605 lines
22 KiB
Python
605 lines
22 KiB
Python
from django.conf import settings
|
|
from django.core.checks.messages import Error, Warning
|
|
from django.core.checks.security import base, csrf, sessions
|
|
from django.core.management.utils import get_random_secret_key
|
|
from django.test import SimpleTestCase
|
|
from django.test.utils import override_settings
|
|
|
|
|
|
class CheckSessionCookieSecureTest(SimpleTestCase):
|
|
@override_settings(
|
|
SESSION_COOKIE_SECURE=False,
|
|
INSTALLED_APPS=["django.contrib.sessions"],
|
|
MIDDLEWARE=[],
|
|
)
|
|
def test_session_cookie_secure_with_installed_app(self):
|
|
"""
|
|
Warn if SESSION_COOKIE_SECURE is off and "django.contrib.sessions" is
|
|
in INSTALLED_APPS.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W010])
|
|
|
|
@override_settings(
|
|
SESSION_COOKIE_SECURE=False,
|
|
INSTALLED_APPS=[],
|
|
MIDDLEWARE=['django.contrib.sessions.middleware.SessionMiddleware'],
|
|
)
|
|
def test_session_cookie_secure_with_middleware(self):
|
|
"""
|
|
Warn if SESSION_COOKIE_SECURE is off and
|
|
"django.contrib.sessions.middleware.SessionMiddleware" is in
|
|
MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W011])
|
|
|
|
@override_settings(
|
|
SESSION_COOKIE_SECURE=False,
|
|
INSTALLED_APPS=["django.contrib.sessions"],
|
|
MIDDLEWARE=['django.contrib.sessions.middleware.SessionMiddleware'],
|
|
)
|
|
def test_session_cookie_secure_both(self):
|
|
"""
|
|
If SESSION_COOKIE_SECURE is off and we find both the session app and
|
|
the middleware, provide one common warning.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_secure(None), [sessions.W012])
|
|
|
|
@override_settings(
|
|
SESSION_COOKIE_SECURE=True,
|
|
INSTALLED_APPS=["django.contrib.sessions"],
|
|
MIDDLEWARE=['django.contrib.sessions.middleware.SessionMiddleware'],
|
|
)
|
|
def test_session_cookie_secure_true(self):
|
|
"""
|
|
If SESSION_COOKIE_SECURE is on, there's no warning about it.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_secure(None), [])
|
|
|
|
|
|
class CheckSessionCookieHttpOnlyTest(SimpleTestCase):
|
|
@override_settings(
|
|
SESSION_COOKIE_HTTPONLY=False,
|
|
INSTALLED_APPS=["django.contrib.sessions"],
|
|
MIDDLEWARE=[],
|
|
)
|
|
def test_session_cookie_httponly_with_installed_app(self):
|
|
"""
|
|
Warn if SESSION_COOKIE_HTTPONLY is off and "django.contrib.sessions"
|
|
is in INSTALLED_APPS.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W013])
|
|
|
|
@override_settings(
|
|
SESSION_COOKIE_HTTPONLY=False,
|
|
INSTALLED_APPS=[],
|
|
MIDDLEWARE=['django.contrib.sessions.middleware.SessionMiddleware'],
|
|
)
|
|
def test_session_cookie_httponly_with_middleware(self):
|
|
"""
|
|
Warn if SESSION_COOKIE_HTTPONLY is off and
|
|
"django.contrib.sessions.middleware.SessionMiddleware" is in
|
|
MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W014])
|
|
|
|
@override_settings(
|
|
SESSION_COOKIE_HTTPONLY=False,
|
|
INSTALLED_APPS=["django.contrib.sessions"],
|
|
MIDDLEWARE=['django.contrib.sessions.middleware.SessionMiddleware'],
|
|
)
|
|
def test_session_cookie_httponly_both(self):
|
|
"""
|
|
If SESSION_COOKIE_HTTPONLY is off and we find both the session app and
|
|
the middleware, provide one common warning.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_httponly(None), [sessions.W015])
|
|
|
|
@override_settings(
|
|
SESSION_COOKIE_HTTPONLY=True,
|
|
INSTALLED_APPS=["django.contrib.sessions"],
|
|
MIDDLEWARE=['django.contrib.sessions.middleware.SessionMiddleware'],
|
|
)
|
|
def test_session_cookie_httponly_true(self):
|
|
"""
|
|
If SESSION_COOKIE_HTTPONLY is on, there's no warning about it.
|
|
"""
|
|
self.assertEqual(sessions.check_session_cookie_httponly(None), [])
|
|
|
|
|
|
class CheckCSRFMiddlewareTest(SimpleTestCase):
|
|
@override_settings(MIDDLEWARE=[])
|
|
def test_no_csrf_middleware(self):
|
|
"""
|
|
Warn if CsrfViewMiddleware isn't in MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(csrf.check_csrf_middleware(None), [csrf.W003])
|
|
|
|
@override_settings(MIDDLEWARE=['django.middleware.csrf.CsrfViewMiddleware'])
|
|
def test_with_csrf_middleware(self):
|
|
self.assertEqual(csrf.check_csrf_middleware(None), [])
|
|
|
|
|
|
class CheckCSRFCookieSecureTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
|
|
CSRF_COOKIE_SECURE=False,
|
|
)
|
|
def test_with_csrf_cookie_secure_false(self):
|
|
"""
|
|
Warn if CsrfViewMiddleware is in MIDDLEWARE but
|
|
CSRF_COOKIE_SECURE isn't True.
|
|
"""
|
|
self.assertEqual(csrf.check_csrf_cookie_secure(None), [csrf.W016])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
|
|
CSRF_USE_SESSIONS=True,
|
|
CSRF_COOKIE_SECURE=False,
|
|
)
|
|
def test_use_sessions_with_csrf_cookie_secure_false(self):
|
|
"""
|
|
No warning if CSRF_COOKIE_SECURE isn't True while CSRF_USE_SESSIONS
|
|
is True.
|
|
"""
|
|
self.assertEqual(csrf.check_csrf_cookie_secure(None), [])
|
|
|
|
@override_settings(MIDDLEWARE=[], CSRF_COOKIE_SECURE=False)
|
|
def test_with_csrf_cookie_secure_false_no_middleware(self):
|
|
"""
|
|
No warning if CsrfViewMiddleware isn't in MIDDLEWARE, even if
|
|
CSRF_COOKIE_SECURE is False.
|
|
"""
|
|
self.assertEqual(csrf.check_csrf_cookie_secure(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.csrf.CsrfViewMiddleware"],
|
|
CSRF_COOKIE_SECURE=True,
|
|
)
|
|
def test_with_csrf_cookie_secure_true(self):
|
|
self.assertEqual(csrf.check_csrf_cookie_secure(None), [])
|
|
|
|
|
|
class CheckSecurityMiddlewareTest(SimpleTestCase):
|
|
@override_settings(MIDDLEWARE=[])
|
|
def test_no_security_middleware(self):
|
|
"""
|
|
Warn if SecurityMiddleware isn't in MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(base.check_security_middleware(None), [base.W001])
|
|
|
|
@override_settings(MIDDLEWARE=['django.middleware.security.SecurityMiddleware'])
|
|
def test_with_security_middleware(self):
|
|
self.assertEqual(base.check_security_middleware(None), [])
|
|
|
|
|
|
class CheckStrictTransportSecurityTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_HSTS_SECONDS=0,
|
|
)
|
|
def test_no_sts(self):
|
|
"""
|
|
Warn if SECURE_HSTS_SECONDS isn't > 0.
|
|
"""
|
|
self.assertEqual(base.check_sts(None), [base.W004])
|
|
|
|
@override_settings(MIDDLEWARE=[], SECURE_HSTS_SECONDS=0)
|
|
def test_no_sts_no_middleware(self):
|
|
"""
|
|
Don't warn if SECURE_HSTS_SECONDS isn't > 0 and SecurityMiddleware isn't
|
|
installed.
|
|
"""
|
|
self.assertEqual(base.check_sts(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_HSTS_SECONDS=3600,
|
|
)
|
|
def test_with_sts(self):
|
|
self.assertEqual(base.check_sts(None), [])
|
|
|
|
|
|
class CheckStrictTransportSecuritySubdomainsTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_HSTS_INCLUDE_SUBDOMAINS=False,
|
|
SECURE_HSTS_SECONDS=3600,
|
|
)
|
|
def test_no_sts_subdomains(self):
|
|
"""
|
|
Warn if SECURE_HSTS_INCLUDE_SUBDOMAINS isn't True.
|
|
"""
|
|
self.assertEqual(base.check_sts_include_subdomains(None), [base.W005])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=[],
|
|
SECURE_HSTS_INCLUDE_SUBDOMAINS=False,
|
|
SECURE_HSTS_SECONDS=3600,
|
|
)
|
|
def test_no_sts_subdomains_no_middleware(self):
|
|
"""
|
|
Don't warn if SecurityMiddleware isn't installed.
|
|
"""
|
|
self.assertEqual(base.check_sts_include_subdomains(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_SSL_REDIRECT=False,
|
|
SECURE_HSTS_SECONDS=None,
|
|
)
|
|
def test_no_sts_subdomains_no_seconds(self):
|
|
"""
|
|
Don't warn if SECURE_HSTS_SECONDS isn't set.
|
|
"""
|
|
self.assertEqual(base.check_sts_include_subdomains(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_HSTS_INCLUDE_SUBDOMAINS=True,
|
|
SECURE_HSTS_SECONDS=3600,
|
|
)
|
|
def test_with_sts_subdomains(self):
|
|
self.assertEqual(base.check_sts_include_subdomains(None), [])
|
|
|
|
|
|
class CheckStrictTransportSecurityPreloadTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_HSTS_PRELOAD=False,
|
|
SECURE_HSTS_SECONDS=3600,
|
|
)
|
|
def test_no_sts_preload(self):
|
|
"""
|
|
Warn if SECURE_HSTS_PRELOAD isn't True.
|
|
"""
|
|
self.assertEqual(base.check_sts_preload(None), [base.W021])
|
|
|
|
@override_settings(MIDDLEWARE=[], SECURE_HSTS_PRELOAD=False, SECURE_HSTS_SECONDS=3600)
|
|
def test_no_sts_preload_no_middleware(self):
|
|
"""
|
|
Don't warn if SecurityMiddleware isn't installed.
|
|
"""
|
|
self.assertEqual(base.check_sts_preload(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_SSL_REDIRECT=False,
|
|
SECURE_HSTS_SECONDS=None,
|
|
)
|
|
def test_no_sts_preload_no_seconds(self):
|
|
"""
|
|
Don't warn if SECURE_HSTS_SECONDS isn't set.
|
|
"""
|
|
self.assertEqual(base.check_sts_preload(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_HSTS_PRELOAD=True,
|
|
SECURE_HSTS_SECONDS=3600,
|
|
)
|
|
def test_with_sts_preload(self):
|
|
self.assertEqual(base.check_sts_preload(None), [])
|
|
|
|
|
|
class CheckXFrameOptionsMiddlewareTest(SimpleTestCase):
|
|
@override_settings(MIDDLEWARE=[])
|
|
def test_middleware_not_installed(self):
|
|
"""
|
|
Warn if XFrameOptionsMiddleware isn't in MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(base.check_xframe_options_middleware(None), [base.W002])
|
|
|
|
@override_settings(MIDDLEWARE=["django.middleware.clickjacking.XFrameOptionsMiddleware"])
|
|
def test_middleware_installed(self):
|
|
self.assertEqual(base.check_xframe_options_middleware(None), [])
|
|
|
|
|
|
class CheckXFrameOptionsDenyTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.clickjacking.XFrameOptionsMiddleware"],
|
|
X_FRAME_OPTIONS='SAMEORIGIN',
|
|
)
|
|
def test_x_frame_options_not_deny(self):
|
|
"""
|
|
Warn if XFrameOptionsMiddleware is in MIDDLEWARE but
|
|
X_FRAME_OPTIONS isn't 'DENY'.
|
|
"""
|
|
self.assertEqual(base.check_xframe_deny(None), [base.W019])
|
|
|
|
@override_settings(MIDDLEWARE=[], X_FRAME_OPTIONS='SAMEORIGIN')
|
|
def test_middleware_not_installed(self):
|
|
"""
|
|
No error if XFrameOptionsMiddleware isn't in MIDDLEWARE even if
|
|
X_FRAME_OPTIONS isn't 'DENY'.
|
|
"""
|
|
self.assertEqual(base.check_xframe_deny(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.clickjacking.XFrameOptionsMiddleware"],
|
|
X_FRAME_OPTIONS='DENY',
|
|
)
|
|
def test_xframe_deny(self):
|
|
self.assertEqual(base.check_xframe_deny(None), [])
|
|
|
|
|
|
class CheckContentTypeNosniffTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_CONTENT_TYPE_NOSNIFF=False,
|
|
)
|
|
def test_no_content_type_nosniff(self):
|
|
"""
|
|
Warn if SECURE_CONTENT_TYPE_NOSNIFF isn't True.
|
|
"""
|
|
self.assertEqual(base.check_content_type_nosniff(None), [base.W006])
|
|
|
|
@override_settings(MIDDLEWARE=[], SECURE_CONTENT_TYPE_NOSNIFF=False)
|
|
def test_no_content_type_nosniff_no_middleware(self):
|
|
"""
|
|
Don't warn if SECURE_CONTENT_TYPE_NOSNIFF isn't True and
|
|
SecurityMiddleware isn't in MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(base.check_content_type_nosniff(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_CONTENT_TYPE_NOSNIFF=True,
|
|
)
|
|
def test_with_content_type_nosniff(self):
|
|
self.assertEqual(base.check_content_type_nosniff(None), [])
|
|
|
|
|
|
class CheckSSLRedirectTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_SSL_REDIRECT=False,
|
|
)
|
|
def test_no_ssl_redirect(self):
|
|
"""
|
|
Warn if SECURE_SSL_REDIRECT isn't True.
|
|
"""
|
|
self.assertEqual(base.check_ssl_redirect(None), [base.W008])
|
|
|
|
@override_settings(MIDDLEWARE=[], SECURE_SSL_REDIRECT=False)
|
|
def test_no_ssl_redirect_no_middleware(self):
|
|
"""
|
|
Don't warn if SECURE_SSL_REDIRECT is False and SecurityMiddleware isn't
|
|
installed.
|
|
"""
|
|
self.assertEqual(base.check_ssl_redirect(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=["django.middleware.security.SecurityMiddleware"],
|
|
SECURE_SSL_REDIRECT=True,
|
|
)
|
|
def test_with_ssl_redirect(self):
|
|
self.assertEqual(base.check_ssl_redirect(None), [])
|
|
|
|
|
|
class CheckSecretKeyTest(SimpleTestCase):
|
|
@override_settings(SECRET_KEY=('abcdefghijklmnopqrstuvwx' * 2) + 'ab')
|
|
def test_okay_secret_key(self):
|
|
self.assertEqual(len(settings.SECRET_KEY), base.SECRET_KEY_MIN_LENGTH)
|
|
self.assertGreater(len(set(settings.SECRET_KEY)), base.SECRET_KEY_MIN_UNIQUE_CHARACTERS)
|
|
self.assertEqual(base.check_secret_key(None), [])
|
|
|
|
@override_settings(SECRET_KEY='')
|
|
def test_empty_secret_key(self):
|
|
self.assertEqual(base.check_secret_key(None), [base.W009])
|
|
|
|
@override_settings(SECRET_KEY=None)
|
|
def test_missing_secret_key(self):
|
|
del settings.SECRET_KEY
|
|
self.assertEqual(base.check_secret_key(None), [base.W009])
|
|
|
|
@override_settings(SECRET_KEY=None)
|
|
def test_none_secret_key(self):
|
|
self.assertEqual(base.check_secret_key(None), [base.W009])
|
|
|
|
@override_settings(
|
|
SECRET_KEY=base.SECRET_KEY_INSECURE_PREFIX + get_random_secret_key()
|
|
)
|
|
def test_insecure_secret_key(self):
|
|
self.assertEqual(base.check_secret_key(None), [base.W009])
|
|
|
|
@override_settings(SECRET_KEY=('abcdefghijklmnopqrstuvwx' * 2) + 'a')
|
|
def test_low_length_secret_key(self):
|
|
self.assertEqual(len(settings.SECRET_KEY), base.SECRET_KEY_MIN_LENGTH - 1)
|
|
self.assertEqual(base.check_secret_key(None), [base.W009])
|
|
|
|
@override_settings(SECRET_KEY='abcd' * 20)
|
|
def test_low_entropy_secret_key(self):
|
|
self.assertGreater(len(settings.SECRET_KEY), base.SECRET_KEY_MIN_LENGTH)
|
|
self.assertLess(len(set(settings.SECRET_KEY)), base.SECRET_KEY_MIN_UNIQUE_CHARACTERS)
|
|
self.assertEqual(base.check_secret_key(None), [base.W009])
|
|
|
|
|
|
class CheckSecretKeyFallbacksTest(SimpleTestCase):
|
|
@override_settings(SECRET_KEY_FALLBACKS=[('abcdefghijklmnopqrstuvwx' * 2) + 'ab'])
|
|
def test_okay_secret_key_fallbacks(self):
|
|
self.assertEqual(
|
|
len(settings.SECRET_KEY_FALLBACKS[0]),
|
|
base.SECRET_KEY_MIN_LENGTH,
|
|
)
|
|
self.assertGreater(
|
|
len(set(settings.SECRET_KEY_FALLBACKS[0])),
|
|
base.SECRET_KEY_MIN_UNIQUE_CHARACTERS,
|
|
)
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [])
|
|
|
|
def test_no_secret_key_fallbacks(self):
|
|
with self.settings(SECRET_KEY_FALLBACKS=None):
|
|
del settings.SECRET_KEY_FALLBACKS
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS', id=base.W025.id),
|
|
])
|
|
|
|
@override_settings(SECRET_KEY_FALLBACKS=[
|
|
base.SECRET_KEY_INSECURE_PREFIX + get_random_secret_key()
|
|
])
|
|
def test_insecure_secret_key_fallbacks(self):
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS[0]', id=base.W025.id),
|
|
])
|
|
|
|
@override_settings(SECRET_KEY_FALLBACKS=[('abcdefghijklmnopqrstuvwx' * 2) + 'a'])
|
|
def test_low_length_secret_key_fallbacks(self):
|
|
self.assertEqual(
|
|
len(settings.SECRET_KEY_FALLBACKS[0]),
|
|
base.SECRET_KEY_MIN_LENGTH - 1,
|
|
)
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS[0]', id=base.W025.id),
|
|
])
|
|
|
|
@override_settings(SECRET_KEY_FALLBACKS=['abcd' * 20])
|
|
def test_low_entropy_secret_key_fallbacks(self):
|
|
self.assertGreater(
|
|
len(settings.SECRET_KEY_FALLBACKS[0]),
|
|
base.SECRET_KEY_MIN_LENGTH,
|
|
)
|
|
self.assertLess(
|
|
len(set(settings.SECRET_KEY_FALLBACKS[0])),
|
|
base.SECRET_KEY_MIN_UNIQUE_CHARACTERS,
|
|
)
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS[0]', id=base.W025.id),
|
|
])
|
|
|
|
@override_settings(SECRET_KEY_FALLBACKS=[
|
|
('abcdefghijklmnopqrstuvwx' * 2) + 'ab',
|
|
'badkey',
|
|
])
|
|
def test_multiple_keys(self):
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS[1]', id=base.W025.id),
|
|
])
|
|
|
|
@override_settings(SECRET_KEY_FALLBACKS=[
|
|
('abcdefghijklmnopqrstuvwx' * 2) + 'ab',
|
|
'badkey1',
|
|
'badkey2',
|
|
])
|
|
def test_multiple_bad_keys(self):
|
|
self.assertEqual(base.check_secret_key_fallbacks(None), [
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS[1]', id=base.W025.id),
|
|
Warning(base.W025.msg % 'SECRET_KEY_FALLBACKS[2]', id=base.W025.id),
|
|
])
|
|
|
|
|
|
class CheckDebugTest(SimpleTestCase):
|
|
@override_settings(DEBUG=True)
|
|
def test_debug_true(self):
|
|
"""
|
|
Warn if DEBUG is True.
|
|
"""
|
|
self.assertEqual(base.check_debug(None), [base.W018])
|
|
|
|
@override_settings(DEBUG=False)
|
|
def test_debug_false(self):
|
|
self.assertEqual(base.check_debug(None), [])
|
|
|
|
|
|
class CheckAllowedHostsTest(SimpleTestCase):
|
|
@override_settings(ALLOWED_HOSTS=[])
|
|
def test_allowed_hosts_empty(self):
|
|
self.assertEqual(base.check_allowed_hosts(None), [base.W020])
|
|
|
|
@override_settings(ALLOWED_HOSTS=['.example.com'])
|
|
def test_allowed_hosts_set(self):
|
|
self.assertEqual(base.check_allowed_hosts(None), [])
|
|
|
|
|
|
class CheckReferrerPolicyTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=['django.middleware.security.SecurityMiddleware'],
|
|
SECURE_REFERRER_POLICY=None,
|
|
)
|
|
def test_no_referrer_policy(self):
|
|
self.assertEqual(base.check_referrer_policy(None), [base.W022])
|
|
|
|
@override_settings(MIDDLEWARE=[], SECURE_REFERRER_POLICY=None)
|
|
def test_no_referrer_policy_no_middleware(self):
|
|
"""
|
|
Don't warn if SECURE_REFERRER_POLICY is None and SecurityMiddleware
|
|
isn't in MIDDLEWARE.
|
|
"""
|
|
self.assertEqual(base.check_referrer_policy(None), [])
|
|
|
|
@override_settings(MIDDLEWARE=['django.middleware.security.SecurityMiddleware'])
|
|
def test_with_referrer_policy(self):
|
|
tests = (
|
|
'strict-origin',
|
|
'strict-origin,origin',
|
|
'strict-origin, origin',
|
|
['strict-origin', 'origin'],
|
|
('strict-origin', 'origin'),
|
|
)
|
|
for value in tests:
|
|
with self.subTest(value=value), override_settings(SECURE_REFERRER_POLICY=value):
|
|
self.assertEqual(base.check_referrer_policy(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=['django.middleware.security.SecurityMiddleware'],
|
|
SECURE_REFERRER_POLICY='invalid-value',
|
|
)
|
|
def test_with_invalid_referrer_policy(self):
|
|
self.assertEqual(base.check_referrer_policy(None), [base.E023])
|
|
|
|
|
|
def failure_view_with_invalid_signature():
|
|
pass
|
|
|
|
|
|
class CSRFFailureViewTest(SimpleTestCase):
|
|
@override_settings(CSRF_FAILURE_VIEW='')
|
|
def test_failure_view_import_error(self):
|
|
self.assertEqual(
|
|
csrf.check_csrf_failure_view(None),
|
|
[
|
|
Error(
|
|
"The CSRF failure view '' could not be imported.",
|
|
id='security.E102',
|
|
)
|
|
],
|
|
)
|
|
|
|
@override_settings(
|
|
CSRF_FAILURE_VIEW='check_framework.test_security.failure_view_with_invalid_signature',
|
|
)
|
|
def test_failure_view_invalid_signature(self):
|
|
msg = (
|
|
"The CSRF failure view "
|
|
"'check_framework.test_security.failure_view_with_invalid_signature' "
|
|
"does not take the correct number of arguments."
|
|
)
|
|
self.assertEqual(
|
|
csrf.check_csrf_failure_view(None),
|
|
[Error(msg, id='security.E101')],
|
|
)
|
|
|
|
|
|
class CheckCrossOriginOpenerPolicyTest(SimpleTestCase):
|
|
@override_settings(
|
|
MIDDLEWARE=['django.middleware.security.SecurityMiddleware'],
|
|
SECURE_CROSS_ORIGIN_OPENER_POLICY=None,
|
|
)
|
|
def test_no_coop(self):
|
|
self.assertEqual(base.check_cross_origin_opener_policy(None), [])
|
|
|
|
@override_settings(MIDDLEWARE=['django.middleware.security.SecurityMiddleware'])
|
|
def test_with_coop(self):
|
|
tests = ['same-origin', 'same-origin-allow-popups', 'unsafe-none']
|
|
for value in tests:
|
|
with self.subTest(value=value), override_settings(
|
|
SECURE_CROSS_ORIGIN_OPENER_POLICY=value,
|
|
):
|
|
self.assertEqual(base.check_cross_origin_opener_policy(None), [])
|
|
|
|
@override_settings(
|
|
MIDDLEWARE=['django.middleware.security.SecurityMiddleware'],
|
|
SECURE_CROSS_ORIGIN_OPENER_POLICY='invalid-value',
|
|
)
|
|
def test_with_invalid_coop(self):
|
|
self.assertEqual(base.check_cross_origin_opener_policy(None), [base.E024])
|