2015-01-28 20:35:27 +08:00
|
|
|
import time
|
2010-11-07 23:41:17 +08:00
|
|
|
from datetime import datetime, timedelta
|
2017-01-07 19:11:46 +08:00
|
|
|
from http import cookies
|
2012-08-11 17:11:20 +08:00
|
|
|
from io import BytesIO
|
2013-07-13 16:16:40 +08:00
|
|
|
from itertools import chain
|
2017-01-26 21:25:15 +08:00
|
|
|
from urllib.parse import urlencode
|
2008-03-08 11:06:30 +08:00
|
|
|
|
2012-10-19 02:10:46 +08:00
|
|
|
from django.core.exceptions import SuspiciousOperation
|
2015-01-28 20:35:27 +08:00
|
|
|
from django.core.handlers.wsgi import LimitedStream, WSGIRequest
|
|
|
|
from django.http import (
|
|
|
|
HttpRequest, HttpResponse, RawPostDataException, UnreadablePostError,
|
|
|
|
)
|
2016-11-30 07:17:10 +08:00
|
|
|
from django.http.request import split_domain_port
|
2015-01-28 20:35:27 +08:00
|
|
|
from django.test import RequestFactory, SimpleTestCase, override_settings
|
2012-10-20 21:53:28 +08:00
|
|
|
from django.test.client import FakePayload
|
2017-01-20 22:24:05 +08:00
|
|
|
from django.test.utils import freeze_time
|
2017-01-26 21:25:15 +08:00
|
|
|
from django.utils.http import cookie_date
|
2012-03-19 04:58:22 +08:00
|
|
|
from django.utils.timezone import utc
|
2008-03-08 11:06:30 +08:00
|
|
|
|
2011-09-10 08:46:38 +08:00
|
|
|
|
2013-04-04 04:27:20 +08:00
|
|
|
class RequestsTests(SimpleTestCase):
|
2010-09-28 15:06:37 +08:00
|
|
|
def test_httprequest(self):
|
2010-09-28 19:54:58 +08:00
|
|
|
request = HttpRequest()
|
2012-08-11 17:11:20 +08:00
|
|
|
self.assertEqual(list(request.GET.keys()), [])
|
|
|
|
self.assertEqual(list(request.POST.keys()), [])
|
|
|
|
self.assertEqual(list(request.COOKIES.keys()), [])
|
|
|
|
self.assertEqual(list(request.META.keys()), [])
|
2008-08-24 01:28:12 +08:00
|
|
|
|
Fixed #22799 -- Made GET and POST on HttpRequest QueryDicts, and FILES a MultiValueDict.
Previously, GET, POST, and FILES on an HttpRequest were created in
the __init__ method as dictionaries. This was not something you would
usually notice causing trouble in production as you'd only see a
WSGIRequest, but in testing using the test client, calling .getlist
on GET, POST, or FILES for a request with no get/post data resulted in
an AttributeError.
Changed GET and POST on an HttpRequest object to be mutable
QueryDicts (mutable because the Django tests, and probably many
third party tests, were expecting it).
2014-06-08 07:47:43 +08:00
|
|
|
# .GET and .POST should be QueryDicts
|
|
|
|
self.assertEqual(request.GET.urlencode(), '')
|
|
|
|
self.assertEqual(request.POST.urlencode(), '')
|
|
|
|
|
|
|
|
# and FILES should be MultiValueDict
|
|
|
|
self.assertEqual(request.FILES.getlist('foo'), [])
|
|
|
|
|
2015-08-07 13:51:39 +08:00
|
|
|
self.assertIsNone(request.content_type)
|
|
|
|
self.assertIsNone(request.content_params)
|
|
|
|
|
2014-10-31 23:43:34 +08:00
|
|
|
def test_httprequest_full_path(self):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.path = request.path_info = '/;some/?awful/=path/foo:bar/'
|
|
|
|
request.META['QUERY_STRING'] = ';some=query&+query=string'
|
|
|
|
expected = '/%3Bsome/%3Fawful/%3Dpath/foo:bar/?;some=query&+query=string'
|
|
|
|
self.assertEqual(request.get_full_path(), expected)
|
|
|
|
|
|
|
|
def test_httprequest_full_path_with_query_string_and_fragment(self):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.path = request.path_info = '/foo#bar'
|
|
|
|
request.META['QUERY_STRING'] = 'baz#quux'
|
|
|
|
self.assertEqual(request.get_full_path(), '/foo%23bar?baz#quux')
|
|
|
|
|
2011-06-10 07:15:42 +08:00
|
|
|
def test_httprequest_repr(self):
|
|
|
|
request = HttpRequest()
|
2012-06-08 00:08:47 +08:00
|
|
|
request.path = '/somepath/'
|
2014-11-20 17:28:16 +08:00
|
|
|
request.method = 'GET'
|
2012-06-08 00:08:47 +08:00
|
|
|
request.GET = {'get-key': 'get-value'}
|
|
|
|
request.POST = {'post-key': 'post-value'}
|
|
|
|
request.COOKIES = {'post-key': 'post-value'}
|
|
|
|
request.META = {'post-key': 'post-value'}
|
2017-01-20 22:24:05 +08:00
|
|
|
self.assertEqual(repr(request), "<HttpRequest: GET '/somepath/'>")
|
2011-06-10 07:15:42 +08:00
|
|
|
|
2014-11-20 17:28:16 +08:00
|
|
|
def test_httprequest_repr_invalid_method_and_path(self):
|
|
|
|
request = HttpRequest()
|
2017-01-20 22:24:05 +08:00
|
|
|
self.assertEqual(repr(request), "<HttpRequest>")
|
2014-11-20 17:28:16 +08:00
|
|
|
request = HttpRequest()
|
|
|
|
request.method = "GET"
|
2017-01-20 22:24:05 +08:00
|
|
|
self.assertEqual(repr(request), "<HttpRequest>")
|
2014-11-20 17:28:16 +08:00
|
|
|
request = HttpRequest()
|
|
|
|
request.path = ""
|
2017-01-20 22:24:05 +08:00
|
|
|
self.assertEqual(repr(request), "<HttpRequest>")
|
2014-11-20 17:28:16 +08:00
|
|
|
|
2010-09-28 15:06:37 +08:00
|
|
|
def test_wsgirequest(self):
|
2015-08-07 13:51:39 +08:00
|
|
|
request = WSGIRequest({
|
|
|
|
'PATH_INFO': 'bogus',
|
|
|
|
'REQUEST_METHOD': 'bogus',
|
|
|
|
'CONTENT_TYPE': 'text/html; charset=utf8',
|
|
|
|
'wsgi.input': BytesIO(b''),
|
|
|
|
})
|
2012-08-11 17:11:20 +08:00
|
|
|
self.assertEqual(list(request.GET.keys()), [])
|
|
|
|
self.assertEqual(list(request.POST.keys()), [])
|
|
|
|
self.assertEqual(list(request.COOKIES.keys()), [])
|
2015-08-07 13:51:39 +08:00
|
|
|
self.assertEqual(
|
|
|
|
set(request.META.keys()),
|
|
|
|
{'PATH_INFO', 'REQUEST_METHOD', 'SCRIPT_NAME', 'CONTENT_TYPE', 'wsgi.input'}
|
|
|
|
)
|
2010-09-28 19:54:58 +08:00
|
|
|
self.assertEqual(request.META['PATH_INFO'], 'bogus')
|
|
|
|
self.assertEqual(request.META['REQUEST_METHOD'], 'bogus')
|
|
|
|
self.assertEqual(request.META['SCRIPT_NAME'], '')
|
2015-08-07 13:51:39 +08:00
|
|
|
self.assertEqual(request.content_type, 'text/html')
|
|
|
|
self.assertEqual(request.content_params, {'charset': 'utf8'})
|
2010-09-13 04:52:49 +08:00
|
|
|
|
2013-03-31 15:54:52 +08:00
|
|
|
def test_wsgirequest_with_script_name(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
The request's path is correctly assembled, regardless of whether or
|
|
|
|
not the SCRIPT_NAME has a trailing slash (#20169).
|
2013-03-31 15:54:52 +08:00
|
|
|
"""
|
|
|
|
# With trailing slash
|
2015-09-12 07:33:12 +08:00
|
|
|
request = WSGIRequest({
|
|
|
|
'PATH_INFO': '/somepath/',
|
|
|
|
'SCRIPT_NAME': '/PREFIX/',
|
|
|
|
'REQUEST_METHOD': 'get',
|
|
|
|
'wsgi.input': BytesIO(b''),
|
|
|
|
})
|
2013-03-31 15:54:52 +08:00
|
|
|
self.assertEqual(request.path, '/PREFIX/somepath/')
|
|
|
|
# Without trailing slash
|
2015-09-12 07:33:12 +08:00
|
|
|
request = WSGIRequest({
|
|
|
|
'PATH_INFO': '/somepath/',
|
|
|
|
'SCRIPT_NAME': '/PREFIX',
|
|
|
|
'REQUEST_METHOD': 'get',
|
|
|
|
'wsgi.input': BytesIO(b''),
|
|
|
|
})
|
2013-03-31 15:54:52 +08:00
|
|
|
self.assertEqual(request.path, '/PREFIX/somepath/')
|
|
|
|
|
2015-10-23 20:53:32 +08:00
|
|
|
def test_wsgirequest_script_url_double_slashes(self):
|
|
|
|
"""
|
|
|
|
WSGI squashes multiple successive slashes in PATH_INFO, WSGIRequest
|
|
|
|
should take that into account when populating request.path and
|
2016-10-27 15:53:39 +08:00
|
|
|
request.META['SCRIPT_NAME'] (#17133).
|
2015-10-23 20:53:32 +08:00
|
|
|
"""
|
|
|
|
request = WSGIRequest({
|
|
|
|
'SCRIPT_URL': '/mst/milestones//accounts/login//help',
|
|
|
|
'PATH_INFO': '/milestones/accounts/login/help',
|
|
|
|
'REQUEST_METHOD': 'get',
|
|
|
|
'wsgi.input': BytesIO(b''),
|
|
|
|
})
|
|
|
|
self.assertEqual(request.path, '/mst/milestones/accounts/login/help')
|
|
|
|
self.assertEqual(request.META['SCRIPT_NAME'], '/mst')
|
|
|
|
|
2013-03-31 15:54:52 +08:00
|
|
|
def test_wsgirequest_with_force_script_name(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
The FORCE_SCRIPT_NAME setting takes precedence over the request's
|
|
|
|
SCRIPT_NAME environment parameter (#20169).
|
2013-03-31 15:54:52 +08:00
|
|
|
"""
|
|
|
|
with override_settings(FORCE_SCRIPT_NAME='/FORCED_PREFIX/'):
|
2015-09-12 07:33:12 +08:00
|
|
|
request = WSGIRequest({
|
|
|
|
'PATH_INFO': '/somepath/',
|
|
|
|
'SCRIPT_NAME': '/PREFIX/',
|
|
|
|
'REQUEST_METHOD': 'get',
|
|
|
|
'wsgi.input': BytesIO(b''),
|
|
|
|
})
|
2013-03-31 15:54:52 +08:00
|
|
|
self.assertEqual(request.path, '/FORCED_PREFIX/somepath/')
|
|
|
|
|
|
|
|
def test_wsgirequest_path_with_force_script_name_trailing_slash(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
The request's path is correctly assembled, regardless of whether or not
|
|
|
|
the FORCE_SCRIPT_NAME setting has a trailing slash (#20169).
|
2013-03-31 15:54:52 +08:00
|
|
|
"""
|
|
|
|
# With trailing slash
|
|
|
|
with override_settings(FORCE_SCRIPT_NAME='/FORCED_PREFIX/'):
|
|
|
|
request = WSGIRequest({'PATH_INFO': '/somepath/', 'REQUEST_METHOD': 'get', 'wsgi.input': BytesIO(b'')})
|
|
|
|
self.assertEqual(request.path, '/FORCED_PREFIX/somepath/')
|
|
|
|
# Without trailing slash
|
|
|
|
with override_settings(FORCE_SCRIPT_NAME='/FORCED_PREFIX'):
|
|
|
|
request = WSGIRequest({'PATH_INFO': '/somepath/', 'REQUEST_METHOD': 'get', 'wsgi.input': BytesIO(b'')})
|
|
|
|
self.assertEqual(request.path, '/FORCED_PREFIX/somepath/')
|
|
|
|
|
2011-06-10 07:15:42 +08:00
|
|
|
def test_wsgirequest_repr(self):
|
2014-11-20 17:28:16 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'get', 'wsgi.input': BytesIO(b'')})
|
2017-01-20 22:24:05 +08:00
|
|
|
self.assertEqual(repr(request), "<WSGIRequest: GET '/'>")
|
2012-08-11 17:11:20 +08:00
|
|
|
request = WSGIRequest({'PATH_INFO': '/somepath/', 'REQUEST_METHOD': 'get', 'wsgi.input': BytesIO(b'')})
|
2012-06-08 00:08:47 +08:00
|
|
|
request.GET = {'get-key': 'get-value'}
|
|
|
|
request.POST = {'post-key': 'post-value'}
|
|
|
|
request.COOKIES = {'post-key': 'post-value'}
|
|
|
|
request.META = {'post-key': 'post-value'}
|
2017-01-20 22:24:05 +08:00
|
|
|
self.assertEqual(repr(request), "<WSGIRequest: GET '/somepath/'>")
|
2011-06-10 07:15:42 +08:00
|
|
|
|
2012-12-17 17:49:26 +08:00
|
|
|
def test_wsgirequest_path_info(self):
|
2016-08-12 21:31:18 +08:00
|
|
|
def wsgi_str(path_info, encoding='utf-8'):
|
2016-12-01 18:38:01 +08:00
|
|
|
path_info = path_info.encode(encoding) # Actual URL sent by the browser (bytestring)
|
|
|
|
path_info = path_info.decode('iso-8859-1') # Value in the WSGI environ dict (native string)
|
2012-12-17 17:49:26 +08:00
|
|
|
return path_info
|
|
|
|
# Regression for #19468
|
|
|
|
request = WSGIRequest({'PATH_INFO': wsgi_str("/سلام/"), 'REQUEST_METHOD': 'get', 'wsgi.input': BytesIO(b'')})
|
|
|
|
self.assertEqual(request.path, "/سلام/")
|
|
|
|
|
2016-08-12 21:31:18 +08:00
|
|
|
# The URL may be incorrectly encoded in a non-UTF-8 encoding (#26971)
|
|
|
|
request = WSGIRequest({
|
|
|
|
'PATH_INFO': wsgi_str("/café/", encoding='iso-8859-1'),
|
|
|
|
'REQUEST_METHOD': 'get',
|
|
|
|
'wsgi.input': BytesIO(b''),
|
|
|
|
})
|
|
|
|
# Since it's impossible to decide the (wrong) encoding of the URL, it's
|
|
|
|
# left percent-encoded in the path.
|
|
|
|
self.assertEqual(request.path, "/caf%E9/")
|
|
|
|
|
2010-09-28 15:06:37 +08:00
|
|
|
def test_httprequest_location(self):
|
|
|
|
request = HttpRequest()
|
2016-04-08 10:04:45 +08:00
|
|
|
self.assertEqual(
|
|
|
|
request.build_absolute_uri(location="https://www.example.com/asdf"),
|
|
|
|
'https://www.example.com/asdf'
|
|
|
|
)
|
2010-09-28 15:06:37 +08:00
|
|
|
|
|
|
|
request.get_host = lambda: 'www.example.com'
|
|
|
|
request.path = ''
|
2016-04-08 10:04:45 +08:00
|
|
|
self.assertEqual(
|
|
|
|
request.build_absolute_uri(location="/path/with:colons"),
|
|
|
|
'http://www.example.com/path/with:colons'
|
|
|
|
)
|
2010-09-28 15:06:37 +08:00
|
|
|
|
|
|
|
def test_near_expiration(self):
|
|
|
|
"Cookie will expire when an near expiration time is provided"
|
|
|
|
response = HttpResponse()
|
|
|
|
# There is a timing weakness in this test; The
|
|
|
|
# expected result for max-age requires that there be
|
|
|
|
# a very slight difference between the evaluated expiration
|
|
|
|
# time, and the time evaluated in set_cookie(). If this
|
|
|
|
# difference doesn't exist, the cookie time will be
|
|
|
|
# 1 second larger. To avoid the problem, put in a quick sleep,
|
|
|
|
# which guarantees that there will be a time difference.
|
|
|
|
expires = datetime.utcnow() + timedelta(seconds=10)
|
|
|
|
time.sleep(0.001)
|
|
|
|
response.set_cookie('datetime', expires=expires)
|
|
|
|
datetime_cookie = response.cookies['datetime']
|
2010-09-28 19:54:58 +08:00
|
|
|
self.assertEqual(datetime_cookie['max-age'], 10)
|
2010-09-28 15:06:37 +08:00
|
|
|
|
2012-03-19 04:58:22 +08:00
|
|
|
def test_aware_expiration(self):
|
|
|
|
"Cookie accepts an aware datetime as expiration time"
|
|
|
|
response = HttpResponse()
|
|
|
|
expires = (datetime.utcnow() + timedelta(seconds=10)).replace(tzinfo=utc)
|
|
|
|
time.sleep(0.001)
|
|
|
|
response.set_cookie('datetime', expires=expires)
|
|
|
|
datetime_cookie = response.cookies['datetime']
|
|
|
|
self.assertEqual(datetime_cookie['max-age'], 10)
|
|
|
|
|
2015-10-31 06:05:11 +08:00
|
|
|
def test_create_cookie_after_deleting_cookie(self):
|
|
|
|
"""
|
|
|
|
Setting a cookie after deletion should clear the expiry date.
|
|
|
|
"""
|
|
|
|
response = HttpResponse()
|
|
|
|
response.set_cookie('c', 'old-value')
|
|
|
|
self.assertEqual(response.cookies['c']['expires'], '')
|
|
|
|
response.delete_cookie('c')
|
|
|
|
self.assertEqual(response.cookies['c']['expires'], 'Thu, 01-Jan-1970 00:00:00 GMT')
|
|
|
|
response.set_cookie('c', 'new-value')
|
|
|
|
self.assertEqual(response.cookies['c']['expires'], '')
|
|
|
|
|
2010-09-28 15:06:37 +08:00
|
|
|
def test_far_expiration(self):
|
|
|
|
"Cookie will expire when an distant expiration time is provided"
|
|
|
|
response = HttpResponse()
|
|
|
|
response.set_cookie('datetime', expires=datetime(2028, 1, 1, 4, 5, 6))
|
|
|
|
datetime_cookie = response.cookies['datetime']
|
2014-12-30 23:23:42 +08:00
|
|
|
self.assertIn(
|
|
|
|
datetime_cookie['expires'],
|
2016-10-27 15:53:39 +08:00
|
|
|
# assertIn accounts for slight time dependency (#23450)
|
2014-12-30 23:23:42 +08:00
|
|
|
('Sat, 01-Jan-2028 04:05:06 GMT', 'Sat, 01-Jan-2028 04:05:07 GMT')
|
|
|
|
)
|
2010-09-28 15:06:37 +08:00
|
|
|
|
|
|
|
def test_max_age_expiration(self):
|
|
|
|
"Cookie will expire if max_age is provided"
|
|
|
|
response = HttpResponse()
|
2016-02-12 14:54:23 +08:00
|
|
|
set_cookie_time = time.time()
|
|
|
|
with freeze_time(set_cookie_time):
|
|
|
|
response.set_cookie('max_age', max_age=10)
|
2010-09-28 15:06:37 +08:00
|
|
|
max_age_cookie = response.cookies['max_age']
|
|
|
|
self.assertEqual(max_age_cookie['max-age'], 10)
|
2016-02-12 14:54:23 +08:00
|
|
|
self.assertEqual(max_age_cookie['expires'], cookie_date(set_cookie_time + 10))
|
2010-10-30 00:39:25 +08:00
|
|
|
|
2010-11-26 21:30:50 +08:00
|
|
|
def test_httponly_cookie(self):
|
|
|
|
response = HttpResponse()
|
|
|
|
response.set_cookie('example', httponly=True)
|
|
|
|
example_cookie = response.cookies['example']
|
|
|
|
# A compat cookie may be in use -- check that it has worked
|
|
|
|
# both as an output string, and using the cookie attributes
|
2017-01-07 19:11:46 +08:00
|
|
|
self.assertIn('; %s' % cookies.Morsel._reserved['httponly'], str(example_cookie))
|
2010-11-26 21:30:50 +08:00
|
|
|
self.assertTrue(example_cookie['httponly'])
|
|
|
|
|
2014-08-02 00:29:59 +08:00
|
|
|
def test_unicode_cookie(self):
|
|
|
|
"Verify HttpResponse.set_cookie() works with unicode data."
|
|
|
|
response = HttpResponse()
|
|
|
|
cookie_value = '清風'
|
|
|
|
response.set_cookie('test', cookie_value)
|
2017-01-12 06:17:25 +08:00
|
|
|
self.assertEqual(cookie_value, response.cookies['test'].value)
|
2014-08-02 00:29:59 +08:00
|
|
|
|
2010-10-30 00:39:25 +08:00
|
|
|
def test_limited_stream(self):
|
|
|
|
# Read all of a limited stream
|
2012-08-11 17:11:20 +08:00
|
|
|
stream = LimitedStream(BytesIO(b'test'), 2)
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.read(), b'te')
|
2011-01-16 15:31:35 +08:00
|
|
|
# Reading again returns nothing.
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.read(), b'')
|
2010-10-30 00:39:25 +08:00
|
|
|
|
|
|
|
# Read a number of characters greater than the stream has to offer
|
2012-08-11 17:11:20 +08:00
|
|
|
stream = LimitedStream(BytesIO(b'test'), 2)
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.read(5), b'te')
|
2011-01-16 15:31:35 +08:00
|
|
|
# Reading again returns nothing.
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(5), b'')
|
2010-10-30 00:39:25 +08:00
|
|
|
|
|
|
|
# Read sequentially from a stream
|
2012-08-11 17:11:20 +08:00
|
|
|
stream = LimitedStream(BytesIO(b'12345678'), 8)
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.read(5), b'12345')
|
|
|
|
self.assertEqual(stream.read(5), b'678')
|
2011-01-16 15:31:35 +08:00
|
|
|
# Reading again returns nothing.
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(5), b'')
|
2010-10-30 00:39:25 +08:00
|
|
|
|
|
|
|
# Read lines from a stream
|
2012-08-11 17:11:20 +08:00
|
|
|
stream = LimitedStream(BytesIO(b'1234\n5678\nabcd\nefgh\nijkl'), 24)
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read a full line, unconditionally
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(), b'1234\n')
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read a number of characters less than a line
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(2), b'56')
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read the rest of the partial line
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(), b'78\n')
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read a full line, with a character limit greater than the line length
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(6), b'abcd\n')
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read the next line, deliberately terminated at the line end
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(4), b'efgh')
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read the next line... just the line end
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(), b'\n')
|
2010-10-30 00:39:25 +08:00
|
|
|
# Read everything else.
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(), b'ijkl')
|
2010-10-30 00:39:25 +08:00
|
|
|
|
2011-01-16 15:31:35 +08:00
|
|
|
# Regression for #15018
|
|
|
|
# If a stream contains a newline, but the provided length
|
|
|
|
# is less than the number of provided characters, the newline
|
|
|
|
# doesn't reset the available character count
|
2012-08-11 17:11:20 +08:00
|
|
|
stream = LimitedStream(BytesIO(b'1234\nabcdef'), 9)
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(10), b'1234\n')
|
|
|
|
self.assertEqual(stream.readline(3), b'abc')
|
2011-01-16 15:31:35 +08:00
|
|
|
# Now expire the available characters
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(3), b'd')
|
2011-01-16 15:31:35 +08:00
|
|
|
# Reading again returns nothing.
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.readline(2), b'')
|
2011-01-16 15:31:35 +08:00
|
|
|
|
|
|
|
# Same test, but with read, not readline.
|
2012-08-11 17:11:20 +08:00
|
|
|
stream = LimitedStream(BytesIO(b'1234\nabcdef'), 9)
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(stream.read(6), b'1234\na')
|
|
|
|
self.assertEqual(stream.read(2), b'bc')
|
|
|
|
self.assertEqual(stream.read(2), b'd')
|
|
|
|
self.assertEqual(stream.read(2), b'')
|
|
|
|
self.assertEqual(stream.read(), b'')
|
2011-01-16 15:31:35 +08:00
|
|
|
|
2010-10-30 00:39:25 +08:00
|
|
|
def test_stream(self):
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload('name=value')
|
2011-06-28 18:17:56 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2011-06-28 18:17:56 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(request.read(), b'name=value')
|
2010-10-30 00:39:25 +08:00
|
|
|
|
|
|
|
def test_read_after_value(self):
|
|
|
|
"""
|
|
|
|
Reading from request is allowed after accessing request contents as
|
2011-12-17 07:40:32 +08:00
|
|
|
POST or body.
|
2010-10-30 00:39:25 +08:00
|
|
|
"""
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload('name=value')
|
2011-06-28 18:17:56 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2011-06-28 18:17:56 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2012-06-08 00:08:47 +08:00
|
|
|
self.assertEqual(request.POST, {'name': ['value']})
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(request.body, b'name=value')
|
|
|
|
self.assertEqual(request.read(), b'name=value')
|
2010-10-30 00:39:25 +08:00
|
|
|
|
|
|
|
def test_value_after_read(self):
|
|
|
|
"""
|
2011-12-17 07:40:32 +08:00
|
|
|
Construction of POST or body is not allowed after reading
|
2010-10-30 00:39:25 +08:00
|
|
|
from request.
|
|
|
|
"""
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload('name=value')
|
2011-06-28 18:17:56 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2011-06-28 18:17:56 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(request.read(2), b'na')
|
2016-01-17 19:26:39 +08:00
|
|
|
with self.assertRaises(RawPostDataException):
|
|
|
|
request.body
|
2010-10-30 00:39:25 +08:00
|
|
|
self.assertEqual(request.POST, {})
|
|
|
|
|
2012-11-03 19:54:06 +08:00
|
|
|
def test_non_ascii_POST(self):
|
|
|
|
payload = FakePayload(urlencode({'key': 'España'}))
|
|
|
|
request = WSGIRequest({
|
|
|
|
'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
|
|
|
'wsgi.input': payload,
|
|
|
|
})
|
|
|
|
self.assertEqual(request.POST, {'key': ['España']})
|
|
|
|
|
2012-10-30 03:33:00 +08:00
|
|
|
def test_alternate_charset_POST(self):
|
|
|
|
"""
|
|
|
|
Test a POST with non-utf-8 payload encoding.
|
|
|
|
"""
|
2017-01-26 21:25:15 +08:00
|
|
|
payload = FakePayload(urlencode({'key': 'España'.encode('latin-1')}))
|
2012-10-30 03:33:00 +08:00
|
|
|
request = WSGIRequest({
|
|
|
|
'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded; charset=iso-8859-1',
|
|
|
|
'wsgi.input': payload,
|
|
|
|
})
|
|
|
|
self.assertEqual(request.POST, {'key': ['España']})
|
|
|
|
|
2013-05-18 18:26:38 +08:00
|
|
|
def test_body_after_POST_multipart_form_data(self):
|
2011-03-29 00:11:40 +08:00
|
|
|
"""
|
2013-05-18 18:26:38 +08:00
|
|
|
Reading body after parsing multipart/form-data is not allowed
|
2011-03-29 00:11:40 +08:00
|
|
|
"""
|
2015-01-20 22:54:12 +08:00
|
|
|
# Because multipart is used for large amounts of data i.e. file uploads,
|
2011-03-29 00:11:40 +08:00
|
|
|
# we don't want the data held in memory twice, and we don't want to
|
2011-12-17 07:40:32 +08:00
|
|
|
# silence the error by setting body = '' either.
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload("\r\n".join([
|
2013-10-20 07:33:10 +08:00
|
|
|
'--boundary',
|
|
|
|
'Content-Disposition: form-data; name="name"',
|
|
|
|
'',
|
|
|
|
'value',
|
|
|
|
'--boundary--'
|
|
|
|
'']))
|
2011-03-29 00:11:40 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'multipart/form-data; boundary=boundary',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2012-06-08 00:08:47 +08:00
|
|
|
self.assertEqual(request.POST, {'name': ['value']})
|
2016-01-17 19:26:39 +08:00
|
|
|
with self.assertRaises(RawPostDataException):
|
|
|
|
request.body
|
2011-03-29 00:11:40 +08:00
|
|
|
|
2013-05-18 18:26:38 +08:00
|
|
|
def test_body_after_POST_multipart_related(self):
|
|
|
|
"""
|
|
|
|
Reading body after parsing multipart that isn't form-data is allowed
|
|
|
|
"""
|
|
|
|
# Ticket #9054
|
|
|
|
# There are cases in which the multipart data is related instead of
|
|
|
|
# being a binary upload, in which case it should still be accessible
|
|
|
|
# via body.
|
2013-05-18 19:34:08 +08:00
|
|
|
payload_data = b"\r\n".join([
|
2013-10-20 07:33:10 +08:00
|
|
|
b'--boundary',
|
|
|
|
b'Content-ID: id; name="name"',
|
|
|
|
b'',
|
|
|
|
b'value',
|
|
|
|
b'--boundary--'
|
|
|
|
b''])
|
2013-05-18 18:26:38 +08:00
|
|
|
payload = FakePayload(payload_data)
|
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'multipart/related; boundary=boundary',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'wsgi.input': payload})
|
|
|
|
self.assertEqual(request.POST, {})
|
|
|
|
self.assertEqual(request.body, payload_data)
|
|
|
|
|
2011-06-10 16:39:38 +08:00
|
|
|
def test_POST_multipart_with_content_length_zero(self):
|
|
|
|
"""
|
|
|
|
Multipart POST requests with Content-Length >= 0 are valid and need to be handled.
|
|
|
|
"""
|
|
|
|
# According to:
|
|
|
|
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.13
|
|
|
|
# Every request.POST with Content-Length >= 0 is a valid request,
|
|
|
|
# this test ensures that we handle Content-Length == 0.
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload("\r\n".join([
|
2013-10-20 07:33:10 +08:00
|
|
|
'--boundary',
|
|
|
|
'Content-Disposition: form-data; name="name"',
|
|
|
|
'',
|
|
|
|
'value',
|
|
|
|
'--boundary--'
|
|
|
|
'']))
|
2011-06-10 16:39:38 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'multipart/form-data; boundary=boundary',
|
|
|
|
'CONTENT_LENGTH': 0,
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2011-06-10 16:39:38 +08:00
|
|
|
self.assertEqual(request.POST, {})
|
|
|
|
|
2012-10-20 20:33:57 +08:00
|
|
|
def test_POST_binary_only(self):
|
|
|
|
payload = b'\r\n\x01\x00\x00\x00ab\x00\x00\xcd\xcc,@'
|
|
|
|
environ = {'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'application/octet-stream',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'wsgi.input': BytesIO(payload)}
|
|
|
|
request = WSGIRequest(environ)
|
|
|
|
self.assertEqual(request.POST, {})
|
|
|
|
self.assertEqual(request.FILES, {})
|
|
|
|
self.assertEqual(request.body, payload)
|
|
|
|
|
|
|
|
# Same test without specifying content-type
|
|
|
|
environ.update({'CONTENT_TYPE': '', 'wsgi.input': BytesIO(payload)})
|
|
|
|
request = WSGIRequest(environ)
|
|
|
|
self.assertEqual(request.POST, {})
|
|
|
|
self.assertEqual(request.FILES, {})
|
|
|
|
self.assertEqual(request.body, payload)
|
|
|
|
|
2010-10-30 00:39:25 +08:00
|
|
|
def test_read_by_lines(self):
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload('name=value')
|
2011-06-28 18:17:56 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2011-06-28 18:17:56 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(list(request), [b'name=value'])
|
2011-03-29 00:11:40 +08:00
|
|
|
|
2011-12-17 07:40:32 +08:00
|
|
|
def test_POST_after_body_read(self):
|
2011-03-29 00:11:40 +08:00
|
|
|
"""
|
2011-12-17 07:40:32 +08:00
|
|
|
POST should be populated even if body is read first
|
2011-03-29 00:11:40 +08:00
|
|
|
"""
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload('name=value')
|
2011-06-28 18:17:56 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2011-06-28 18:17:56 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2013-10-19 20:31:38 +08:00
|
|
|
request.body # evaluate
|
2012-06-08 00:08:47 +08:00
|
|
|
self.assertEqual(request.POST, {'name': ['value']})
|
2011-03-29 00:11:40 +08:00
|
|
|
|
2011-12-17 07:40:32 +08:00
|
|
|
def test_POST_after_body_read_and_stream_read(self):
|
2011-03-29 00:11:40 +08:00
|
|
|
"""
|
2011-12-17 07:40:32 +08:00
|
|
|
POST should be populated even if body is read first, and then
|
2011-03-29 00:11:40 +08:00
|
|
|
the stream is read second.
|
|
|
|
"""
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload('name=value')
|
2011-06-28 18:17:56 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2011-06-28 18:17:56 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2013-10-19 20:31:38 +08:00
|
|
|
request.body # evaluate
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(request.read(1), b'n')
|
2012-06-08 00:08:47 +08:00
|
|
|
self.assertEqual(request.POST, {'name': ['value']})
|
2011-03-29 00:11:40 +08:00
|
|
|
|
2011-12-17 07:40:32 +08:00
|
|
|
def test_POST_after_body_read_and_stream_read_multipart(self):
|
2011-03-29 00:11:40 +08:00
|
|
|
"""
|
2011-12-17 07:40:32 +08:00
|
|
|
POST should be populated even if body is read first, and then
|
2011-03-29 00:11:40 +08:00
|
|
|
the stream is read second. Using multipart/form-data instead of urlencoded.
|
|
|
|
"""
|
2012-10-20 21:53:28 +08:00
|
|
|
payload = FakePayload("\r\n".join([
|
2013-10-20 07:33:10 +08:00
|
|
|
'--boundary',
|
|
|
|
'Content-Disposition: form-data; name="name"',
|
|
|
|
'',
|
|
|
|
'value',
|
|
|
|
'--boundary--'
|
|
|
|
'']))
|
2011-03-29 00:11:40 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'multipart/form-data; boundary=boundary',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-10-20 21:53:28 +08:00
|
|
|
'wsgi.input': payload})
|
2013-10-19 20:31:38 +08:00
|
|
|
request.body # evaluate
|
2011-03-29 00:11:40 +08:00
|
|
|
# Consume enough data to mess up the parsing:
|
2012-05-19 23:43:34 +08:00
|
|
|
self.assertEqual(request.read(13), b'--boundary\r\nC')
|
2012-06-08 00:08:47 +08:00
|
|
|
self.assertEqual(request.POST, {'name': ['value']})
|
2011-12-17 07:40:32 +08:00
|
|
|
|
2016-11-16 21:22:38 +08:00
|
|
|
def test_POST_immutable_for_mutipart(self):
|
|
|
|
"""
|
|
|
|
MultiPartParser.parse() leaves request.POST immutable.
|
|
|
|
"""
|
|
|
|
payload = FakePayload("\r\n".join([
|
|
|
|
'--boundary',
|
|
|
|
'Content-Disposition: form-data; name="name"',
|
|
|
|
'',
|
|
|
|
'value',
|
|
|
|
'--boundary--',
|
|
|
|
]))
|
|
|
|
request = WSGIRequest({
|
|
|
|
'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'multipart/form-data; boundary=boundary',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'wsgi.input': payload,
|
|
|
|
})
|
|
|
|
self.assertFalse(request.POST._mutable)
|
|
|
|
|
2012-02-11 06:51:07 +08:00
|
|
|
def test_POST_connection_error(self):
|
|
|
|
"""
|
|
|
|
If wsgi.input.read() raises an exception while trying to read() the
|
|
|
|
POST, the exception should be identifiable (not a generic IOError).
|
|
|
|
"""
|
2012-08-11 17:11:20 +08:00
|
|
|
class ExplodingBytesIO(BytesIO):
|
2012-02-11 06:51:07 +08:00
|
|
|
def read(self, len=0):
|
|
|
|
raise IOError("kaboom!")
|
|
|
|
|
2012-05-19 23:43:34 +08:00
|
|
|
payload = b'name=value'
|
2012-02-11 06:51:07 +08:00
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
2012-10-20 20:33:57 +08:00
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
2012-02-11 06:51:07 +08:00
|
|
|
'CONTENT_LENGTH': len(payload),
|
2012-08-11 17:11:20 +08:00
|
|
|
'wsgi.input': ExplodingBytesIO(payload)})
|
2012-02-11 06:51:07 +08:00
|
|
|
|
2012-12-25 06:20:38 +08:00
|
|
|
with self.assertRaises(UnreadablePostError):
|
|
|
|
request.body
|
2013-02-06 05:52:29 +08:00
|
|
|
|
2016-08-31 04:26:28 +08:00
|
|
|
def test_set_encoding_clears_POST(self):
|
|
|
|
payload = FakePayload('name=Hello Günter')
|
|
|
|
request = WSGIRequest({
|
|
|
|
'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'application/x-www-form-urlencoded',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'wsgi.input': payload,
|
|
|
|
})
|
|
|
|
self.assertEqual(request.POST, {'name': ['Hello Günter']})
|
|
|
|
request.encoding = 'iso-8859-16'
|
|
|
|
self.assertEqual(request.POST, {'name': ['Hello GĂŒnter']})
|
|
|
|
|
2016-11-18 01:46:42 +08:00
|
|
|
def test_set_encoding_clears_GET(self):
|
|
|
|
request = WSGIRequest({
|
|
|
|
'REQUEST_METHOD': 'GET',
|
|
|
|
'wsgi.input': '',
|
2016-12-01 18:38:01 +08:00
|
|
|
'QUERY_STRING': 'name=Hello%20G%C3%BCnter',
|
2016-11-18 01:46:42 +08:00
|
|
|
})
|
|
|
|
self.assertEqual(request.GET, {'name': ['Hello Günter']})
|
|
|
|
request.encoding = 'iso-8859-16'
|
|
|
|
self.assertEqual(request.GET, {'name': ['Hello G\u0102\u0152nter']})
|
|
|
|
|
2013-06-01 16:26:46 +08:00
|
|
|
def test_FILES_connection_error(self):
|
|
|
|
"""
|
|
|
|
If wsgi.input.read() raises an exception while trying to read() the
|
|
|
|
FILES, the exception should be identifiable (not a generic IOError).
|
|
|
|
"""
|
|
|
|
class ExplodingBytesIO(BytesIO):
|
|
|
|
def read(self, len=0):
|
|
|
|
raise IOError("kaboom!")
|
|
|
|
|
|
|
|
payload = b'x'
|
|
|
|
request = WSGIRequest({'REQUEST_METHOD': 'POST',
|
|
|
|
'CONTENT_TYPE': 'multipart/form-data; boundary=foo_',
|
|
|
|
'CONTENT_LENGTH': len(payload),
|
|
|
|
'wsgi.input': ExplodingBytesIO(payload)})
|
|
|
|
|
|
|
|
with self.assertRaises(UnreadablePostError):
|
|
|
|
request.FILES
|
|
|
|
|
2015-09-04 02:52:49 +08:00
|
|
|
@override_settings(ALLOWED_HOSTS=['example.com'])
|
|
|
|
def test_get_raw_uri(self):
|
|
|
|
factory = RequestFactory(HTTP_HOST='evil.com')
|
|
|
|
request = factory.get('////absolute-uri')
|
|
|
|
self.assertEqual(request.get_raw_uri(), 'http://evil.com//absolute-uri')
|
|
|
|
|
|
|
|
request = factory.get('/?foo=bar')
|
|
|
|
self.assertEqual(request.get_raw_uri(), 'http://evil.com/?foo=bar')
|
|
|
|
|
|
|
|
request = factory.get('/path/with:colons')
|
|
|
|
self.assertEqual(request.get_raw_uri(), 'http://evil.com/path/with:colons')
|
|
|
|
|
2013-03-01 00:05:25 +08:00
|
|
|
|
2013-07-13 16:16:40 +08:00
|
|
|
class HostValidationTests(SimpleTestCase):
|
|
|
|
poisoned_hosts = [
|
|
|
|
'example.com@evil.tld',
|
|
|
|
'example.com:dr.frankenstein@evil.tld',
|
|
|
|
'example.com:dr.frankenstein@evil.tld:80',
|
|
|
|
'example.com:80/badpath',
|
|
|
|
'example.com: recovermypassword.com',
|
|
|
|
]
|
|
|
|
|
|
|
|
@override_settings(
|
|
|
|
USE_X_FORWARDED_HOST=False,
|
|
|
|
ALLOWED_HOSTS=[
|
|
|
|
'forward.com', 'example.com', 'internal.com', '12.34.56.78',
|
|
|
|
'[2001:19f0:feee::dead:beef:cafe]', 'xn--4ca9at.com',
|
2016-08-11 22:41:10 +08:00
|
|
|
'.multitenant.com', 'INSENSITIVE.com', '[::ffff:169.254.169.254]',
|
2013-10-18 17:02:43 +08:00
|
|
|
])
|
2013-07-13 16:16:40 +08:00
|
|
|
def test_http_get_host(self):
|
|
|
|
# Check if X_FORWARDED_HOST is provided.
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_X_FORWARDED_HOST': 'forward.com',
|
|
|
|
'HTTP_HOST': 'example.com',
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 80,
|
|
|
|
}
|
|
|
|
# X_FORWARDED_HOST is ignored.
|
|
|
|
self.assertEqual(request.get_host(), 'example.com')
|
|
|
|
|
|
|
|
# Check if X_FORWARDED_HOST isn't provided.
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_HOST': 'example.com',
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 80,
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_host(), 'example.com')
|
|
|
|
|
|
|
|
# Check if HTTP_HOST isn't provided.
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 80,
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_host(), 'internal.com')
|
|
|
|
|
|
|
|
# Check if HTTP_HOST isn't provided, and we're on a nonstandard port
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 8042,
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_host(), 'internal.com:8042')
|
|
|
|
|
|
|
|
legit_hosts = [
|
|
|
|
'example.com',
|
|
|
|
'example.com:80',
|
|
|
|
'12.34.56.78',
|
|
|
|
'12.34.56.78:443',
|
|
|
|
'[2001:19f0:feee::dead:beef:cafe]',
|
|
|
|
'[2001:19f0:feee::dead:beef:cafe]:8080',
|
2015-12-03 07:55:50 +08:00
|
|
|
'xn--4ca9at.com', # Punycode for öäü.com
|
2013-07-13 16:16:40 +08:00
|
|
|
'anything.multitenant.com',
|
|
|
|
'multitenant.com',
|
|
|
|
'insensitive.com',
|
2013-10-25 01:34:40 +08:00
|
|
|
'example.com.',
|
|
|
|
'example.com.:80',
|
2016-08-11 22:41:10 +08:00
|
|
|
'[::ffff:169.254.169.254]',
|
2013-07-13 16:16:40 +08:00
|
|
|
]
|
|
|
|
|
|
|
|
for host in legit_hosts:
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_HOST': host,
|
|
|
|
}
|
|
|
|
request.get_host()
|
|
|
|
|
|
|
|
# Poisoned host headers are rejected as suspicious
|
2013-10-25 01:34:40 +08:00
|
|
|
for host in chain(self.poisoned_hosts, ['other.com', 'example.com..']):
|
2013-07-13 16:16:40 +08:00
|
|
|
with self.assertRaises(SuspiciousOperation):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_HOST': host,
|
|
|
|
}
|
|
|
|
request.get_host()
|
|
|
|
|
|
|
|
@override_settings(USE_X_FORWARDED_HOST=True, ALLOWED_HOSTS=['*'])
|
|
|
|
def test_http_get_host_with_x_forwarded_host(self):
|
|
|
|
# Check if X_FORWARDED_HOST is provided.
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_X_FORWARDED_HOST': 'forward.com',
|
|
|
|
'HTTP_HOST': 'example.com',
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 80,
|
|
|
|
}
|
|
|
|
# X_FORWARDED_HOST is obeyed.
|
|
|
|
self.assertEqual(request.get_host(), 'forward.com')
|
|
|
|
|
|
|
|
# Check if X_FORWARDED_HOST isn't provided.
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_HOST': 'example.com',
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 80,
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_host(), 'example.com')
|
|
|
|
|
|
|
|
# Check if HTTP_HOST isn't provided.
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 80,
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_host(), 'internal.com')
|
|
|
|
|
|
|
|
# Check if HTTP_HOST isn't provided, and we're on a nonstandard port
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_NAME': 'internal.com',
|
|
|
|
'SERVER_PORT': 8042,
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_host(), 'internal.com:8042')
|
|
|
|
|
|
|
|
# Poisoned host headers are rejected as suspicious
|
|
|
|
legit_hosts = [
|
|
|
|
'example.com',
|
|
|
|
'example.com:80',
|
|
|
|
'12.34.56.78',
|
|
|
|
'12.34.56.78:443',
|
|
|
|
'[2001:19f0:feee::dead:beef:cafe]',
|
|
|
|
'[2001:19f0:feee::dead:beef:cafe]:8080',
|
2015-12-03 07:55:50 +08:00
|
|
|
'xn--4ca9at.com', # Punycode for öäü.com
|
2013-07-13 16:16:40 +08:00
|
|
|
]
|
|
|
|
|
|
|
|
for host in legit_hosts:
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_HOST': host,
|
|
|
|
}
|
|
|
|
request.get_host()
|
|
|
|
|
|
|
|
for host in self.poisoned_hosts:
|
|
|
|
with self.assertRaises(SuspiciousOperation):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'HTTP_HOST': host,
|
|
|
|
}
|
|
|
|
request.get_host()
|
|
|
|
|
2015-08-03 07:56:54 +08:00
|
|
|
@override_settings(USE_X_FORWARDED_PORT=False)
|
|
|
|
def test_get_port(self):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'HTTP_X_FORWARDED_PORT': '80',
|
|
|
|
}
|
|
|
|
# Shouldn't use the X-Forwarded-Port header
|
|
|
|
self.assertEqual(request.get_port(), '8080')
|
|
|
|
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_port(), '8080')
|
|
|
|
|
|
|
|
@override_settings(USE_X_FORWARDED_PORT=True)
|
|
|
|
def test_get_port_with_x_forwarded_port(self):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'HTTP_X_FORWARDED_PORT': '80',
|
|
|
|
}
|
|
|
|
# Should use the X-Forwarded-Port header
|
|
|
|
self.assertEqual(request.get_port(), '80')
|
|
|
|
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
}
|
|
|
|
self.assertEqual(request.get_port(), '8080')
|
|
|
|
|
2013-07-13 16:16:40 +08:00
|
|
|
@override_settings(DEBUG=True, ALLOWED_HOSTS=[])
|
2016-10-18 00:14:49 +08:00
|
|
|
def test_host_validation_in_debug_mode(self):
|
|
|
|
"""
|
|
|
|
If ALLOWED_HOSTS is empty and DEBUG is True, variants of localhost are
|
|
|
|
allowed.
|
|
|
|
"""
|
|
|
|
valid_hosts = ['localhost', '127.0.0.1', '[::1]']
|
|
|
|
for host in valid_hosts:
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {'HTTP_HOST': host}
|
|
|
|
self.assertEqual(request.get_host(), host)
|
2013-07-13 16:16:40 +08:00
|
|
|
|
2016-10-18 00:14:49 +08:00
|
|
|
# Other hostnames raise a SuspiciousOperation.
|
|
|
|
with self.assertRaises(SuspiciousOperation):
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {'HTTP_HOST': 'example.com'}
|
|
|
|
request.get_host()
|
2013-07-13 16:16:40 +08:00
|
|
|
|
|
|
|
@override_settings(ALLOWED_HOSTS=[])
|
|
|
|
def test_get_host_suggestion_of_allowed_host(self):
|
|
|
|
"""get_host() makes helpful suggestions if a valid-looking host is not in ALLOWED_HOSTS."""
|
|
|
|
msg_invalid_host = "Invalid HTTP_HOST header: %r."
|
2014-07-06 08:20:19 +08:00
|
|
|
msg_suggestion = msg_invalid_host + " You may need to add %r to ALLOWED_HOSTS."
|
|
|
|
msg_suggestion2 = msg_invalid_host + " The domain name provided is not valid according to RFC 1034/1035"
|
2013-07-13 16:16:40 +08:00
|
|
|
|
2013-11-03 05:02:56 +08:00
|
|
|
for host in [ # Valid-looking hosts
|
2013-07-13 16:16:40 +08:00
|
|
|
'example.com',
|
|
|
|
'12.34.56.78',
|
|
|
|
'[2001:19f0:feee::dead:beef:cafe]',
|
2015-12-03 07:55:50 +08:00
|
|
|
'xn--4ca9at.com', # Punycode for öäü.com
|
2013-07-13 16:16:40 +08:00
|
|
|
]:
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {'HTTP_HOST': host}
|
2016-01-04 16:50:08 +08:00
|
|
|
with self.assertRaisesMessage(SuspiciousOperation, msg_suggestion % (host, host)):
|
|
|
|
request.get_host()
|
2013-07-13 16:16:40 +08:00
|
|
|
|
2013-11-03 05:02:56 +08:00
|
|
|
for domain, port in [ # Valid-looking hosts with a port number
|
2013-07-13 16:16:40 +08:00
|
|
|
('example.com', 80),
|
|
|
|
('12.34.56.78', 443),
|
|
|
|
('[2001:19f0:feee::dead:beef:cafe]', 8080),
|
|
|
|
]:
|
|
|
|
host = '%s:%s' % (domain, port)
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {'HTTP_HOST': host}
|
2016-01-04 16:50:08 +08:00
|
|
|
with self.assertRaisesMessage(SuspiciousOperation, msg_suggestion % (host, domain)):
|
|
|
|
request.get_host()
|
2013-07-13 16:16:40 +08:00
|
|
|
|
|
|
|
for host in self.poisoned_hosts:
|
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {'HTTP_HOST': host}
|
2016-01-04 16:50:08 +08:00
|
|
|
with self.assertRaisesMessage(SuspiciousOperation, msg_invalid_host % host):
|
|
|
|
request.get_host()
|
2013-07-13 16:16:40 +08:00
|
|
|
|
2013-03-28 00:37:08 +08:00
|
|
|
request = HttpRequest()
|
|
|
|
request.META = {'HTTP_HOST': "invalid_hostname.com"}
|
2016-01-04 16:50:08 +08:00
|
|
|
with self.assertRaisesMessage(SuspiciousOperation, msg_suggestion2 % "invalid_hostname.com"):
|
|
|
|
request.get_host()
|
2013-11-04 07:34:11 +08:00
|
|
|
|
2016-11-30 07:17:10 +08:00
|
|
|
def test_split_domain_port_removes_trailing_dot(self):
|
|
|
|
domain, port = split_domain_port('example.com.:8080')
|
|
|
|
self.assertEqual(domain, 'example.com')
|
|
|
|
self.assertEqual(port, '8080')
|
|
|
|
|
2013-11-04 07:34:11 +08:00
|
|
|
|
|
|
|
class BuildAbsoluteURITestCase(SimpleTestCase):
|
|
|
|
"""
|
|
|
|
Regression tests for ticket #18314.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.factory = RequestFactory()
|
|
|
|
|
|
|
|
def test_build_absolute_uri_no_location(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
``request.build_absolute_uri()`` returns the proper value when
|
|
|
|
the ``location`` argument is not provided, and ``request.path``
|
2013-11-04 07:34:11 +08:00
|
|
|
begins with //.
|
|
|
|
"""
|
|
|
|
# //// is needed to create a request with a path beginning with //
|
|
|
|
request = self.factory.get('////absolute-uri')
|
|
|
|
self.assertEqual(
|
|
|
|
request.build_absolute_uri(),
|
|
|
|
'http://testserver//absolute-uri'
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_build_absolute_uri_absolute_location(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
``request.build_absolute_uri()`` returns the proper value when
|
|
|
|
an absolute URL ``location`` argument is provided, and ``request.path``
|
|
|
|
begins with //.
|
2013-11-04 07:34:11 +08:00
|
|
|
"""
|
|
|
|
# //// is needed to create a request with a path beginning with //
|
|
|
|
request = self.factory.get('////absolute-uri')
|
|
|
|
self.assertEqual(
|
|
|
|
request.build_absolute_uri(location='http://example.com/?foo=bar'),
|
|
|
|
'http://example.com/?foo=bar'
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_build_absolute_uri_schema_relative_location(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
``request.build_absolute_uri()`` returns the proper value when
|
|
|
|
a schema-relative URL ``location`` argument is provided, and
|
2013-11-04 07:34:11 +08:00
|
|
|
``request.path`` begins with //.
|
|
|
|
"""
|
|
|
|
# //// is needed to create a request with a path beginning with //
|
|
|
|
request = self.factory.get('////absolute-uri')
|
|
|
|
self.assertEqual(
|
|
|
|
request.build_absolute_uri(location='//example.com/?foo=bar'),
|
|
|
|
'http://example.com/?foo=bar'
|
|
|
|
)
|
|
|
|
|
|
|
|
def test_build_absolute_uri_relative_location(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
``request.build_absolute_uri()`` returns the proper value when
|
|
|
|
a relative URL ``location`` argument is provided, and ``request.path``
|
|
|
|
begins with //.
|
2013-11-04 07:34:11 +08:00
|
|
|
"""
|
|
|
|
# //// is needed to create a request with a path beginning with //
|
|
|
|
request = self.factory.get('////absolute-uri')
|
|
|
|
self.assertEqual(
|
|
|
|
request.build_absolute_uri(location='/foo/bar/'),
|
|
|
|
'http://testserver/foo/bar/'
|
|
|
|
)
|