2013-04-03 09:00:55 +08:00
|
|
|
"""
|
2014-09-24 13:13:13 +08:00
|
|
|
Testing using the Test Client
|
2007-07-20 21:57:49 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
The test client is a class that can act like a simple
|
|
|
|
browser for testing purposes.
|
2007-07-20 21:57:49 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
It allows the user to compose GET and POST requests, and
|
|
|
|
obtain the response that the server gave to those requests.
|
|
|
|
The server Response objects are annotated with the details
|
|
|
|
of the contexts and templates that were rendered during the
|
|
|
|
process of serving the request.
|
2011-10-14 02:04:12 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
``Client`` objects are stateful - they will retain cookie (and
|
|
|
|
thus session) details for the lifetime of the ``Client`` instance.
|
2011-10-14 02:04:12 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
This is not intended as a replacement for Twill, Selenium, or
|
|
|
|
other browser automation frameworks - it is here to allow
|
|
|
|
testing against the contexts and templates produced by a view,
|
|
|
|
rather than the HTML rendered to the end-user.
|
2011-10-14 02:04:12 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
"""
|
2017-05-22 18:49:39 +08:00
|
|
|
import itertools
|
2016-09-11 17:23:35 +08:00
|
|
|
import tempfile
|
2018-02-05 18:22:24 +08:00
|
|
|
from unittest import mock
|
2016-09-11 17:23:35 +08:00
|
|
|
|
2015-02-23 08:53:57 +08:00
|
|
|
from django.contrib.auth.models import User
|
2013-04-03 09:00:55 +08:00
|
|
|
from django.core import mail
|
2014-10-13 19:10:00 +08:00
|
|
|
from django.http import HttpResponse
|
2015-04-18 05:38:20 +08:00
|
|
|
from django.test import (
|
|
|
|
Client, RequestFactory, SimpleTestCase, TestCase, override_settings,
|
|
|
|
)
|
2015-12-30 23:51:16 +08:00
|
|
|
from django.urls import reverse_lazy
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2017-11-24 00:18:03 +08:00
|
|
|
from .views import TwoArgException, get_view, post_view, trace_view
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2013-11-03 05:34:05 +08:00
|
|
|
|
2016-02-06 04:56:52 +08:00
|
|
|
@override_settings(ROOT_URLCONF='test_client.urls')
|
2013-04-03 09:00:55 +08:00
|
|
|
class ClientTest(TestCase):
|
2015-02-23 08:53:57 +08:00
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def setUpTestData(cls):
|
2016-02-06 04:56:52 +08:00
|
|
|
cls.u1 = User.objects.create_user(username='testclient', password='password')
|
|
|
|
cls.u2 = User.objects.create_user(username='inactive', password='password', is_active=False)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
def test_get_view(self):
|
|
|
|
"GET a view"
|
|
|
|
# The data is ignored, but let's check it doesn't crash the system
|
|
|
|
# anyway.
|
|
|
|
data = {'var': '\xf2'}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/get_view/', data)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Check some response details
|
|
|
|
self.assertContains(response, 'This is a test')
|
|
|
|
self.assertEqual(response.context['var'], '\xf2')
|
|
|
|
self.assertEqual(response.templates[0].name, 'GET Template')
|
|
|
|
|
2018-02-11 09:19:26 +08:00
|
|
|
def test_query_string_encoding(self):
|
|
|
|
# WSGI requires latin-1 encoded strings.
|
|
|
|
response = self.client.get('/get_view/?var=1\ufffd')
|
|
|
|
self.assertEqual(response.context['var'], '1\ufffd')
|
|
|
|
|
2018-12-28 00:19:55 +08:00
|
|
|
def test_get_data_none(self):
|
|
|
|
msg = (
|
2019-08-09 16:19:18 +08:00
|
|
|
"Cannot encode None for key 'value' in a query string. Did you "
|
|
|
|
"mean to pass an empty string or omit the value?"
|
2018-12-28 00:19:55 +08:00
|
|
|
)
|
|
|
|
with self.assertRaisesMessage(TypeError, msg):
|
|
|
|
self.client.get('/get_view/', {'value': None})
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_get_post_view(self):
|
|
|
|
"GET a view that normally expects POSTs"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/post_view/', {})
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Check some response details
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.templates[0].name, 'Empty GET Template')
|
|
|
|
self.assertTemplateUsed(response, 'Empty GET Template')
|
|
|
|
self.assertTemplateNotUsed(response, 'Empty POST Template')
|
|
|
|
|
|
|
|
def test_empty_post(self):
|
|
|
|
"POST an empty dictionary to a view"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/post_view/', {})
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Check some response details
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.templates[0].name, 'Empty POST Template')
|
|
|
|
self.assertTemplateNotUsed(response, 'Empty GET Template')
|
|
|
|
self.assertTemplateUsed(response, 'Empty POST Template')
|
|
|
|
|
|
|
|
def test_post(self):
|
|
|
|
"POST some data to a view"
|
|
|
|
post_data = {
|
|
|
|
'value': 37
|
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/post_view/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Check some response details
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['data'], '37')
|
|
|
|
self.assertEqual(response.templates[0].name, 'POST Template')
|
|
|
|
self.assertContains(response, 'Data received')
|
|
|
|
|
2018-12-28 00:19:55 +08:00
|
|
|
def test_post_data_none(self):
|
|
|
|
msg = (
|
2019-08-09 16:19:18 +08:00
|
|
|
"Cannot encode None for key 'value' as POST data. Did you mean "
|
|
|
|
"to pass an empty string or omit the value?"
|
2018-12-28 00:19:55 +08:00
|
|
|
)
|
|
|
|
with self.assertRaisesMessage(TypeError, msg):
|
|
|
|
self.client.post('/post_view/', {'value': None})
|
|
|
|
|
2018-02-05 18:22:24 +08:00
|
|
|
def test_json_serialization(self):
|
|
|
|
"""The test client serializes JSON data."""
|
|
|
|
methods = ('post', 'put', 'patch', 'delete')
|
2018-08-18 20:15:24 +08:00
|
|
|
tests = (
|
|
|
|
({'value': 37}, {'value': 37}),
|
|
|
|
([37, True], [37, True]),
|
|
|
|
((37, False), [37, False]),
|
|
|
|
)
|
2018-02-05 18:22:24 +08:00
|
|
|
for method in methods:
|
|
|
|
with self.subTest(method=method):
|
2018-08-18 20:15:24 +08:00
|
|
|
for data, expected in tests:
|
|
|
|
with self.subTest(data):
|
|
|
|
client_method = getattr(self.client, method)
|
|
|
|
method_name = method.upper()
|
|
|
|
response = client_method('/json_view/', data, content_type='application/json')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['data'], expected)
|
|
|
|
self.assertContains(response, 'Viewing %s page.' % method_name)
|
2018-02-05 18:22:24 +08:00
|
|
|
|
|
|
|
def test_json_encoder_argument(self):
|
|
|
|
"""The test Client accepts a json_encoder."""
|
|
|
|
mock_encoder = mock.MagicMock()
|
|
|
|
mock_encoding = mock.MagicMock()
|
|
|
|
mock_encoder.return_value = mock_encoding
|
|
|
|
mock_encoding.encode.return_value = '{"value": 37}'
|
|
|
|
|
|
|
|
client = self.client_class(json_encoder=mock_encoder)
|
|
|
|
# Vendored tree JSON content types are accepted.
|
|
|
|
client.post('/json_view/', {'value': 37}, content_type='application/vnd.api+json')
|
|
|
|
self.assertTrue(mock_encoder.called)
|
|
|
|
self.assertTrue(mock_encoding.encode.called)
|
|
|
|
|
2018-02-12 23:50:43 +08:00
|
|
|
def test_put(self):
|
|
|
|
response = self.client.put('/put_view/', {'foo': 'bar'})
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.templates[0].name, 'PUT Template')
|
|
|
|
self.assertEqual(response.context['data'], "{'foo': 'bar'}")
|
2018-07-09 23:44:49 +08:00
|
|
|
self.assertEqual(response.context['Content-Length'], '14')
|
2018-02-12 23:50:43 +08:00
|
|
|
|
2014-10-13 19:10:00 +08:00
|
|
|
def test_trace(self):
|
|
|
|
"""TRACE a view"""
|
|
|
|
response = self.client.trace('/trace_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['method'], 'TRACE')
|
|
|
|
self.assertEqual(response.templates[0].name, 'TRACE Template')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_response_headers(self):
|
|
|
|
"Check the value of HTTP headers returned in a response"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get("/header_view/")
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
self.assertEqual(response['X-DJANGO-TEST'], 'Slartibartfast')
|
|
|
|
|
2013-11-19 16:44:30 +08:00
|
|
|
def test_response_attached_request(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
The returned response has a ``request`` attribute with the originating
|
|
|
|
environ dict and a ``wsgi_request`` with the originating WSGIRequest.
|
2013-11-19 16:44:30 +08:00
|
|
|
"""
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get("/header_view/")
|
2013-11-19 16:44:30 +08:00
|
|
|
|
|
|
|
self.assertTrue(hasattr(response, 'request'))
|
|
|
|
self.assertTrue(hasattr(response, 'wsgi_request'))
|
|
|
|
for key, value in response.request.items():
|
|
|
|
self.assertIn(key, response.wsgi_request.environ)
|
|
|
|
self.assertEqual(response.wsgi_request.environ[key], value)
|
|
|
|
|
2014-06-06 22:49:02 +08:00
|
|
|
def test_response_resolver_match(self):
|
|
|
|
"""
|
|
|
|
The response contains a ResolverMatch instance.
|
|
|
|
"""
|
|
|
|
response = self.client.get('/header_view/')
|
|
|
|
self.assertTrue(hasattr(response, 'resolver_match'))
|
|
|
|
|
|
|
|
def test_response_resolver_match_redirect_follow(self):
|
|
|
|
"""
|
|
|
|
The response ResolverMatch instance contains the correct
|
|
|
|
information when following redirects.
|
|
|
|
"""
|
|
|
|
response = self.client.get('/redirect_view/', follow=True)
|
|
|
|
self.assertEqual(response.resolver_match.url_name, 'get_view')
|
|
|
|
|
|
|
|
def test_response_resolver_match_regular_view(self):
|
|
|
|
"""
|
|
|
|
The response ResolverMatch instance contains the correct
|
|
|
|
information when accessing a regular view.
|
|
|
|
"""
|
|
|
|
response = self.client.get('/get_view/')
|
|
|
|
self.assertEqual(response.resolver_match.url_name, 'get_view')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_raw_post(self):
|
|
|
|
"POST raw data (with a content type) to a view"
|
2015-09-12 07:33:12 +08:00
|
|
|
test_doc = """<?xml version="1.0" encoding="utf-8"?>
|
|
|
|
<library><book><title>Blink</title><author>Malcolm Gladwell</author></book></library>
|
|
|
|
"""
|
2018-03-16 17:54:34 +08:00
|
|
|
response = self.client.post('/raw_post_view/', test_doc, content_type='text/xml')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.templates[0].name, "Book template")
|
|
|
|
self.assertEqual(response.content, b"Blink - Malcolm Gladwell")
|
|
|
|
|
2013-10-28 22:00:54 +08:00
|
|
|
def test_insecure(self):
|
|
|
|
"GET a URL through http"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/secure_view/', secure=False)
|
2013-10-28 22:00:54 +08:00
|
|
|
self.assertFalse(response.test_was_secure_request)
|
|
|
|
self.assertEqual(response.test_server_port, '80')
|
|
|
|
|
|
|
|
def test_secure(self):
|
|
|
|
"GET a URL through https"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/secure_view/', secure=True)
|
2013-10-28 22:00:54 +08:00
|
|
|
self.assertTrue(response.test_was_secure_request)
|
|
|
|
self.assertEqual(response.test_server_port, '443')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_redirect(self):
|
|
|
|
"GET a URL that redirects elsewhere"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/redirect_view/')
|
|
|
|
self.assertRedirects(response, '/get_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
def test_redirect_with_query(self):
|
|
|
|
"GET a URL that redirects with given GET parameters"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/redirect_view/', {'var': 'value'})
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/get_view/?var=value')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2017-12-20 03:05:10 +08:00
|
|
|
def test_redirect_with_query_ordering(self):
|
|
|
|
"""assertRedirects() ignores the order of query string parameters."""
|
|
|
|
response = self.client.get('/redirect_view/', {'var': 'value', 'foo': 'bar'})
|
|
|
|
self.assertRedirects(response, '/get_view/?var=value&foo=bar')
|
|
|
|
self.assertRedirects(response, '/get_view/?foo=bar&var=value')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_permanent_redirect(self):
|
|
|
|
"GET a URL that redirects permanently elsewhere"
|
2014-11-27 11:44:56 +08:00
|
|
|
response = self.client.get('/permanent_redirect_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/get_view/', status_code=301)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
def test_temporary_redirect(self):
|
|
|
|
"GET a URL that does a non-permanent redirect"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/temporary_redirect_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/get_view/', status_code=302)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
def test_redirect_to_strange_location(self):
|
|
|
|
"GET a URL that redirects to a non-200 page"
|
2014-11-27 11:44:56 +08:00
|
|
|
response = self.client.get('/double_redirect_view/')
|
2016-10-27 15:53:39 +08:00
|
|
|
# The response was a 302, and that the attempt to get the redirection
|
|
|
|
# location returned 301 when retrieved
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/permanent_redirect_view/', target_status_code=301)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
def test_follow_redirect(self):
|
|
|
|
"A URL that redirects can be followed to termination."
|
2014-11-27 11:44:56 +08:00
|
|
|
response = self.client.get('/double_redirect_view/', follow=True)
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/get_view/', status_code=302, target_status_code=200)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(len(response.redirect_chain), 2)
|
|
|
|
|
2016-04-29 20:55:36 +08:00
|
|
|
def test_follow_relative_redirect(self):
|
|
|
|
"A URL with a relative redirect can be followed."
|
|
|
|
response = self.client.get('/accounts/', follow=True)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.request['PATH_INFO'], '/accounts/login/')
|
|
|
|
|
|
|
|
def test_follow_relative_redirect_no_trailing_slash(self):
|
|
|
|
"A URL with a relative redirect with no trailing slash can be followed."
|
|
|
|
response = self.client.get('/accounts/no_trailing_slash', follow=True)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.request['PATH_INFO'], '/accounts/login/')
|
|
|
|
|
2017-05-22 18:49:39 +08:00
|
|
|
def test_follow_307_and_308_redirect(self):
|
|
|
|
"""
|
|
|
|
A 307 or 308 redirect preserves the request method after the redirect.
|
|
|
|
"""
|
|
|
|
methods = ('get', 'post', 'head', 'options', 'put', 'patch', 'delete', 'trace')
|
|
|
|
codes = (307, 308)
|
|
|
|
for method, code in itertools.product(methods, codes):
|
|
|
|
with self.subTest(method=method, code=code):
|
|
|
|
req_method = getattr(self.client, method)
|
|
|
|
response = req_method('/redirect_view_%s/' % code, data={'value': 'test'}, follow=True)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.request['PATH_INFO'], '/post_view/')
|
|
|
|
self.assertEqual(response.request['REQUEST_METHOD'], method.upper())
|
|
|
|
|
|
|
|
def test_follow_307_and_308_preserves_post_data(self):
|
|
|
|
for code in (307, 308):
|
|
|
|
with self.subTest(code=code):
|
|
|
|
response = self.client.post('/redirect_view_%s/' % code, data={'value': 'test'}, follow=True)
|
|
|
|
self.assertContains(response, 'test is the value')
|
|
|
|
|
|
|
|
def test_follow_307_and_308_preserves_put_body(self):
|
|
|
|
for code in (307, 308):
|
|
|
|
with self.subTest(code=code):
|
|
|
|
response = self.client.put('/redirect_view_%s/?to=/put_view/' % code, data='a=b', follow=True)
|
|
|
|
self.assertContains(response, 'a=b is the body')
|
|
|
|
|
|
|
|
def test_follow_307_and_308_preserves_get_params(self):
|
|
|
|
data = {'var': 30, 'to': '/get_view/'}
|
|
|
|
for code in (307, 308):
|
|
|
|
with self.subTest(code=code):
|
|
|
|
response = self.client.get('/redirect_view_%s/' % code, data=data, follow=True)
|
|
|
|
self.assertContains(response, '30 is the value')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_redirect_http(self):
|
|
|
|
"GET a URL that redirects to an http URI"
|
2014-11-27 11:44:56 +08:00
|
|
|
response = self.client.get('/http_redirect_view/', follow=True)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertFalse(response.test_was_secure_request)
|
|
|
|
|
|
|
|
def test_redirect_https(self):
|
|
|
|
"GET a URL that redirects to an https URI"
|
2014-11-27 11:44:56 +08:00
|
|
|
response = self.client.get('/https_redirect_view/', follow=True)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertTrue(response.test_was_secure_request)
|
|
|
|
|
|
|
|
def test_notfound_response(self):
|
|
|
|
"GET a URL that responds as '404:Not Found'"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/bad_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertContains(response, 'MAGIC', status_code=404)
|
|
|
|
|
|
|
|
def test_valid_form(self):
|
|
|
|
"POST valid data to a form"
|
|
|
|
post_data = {
|
|
|
|
'text': 'Hello World',
|
|
|
|
'email': 'foo@example.com',
|
|
|
|
'value': 37,
|
|
|
|
'single': 'b',
|
2013-10-27 03:15:03 +08:00
|
|
|
'multi': ('b', 'c', 'e')
|
2013-04-03 09:00:55 +08:00
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/form_view/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertTemplateUsed(response, "Valid POST Template")
|
|
|
|
|
|
|
|
def test_valid_form_with_hints(self):
|
|
|
|
"GET a form, providing hints in the GET data"
|
|
|
|
hints = {
|
|
|
|
'text': 'Hello World',
|
2013-10-27 03:15:03 +08:00
|
|
|
'multi': ('b', 'c', 'e')
|
2013-04-03 09:00:55 +08:00
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/form_view/', data=hints)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertTemplateUsed(response, "Form GET Template")
|
2016-10-27 15:53:39 +08:00
|
|
|
# The multi-value data has been rolled out ok
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertContains(response, 'Select a valid choice.', 0)
|
|
|
|
|
|
|
|
def test_incomplete_data_form(self):
|
|
|
|
"POST incomplete data to a form"
|
|
|
|
post_data = {
|
|
|
|
'text': 'Hello World',
|
|
|
|
'value': 37
|
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/form_view/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertContains(response, 'This field is required.', 3)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertTemplateUsed(response, "Invalid POST Template")
|
|
|
|
|
|
|
|
self.assertFormError(response, 'form', 'email', 'This field is required.')
|
|
|
|
self.assertFormError(response, 'form', 'single', 'This field is required.')
|
|
|
|
self.assertFormError(response, 'form', 'multi', 'This field is required.')
|
|
|
|
|
|
|
|
def test_form_error(self):
|
|
|
|
"POST erroneous data to a form"
|
|
|
|
post_data = {
|
|
|
|
'text': 'Hello World',
|
|
|
|
'email': 'not an email address',
|
|
|
|
'value': 37,
|
|
|
|
'single': 'b',
|
2013-10-27 03:15:03 +08:00
|
|
|
'multi': ('b', 'c', 'e')
|
2013-04-03 09:00:55 +08:00
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/form_view/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertTemplateUsed(response, "Invalid POST Template")
|
|
|
|
|
|
|
|
self.assertFormError(response, 'form', 'email', 'Enter a valid email address.')
|
|
|
|
|
|
|
|
def test_valid_form_with_template(self):
|
|
|
|
"POST valid data to a form using multiple templates"
|
|
|
|
post_data = {
|
|
|
|
'text': 'Hello World',
|
|
|
|
'email': 'foo@example.com',
|
|
|
|
'value': 37,
|
|
|
|
'single': 'b',
|
2013-10-27 03:15:03 +08:00
|
|
|
'multi': ('b', 'c', 'e')
|
2013-04-03 09:00:55 +08:00
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/form_view_with_template/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertContains(response, 'POST data OK')
|
|
|
|
self.assertTemplateUsed(response, "form_view.html")
|
|
|
|
self.assertTemplateUsed(response, 'base.html')
|
|
|
|
self.assertTemplateNotUsed(response, "Valid POST Template")
|
|
|
|
|
|
|
|
def test_incomplete_data_form_with_template(self):
|
|
|
|
"POST incomplete data to a form using multiple templates"
|
|
|
|
post_data = {
|
|
|
|
'text': 'Hello World',
|
|
|
|
'value': 37
|
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/form_view_with_template/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertContains(response, 'POST data has errors')
|
|
|
|
self.assertTemplateUsed(response, 'form_view.html')
|
|
|
|
self.assertTemplateUsed(response, 'base.html')
|
|
|
|
self.assertTemplateNotUsed(response, "Invalid POST Template")
|
|
|
|
|
|
|
|
self.assertFormError(response, 'form', 'email', 'This field is required.')
|
|
|
|
self.assertFormError(response, 'form', 'single', 'This field is required.')
|
|
|
|
self.assertFormError(response, 'form', 'multi', 'This field is required.')
|
|
|
|
|
|
|
|
def test_form_error_with_template(self):
|
|
|
|
"POST erroneous data to a form using multiple templates"
|
|
|
|
post_data = {
|
|
|
|
'text': 'Hello World',
|
|
|
|
'email': 'not an email address',
|
|
|
|
'value': 37,
|
|
|
|
'single': 'b',
|
2013-10-27 03:15:03 +08:00
|
|
|
'multi': ('b', 'c', 'e')
|
2013-04-03 09:00:55 +08:00
|
|
|
}
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/form_view_with_template/', post_data)
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertContains(response, 'POST data has errors')
|
|
|
|
self.assertTemplateUsed(response, "form_view.html")
|
|
|
|
self.assertTemplateUsed(response, 'base.html')
|
|
|
|
self.assertTemplateNotUsed(response, "Invalid POST Template")
|
|
|
|
|
|
|
|
self.assertFormError(response, 'form', 'email', 'Enter a valid email address.')
|
|
|
|
|
|
|
|
def test_unknown_page(self):
|
|
|
|
"GET an invalid URL"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/unknown_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2016-10-27 15:53:39 +08:00
|
|
|
# The response was a 404
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 404)
|
|
|
|
|
|
|
|
def test_url_parameters(self):
|
|
|
|
"Make sure that URL ;-parameters are not stripped."
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/unknown_view/;some-parameter')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2016-10-27 15:53:39 +08:00
|
|
|
# The path in the response includes it (ignore that it's a 404)
|
2014-01-14 23:43:27 +08:00
|
|
|
self.assertEqual(response.request['PATH_INFO'], '/unknown_view/;some-parameter')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
def test_view_with_login(self):
|
|
|
|
"Request a page that is protected with @login_required"
|
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Log in
|
|
|
|
login = self.client.login(username='testclient', password='password')
|
|
|
|
self.assertTrue(login, 'Could not log in')
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2016-04-02 22:11:47 +08:00
|
|
|
@override_settings(
|
|
|
|
INSTALLED_APPS=['django.contrib.auth'],
|
|
|
|
SESSION_ENGINE='django.contrib.sessions.backends.file',
|
|
|
|
)
|
|
|
|
def test_view_with_login_when_sessions_app_is_not_installed(self):
|
|
|
|
self.test_view_with_login()
|
|
|
|
|
2015-06-16 12:35:19 +08:00
|
|
|
def test_view_with_force_login(self):
|
|
|
|
"Request a page that is protected with @login_required"
|
|
|
|
# Get the page without logging in. Should result in 302.
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_view/')
|
|
|
|
|
|
|
|
# Log in
|
|
|
|
self.client.force_login(self.u1)
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_view_with_method_login(self):
|
|
|
|
"Request a page that is protected with a @login_required method"
|
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_method_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_method_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Log in
|
|
|
|
login = self.client.login(username='testclient', password='password')
|
|
|
|
self.assertTrue(login, 'Could not log in')
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_method_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2015-06-16 12:35:19 +08:00
|
|
|
def test_view_with_method_force_login(self):
|
|
|
|
"Request a page that is protected with a @login_required method"
|
|
|
|
# Get the page without logging in. Should result in 302.
|
|
|
|
response = self.client.get('/login_protected_method_view/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_method_view/')
|
|
|
|
|
|
|
|
# Log in
|
|
|
|
self.client.force_login(self.u1)
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_method_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_view_with_login_and_custom_redirect(self):
|
|
|
|
"Request a page that is protected with @login_required(redirect_field_name='redirect_to')"
|
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_view_custom_redirect/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?redirect_to=/login_protected_view_custom_redirect/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Log in
|
|
|
|
login = self.client.login(username='testclient', password='password')
|
|
|
|
self.assertTrue(login, 'Could not log in')
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_view_custom_redirect/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2015-06-16 12:35:19 +08:00
|
|
|
def test_view_with_force_login_and_custom_redirect(self):
|
|
|
|
"""
|
|
|
|
Request a page that is protected with
|
|
|
|
@login_required(redirect_field_name='redirect_to')
|
|
|
|
"""
|
|
|
|
# Get the page without logging in. Should result in 302.
|
|
|
|
response = self.client.get('/login_protected_view_custom_redirect/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/?redirect_to=/login_protected_view_custom_redirect/')
|
|
|
|
|
|
|
|
# Log in
|
|
|
|
self.client.force_login(self.u1)
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_view_custom_redirect/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_view_with_bad_login(self):
|
|
|
|
"Request a page that is protected with @login, but use bad credentials"
|
|
|
|
|
|
|
|
login = self.client.login(username='otheruser', password='nopassword')
|
|
|
|
self.assertFalse(login)
|
|
|
|
|
|
|
|
def test_view_with_inactive_login(self):
|
2016-02-06 03:03:06 +08:00
|
|
|
"""
|
|
|
|
An inactive user may login if the authenticate backend allows it.
|
|
|
|
"""
|
|
|
|
credentials = {'username': 'inactive', 'password': 'password'}
|
|
|
|
self.assertFalse(self.client.login(**credentials))
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2016-02-06 03:03:06 +08:00
|
|
|
with self.settings(AUTHENTICATION_BACKENDS=['django.contrib.auth.backends.AllowAllUsersModelBackend']):
|
|
|
|
self.assertTrue(self.client.login(**credentials))
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2016-02-05 22:46:19 +08:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=[
|
|
|
|
'django.contrib.auth.backends.ModelBackend',
|
|
|
|
'django.contrib.auth.backends.AllowAllUsersModelBackend',
|
|
|
|
]
|
|
|
|
)
|
2015-06-16 12:35:19 +08:00
|
|
|
def test_view_with_inactive_force_login(self):
|
|
|
|
"Request a page that is protected with @login, but use an inactive login"
|
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 302.
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_view/')
|
|
|
|
|
|
|
|
# Log in
|
2016-02-05 22:46:19 +08:00
|
|
|
self.client.force_login(self.u2, backend='django.contrib.auth.backends.AllowAllUsersModelBackend')
|
2015-06-16 12:35:19 +08:00
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'inactive')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_logout(self):
|
|
|
|
"Request a logout after logging in"
|
|
|
|
# Log in
|
|
|
|
self.client.login(username='testclient', password='password')
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
|
|
|
# Log out
|
|
|
|
self.client.logout()
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/login_protected_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2015-06-16 12:35:19 +08:00
|
|
|
def test_logout_with_force_login(self):
|
|
|
|
"Request a logout after logging in"
|
|
|
|
# Log in
|
|
|
|
self.client.force_login(self.u1)
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
|
|
|
# Log out
|
|
|
|
self.client.logout()
|
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_view/')
|
|
|
|
|
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=[
|
|
|
|
'django.contrib.auth.backends.ModelBackend',
|
|
|
|
'test_client.auth_backends.TestClientBackend',
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_force_login_with_backend(self):
|
|
|
|
"""
|
|
|
|
Request a page that is protected with @login_required when using
|
|
|
|
force_login() and passing a backend.
|
|
|
|
"""
|
|
|
|
# Get the page without logging in. Should result in 302.
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/login_protected_view/')
|
|
|
|
|
|
|
|
# Log in
|
|
|
|
self.client.force_login(self.u1, backend='test_client.auth_backends.TestClientBackend')
|
2016-08-06 08:18:12 +08:00
|
|
|
self.assertEqual(self.u1.backend, 'test_client.auth_backends.TestClientBackend')
|
2015-06-16 12:35:19 +08:00
|
|
|
|
|
|
|
# Request a page that requires a login
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
|
2016-08-06 08:18:12 +08:00
|
|
|
@override_settings(
|
|
|
|
AUTHENTICATION_BACKENDS=[
|
|
|
|
'django.contrib.auth.backends.ModelBackend',
|
|
|
|
'test_client.auth_backends.TestClientBackend',
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_force_login_without_backend(self):
|
|
|
|
"""
|
|
|
|
force_login() without passing a backend and with multiple backends
|
|
|
|
configured should automatically use the first backend.
|
|
|
|
"""
|
|
|
|
self.client.force_login(self.u1)
|
|
|
|
response = self.client.get('/login_protected_view/')
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
self.assertEqual(response.context['user'].username, 'testclient')
|
|
|
|
self.assertEqual(self.u1.backend, 'django.contrib.auth.backends.ModelBackend')
|
2016-12-01 02:37:07 +08:00
|
|
|
|
|
|
|
@override_settings(AUTHENTICATION_BACKENDS=[
|
|
|
|
'test_client.auth_backends.BackendWithoutGetUserMethod',
|
|
|
|
'django.contrib.auth.backends.ModelBackend',
|
|
|
|
])
|
|
|
|
def test_force_login_with_backend_missing_get_user(self):
|
|
|
|
"""
|
|
|
|
force_login() skips auth backends without a get_user() method.
|
|
|
|
"""
|
|
|
|
self.client.force_login(self.u1)
|
|
|
|
self.assertEqual(self.u1.backend, 'django.contrib.auth.backends.ModelBackend')
|
2016-08-06 08:18:12 +08:00
|
|
|
|
2013-11-24 03:51:17 +08:00
|
|
|
@override_settings(SESSION_ENGINE="django.contrib.sessions.backends.signed_cookies")
|
|
|
|
def test_logout_cookie_sessions(self):
|
|
|
|
self.test_logout()
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_view_with_permissions(self):
|
|
|
|
"Request a page that is protected with @permission_required"
|
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/permission_protected_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/permission_protected_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Log in
|
|
|
|
login = self.client.login(username='testclient', password='password')
|
|
|
|
self.assertTrue(login, 'Could not log in')
|
|
|
|
|
|
|
|
# Log in with wrong permissions. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/permission_protected_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/permission_protected_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# TODO: Log in with right permissions and request the page again
|
|
|
|
|
|
|
|
def test_view_with_permissions_exception(self):
|
2014-05-29 08:39:14 +08:00
|
|
|
"Request a page that is protected with @permission_required but raises an exception"
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 403.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/permission_protected_view_exception/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
|
|
# Log in
|
|
|
|
login = self.client.login(username='testclient', password='password')
|
|
|
|
self.assertTrue(login, 'Could not log in')
|
|
|
|
|
|
|
|
# Log in with wrong permissions. Should result in 403.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/permission_protected_view_exception/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
|
|
def test_view_with_method_permissions(self):
|
|
|
|
"Request a page that is protected with a @permission_required method"
|
|
|
|
|
|
|
|
# Get the page without logging in. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/permission_protected_method_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/permission_protected_method_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# Log in
|
|
|
|
login = self.client.login(username='testclient', password='password')
|
|
|
|
self.assertTrue(login, 'Could not log in')
|
|
|
|
|
|
|
|
# Log in with wrong permissions. Should result in 302.
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/permission_protected_method_view/')
|
2015-03-14 06:40:14 +08:00
|
|
|
self.assertRedirects(response, '/accounts/login/?next=/permission_protected_method_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
# TODO: Log in with right permissions and request the page again
|
|
|
|
|
2013-09-08 05:13:57 +08:00
|
|
|
def test_external_redirect(self):
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/django_project_redirect/')
|
2013-09-08 05:13:57 +08:00
|
|
|
self.assertRedirects(response, 'https://www.djangoproject.com/', fetch_redirect_response=False)
|
|
|
|
|
2016-06-03 04:00:04 +08:00
|
|
|
def test_external_redirect_with_fetch_error_msg(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
assertRedirects without fetch_redirect_response=False raises
|
2016-06-03 04:00:04 +08:00
|
|
|
a relevant ValueError rather than a non-descript AssertionError.
|
|
|
|
"""
|
|
|
|
response = self.client.get('/django_project_redirect/')
|
2016-06-04 06:02:38 +08:00
|
|
|
msg = (
|
|
|
|
"The test client is unable to fetch remote URLs (got "
|
|
|
|
"https://www.djangoproject.com/). If the host is served by Django, "
|
|
|
|
"add 'www.djangoproject.com' to ALLOWED_HOSTS. "
|
|
|
|
"Otherwise, use assertRedirects(..., fetch_redirect_response=False)."
|
|
|
|
)
|
|
|
|
with self.assertRaisesMessage(ValueError, msg):
|
2016-06-03 04:00:04 +08:00
|
|
|
self.assertRedirects(response, 'https://www.djangoproject.com/')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_session_modifying_view(self):
|
|
|
|
"Request a page that modifies the session"
|
|
|
|
# Session value isn't set initially
|
2016-06-28 23:21:26 +08:00
|
|
|
with self.assertRaises(KeyError):
|
2013-04-03 09:00:55 +08:00
|
|
|
self.client.session['tobacconist']
|
|
|
|
|
2014-01-14 23:43:27 +08:00
|
|
|
self.client.post('/session_view/')
|
2016-10-27 15:53:39 +08:00
|
|
|
# The session was modified
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(self.client.session['tobacconist'], 'hovercraft')
|
|
|
|
|
2016-04-02 22:11:47 +08:00
|
|
|
@override_settings(
|
|
|
|
INSTALLED_APPS=[],
|
|
|
|
SESSION_ENGINE='django.contrib.sessions.backends.file',
|
|
|
|
)
|
|
|
|
def test_sessions_app_is_not_installed(self):
|
|
|
|
self.test_session_modifying_view()
|
|
|
|
|
|
|
|
@override_settings(
|
|
|
|
INSTALLED_APPS=[],
|
|
|
|
SESSION_ENGINE='django.contrib.sessions.backends.nonexistent',
|
|
|
|
)
|
|
|
|
def test_session_engine_is_invalid(self):
|
|
|
|
with self.assertRaisesMessage(ImportError, 'nonexistent'):
|
|
|
|
self.test_session_modifying_view()
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_view_with_exception(self):
|
|
|
|
"Request a page that is known to throw an error"
|
2016-01-17 19:26:39 +08:00
|
|
|
with self.assertRaises(KeyError):
|
|
|
|
self.client.get("/broken_view/")
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2019-02-20 19:16:10 +08:00
|
|
|
def test_exc_info(self):
|
|
|
|
client = Client(raise_request_exception=False)
|
|
|
|
response = client.get("/broken_view/")
|
|
|
|
self.assertEqual(response.status_code, 500)
|
|
|
|
exc_type, exc_value, exc_traceback = response.exc_info
|
|
|
|
self.assertIs(exc_type, KeyError)
|
|
|
|
self.assertIsInstance(exc_value, KeyError)
|
|
|
|
self.assertEqual(str(exc_value), "'Oops! Looks like you wrote some bad code.'")
|
|
|
|
self.assertIsNotNone(exc_traceback)
|
|
|
|
|
|
|
|
def test_exc_info_none(self):
|
|
|
|
response = self.client.get("/get_view/")
|
|
|
|
self.assertIsNone(response.exc_info)
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_mail_sending(self):
|
2016-10-27 15:53:39 +08:00
|
|
|
"Mail is redirected to a dummy outbox during test setup"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/mail_sending_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
|
|
self.assertEqual(len(mail.outbox), 1)
|
|
|
|
self.assertEqual(mail.outbox[0].subject, 'Test message')
|
|
|
|
self.assertEqual(mail.outbox[0].body, 'This is a test email')
|
|
|
|
self.assertEqual(mail.outbox[0].from_email, 'from@example.com')
|
|
|
|
self.assertEqual(mail.outbox[0].to[0], 'first@example.com')
|
|
|
|
self.assertEqual(mail.outbox[0].to[1], 'second@example.com')
|
|
|
|
|
2015-09-18 09:37:16 +08:00
|
|
|
def test_reverse_lazy_decodes(self):
|
2016-10-27 15:53:39 +08:00
|
|
|
"reverse_lazy() works in the test client"
|
2015-09-18 09:37:16 +08:00
|
|
|
data = {'var': 'data'}
|
|
|
|
response = self.client.get(reverse_lazy('get_view'), data)
|
|
|
|
|
|
|
|
# Check some response details
|
|
|
|
self.assertContains(response, 'This is a test')
|
|
|
|
|
2016-04-02 22:35:33 +08:00
|
|
|
def test_relative_redirect(self):
|
|
|
|
response = self.client.get('/accounts/')
|
|
|
|
self.assertRedirects(response, '/accounts/login/')
|
|
|
|
|
|
|
|
def test_relative_redirect_no_trailing_slash(self):
|
|
|
|
response = self.client.get('/accounts/no_trailing_slash')
|
|
|
|
self.assertRedirects(response, '/accounts/login/')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_mass_mail_sending(self):
|
2016-10-27 15:53:39 +08:00
|
|
|
"Mass mail is redirected to a dummy outbox during test setup"
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.get('/mass_mail_sending_view/')
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
|
|
self.assertEqual(len(mail.outbox), 2)
|
|
|
|
self.assertEqual(mail.outbox[0].subject, 'First Test message')
|
|
|
|
self.assertEqual(mail.outbox[0].body, 'This is the first test email')
|
|
|
|
self.assertEqual(mail.outbox[0].from_email, 'from@example.com')
|
|
|
|
self.assertEqual(mail.outbox[0].to[0], 'first@example.com')
|
|
|
|
self.assertEqual(mail.outbox[0].to[1], 'second@example.com')
|
|
|
|
|
|
|
|
self.assertEqual(mail.outbox[1].subject, 'Second Test message')
|
|
|
|
self.assertEqual(mail.outbox[1].body, 'This is the second test email')
|
|
|
|
self.assertEqual(mail.outbox[1].from_email, 'from@example.com')
|
|
|
|
self.assertEqual(mail.outbox[1].to[0], 'second@example.com')
|
|
|
|
self.assertEqual(mail.outbox[1].to[1], 'third@example.com')
|
|
|
|
|
2015-08-08 03:28:54 +08:00
|
|
|
def test_exception_following_nested_client_request(self):
|
|
|
|
"""
|
|
|
|
A nested test client request shouldn't clobber exception signals from
|
|
|
|
the outer client request.
|
|
|
|
"""
|
|
|
|
with self.assertRaisesMessage(Exception, 'exception message'):
|
|
|
|
self.client.get('/nesting_exception_view/')
|
|
|
|
|
2017-11-24 00:18:03 +08:00
|
|
|
def test_response_raises_multi_arg_exception(self):
|
|
|
|
"""A request may raise an exception with more than one required arg."""
|
2019-03-16 07:27:57 +08:00
|
|
|
with self.assertRaises(TwoArgException) as cm:
|
2017-11-24 00:18:03 +08:00
|
|
|
self.client.get('/two_arg_exception/')
|
2019-03-16 07:27:57 +08:00
|
|
|
self.assertEqual(cm.exception.args, ('one', 'two'))
|
2017-11-24 00:18:03 +08:00
|
|
|
|
2016-09-11 17:23:35 +08:00
|
|
|
def test_uploading_temp_file(self):
|
2016-12-13 01:41:38 +08:00
|
|
|
with tempfile.TemporaryFile() as test_file:
|
|
|
|
response = self.client.post('/upload_view/', data={'temp_file': test_file})
|
2016-09-11 17:23:35 +08:00
|
|
|
self.assertEqual(response.content, b'temp_file')
|
|
|
|
|
2016-11-09 18:31:43 +08:00
|
|
|
def test_uploading_named_temp_file(self):
|
|
|
|
test_file = tempfile.NamedTemporaryFile()
|
|
|
|
response = self.client.post('/upload_view/', data={'named_temp_file': test_file})
|
|
|
|
self.assertEqual(response.content, b'named_temp_file')
|
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
|
2013-10-14 21:14:17 +08:00
|
|
|
@override_settings(
|
2015-11-07 23:12:37 +08:00
|
|
|
MIDDLEWARE=['django.middleware.csrf.CsrfViewMiddleware'],
|
2014-04-05 14:04:46 +08:00
|
|
|
ROOT_URLCONF='test_client.urls',
|
2013-10-14 21:14:17 +08:00
|
|
|
)
|
2015-04-18 05:38:20 +08:00
|
|
|
class CSRFEnabledClientTests(SimpleTestCase):
|
2014-01-14 23:43:27 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_csrf_enabled_client(self):
|
|
|
|
"A client can be instantiated with CSRF checks enabled"
|
|
|
|
csrf_client = Client(enforce_csrf_checks=True)
|
|
|
|
# The normal client allows the post
|
2014-01-14 23:43:27 +08:00
|
|
|
response = self.client.post('/post_view/', {})
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
# The CSRF-enabled client rejects it
|
2014-01-14 23:43:27 +08:00
|
|
|
response = csrf_client.post('/post_view/', {})
|
2013-04-03 09:00:55 +08:00
|
|
|
self.assertEqual(response.status_code, 403)
|
|
|
|
|
|
|
|
|
|
|
|
class CustomTestClient(Client):
|
|
|
|
i_am_customized = "Yes"
|
|
|
|
|
2013-11-03 05:34:05 +08:00
|
|
|
|
2015-04-18 05:38:20 +08:00
|
|
|
class CustomTestClientTest(SimpleTestCase):
|
2013-04-03 09:00:55 +08:00
|
|
|
client_class = CustomTestClient
|
|
|
|
|
|
|
|
def test_custom_test_client(self):
|
|
|
|
"""A test case can specify a custom class for self.client."""
|
2016-06-17 02:19:18 +08:00
|
|
|
self.assertIs(hasattr(self.client, "i_am_customized"), True)
|
2013-04-03 09:00:55 +08:00
|
|
|
|
|
|
|
|
2016-01-24 00:47:07 +08:00
|
|
|
def _generic_view(request):
|
|
|
|
return HttpResponse(status=200)
|
2014-10-13 19:10:00 +08:00
|
|
|
|
|
|
|
|
2014-04-05 14:04:46 +08:00
|
|
|
@override_settings(ROOT_URLCONF='test_client.urls')
|
2015-04-18 05:38:20 +08:00
|
|
|
class RequestFactoryTest(SimpleTestCase):
|
2014-10-13 19:10:00 +08:00
|
|
|
"""Tests for the request factory."""
|
|
|
|
|
|
|
|
# A mapping between names of HTTP/1.1 methods and their test views.
|
|
|
|
http_methods_and_views = (
|
|
|
|
('get', get_view),
|
|
|
|
('post', post_view),
|
|
|
|
('put', _generic_view),
|
|
|
|
('patch', _generic_view),
|
|
|
|
('delete', _generic_view),
|
|
|
|
('head', _generic_view),
|
|
|
|
('options', _generic_view),
|
|
|
|
('trace', trace_view),
|
|
|
|
)
|
2018-11-27 03:01:27 +08:00
|
|
|
request_factory = RequestFactory()
|
2014-01-14 23:43:27 +08:00
|
|
|
|
2013-04-03 09:00:55 +08:00
|
|
|
def test_request_factory(self):
|
2014-10-13 19:10:00 +08:00
|
|
|
"""The request factory implements all the HTTP/1.1 methods."""
|
|
|
|
for method_name, view in self.http_methods_and_views:
|
|
|
|
method = getattr(self.request_factory, method_name)
|
|
|
|
request = method('/somewhere/')
|
|
|
|
response = view(request)
|
|
|
|
self.assertEqual(response.status_code, 200)
|
|
|
|
|
|
|
|
def test_get_request_from_factory(self):
|
|
|
|
"""
|
|
|
|
The request factory returns a templated response for a GET request.
|
|
|
|
"""
|
|
|
|
request = self.request_factory.get('/somewhere/')
|
2013-04-03 09:00:55 +08:00
|
|
|
response = get_view(request)
|
|
|
|
self.assertContains(response, 'This is a test')
|
2014-10-13 19:10:00 +08:00
|
|
|
|
|
|
|
def test_trace_request_from_factory(self):
|
|
|
|
"""The request factory returns an echo response for a TRACE request."""
|
|
|
|
url_path = '/somewhere/'
|
|
|
|
request = self.request_factory.trace(url_path)
|
|
|
|
response = trace_view(request)
|
|
|
|
protocol = request.META["SERVER_PROTOCOL"]
|
|
|
|
echoed_request_line = "TRACE {} {}".format(url_path, protocol)
|
|
|
|
self.assertContains(response, echoed_request_line)
|