2012-04-30 01:58:00 +08:00
|
|
|
import json
|
2020-12-19 22:38:32 +08:00
|
|
|
import random
|
2012-04-30 01:58:00 +08:00
|
|
|
|
2020-07-16 14:16:58 +08:00
|
|
|
from django.conf import settings
|
2009-12-10 00:57:23 +08:00
|
|
|
from django.contrib.messages import constants
|
|
|
|
from django.contrib.messages.storage.base import Message
|
2015-01-28 20:35:27 +08:00
|
|
|
from django.contrib.messages.storage.cookie import (
|
|
|
|
CookieStorage, MessageDecoder, MessageEncoder,
|
|
|
|
)
|
2020-12-19 22:38:32 +08:00
|
|
|
from django.core.signing import get_cookie_signer
|
2015-04-18 05:38:20 +08:00
|
|
|
from django.test import SimpleTestCase, override_settings
|
2020-12-19 22:38:32 +08:00
|
|
|
from django.utils.crypto import get_random_string
|
2012-12-21 17:01:03 +08:00
|
|
|
from django.utils.safestring import SafeData, mark_safe
|
2009-12-10 00:57:23 +08:00
|
|
|
|
2015-02-10 21:30:35 +08:00
|
|
|
from .base import BaseTests
|
|
|
|
|
2009-12-10 00:57:23 +08:00
|
|
|
|
|
|
|
def set_cookie_data(storage, messages, invalid=False, encode_empty=False):
|
|
|
|
"""
|
2017-01-05 22:23:39 +08:00
|
|
|
Set ``request.COOKIES`` with the encoded data and remove the storage
|
2009-12-10 00:57:23 +08:00
|
|
|
backend's loaded data cache.
|
|
|
|
"""
|
|
|
|
encoded_data = storage._encode(messages, encode_empty=encode_empty)
|
|
|
|
if invalid:
|
|
|
|
# Truncate the first character so that the hash is invalid.
|
|
|
|
encoded_data = encoded_data[1:]
|
|
|
|
storage.request.COOKIES = {CookieStorage.cookie_name: encoded_data}
|
|
|
|
if hasattr(storage, '_loaded_data'):
|
|
|
|
del storage._loaded_data
|
|
|
|
|
|
|
|
|
|
|
|
def stored_cookie_messages_count(storage, response):
|
|
|
|
"""
|
2017-01-05 22:23:39 +08:00
|
|
|
Return an integer containing the number of messages stored.
|
2009-12-10 00:57:23 +08:00
|
|
|
"""
|
|
|
|
# Get a list of cookies, excluding ones with a max-age of 0 (because
|
|
|
|
# they have been marked for deletion).
|
|
|
|
cookie = response.cookies.get(storage.cookie_name)
|
|
|
|
if not cookie or cookie['max-age'] == 0:
|
|
|
|
return 0
|
|
|
|
data = storage._decode(cookie.value)
|
|
|
|
if not data:
|
|
|
|
return 0
|
|
|
|
if data[-1] == CookieStorage.not_finished:
|
|
|
|
data.pop()
|
|
|
|
return len(data)
|
|
|
|
|
|
|
|
|
2013-08-27 03:34:29 +08:00
|
|
|
@override_settings(SESSION_COOKIE_DOMAIN='.example.com', SESSION_COOKIE_SECURE=True, SESSION_COOKIE_HTTPONLY=True)
|
2017-01-05 22:23:39 +08:00
|
|
|
class CookieTests(BaseTests, SimpleTestCase):
|
2009-12-10 00:57:23 +08:00
|
|
|
storage_class = CookieStorage
|
|
|
|
|
|
|
|
def stored_messages_count(self, storage, response):
|
|
|
|
return stored_cookie_messages_count(storage, response)
|
|
|
|
|
|
|
|
def test_get(self):
|
|
|
|
storage = self.storage_class(self.get_request())
|
|
|
|
# Set initial data.
|
|
|
|
example_messages = ['test', 'me']
|
|
|
|
set_cookie_data(storage, example_messages)
|
2017-01-05 22:23:39 +08:00
|
|
|
# The message contains what's expected.
|
2009-12-10 00:57:23 +08:00
|
|
|
self.assertEqual(list(storage), example_messages)
|
|
|
|
|
2018-04-14 08:58:31 +08:00
|
|
|
@override_settings(SESSION_COOKIE_SAMESITE='Strict')
|
2013-08-27 03:34:29 +08:00
|
|
|
def test_cookie_setings(self):
|
2011-03-20 19:27:03 +08:00
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
CookieStorage honors SESSION_COOKIE_DOMAIN, SESSION_COOKIE_SECURE, and
|
|
|
|
SESSION_COOKIE_HTTPONLY (#15618, #20972).
|
2011-03-20 19:27:03 +08:00
|
|
|
"""
|
|
|
|
# Test before the messages have been consumed
|
|
|
|
storage = self.get_storage()
|
|
|
|
response = self.get_response()
|
|
|
|
storage.add(constants.INFO, 'test')
|
|
|
|
storage.update(response)
|
2020-12-19 22:38:32 +08:00
|
|
|
messages = storage._decode(response.cookies['messages'].value)
|
|
|
|
self.assertEqual(len(messages), 1)
|
|
|
|
self.assertEqual(messages[0].message, 'test')
|
2012-06-07 17:50:20 +08:00
|
|
|
self.assertEqual(response.cookies['messages']['domain'], '.example.com')
|
2011-03-20 19:27:03 +08:00
|
|
|
self.assertEqual(response.cookies['messages']['expires'], '')
|
2016-06-17 02:19:18 +08:00
|
|
|
self.assertIs(response.cookies['messages']['secure'], True)
|
|
|
|
self.assertIs(response.cookies['messages']['httponly'], True)
|
2018-04-14 08:58:31 +08:00
|
|
|
self.assertEqual(response.cookies['messages']['samesite'], 'Strict')
|
2011-03-20 19:27:03 +08:00
|
|
|
|
2013-08-27 03:34:29 +08:00
|
|
|
# Test deletion of the cookie (storing with an empty value) after the messages have been consumed
|
2011-03-20 19:27:03 +08:00
|
|
|
storage = self.get_storage()
|
|
|
|
response = self.get_response()
|
|
|
|
storage.add(constants.INFO, 'test')
|
|
|
|
for m in storage:
|
2013-11-03 05:02:56 +08:00
|
|
|
pass # Iterate through the storage to simulate consumption of messages.
|
2011-03-20 19:27:03 +08:00
|
|
|
storage.update(response)
|
|
|
|
self.assertEqual(response.cookies['messages'].value, '')
|
2012-06-07 17:50:20 +08:00
|
|
|
self.assertEqual(response.cookies['messages']['domain'], '.example.com')
|
2017-12-28 05:49:46 +08:00
|
|
|
self.assertEqual(response.cookies['messages']['expires'], 'Thu, 01 Jan 1970 00:00:00 GMT')
|
2020-07-16 14:16:58 +08:00
|
|
|
self.assertEqual(
|
|
|
|
response.cookies['messages']['samesite'],
|
|
|
|
settings.SESSION_COOKIE_SAMESITE,
|
|
|
|
)
|
2011-03-20 19:27:03 +08:00
|
|
|
|
2009-12-10 00:57:23 +08:00
|
|
|
def test_get_bad_cookie(self):
|
|
|
|
request = self.get_request()
|
|
|
|
storage = self.storage_class(request)
|
|
|
|
# Set initial (invalid) data.
|
|
|
|
example_messages = ['test', 'me']
|
|
|
|
set_cookie_data(storage, example_messages, invalid=True)
|
2016-10-27 15:53:39 +08:00
|
|
|
# The message actually contains what we expect.
|
2009-12-10 00:57:23 +08:00
|
|
|
self.assertEqual(list(storage), [])
|
|
|
|
|
|
|
|
def test_max_cookie_length(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
If the data exceeds what is allowed in a cookie, older messages are
|
|
|
|
removed before saving (and returned by the ``update`` method).
|
2009-12-10 00:57:23 +08:00
|
|
|
"""
|
|
|
|
storage = self.get_storage()
|
|
|
|
response = self.get_response()
|
|
|
|
|
2010-01-24 08:04:02 +08:00
|
|
|
# When storing as a cookie, the cookie has constant overhead of approx
|
|
|
|
# 54 chars, and each message has a constant overhead of about 37 chars
|
|
|
|
# and a variable overhead of zero in the best case. We aim for a message
|
|
|
|
# size which will fit 4 messages into the cookie, but not 5.
|
|
|
|
# See also FallbackTest.test_session_fallback
|
|
|
|
msg_size = int((CookieStorage.max_cookie_size - 54) / 4.5 - 37)
|
2020-12-19 22:38:32 +08:00
|
|
|
first_msg = None
|
|
|
|
# Generate the same (tested) content every time that does not get run
|
|
|
|
# through zlib compression.
|
|
|
|
random.seed(42)
|
2009-12-10 00:57:23 +08:00
|
|
|
for i in range(5):
|
2020-12-19 22:38:32 +08:00
|
|
|
msg = get_random_string(msg_size)
|
|
|
|
storage.add(constants.INFO, msg)
|
|
|
|
if i == 0:
|
|
|
|
first_msg = msg
|
2009-12-10 00:57:23 +08:00
|
|
|
unstored_messages = storage.update(response)
|
|
|
|
|
|
|
|
cookie_storing = self.stored_messages_count(storage, response)
|
|
|
|
self.assertEqual(cookie_storing, 4)
|
|
|
|
|
|
|
|
self.assertEqual(len(unstored_messages), 1)
|
2020-12-19 22:38:32 +08:00
|
|
|
self.assertEqual(unstored_messages[0].message, first_msg)
|
|
|
|
|
|
|
|
def test_message_rfc6265(self):
|
|
|
|
non_compliant_chars = ['\\', ',', ';', '"']
|
|
|
|
messages = ['\\te,st', ';m"e', '\u2019', '123"NOTRECEIVED"']
|
|
|
|
storage = self.get_storage()
|
|
|
|
encoded = storage._encode(messages)
|
|
|
|
for illegal in non_compliant_chars:
|
|
|
|
self.assertEqual(encoded.find(illegal), -1)
|
2009-12-10 00:57:23 +08:00
|
|
|
|
|
|
|
def test_json_encoder_decoder(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
A complex nested data structure containing Message
|
2009-12-10 00:57:23 +08:00
|
|
|
instances is properly encoded/decoded by the custom JSON
|
|
|
|
encoder/decoder classes.
|
|
|
|
"""
|
|
|
|
messages = [
|
|
|
|
{
|
|
|
|
'message': Message(constants.INFO, 'Test message'),
|
2016-04-08 10:04:45 +08:00
|
|
|
'message_list': [
|
|
|
|
Message(constants.INFO, 'message %s') for x in range(5)
|
|
|
|
] + [{'another-message': Message(constants.ERROR, 'error')}],
|
2009-12-10 00:57:23 +08:00
|
|
|
},
|
|
|
|
Message(constants.INFO, 'message %s'),
|
|
|
|
]
|
2020-11-13 23:34:37 +08:00
|
|
|
encoder = MessageEncoder()
|
2009-12-10 00:57:23 +08:00
|
|
|
value = encoder.encode(messages)
|
|
|
|
decoded_messages = json.loads(value, cls=MessageDecoder)
|
|
|
|
self.assertEqual(messages, decoded_messages)
|
2012-12-21 17:01:03 +08:00
|
|
|
|
|
|
|
def test_safedata(self):
|
|
|
|
"""
|
2016-10-27 15:53:39 +08:00
|
|
|
A message containing SafeData is keeping its safe status when
|
2012-12-21 17:01:03 +08:00
|
|
|
retrieved from the message storage.
|
|
|
|
"""
|
|
|
|
def encode_decode(data):
|
|
|
|
message = Message(constants.DEBUG, data)
|
|
|
|
encoded = storage._encode(message)
|
|
|
|
decoded = storage._decode(encoded)
|
|
|
|
return decoded.message
|
|
|
|
|
|
|
|
storage = self.get_storage()
|
2017-01-05 22:23:39 +08:00
|
|
|
self.assertIsInstance(encode_decode(mark_safe("<b>Hello Django!</b>")), SafeData)
|
|
|
|
self.assertNotIsInstance(encode_decode("<b>Hello Django!</b>"), SafeData)
|
2020-01-31 06:11:09 +08:00
|
|
|
|
2020-12-19 22:38:32 +08:00
|
|
|
def test_legacy_encode_decode(self):
|
|
|
|
# RemovedInDjango41Warning: pre-Django 3.2 encoded messages will be
|
|
|
|
# invalid.
|
|
|
|
storage = self.storage_class(self.get_request())
|
|
|
|
messages = ['this', 'that']
|
|
|
|
# Encode/decode a message using the pre-Django 3.2 format.
|
|
|
|
encoder = MessageEncoder()
|
|
|
|
value = encoder.encode(messages)
|
|
|
|
signer = get_cookie_signer(salt=storage.key_salt)
|
|
|
|
encoded_messages = signer.sign(value)
|
|
|
|
decoded_messages = storage._decode(encoded_messages)
|
|
|
|
self.assertEqual(messages, decoded_messages)
|