2014-05-16 01:41:55 +08:00
|
|
|
# -*- coding: utf-8 -*-
|
2013-09-07 23:43:44 +08:00
|
|
|
|
2013-09-07 23:25:43 +08:00
|
|
|
from __future__ import unicode_literals
|
|
|
|
|
|
|
|
from django.core.handlers.wsgi import WSGIHandler, WSGIRequest
|
2013-02-18 18:37:26 +08:00
|
|
|
from django.core.signals import request_started, request_finished
|
2013-03-06 18:12:24 +08:00
|
|
|
from django.db import close_old_connections, connection
|
|
|
|
from django.test import RequestFactory, TestCase, TransactionTestCase
|
2013-12-23 23:01:13 +08:00
|
|
|
from django.test import override_settings
|
2013-09-07 23:43:44 +08:00
|
|
|
from django.utils.encoding import force_str
|
2013-09-07 23:25:43 +08:00
|
|
|
from django.utils import six
|
2011-04-22 20:15:52 +08:00
|
|
|
|
2012-12-30 22:19:22 +08:00
|
|
|
|
|
|
|
class HandlerTests(TestCase):
|
2011-01-15 07:18:21 +08:00
|
|
|
|
2013-02-18 18:37:26 +08:00
|
|
|
def setUp(self):
|
|
|
|
request_started.disconnect(close_old_connections)
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
request_started.connect(close_old_connections)
|
|
|
|
|
2012-10-21 05:22:46 +08:00
|
|
|
# Mangle settings so the handler will fail
|
|
|
|
@override_settings(MIDDLEWARE_CLASSES=42)
|
2011-01-15 07:18:21 +08:00
|
|
|
def test_lock_safety(self):
|
|
|
|
"""
|
|
|
|
Tests for bug #11193 (errors inside middleware shouldn't leave
|
|
|
|
the initLock locked).
|
|
|
|
"""
|
|
|
|
# Try running the handler, it will fail in load_middleware
|
|
|
|
handler = WSGIHandler()
|
|
|
|
self.assertEqual(handler.initLock.locked(), False)
|
2012-09-08 03:06:23 +08:00
|
|
|
with self.assertRaises(Exception):
|
2011-01-15 07:18:21 +08:00
|
|
|
handler(None, None)
|
|
|
|
self.assertEqual(handler.initLock.locked(), False)
|
|
|
|
|
2011-04-22 20:15:52 +08:00
|
|
|
def test_bad_path_info(self):
|
|
|
|
"""Tests for bug #15672 ('request' referenced before assignment)"""
|
|
|
|
environ = RequestFactory().get('/').environ
|
2013-09-07 23:25:43 +08:00
|
|
|
environ['PATH_INFO'] = b'\xed' if six.PY2 else '\xed'
|
2011-04-22 20:15:52 +08:00
|
|
|
handler = WSGIHandler()
|
|
|
|
response = handler(environ, lambda *a, **k: None)
|
|
|
|
self.assertEqual(response.status_code, 400)
|
2012-12-30 22:19:22 +08:00
|
|
|
|
2013-09-08 00:41:34 +08:00
|
|
|
def test_non_ascii_query_string(self):
|
|
|
|
"""Test that non-ASCII query strings are properly decoded (#20530)."""
|
|
|
|
environ = RequestFactory().get('/').environ
|
|
|
|
raw_query_string = 'want=café'
|
|
|
|
if six.PY3:
|
|
|
|
raw_query_string = raw_query_string.encode('utf-8').decode('iso-8859-1')
|
|
|
|
environ['QUERY_STRING'] = raw_query_string
|
|
|
|
request = WSGIRequest(environ)
|
|
|
|
self.assertEqual(request.GET['want'], "café")
|
|
|
|
|
2013-09-07 23:25:43 +08:00
|
|
|
def test_non_ascii_cookie(self):
|
|
|
|
"""Test that non-ASCII cookies set in JavaScript are properly decoded (#20557)."""
|
|
|
|
environ = RequestFactory().get('/').environ
|
2013-09-07 23:43:44 +08:00
|
|
|
raw_cookie = 'want="café"'
|
|
|
|
if six.PY3:
|
|
|
|
raw_cookie = raw_cookie.encode('utf-8').decode('iso-8859-1')
|
|
|
|
environ['HTTP_COOKIE'] = raw_cookie
|
2013-09-07 23:25:43 +08:00
|
|
|
request = WSGIRequest(environ)
|
2013-09-08 00:41:34 +08:00
|
|
|
# If would be nicer if request.COOKIES returned unicode values.
|
|
|
|
# However the current cookie parser doesn't do this and fixing it is
|
|
|
|
# much more work than fixing #20557. Feel free to remove force_str()!
|
2013-09-07 23:43:44 +08:00
|
|
|
self.assertEqual(request.COOKIES['want'], force_str("café"))
|
2013-09-07 23:25:43 +08:00
|
|
|
|
2012-12-30 22:19:22 +08:00
|
|
|
|
2013-03-06 18:12:24 +08:00
|
|
|
class TransactionsPerRequestTests(TransactionTestCase):
|
2013-06-04 14:09:29 +08:00
|
|
|
|
|
|
|
available_apps = []
|
2013-03-06 18:12:24 +08:00
|
|
|
urls = 'handlers.urls'
|
|
|
|
|
|
|
|
def test_no_transaction(self):
|
|
|
|
response = self.client.get('/in_transaction/')
|
|
|
|
self.assertContains(response, 'False')
|
|
|
|
|
|
|
|
def test_auto_transaction(self):
|
|
|
|
old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
|
|
|
|
try:
|
|
|
|
connection.settings_dict['ATOMIC_REQUESTS'] = True
|
|
|
|
response = self.client.get('/in_transaction/')
|
|
|
|
finally:
|
|
|
|
connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
|
|
|
|
self.assertContains(response, 'True')
|
|
|
|
|
|
|
|
def test_no_auto_transaction(self):
|
|
|
|
old_atomic_requests = connection.settings_dict['ATOMIC_REQUESTS']
|
|
|
|
try:
|
|
|
|
connection.settings_dict['ATOMIC_REQUESTS'] = True
|
|
|
|
response = self.client.get('/not_in_transaction/')
|
|
|
|
finally:
|
|
|
|
connection.settings_dict['ATOMIC_REQUESTS'] = old_atomic_requests
|
|
|
|
self.assertContains(response, 'False')
|
|
|
|
|
2013-05-16 07:14:28 +08:00
|
|
|
|
2012-12-30 22:19:22 +08:00
|
|
|
class SignalsTests(TestCase):
|
2013-02-26 20:19:18 +08:00
|
|
|
urls = 'handlers.urls'
|
2012-12-30 22:19:22 +08:00
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.signals = []
|
2013-02-18 18:37:26 +08:00
|
|
|
request_started.connect(self.register_started)
|
|
|
|
request_finished.connect(self.register_finished)
|
2012-12-30 22:19:22 +08:00
|
|
|
|
|
|
|
def tearDown(self):
|
2013-02-18 18:37:26 +08:00
|
|
|
request_started.disconnect(self.register_started)
|
|
|
|
request_finished.disconnect(self.register_finished)
|
2012-12-30 22:19:22 +08:00
|
|
|
|
|
|
|
def register_started(self, **kwargs):
|
|
|
|
self.signals.append('started')
|
|
|
|
|
|
|
|
def register_finished(self, **kwargs):
|
|
|
|
self.signals.append('finished')
|
|
|
|
|
|
|
|
def test_request_signals(self):
|
|
|
|
response = self.client.get('/regular/')
|
|
|
|
self.assertEqual(self.signals, ['started', 'finished'])
|
|
|
|
self.assertEqual(response.content, b"regular content")
|
|
|
|
|
|
|
|
def test_request_signals_streaming_response(self):
|
|
|
|
response = self.client.get('/streaming/')
|
|
|
|
self.assertEqual(self.signals, ['started'])
|
|
|
|
self.assertEqual(b''.join(response.streaming_content), b"streaming content")
|
|
|
|
self.assertEqual(self.signals, ['started', 'finished'])
|
2013-05-16 07:14:28 +08:00
|
|
|
|
|
|
|
|
|
|
|
class HandlerSuspiciousOpsTest(TestCase):
|
|
|
|
urls = 'handlers.urls'
|
|
|
|
|
|
|
|
def test_suspiciousop_in_view_returns_400(self):
|
|
|
|
response = self.client.get('/suspicious/')
|
|
|
|
self.assertEqual(response.status_code, 400)
|