2015-07-20 20:02:22 +08:00
|
|
|
from io import BytesIO
|
|
|
|
|
2014-09-06 04:27:26 +08:00
|
|
|
from django.core.handlers.wsgi import WSGIRequest
|
2020-12-11 21:05:36 +08:00
|
|
|
from django.core.servers.basehttp import WSGIRequestHandler, WSGIServer
|
2015-04-18 05:38:20 +08:00
|
|
|
from django.test import SimpleTestCase
|
2014-09-06 04:27:26 +08:00
|
|
|
from django.test.client import RequestFactory
|
2020-12-11 21:05:36 +08:00
|
|
|
from django.test.utils import captured_stderr
|
2014-09-06 04:27:26 +08:00
|
|
|
|
|
|
|
|
2017-01-19 15:39:46 +08:00
|
|
|
class Stub:
|
2014-09-11 01:06:19 +08:00
|
|
|
def __init__(self, **kwargs):
|
|
|
|
self.__dict__.update(kwargs)
|
|
|
|
|
2016-08-09 04:50:48 +08:00
|
|
|
def sendall(self, data):
|
|
|
|
self.makefile("wb").write(data)
|
|
|
|
|
2014-09-11 01:06:19 +08:00
|
|
|
|
2015-04-18 05:38:20 +08:00
|
|
|
class WSGIRequestHandlerTestCase(SimpleTestCase):
|
2018-11-27 03:01:27 +08:00
|
|
|
request_factory = RequestFactory()
|
2015-08-01 00:45:27 +08:00
|
|
|
|
|
|
|
def test_log_message(self):
|
2018-11-27 03:01:27 +08:00
|
|
|
request = WSGIRequest(self.request_factory.get("/").environ)
|
2018-04-29 17:02:51 +08:00
|
|
|
request.makefile = lambda *args, **kwargs: BytesIO()
|
|
|
|
handler = WSGIRequestHandler(request, "192.168.0.2", None)
|
|
|
|
level_status_codes = {
|
|
|
|
"info": [200, 301, 304],
|
|
|
|
"warning": [400, 403, 404],
|
|
|
|
"error": [500, 503],
|
|
|
|
}
|
|
|
|
for level, status_codes in level_status_codes.items():
|
|
|
|
for status_code in status_codes:
|
|
|
|
# The correct level gets the message.
|
|
|
|
with self.assertLogs("django.server", level.upper()) as cm:
|
|
|
|
handler.log_message("GET %s %s", "A", str(status_code))
|
|
|
|
self.assertIn("GET A %d" % status_code, cm.output[0])
|
|
|
|
# Incorrect levels don't have any messages.
|
|
|
|
for wrong_level in level_status_codes:
|
|
|
|
if wrong_level != level:
|
|
|
|
with self.assertLogs("django.server", "INFO") as cm:
|
|
|
|
handler.log_message("GET %s %s", "A", str(status_code))
|
|
|
|
self.assertNotEqual(
|
|
|
|
cm.records[0].levelname, wrong_level.upper()
|
2022-02-04 03:24:19 +08:00
|
|
|
)
|
2015-08-01 00:45:27 +08:00
|
|
|
|
2014-09-06 04:27:26 +08:00
|
|
|
def test_https(self):
|
2018-11-27 03:01:27 +08:00
|
|
|
request = WSGIRequest(self.request_factory.get("/").environ)
|
2014-09-06 04:27:26 +08:00
|
|
|
request.makefile = lambda *args, **kwargs: BytesIO()
|
|
|
|
|
|
|
|
handler = WSGIRequestHandler(request, "192.168.0.2", None)
|
|
|
|
|
2018-04-28 21:20:27 +08:00
|
|
|
with self.assertLogs("django.server", "ERROR") as cm:
|
2017-01-20 17:20:53 +08:00
|
|
|
handler.log_message("GET %s %s", "\x16\x03", "4")
|
2022-02-12 20:57:25 +08:00
|
|
|
self.assertEqual(
|
2015-11-07 00:19:41 +08:00
|
|
|
"You're accessing the development server over HTTPS, "
|
|
|
|
"but it only supports HTTP.",
|
2018-04-28 21:20:27 +08:00
|
|
|
cm.records[0].getMessage(),
|
2015-11-07 00:19:41 +08:00
|
|
|
)
|
2014-09-11 01:06:19 +08:00
|
|
|
|
|
|
|
def test_strips_underscore_headers(self):
|
|
|
|
"""WSGIRequestHandler ignores headers containing underscores.
|
|
|
|
|
|
|
|
This follows the lead of nginx and Apache 2.4, and is to avoid
|
|
|
|
ambiguity between dashes and underscores in mapping to WSGI environ,
|
|
|
|
which can have security implications.
|
|
|
|
"""
|
2022-02-04 03:24:19 +08:00
|
|
|
|
2014-09-11 01:06:19 +08:00
|
|
|
def test_app(environ, start_response):
|
|
|
|
"""A WSGI app that just reflects its HTTP environ."""
|
|
|
|
start_response("200 OK", [])
|
|
|
|
http_environ_items = sorted(
|
|
|
|
"%s:%s" % (k, v) for k, v in environ.items() if k.startswith("HTTP_")
|
|
|
|
)
|
2017-02-08 01:05:47 +08:00
|
|
|
yield (",".join(http_environ_items)).encode()
|
2014-09-11 01:06:19 +08:00
|
|
|
|
|
|
|
rfile = BytesIO()
|
|
|
|
rfile.write(b"GET / HTTP/1.0\r\n")
|
|
|
|
rfile.write(b"Some-Header: good\r\n")
|
|
|
|
rfile.write(b"Some_Header: bad\r\n")
|
|
|
|
rfile.write(b"Other_Header: bad\r\n")
|
|
|
|
rfile.seek(0)
|
|
|
|
|
|
|
|
# WSGIRequestHandler closes the output file; we need to make this a
|
|
|
|
# no-op so we can still read its contents.
|
|
|
|
class UnclosableBytesIO(BytesIO):
|
|
|
|
def close(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
wfile = UnclosableBytesIO()
|
|
|
|
|
|
|
|
def makefile(mode, *a, **kw):
|
|
|
|
if mode == "rb":
|
|
|
|
return rfile
|
|
|
|
elif mode == "wb":
|
|
|
|
return wfile
|
|
|
|
|
|
|
|
request = Stub(makefile=makefile)
|
|
|
|
server = Stub(base_environ={}, get_app=lambda: test_app)
|
|
|
|
|
2018-04-28 21:20:27 +08:00
|
|
|
# Prevent logging from appearing in test output.
|
|
|
|
with self.assertLogs("django.server", "INFO"):
|
2014-09-11 01:06:19 +08:00
|
|
|
# instantiating a handler runs the request as side effect
|
|
|
|
WSGIRequestHandler(request, "192.168.0.2", server)
|
|
|
|
|
|
|
|
wfile.seek(0)
|
|
|
|
body = list(wfile.readlines())[-1]
|
|
|
|
|
|
|
|
self.assertEqual(body, b"HTTP_SOME_HEADER:good")
|
2020-12-11 21:05:36 +08:00
|
|
|
|
|
|
|
|
|
|
|
class WSGIServerTestCase(SimpleTestCase):
|
|
|
|
request_factory = RequestFactory()
|
|
|
|
|
|
|
|
def test_broken_pipe_errors(self):
|
|
|
|
"""WSGIServer handles broken pipe errors."""
|
|
|
|
request = WSGIRequest(self.request_factory.get("/").environ)
|
|
|
|
client_address = ("192.168.2.0", 8080)
|
2022-02-12 20:57:25 +08:00
|
|
|
msg = f"- Broken pipe from {client_address}"
|
2020-12-03 15:46:03 +08:00
|
|
|
tests = [
|
|
|
|
BrokenPipeError,
|
|
|
|
ConnectionAbortedError,
|
|
|
|
ConnectionResetError,
|
|
|
|
]
|
|
|
|
for exception in tests:
|
|
|
|
with self.subTest(exception=exception):
|
|
|
|
try:
|
|
|
|
server = WSGIServer(("localhost", 0), WSGIRequestHandler)
|
|
|
|
try:
|
|
|
|
raise exception()
|
|
|
|
except Exception:
|
|
|
|
with captured_stderr() as err:
|
|
|
|
with self.assertLogs("django.server", "INFO") as cm:
|
|
|
|
server.handle_error(request, client_address)
|
|
|
|
self.assertEqual(err.getvalue(), "")
|
|
|
|
self.assertEqual(cm.records[0].getMessage(), msg)
|
|
|
|
finally:
|
|
|
|
server.server_close()
|