ
 | |
|         environ['PATH_INFO'] = '\xed'
 | |
|         handler = WSGIHandler()
 | |
|         response = handler(environ, lambda *a, **k: None)
 | |
|         # The path of the request will be encoded to '/%ED'.
 | |
|         self.assertEqual(response.status_code, 404)
 | |
| 
 | |
|     def test_non_ascii_query_string(self):
 | |
|         """
 | |
|         Non-ASCII query strings are properly decoded (#20530, #22996).
 | |
|         """
 | |
|         environ = RequestFactory().get('/').environ
 | |
|         raw_query_strings = [
 | |
|             b'want=caf%C3%A9',  # This is the proper way to encode 'café'
 | |
|             b'want=caf\xc3\xa9',  # UA forgot to quote bytes
 | |
|             b'want=caf%E9',  # UA quoted, but not in UTF-8
 | |
|             b'want=caf\xe9',  # UA forgot to convert Latin-1 to UTF-8 and to quote (typical of MSIE)
 | |
|         ]
 | |
|         got = []
 | |
|         for raw_query_string in raw_query_strings:
 | |
|             # Simulate http.server.BaseHTTPRequestHandler.parse_request handling of raw request
 | |
|             environ['QUERY_STRING'] = str(raw_query_string, 'iso-8859-1')
 | |
|             request = WSGIRequest(environ)
 | |
|             got.append(request.GET['want'])
 | |
|         # %E9 is converted to the unicode replacement character by parse_qsl
 | |
|         self.assertEqual(got, ['café', 'café', 'caf\ufffd', 'café'])
 | |
| 
 | |
|     def test_non_ascii_cookie(self):
 | |
|         """Non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
 | |
|         environ = RequestFactory().get('/').environ
 | |
|         raw_cookie = 'want="café"'.encode('utf-8').decode('iso-8859-1')
 | |
|         environ['HTTP_COOKIE'] = raw_cookie
 | |
|         request = WSGIRequest(environ)
 | |
|         self.assertEqual(request.COOKIES['want'], "café")
 | |
| 
 | |
|     def test_invalid_unicode_cookie(self):
 | |
|         """
 | |
|         Invalid cookie content should result in an absent cookie, but not in a
 | |
|         crash while trying to decode it (#23638).
 | |
|         """
 | |
|         environ = RequestFactory().get('/').environ
 | |
|         environ['HTTP_COOKIE'] = 'x=W\x03c(h]\x8e'
 | |
|         request = WSGIRequest(environ)
 | |
|         # We don't test COOKIES content, as the result might differ between
 | |
|         # Python version because parsing invalid content became stricter in
 | |
|         # latest versions.
 | |
|         self.assertIsInstance(request.COOKIES, dict)
 | |
| 
 | |
|     @override_settings(ROOT_URLCONF='handlers.urls')
 | |
|     def test_invalid_multipart_boundary(self):
 | |
|         """
 | |
|         Invalid boundary string should produce a "Bad Request" response, not a
 | |
|         server error (#23887).
 | |
|         """
 | |
|         environ = RequestFactory().post('/malformed_post/').environ
 | |
|         environ['CONTENT_TYPE'] = 'multipart/form-data; boundary=WRONG\x07'
 | |
|         handler = WSGIHandler()
 | |
|         response = handler(environ, lambda *a, **k: None)
 | |
|         # Expect "bad request" response
 | |
|         self.assertEqual(response.status_code, 400)
 | |
| 
 | |
| 
 | |
| @override_settings(ROOT_URLCONF='handlers.urls', MIDDLEWARE=[])
 | |
| class TransactionsPerRequestTests(TransactionTestCase):
 | |
| 
 | |
|     available_apps = []
 | |
| 
 | |
|     def test_no_transaction(self):
 | |
|         response = self.client.get('/in_transaction/')
 | |
|         self.assertContains(response, 'False')
 | |
| 
 | |
|     def test_auto_transaction(self):
 | |
|         old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
 | |
|         try:
 | |
|             connection.settings_dict['ATOMIC_REQUESTS'] = True
 | |
|             response = self.client.get('/in_transaction/')
 | |
|         finally:
 | |
|             connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
 | |
|         self.assertContains(response, 'True')
 | |
| 
 | |
|     def test_no_auto_transaction(self):
 | |
|         old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
 | |
|         try:
 | |
|             connection.settings_dict['ATOMIC_REQUESTS'] = True
 | |
|             response = self.client.get('/not_in_transaction/')
 | |
|         finally:
 | |
|             connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
 | |
|         self.assertContains(response, 'False')
 | |
| 
 | |
| 
 | |
| @override_settings(ROOT_URLCONF='handlers.urls')
 | |
| class SignalsTests(SimpleTestCase):
 | |
| 
 | |
|     def setUp(self):
 | |
|         self.signals = []
 | |
|         self.signaled_environ = None
 | |
|         request_started.connect(self.register_started)
 | |
|         request_finished.connect(self.register_finished)
 | |
| 
 | |
|     def tearDown(self):
 | |
|         request_started.disconnect(self.register_started)
 | |
|         request_finished.disconnect(self.register_finished)
 | |
| 
 | |
|     def register_started(self, **kwargs):
 | |
|         self.signals.append('started')
 | |
|         self.signaled_environ = kwargs.get('environ')
 | |
| 
 | |
|     def register_finished(self, **kwargs):
 | |
|         self.signals.append('finished')
 | |
| 
 | |
|     def test_request_signals(self):
 | |
|         response = self.client.get('/regular/')
 | |
|         self.assertEqual(self.signals, ['started', 'finished'])
 | |
|         self.assertEqual(response.content, b"regular content")
 | |
|         self.assertEqual(self.signaled_environ, response.wsgi_request.environ)
 | |
| 
 | |
|     def test_request_signals_streaming_response(self):
 | |
|         response = self.client.get('/streaming/')
 | |
|         self.assertEqual(self.signals, ['started'])
 | |
|         self.assertEqual(b''.join(response.streaming_content), b"streaming content")
 | |
|         self.assertEqual(self.signals, ['started', 'finished'])
 | |
| 
 | |
| 
 | |
| def empty_middleware(get_response):
 | |
|     pass
 | |
| 
 | |
| 
 | |
| @override_settings(ROOT_URLCONF='handlers.urls')
 | |
| class HandlerRequestTests(SimpleTestCase):
 | |
| 
 | |
|     def test_suspiciousop_in_view_returns_400(self):
 | |
|         response = self.client.get('/suspicious/')
 | |
|         self.assertEqual(response.status_code, 400)
 | |
| 
 | |
|     def test_invalid_urls(self):
 | |
|         response = self.client.get('~%A9helloworld')
 | |
|         self.assertContains(response, '~%A9helloworld', status_code=404)
 | |
| 
 | |
|         response = self.client.get('d%aao%aaw%aan%aal%aao%aaa%aad%aa/')
 | |
|         self.assertContains(response, 'd%AAo%AAw%AAn%AAl%AAo%AAa%AAd%AA', status_code=404)
 | |
| 
 | |
|         response = self.client.get('/%E2%99%E2%99%A5/')
 | |
|         self.assertContains(response, '%E2%99\u2665', status_code=404)
 | |
| 
 | |
|         response = self.client.get('/%E2%98%8E%E2%A9%E2%99%A5/')
 | |
|         self.assertContains(response, '\u260e%E2%A9\u2665', status_code=404)
 | |
| 
 | |
|     def test_environ_path_info_type(self):
 | |
|         environ = RequestFactory().get('/%E2%A8%87%87%A5%E2%A8%A0').environ
 | |
|         self.assertIsInstance(environ['PATH_INFO'], str)
 | |
| 
 | |
|     @unittest.skipIf(HTTPStatus is None, 'HTTPStatus only exists on Python 3.5+')
 | |
|     def test_handle_accepts_httpstatus_enum_value(self):
 | |
|         def start_response(status, headers):
 | |
|             start_response.status = status
 | |
| 
 | |
|         environ = RequestFactory().get('/httpstatus_enum/').environ
 | |
|         WSGIHandler()(environ, start_response)
 | |
|         self.assertEqual(start_response.status, '200 OK')
 | |
| 
 | |
|     @override_settings(MIDDLEWARE=['handlers.tests.empty_middleware'])
 | |
|     def test_middleware_returns_none(self):
 | |
|         msg = 'Middleware factory handlers.tests.empty_middleware returned None.'
 | |
|         with self.assertRaisesMessage(ImproperlyConfigured, msg):
 | |
|             self.client.get('/')
 | |
| 
 | |
| 
 | |
| class ScriptNameTests(SimpleTestCase):
 | |
|     def test_get_script_name(self):
 | |
|         # Regression test for #23173
 | |
|         # Test first without PATH_INFO
 | |
|         script_name = get_script_name({'SCRIPT_URL': '/foobar/'})
 | |
|         self.assertEqual(script_name, '/foobar/')
 | |
| 
 | |
|         script_name = get_script_name({'SCRIPT_URL': '/foobar/', 'PATH_INFO': '/'})
 | |
|         self.assertEqual(script_name, '/foobar')
 | |
| 
 | |
|     def test_get_script_name_double_slashes(self):
 | |
|         """
 | |
|         WSGI squashes multiple successive slashes in PATH_INFO, get_script_name
 | |
|         should take that into account when forming SCRIPT_NAME (#17133).
 | |
|         """
 | |
|         script_name = get_script_name({
 | |
|             'SCRIPT_URL': '/mst/milestones//accounts/login//help',
 | |
|             'PATH_INFO': '/milestones/accounts/login/help',
 | |
|         })
 | |
|         self.assertEqual(script_name, '/mst')
 |