repo
stringlengths
7
90
file_url
stringlengths
81
315
file_path
stringlengths
4
228
content
stringlengths
0
32.8k
language
stringclasses
1 value
license
stringclasses
7 values
commit_sha
stringlengths
40
40
retrieved_at
stringdate
2026-01-04 14:38:15
2026-01-05 02:33:18
truncated
bool
2 classes
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/custom_methods/models.py
tests/custom_methods/models.py
""" Giving models custom methods Any method you add to a model will be available to instances. """ import datetime from django.db import models class Article(models.Model): headline = models.CharField(max_length=100) pub_date = models.DateField() def __str__(self): return self.headline def was_published_today(self): return self.pub_date == datetime.date.today() def articles_from_same_day_1(self): return Article.objects.filter(pub_date=self.pub_date).exclude(id=self.id) def articles_from_same_day_2(self): """ Verbose version of get_articles_from_same_day_1, which does a custom database query for the sake of demonstration. """ from django.db import connection with connection.cursor() as cursor: cursor.execute( """ SELECT id, headline, pub_date FROM custom_methods_article WHERE pub_date = %s AND id != %s""", [connection.ops.adapt_datefield_value(self.pub_date), self.id], ) return [self.__class__(*row) for row in cursor.fetchall()]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/custom_methods/__init__.py
tests/custom_methods/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/custom_methods/tests.py
tests/custom_methods/tests.py
from datetime import date from django.test import TestCase from .models import Article class MethodsTests(TestCase): def test_custom_methods(self): a = Article.objects.create( headline="Parrot programs in Python", pub_date=date(2005, 7, 27) ) b = Article.objects.create( headline="Beatles reunite", pub_date=date(2005, 7, 27) ) self.assertFalse(a.was_published_today()) self.assertQuerySetEqual( a.articles_from_same_day_1(), [ "Beatles reunite", ], lambda a: a.headline, ) self.assertQuerySetEqual( a.articles_from_same_day_2(), [ "Beatles reunite", ], lambda a: a.headline, ) self.assertQuerySetEqual( b.articles_from_same_day_1(), [ "Parrot programs in Python", ], lambda a: a.headline, ) self.assertQuerySetEqual( b.articles_from_same_day_2(), [ "Parrot programs in Python", ], lambda a: a.headline, )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/client.py
tests/auth_tests/client.py
import re from django.contrib.auth.views import ( INTERNAL_RESET_SESSION_TOKEN, PasswordResetConfirmView, ) from django.test import Client def extract_token_from_url(url): token_search = re.search(r"/reset/.*/(.+?)/", url) if token_search: return token_search[1] class PasswordResetConfirmClient(Client): """ This client eases testing the password reset flow by emulating the PasswordResetConfirmView's redirect and saving of the reset token in the user's session. This request puts 'my-token' in the session and redirects to '/reset/bla/set-password/': >>> client = PasswordResetConfirmClient() >>> client.get('/reset/bla/my-token/') """ reset_url_token = PasswordResetConfirmView.reset_url_token def _get_password_reset_confirm_redirect_url(self, url): token = extract_token_from_url(url) if not token: return url # Add the token to the session session = self.session session[INTERNAL_RESET_SESSION_TOKEN] = token session.save() return url.replace(token, self.reset_url_token) def get(self, path, *args, **kwargs): redirect_url = self._get_password_reset_confirm_redirect_url(path) return super().get(redirect_url, *args, **kwargs) def post(self, path, *args, **kwargs): redirect_url = self._get_password_reset_confirm_redirect_url(path) return super().post(redirect_url, *args, **kwargs)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_checks.py
tests/auth_tests/test_checks.py
from django.contrib.auth.checks import ( check_middleware, check_models_permissions, check_user_model, ) from django.contrib.auth.middleware import ( AuthenticationMiddleware, LoginRequiredMiddleware, ) from django.contrib.auth.models import AbstractBaseUser from django.contrib.sessions.middleware import SessionMiddleware from django.core import checks from django.db import models from django.db.models import Q, UniqueConstraint from django.test import SimpleTestCase, override_settings, override_system_checks from django.test.utils import isolate_apps from .models import CustomUserNonUniqueUsername @isolate_apps("auth_tests", attr_name="apps") @override_system_checks([check_user_model]) class UserModelChecksTests(SimpleTestCase): @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserNonListRequiredFields") def test_required_fields_is_list(self): """REQUIRED_FIELDS should be a list.""" class CustomUserNonListRequiredFields(AbstractBaseUser): username = models.CharField(max_length=30, unique=True) date_of_birth = models.DateField() USERNAME_FIELD = "username" REQUIRED_FIELDS = "date_of_birth" errors = checks.run_checks(app_configs=self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "'REQUIRED_FIELDS' must be a list or tuple.", obj=CustomUserNonListRequiredFields, id="auth.E001", ), ], ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserBadRequiredFields") def test_username_not_in_required_fields(self): """USERNAME_FIELD should not appear in REQUIRED_FIELDS.""" class CustomUserBadRequiredFields(AbstractBaseUser): username = models.CharField(max_length=30, unique=True) date_of_birth = models.DateField() USERNAME_FIELD = "username" REQUIRED_FIELDS = ["username", "date_of_birth"] errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The field named as the 'USERNAME_FIELD' for a custom user model " "must not be included in 'REQUIRED_FIELDS'.", hint=( "The 'USERNAME_FIELD' is currently set to 'username', you " "should remove 'username' from the 'REQUIRED_FIELDS'." ), obj=CustomUserBadRequiredFields, id="auth.E002", ), ], ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserNonUniqueUsername") def test_username_non_unique(self): """ A non-unique USERNAME_FIELD raises an error only if the default authentication backend is used. Otherwise, a warning is raised. """ errors = checks.run_checks() self.assertEqual( errors, [ checks.Error( "'CustomUserNonUniqueUsername.username' must be " "unique because it is named as the 'USERNAME_FIELD'.", obj=CustomUserNonUniqueUsername, id="auth.E003", ), ], ) with self.settings(AUTHENTICATION_BACKENDS=["my.custom.backend"]): errors = checks.run_checks() self.assertEqual( errors, [ checks.Warning( "'CustomUserNonUniqueUsername.username' is named as " "the 'USERNAME_FIELD', but it is not unique.", hint=( "Ensure that your authentication backend(s) can handle " "non-unique usernames." ), obj=CustomUserNonUniqueUsername, id="auth.W004", ), ], ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserPartiallyUnique") def test_username_partially_unique(self): class CustomUserPartiallyUnique(AbstractBaseUser): username = models.CharField(max_length=30) USERNAME_FIELD = "username" class Meta: constraints = [ UniqueConstraint( fields=["username"], name="partial_username_unique", condition=Q(password__isnull=False), ), ] errors = checks.run_checks(app_configs=self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "'CustomUserPartiallyUnique.username' must be unique because " "it is named as the 'USERNAME_FIELD'.", obj=CustomUserPartiallyUnique, id="auth.E003", ), ], ) with self.settings(AUTHENTICATION_BACKENDS=["my.custom.backend"]): errors = checks.run_checks(app_configs=self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Warning( "'CustomUserPartiallyUnique.username' is named as the " "'USERNAME_FIELD', but it is not unique.", hint=( "Ensure that your authentication backend(s) can " "handle non-unique usernames." ), obj=CustomUserPartiallyUnique, id="auth.W004", ), ], ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserUniqueConstraint") def test_username_unique_with_model_constraint(self): class CustomUserUniqueConstraint(AbstractBaseUser): username = models.CharField(max_length=30) USERNAME_FIELD = "username" class Meta: constraints = [ UniqueConstraint(fields=["username"], name="username_unique"), ] self.assertEqual(checks.run_checks(app_configs=self.apps.get_app_configs()), []) with self.settings(AUTHENTICATION_BACKENDS=["my.custom.backend"]): errors = checks.run_checks(app_configs=self.apps.get_app_configs()) self.assertEqual(errors, []) @override_settings(AUTH_USER_MODEL="auth_tests.BadUser") def test_is_anonymous_authenticated_methods(self): """ <User Model>.is_anonymous/is_authenticated must not be methods. """ class BadUser(AbstractBaseUser): username = models.CharField(max_length=30, unique=True) USERNAME_FIELD = "username" def is_anonymous(self): return True def is_authenticated(self): return True errors = checks.run_checks(app_configs=self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Critical( "%s.is_anonymous must be an attribute or property rather than " "a method. Ignoring this is a security issue as anonymous " "users will be treated as authenticated!" % BadUser, obj=BadUser, id="auth.C009", ), checks.Critical( "%s.is_authenticated must be an attribute or property rather " "than a method. Ignoring this is a security issue as anonymous " "users will be treated as authenticated!" % BadUser, obj=BadUser, id="auth.C010", ), ], ) @override_settings(AUTH_USER_MODEL="auth_tests.VulnerableStaticUser") def test_is_anonymous_authenticated_static_methods(self): """ <User Model>.is_anonymous/is_authenticated must not be static methods. """ class VulnerableStaticUser(AbstractBaseUser): username = models.CharField(max_length=30, unique=True) USERNAME_FIELD = "username" @staticmethod def is_anonymous(): return False @staticmethod def is_authenticated(): return False errors = checks.run_checks(app_configs=self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Critical( "%s.is_anonymous must be an attribute or property rather than " "a method. Ignoring this is a security issue as anonymous " "users will be treated as authenticated!" % VulnerableStaticUser, obj=VulnerableStaticUser, id="auth.C009", ), checks.Critical( "%s.is_authenticated must be an attribute or property rather " "than a method. Ignoring this is a security issue as anonymous " "users will be treated as authenticated!" % VulnerableStaticUser, obj=VulnerableStaticUser, id="auth.C010", ), ], ) @isolate_apps("auth_tests", attr_name="apps") @override_system_checks([check_models_permissions]) class ModelsPermissionsChecksTests(SimpleTestCase): def test_clashing_default_permissions(self): class Checked(models.Model): class Meta: permissions = [("change_checked", "Can edit permission (duplicate)")] errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The permission codenamed 'change_checked' clashes with a builtin " "permission for model 'auth_tests.Checked'.", obj=Checked, id="auth.E005", ), ], ) def test_non_clashing_custom_permissions(self): class Checked(models.Model): class Meta: permissions = [ ("my_custom_permission", "Some permission"), ("other_one", "Some other permission"), ] errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual(errors, []) def test_clashing_custom_permissions(self): class Checked(models.Model): class Meta: permissions = [ ("my_custom_permission", "Some permission"), ("other_one", "Some other permission"), ( "my_custom_permission", "Some permission with duplicate permission code", ), ] errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The permission codenamed 'my_custom_permission' is duplicated for " "model 'auth_tests.Checked'.", obj=Checked, id="auth.E006", ), ], ) def test_verbose_name_max_length(self): class Checked(models.Model): class Meta: verbose_name = ( "some ridiculously long verbose name that is out of control" * 5 ) errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The verbose_name of model 'auth_tests.Checked' must be at most " "244 characters for its builtin permission names to be at most 255 " "characters.", obj=Checked, id="auth.E007", ), ], ) def test_model_name_max_length(self): model_name = "X" * 94 model = type(model_name, (models.Model,), {"__module__": self.__module__}) errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The name of model 'auth_tests.%s' must be at most 93 " "characters for its builtin permission codenames to be at " "most 100 characters." % model_name, obj=model, id="auth.E011", ), ], ) def test_custom_permission_name_max_length(self): custom_permission_name = ( "some ridiculously long verbose name that is out of control" * 5 ) class Checked(models.Model): class Meta: permissions = [ ("my_custom_permission", custom_permission_name), ] errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The permission named '%s' of model 'auth_tests.Checked' is longer " "than 255 characters." % custom_permission_name, obj=Checked, id="auth.E008", ), ], ) def test_custom_permission_codename_max_length(self): custom_permission_codename = "x" * 101 class Checked(models.Model): class Meta: permissions = [ (custom_permission_codename, "Custom permission"), ] errors = checks.run_checks(self.apps.get_app_configs()) self.assertEqual( errors, [ checks.Error( "The permission codenamed '%s' of model 'auth_tests.Checked' " "is longer than 100 characters." % custom_permission_codename, obj=Checked, id="auth.E012", ), ], ) def test_empty_default_permissions(self): class Checked(models.Model): class Meta: default_permissions = () self.assertEqual(checks.run_checks(self.apps.get_app_configs()), []) class LoginRequiredMiddlewareSubclass(LoginRequiredMiddleware): redirect_field_name = "redirect_to" class AuthenticationMiddlewareSubclass(AuthenticationMiddleware): pass class SessionMiddlewareSubclass(SessionMiddleware): pass @override_system_checks([check_middleware]) class MiddlewareChecksTests(SimpleTestCase): @override_settings( MIDDLEWARE=[ "auth_tests.test_checks.SessionMiddlewareSubclass", "auth_tests.test_checks.AuthenticationMiddlewareSubclass", "auth_tests.test_checks.LoginRequiredMiddlewareSubclass", ] ) def test_middleware_subclasses(self): errors = checks.run_checks() self.assertEqual(errors, []) @override_settings( MIDDLEWARE=[ "auth_tests.test_checks", "auth_tests.test_checks.NotExist", ] ) def test_invalid_middleware_skipped(self): errors = checks.run_checks() self.assertEqual(errors, []) @override_settings( MIDDLEWARE=[ "django.contrib.does.not.Exist", "django.contrib.sessions.middleware.SessionMiddleware", "django.contrib.auth.middleware.AuthenticationMiddleware", "django.contrib.auth.middleware.LoginRequiredMiddleware", ] ) def test_check_ignores_import_error_in_middleware(self): errors = checks.run_checks() self.assertEqual(errors, []) @override_settings( MIDDLEWARE=[ "django.contrib.sessions.middleware.SessionMiddleware", "django.contrib.auth.middleware.AuthenticationMiddleware", "django.contrib.auth.middleware.LoginRequiredMiddleware", ] ) def test_correct_order_with_login_required_middleware(self): errors = checks.run_checks() self.assertEqual(errors, []) @override_settings( MIDDLEWARE=[ "django.contrib.auth.middleware.LoginRequiredMiddleware", "django.contrib.auth.middleware.AuthenticationMiddleware", "django.contrib.sessions.middleware.SessionMiddleware", ] ) def test_incorrect_order_with_login_required_middleware(self): errors = checks.run_checks() self.assertEqual( errors, [ checks.Error( "In order to use django.contrib.auth.middleware." "LoginRequiredMiddleware, django.contrib.auth.middleware." "AuthenticationMiddleware must be defined before it in MIDDLEWARE.", id="auth.E013", ) ], ) @override_settings( MIDDLEWARE=[ "django.contrib.auth.middleware.LoginRequiredMiddleware", ] ) def test_missing_authentication_with_login_required_middleware(self): errors = checks.run_checks() self.assertEqual( errors, [ checks.Error( "In order to use django.contrib.auth.middleware." "LoginRequiredMiddleware, django.contrib.auth.middleware." "AuthenticationMiddleware must be defined before it in MIDDLEWARE.", id="auth.E013", ) ], )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/urls_admin.py
tests/auth_tests/urls_admin.py
""" Test URLs for auth admins. """ from django.contrib import admin from django.contrib.auth.admin import GroupAdmin, UserAdmin from django.contrib.auth.models import Group, User from django.contrib.auth.urls import urlpatterns from django.urls import path # Create a silo'd admin site for just the user/group admins. site = admin.AdminSite(name="auth_test_admin") site.register(User, UserAdmin) site.register(Group, GroupAdmin) urlpatterns += [ path("admin/", site.urls), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_context_processors.py
tests/auth_tests/test_context_processors.py
from django.contrib.auth import authenticate from django.contrib.auth.context_processors import PermLookupDict, PermWrapper from django.contrib.auth.models import Permission, User from django.contrib.contenttypes.models import ContentType from django.db.models import Q from django.test import SimpleTestCase, TestCase, override_settings from .settings import AUTH_MIDDLEWARE, AUTH_TEMPLATES class MockUser: def __repr__(self): return "MockUser()" def has_module_perms(self, perm): return perm == "mockapp" def has_perm(self, perm, obj=None): return perm == "mockapp.someperm" class PermWrapperTests(SimpleTestCase): """ Test some details of the PermWrapper implementation. """ class EQLimiterObject: """ This object makes sure __eq__ will not be called endlessly. """ def __init__(self): self.eq_calls = 0 def __eq__(self, other): if self.eq_calls > 0: return True self.eq_calls += 1 return False def test_repr(self): perms = PermWrapper(MockUser()) self.assertEqual(repr(perms), "PermWrapper(MockUser())") def test_permwrapper_in(self): """ 'something' in PermWrapper works as expected. """ perms = PermWrapper(MockUser()) # Works for modules and full permissions. self.assertIn("mockapp", perms) self.assertNotIn("nonexistent", perms) self.assertIn("mockapp.someperm", perms) self.assertNotIn("mockapp.nonexistent", perms) def test_permlookupdict_in(self): """ No endless loops if accessed with 'in' - refs #18979. """ pldict = PermLookupDict(MockUser(), "mockapp") with self.assertRaises(TypeError): self.EQLimiterObject() in pldict def test_iter(self): with self.assertRaisesMessage(TypeError, "PermWrapper is not iterable."): iter(PermWrapper(MockUser())) @override_settings(ROOT_URLCONF="auth_tests.urls", TEMPLATES=AUTH_TEMPLATES) class AuthContextProcessorTests(TestCase): """ Tests for the ``django.contrib.auth.context_processors.auth`` processor """ @classmethod def setUpTestData(cls): cls.superuser = User.objects.create_superuser( username="super", password="secret", email="super@example.com" ) @override_settings(MIDDLEWARE=AUTH_MIDDLEWARE) def test_session_not_accessed(self): """ The session is not accessed simply by including the auth context processor """ response = self.client.get("/auth_processor_no_attr_access/") self.assertContains(response, "Session not accessed") @override_settings(MIDDLEWARE=AUTH_MIDDLEWARE) def test_session_is_accessed(self): """ The session is accessed if the auth context processor is used and relevant attributes accessed. """ response = self.client.get("/auth_processor_attr_access/") self.assertContains(response, "Session accessed") def test_perms_attrs(self): u = User.objects.create_user(username="normal", password="secret") u.user_permissions.add( Permission.objects.get( content_type=ContentType.objects.get_for_model(Permission), codename="add_permission", ) ) self.client.force_login(u) response = self.client.get("/auth_processor_perms/") self.assertContains(response, "Has auth permissions") self.assertContains(response, "Has auth.add_permission permissions") self.assertNotContains(response, "nonexistent") def test_perm_in_perms_attrs(self): u = User.objects.create_user(username="normal", password="secret") u.user_permissions.add( Permission.objects.get( content_type=ContentType.objects.get_for_model(Permission), codename="add_permission", ) ) self.client.login(username="normal", password="secret") response = self.client.get("/auth_processor_perm_in_perms/") self.assertContains(response, "Has auth permissions") self.assertContains(response, "Has auth.add_permission permissions") self.assertNotContains(response, "nonexistent") def test_message_attrs(self): self.client.force_login(self.superuser) response = self.client.get("/auth_processor_messages/") self.assertContains(response, "Message 1") def test_user_attrs(self): """ The lazy objects returned behave just like the wrapped objects. """ # These are 'functional' level tests for common use cases. Direct # testing of the implementation (SimpleLazyObject) is in the 'utils' # tests. self.client.login(username="super", password="secret") user = authenticate(username="super", password="secret") response = self.client.get("/auth_processor_user/") self.assertContains(response, "unicode: super") self.assertContains(response, "id: %d" % self.superuser.pk) self.assertContains(response, "username: super") # bug #12037 is tested by the {% url %} in the template: self.assertContains(response, "url: /userpage/super/") # A Q() comparing a user and with another Q() (in an AND or OR # fashion). Q(user=response.context["user"]) & Q(someflag=True) # Tests for user equality. This is hard because User defines # equality in a non-duck-typing way # See bug #12060 self.assertEqual(response.context["user"], user) self.assertEqual(user, response.context["user"])
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_decorators.py
tests/auth_tests/test_decorators.py
from asgiref.sync import iscoroutinefunction from django.conf import settings from django.contrib.auth import models from django.contrib.auth.decorators import ( login_not_required, login_required, permission_required, user_passes_test, ) from django.core.exceptions import PermissionDenied from django.http import HttpResponse from django.test import TestCase, override_settings from django.test.client import RequestFactory from .test_views import AuthViewsTestCase @override_settings(ROOT_URLCONF="auth_tests.urls") class LoginRequiredTestCase(AuthViewsTestCase): """ Tests the login_required decorators """ factory = RequestFactory() def test_wrapped_sync_function_is_not_coroutine_function(self): def sync_view(request): return HttpResponse() wrapped_view = login_required(sync_view) self.assertIs(iscoroutinefunction(wrapped_view), False) def test_wrapped_async_function_is_coroutine_function(self): async def async_view(request): return HttpResponse() wrapped_view = login_required(async_view) self.assertIs(iscoroutinefunction(wrapped_view), True) def test_callable(self): """ login_required is assignable to callable objects. """ class CallableView: def __call__(self, *args, **kwargs): pass login_required(CallableView()) def test_view(self): """ login_required is assignable to normal views. """ def normal_view(request): pass login_required(normal_view) def test_login_required(self, view_url="/login_required/", login_url=None): """ login_required works on a simple view wrapped in a login_required decorator. """ if login_url is None: login_url = settings.LOGIN_URL response = self.client.get(view_url) self.assertEqual(response.status_code, 302) self.assertIn(login_url, response.url) self.login() response = self.client.get(view_url) self.assertEqual(response.status_code, 200) def test_login_required_next_url(self): """ login_required works on a simple view wrapped in a login_required decorator with a login_url set. """ self.test_login_required( view_url="/login_required_login_url/", login_url="/somewhere/" ) async def test_login_required_async_view(self, login_url=None): async def async_view(request): return HttpResponse() async def auser_anonymous(): return models.AnonymousUser() async def auser(): return self.u1 if login_url is None: async_view = login_required(async_view) login_url = settings.LOGIN_URL else: async_view = login_required(async_view, login_url=login_url) request = self.factory.get("/rand") request.auser = auser_anonymous response = await async_view(request) self.assertEqual(response.status_code, 302) self.assertIn(login_url, response.url) request.auser = auser response = await async_view(request) self.assertEqual(response.status_code, 200) async def test_login_required_next_url_async_view(self): await self.test_login_required_async_view(login_url="/somewhere/") class LoginNotRequiredTestCase(TestCase): """ Tests the login_not_required decorators """ def test_callable(self): """ login_not_required is assignable to callable objects. """ class CallableView: def __call__(self, *args, **kwargs): pass login_not_required(CallableView()) def test_view(self): """ login_not_required is assignable to normal views. """ def normal_view(request): pass login_not_required(normal_view) def test_decorator_marks_view_as_login_not_required(self): @login_not_required def view(request): return HttpResponse() self.assertFalse(view.login_required) class PermissionsRequiredDecoratorTest(TestCase): """ Tests for the permission_required decorator """ factory = RequestFactory() @classmethod def setUpTestData(cls): cls.user = models.User.objects.create(username="joe", password="qwerty") # Add permissions auth.add_customuser and auth.change_customuser perms = models.Permission.objects.filter( codename__in=("add_customuser", "change_customuser") ) cls.user.user_permissions.add(*perms) @classmethod async def auser(cls): return cls.user def test_wrapped_sync_function_is_not_coroutine_function(self): def sync_view(request): return HttpResponse() wrapped_view = permission_required([])(sync_view) self.assertIs(iscoroutinefunction(wrapped_view), False) def test_wrapped_async_function_is_coroutine_function(self): async def async_view(request): return HttpResponse() wrapped_view = permission_required([])(async_view) self.assertIs(iscoroutinefunction(wrapped_view), True) def test_many_permissions_pass(self): @permission_required( ["auth_tests.add_customuser", "auth_tests.change_customuser"] ) def a_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user resp = a_view(request) self.assertEqual(resp.status_code, 200) def test_many_permissions_in_set_pass(self): @permission_required( {"auth_tests.add_customuser", "auth_tests.change_customuser"} ) def a_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user resp = a_view(request) self.assertEqual(resp.status_code, 200) def test_single_permission_pass(self): @permission_required("auth_tests.add_customuser") def a_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user resp = a_view(request) self.assertEqual(resp.status_code, 200) def test_permissioned_denied_redirect(self): @permission_required( [ "auth_tests.add_customuser", "auth_tests.change_customuser", "nonexistent-permission", ] ) def a_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user resp = a_view(request) self.assertEqual(resp.status_code, 302) def test_permissioned_denied_exception_raised(self): @permission_required( [ "auth_tests.add_customuser", "auth_tests.change_customuser", "nonexistent-permission", ], raise_exception=True, ) def a_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user with self.assertRaises(PermissionDenied): a_view(request) async def test_many_permissions_pass_async_view(self): @permission_required( ["auth_tests.add_customuser", "auth_tests.change_customuser"] ) async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser response = await async_view(request) self.assertEqual(response.status_code, 200) async def test_many_permissions_in_set_pass_async_view(self): @permission_required( {"auth_tests.add_customuser", "auth_tests.change_customuser"} ) async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser response = await async_view(request) self.assertEqual(response.status_code, 200) async def test_single_permission_pass_async_view(self): @permission_required("auth_tests.add_customuser") async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser response = await async_view(request) self.assertEqual(response.status_code, 200) async def test_permissioned_denied_redirect_async_view(self): @permission_required( [ "auth_tests.add_customuser", "auth_tests.change_customuser", "nonexistent-permission", ] ) async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser response = await async_view(request) self.assertEqual(response.status_code, 302) async def test_permissioned_denied_exception_raised_async_view(self): @permission_required( [ "auth_tests.add_customuser", "auth_tests.change_customuser", "nonexistent-permission", ], raise_exception=True, ) async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser with self.assertRaises(PermissionDenied): await async_view(request) class UserPassesTestDecoratorTest(TestCase): factory = RequestFactory() @classmethod def setUpTestData(cls): cls.user_pass = models.User.objects.create(username="joe", password="qwerty") cls.user_deny = models.User.objects.create(username="jim", password="qwerty") models.Group.objects.create(name="Joe group") # Add permissions auth.add_customuser and auth.change_customuser perms = models.Permission.objects.filter( codename__in=("add_customuser", "change_customuser") ) cls.user_pass.user_permissions.add(*perms) @classmethod async def auser_pass(cls): return cls.user_pass @classmethod async def auser_deny(cls): return cls.user_deny def test_wrapped_sync_function_is_not_coroutine_function(self): def sync_view(request): return HttpResponse() wrapped_view = user_passes_test(lambda user: True)(sync_view) self.assertIs(iscoroutinefunction(wrapped_view), False) def test_wrapped_async_function_is_coroutine_function(self): async def async_view(request): return HttpResponse() wrapped_view = user_passes_test(lambda user: True)(async_view) self.assertIs(iscoroutinefunction(wrapped_view), True) def test_decorator(self): def sync_test_func(user): return bool( models.Group.objects.filter(name__istartswith=user.username).exists() ) @user_passes_test(sync_test_func) def sync_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user_pass response = sync_view(request) self.assertEqual(response.status_code, 200) request.user = self.user_deny response = sync_view(request) self.assertEqual(response.status_code, 302) def test_decorator_async_test_func(self): async def async_test_func(user): return await user.ahas_perms(["auth_tests.add_customuser"]) @user_passes_test(async_test_func) def sync_view(request): return HttpResponse() request = self.factory.get("/rand") request.user = self.user_pass response = sync_view(request) self.assertEqual(response.status_code, 200) request.user = self.user_deny response = sync_view(request) self.assertEqual(response.status_code, 302) async def test_decorator_async_view(self): def sync_test_func(user): return bool( models.Group.objects.filter(name__istartswith=user.username).exists() ) @user_passes_test(sync_test_func) async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser_pass response = await async_view(request) self.assertEqual(response.status_code, 200) request.auser = self.auser_deny response = await async_view(request) self.assertEqual(response.status_code, 302) async def test_decorator_async_view_async_test_func(self): async def async_test_func(user): return await user.ahas_perms(["auth_tests.add_customuser"]) @user_passes_test(async_test_func) async def async_view(request): return HttpResponse() request = self.factory.get("/rand") request.auser = self.auser_pass response = await async_view(request) self.assertEqual(response.status_code, 200) request.auser = self.auser_deny response = await async_view(request) self.assertEqual(response.status_code, 302)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_login.py
tests/auth_tests/test_login.py
from django.contrib import auth from django.contrib.auth.models import User from django.http import HttpRequest from django.test import TestCase class TestLogin(TestCase): @classmethod def setUpTestData(cls): cls.user = User.objects.create_user(username="testuser", password="password") def setUp(self): self.request = HttpRequest() self.request.session = self.client.session def test_user_login(self): auth.login(self.request, self.user) self.assertEqual(self.request.session[auth.SESSION_KEY], str(self.user.pk)) def test_inactive_user(self): self.user.is_active = False self.user.save(update_fields=["is_active"]) auth.login(self.request, self.user) self.assertEqual(self.request.session[auth.SESSION_KEY], str(self.user.pk)) def test_without_user(self): with self.assertRaisesMessage( AttributeError, "'NoneType' object has no attribute 'get_session_auth_hash'", ): auth.login(self.request, None)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_forms.py
tests/auth_tests/test_forms.py
import datetime import re import sys import urllib.parse from unittest import mock from django import forms from django.contrib.auth.forms import ( AdminPasswordChangeForm, AdminUserCreationForm, AuthenticationForm, BaseUserCreationForm, PasswordChangeForm, PasswordResetForm, ReadOnlyPasswordHashField, ReadOnlyPasswordHashWidget, SetPasswordForm, SetPasswordMixin, UserChangeForm, UserCreationForm, UsernameField, ) from django.contrib.auth.hashers import make_password from django.contrib.auth.models import User from django.contrib.auth.signals import user_login_failed from django.contrib.sites.models import Site from django.core import mail from django.core.exceptions import ValidationError from django.core.mail import EmailMultiAlternatives from django.forms.fields import CharField, Field, IntegerField from django.test import RequestFactory, SimpleTestCase, TestCase, override_settings from django.urls import reverse from django.utils import translation from django.utils.text import capfirst from django.utils.translation import gettext as _ from django.views.debug import technical_500_response from django.views.decorators.debug import sensitive_variables from .models.custom_user import ( CustomUser, CustomUserWithoutIsActiveField, ExtensionUser, ) from .models.with_custom_email_field import CustomEmailField from .models.with_integer_username import IntegerUsernameUser from .models.with_many_to_many import CustomUserWithM2M, Organization from .settings import AUTH_TEMPLATES class TestDataMixin: @classmethod def setUpTestData(cls): cls.u1 = User.objects.create_user( username="testclient", password="password", email="testclient@example.com" ) cls.u2 = User.objects.create_user( username="inactive", password="password", is_active=False ) cls.u3 = User.objects.create_user(username="staff", password="password") cls.u4 = User.objects.create(username="empty_password", password="") cls.u5 = User.objects.create(username="unmanageable_password", password="$") cls.u6 = User.objects.create(username="unknown_password", password="foo$bar") cls.u7 = User.objects.create( username="unusable_password", password=make_password(None) ) class ExtraValidationFormMixin: def __init__(self, *args, failing_fields=None, **kwargs): super().__init__(*args, **kwargs) self.failing_fields = failing_fields or {} def failing_helper(self, field_name): if field_name in self.failing_fields: errors = [ ValidationError(error, code="invalid") for error in self.failing_fields[field_name] ] raise ValidationError(errors) return self.cleaned_data[field_name] class BaseUserCreationFormTest(TestDataMixin, TestCase): form_class = BaseUserCreationForm def test_form_fields(self): form = self.form_class() self.assertEqual( list(form.fields.keys()), ["username", "password1", "password2"] ) def test_user_already_exists(self): data = { "username": "testclient", "password1": "test123", "password2": "test123", } form = self.form_class(data) self.assertFalse(form.is_valid()) self.assertEqual( form["username"].errors, [str(User._meta.get_field("username").error_messages["unique"])], ) def test_invalid_data(self): data = { "username": "jsmith!", "password1": "test123", "password2": "test123", } form = self.form_class(data) self.assertFalse(form.is_valid()) validator = next( v for v in User._meta.get_field("username").validators if v.code == "invalid" ) self.assertEqual(form["username"].errors, [str(validator.message)]) def test_password_verification(self): # The verification password is incorrect. data = { "username": "jsmith", "password1": "test123", "password2": "test", } form = self.form_class(data) self.assertFalse(form.is_valid()) self.assertEqual( form["password2"].errors, [str(form.error_messages["password_mismatch"])] ) def test_both_passwords(self): # One (or both) passwords weren't given data = {"username": "jsmith"} form = self.form_class(data) required_error = [str(Field.default_error_messages["required"])] self.assertFalse(form.is_valid()) self.assertEqual(form["password1"].errors, required_error) self.assertEqual(form["password2"].errors, required_error) data["password2"] = "test123" form = self.form_class(data) self.assertFalse(form.is_valid()) self.assertEqual(form["password1"].errors, required_error) self.assertEqual(form["password2"].errors, []) @mock.patch("django.contrib.auth.password_validation.password_changed") def test_success(self, password_changed): # The success case. data = { "username": "jsmith@example.com", "password1": "test123", "password2": "test123", } form = self.form_class(data) self.assertTrue(form.is_valid()) form.save(commit=False) self.assertEqual(password_changed.call_count, 0) u = form.save() self.assertEqual(password_changed.call_count, 1) self.assertEqual(repr(u), "<User: jsmith@example.com>") def test_unicode_username(self): data = { "username": "宝", "password1": "test123", "password2": "test123", } form = self.form_class(data) self.assertTrue(form.is_valid()) u = form.save() self.assertEqual(u.username, "宝") def test_normalize_username(self): # The normalization happens in AbstractBaseUser.clean() and ModelForm # validation calls Model.clean(). ohm_username = "testΩ" # U+2126 OHM SIGN data = { "username": ohm_username, "password1": "pwd2", "password2": "pwd2", } form = self.form_class(data) self.assertTrue(form.is_valid()) user = form.save() self.assertNotEqual(user.username, ohm_username) self.assertEqual(user.username, "testΩ") # U+03A9 GREEK CAPITAL LETTER OMEGA def test_invalid_username_no_normalize(self): field = UsernameField(max_length=254) # Usernames are not normalized if they are too long. self.assertEqual(field.to_python("½" * 255), "½" * 255) self.assertEqual(field.to_python("ff" * 254), "ff" * 254) def test_duplicate_normalized_unicode(self): """ To prevent almost identical usernames, visually identical but differing by their unicode code points only, Unicode NFKC normalization should make appear them equal to Django. """ omega_username = "iamtheΩ" # U+03A9 GREEK CAPITAL LETTER OMEGA ohm_username = "iamtheΩ" # U+2126 OHM SIGN self.assertNotEqual(omega_username, ohm_username) User.objects.create_user(username=omega_username, password="pwd") data = { "username": ohm_username, "password1": "pwd2", "password2": "pwd2", } form = self.form_class(data) self.assertFalse(form.is_valid()) self.assertEqual( form.errors["username"], ["A user with that username already exists."] ) @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, { "NAME": ( "django.contrib.auth.password_validation.MinimumLengthValidator" ), "OPTIONS": { "min_length": 12, }, }, ] ) def test_validates_password(self): data = { "username": "otherclient", "password1": "otherclient", "password2": "otherclient", } form = self.form_class(data) self.assertFalse(form.is_valid()) self.assertEqual(len(form["password2"].errors), 2) self.assertIn( "The password is too similar to the username.", form["password2"].errors ) self.assertIn( "This password is too short. It must contain at least 12 characters.", form["password2"].errors, ) def test_password_whitespace_not_stripped(self): data = { "username": "testuser", "password1": " testpassword ", "password2": " testpassword ", } form = self.form_class(data) self.assertTrue(form.is_valid()) self.assertEqual(form.cleaned_data["password1"], data["password1"]) self.assertEqual(form.cleaned_data["password2"], data["password2"]) @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, ] ) def test_password_help_text(self): form = self.form_class() self.assertEqual( form.fields["password1"].help_text, "<ul><li>" "Your password can’t be too similar to your other personal information." "</li></ul>", ) def test_password_extra_validations(self): class ExtraValidationForm(ExtraValidationFormMixin, self.form_class): def clean_password1(self): return self.failing_helper("password1") def clean_password2(self): return self.failing_helper("password2") data = {"username": "extra", "password1": "abc", "password2": "abc"} for fields in (["password1"], ["password2"], ["password1", "password2"]): with self.subTest(fields=fields): errors = {field: [f"Extra validation for {field}."] for field in fields} form = ExtraValidationForm(data, failing_fields=errors) self.assertIs(form.is_valid(), False) self.assertDictEqual(form.errors, errors) @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, ] ) def test_user_create_form_validates_password_with_all_data(self): """ BaseUserCreationForm password validation uses all of the form's data. """ class CustomUserCreationForm(self.form_class): class Meta(self.form_class.Meta): model = User fields = ("username", "email", "first_name", "last_name") form = CustomUserCreationForm( { "username": "testuser", "password1": "testpassword", "password2": "testpassword", "first_name": "testpassword", "last_name": "lastname", } ) self.assertFalse(form.is_valid()) self.assertEqual( form.errors["password2"], ["The password is too similar to the first name."], ) def test_username_field_autocapitalize_none(self): form = self.form_class() self.assertEqual( form.fields["username"].widget.attrs.get("autocapitalize"), "none" ) def test_html_autocomplete_attributes(self): form = self.form_class() tests = ( ("username", "username"), ("password1", "new-password"), ("password2", "new-password"), ) for field_name, autocomplete in tests: with self.subTest(field_name=field_name, autocomplete=autocomplete): self.assertEqual( form.fields[field_name].widget.attrs["autocomplete"], autocomplete ) def test_user_creation_form_class_getitem(self): self.assertIs(BaseUserCreationForm["MyCustomUser"], BaseUserCreationForm) class CustomUserCreationFormTest(TestDataMixin, TestCase): def test_custom_form(self): class CustomUserCreationForm(BaseUserCreationForm): class Meta(BaseUserCreationForm.Meta): model = ExtensionUser fields = UserCreationForm.Meta.fields + ("date_of_birth",) data = { "username": "testclient", "password1": "testclient", "password2": "testclient", "date_of_birth": "1988-02-24", } form = CustomUserCreationForm(data) self.assertTrue(form.is_valid()) def test_custom_form_with_different_username_field(self): class CustomUserCreationForm(BaseUserCreationForm): class Meta(BaseUserCreationForm.Meta): model = CustomUser fields = ("email", "date_of_birth") data = { "email": "test@client222.com", "password1": "testclient", "password2": "testclient", "date_of_birth": "1988-02-24", } form = CustomUserCreationForm(data) self.assertTrue(form.is_valid()) def test_custom_form_hidden_username_field(self): class CustomUserCreationForm(BaseUserCreationForm): class Meta(BaseUserCreationForm.Meta): model = CustomUserWithoutIsActiveField fields = ("email",) # without USERNAME_FIELD data = { "email": "testclient@example.com", "password1": "testclient", "password2": "testclient", } form = CustomUserCreationForm(data) self.assertTrue(form.is_valid()) def test_custom_form_saves_many_to_many_field(self): class CustomUserCreationForm(BaseUserCreationForm): class Meta(BaseUserCreationForm.Meta): model = CustomUserWithM2M fields = UserCreationForm.Meta.fields + ("orgs",) organization = Organization.objects.create(name="organization 1") data = { "username": "testclient@example.com", "password1": "testclient", "password2": "testclient", "orgs": [str(organization.pk)], } form = CustomUserCreationForm(data) self.assertIs(form.is_valid(), True) user = form.save(commit=True) self.assertSequenceEqual(user.orgs.all(), [organization]) def test_custom_form_with_non_required_password(self): class CustomUserCreationForm(BaseUserCreationForm): password1 = forms.CharField(required=False) password2 = forms.CharField(required=False) another_field = forms.CharField(required=True) data = { "username": "testclientnew", "another_field": "Content", } form = CustomUserCreationForm(data) self.assertIs(form.is_valid(), True, form.errors) class UserCreationFormTest(BaseUserCreationFormTest): form_class = UserCreationForm def test_case_insensitive_username(self): data = { "username": "TeStClIeNt", "password1": "test123", "password2": "test123", } form = UserCreationForm(data) self.assertFalse(form.is_valid()) self.assertEqual( form["username"].errors, ["A user with that username already exists."], ) @override_settings(AUTH_USER_MODEL="auth_tests.ExtensionUser") def test_case_insensitive_username_custom_user_and_error_message(self): class CustomUserCreationForm(UserCreationForm): class Meta(UserCreationForm.Meta): model = ExtensionUser fields = UserCreationForm.Meta.fields + ("date_of_birth",) error_messages = { "username": {"unique": "This username has already been taken."} } ExtensionUser.objects.create_user( username="testclient", password="password", email="testclient@example.com", date_of_birth=datetime.date(1984, 3, 5), ) data = { "username": "TeStClIeNt", "password1": "test123", "password2": "test123", "date_of_birth": "1980-01-01", } form = CustomUserCreationForm(data) self.assertIs(form.is_valid(), False) self.assertEqual( form["username"].errors, ["This username has already been taken."], ) # To verify that the login form rejects inactive users, use an authentication # backend that allows them. @override_settings( AUTHENTICATION_BACKENDS=["django.contrib.auth.backends.AllowAllUsersModelBackend"] ) class AuthenticationFormTest(TestDataMixin, TestCase): def test_invalid_username(self): # The user submits an invalid username. data = { "username": "jsmith_does_not_exist", "password": "test123", } form = AuthenticationForm(None, data) self.assertFalse(form.is_valid()) self.assertEqual( form.non_field_errors(), [ form.error_messages["invalid_login"] % {"username": User._meta.get_field("username").verbose_name} ], ) def test_inactive_user(self): # The user is inactive. data = { "username": "inactive", "password": "password", } form = AuthenticationForm(None, data) self.assertFalse(form.is_valid()) self.assertEqual( form.non_field_errors(), [str(form.error_messages["inactive"])] ) # Use an authentication backend that rejects inactive users. @override_settings( AUTHENTICATION_BACKENDS=["django.contrib.auth.backends.ModelBackend"] ) def test_inactive_user_incorrect_password(self): """An invalid login doesn't leak the inactive status of a user.""" data = { "username": "inactive", "password": "incorrect", } form = AuthenticationForm(None, data) self.assertFalse(form.is_valid()) self.assertEqual( form.non_field_errors(), [ form.error_messages["invalid_login"] % {"username": User._meta.get_field("username").verbose_name} ], ) def test_login_failed(self): signal_calls = [] def signal_handler(**kwargs): signal_calls.append(kwargs) user_login_failed.connect(signal_handler) fake_request = object() try: form = AuthenticationForm( fake_request, { "username": "testclient", "password": "incorrect", }, ) self.assertFalse(form.is_valid()) self.assertIs(signal_calls[0]["request"], fake_request) finally: user_login_failed.disconnect(signal_handler) def test_inactive_user_i18n(self): with ( self.settings(USE_I18N=True), translation.override("pt-br", deactivate=True), ): # The user is inactive. data = { "username": "inactive", "password": "password", } form = AuthenticationForm(None, data) self.assertFalse(form.is_valid()) self.assertEqual( form.non_field_errors(), [str(form.error_messages["inactive"])] ) # Use an authentication backend that allows inactive users. @override_settings( AUTHENTICATION_BACKENDS=[ "django.contrib.auth.backends.AllowAllUsersModelBackend" ] ) def test_custom_login_allowed_policy(self): # The user is inactive, but our custom form policy allows them to log # in. data = { "username": "inactive", "password": "password", } class AuthenticationFormWithInactiveUsersOkay(AuthenticationForm): def confirm_login_allowed(self, user): pass form = AuthenticationFormWithInactiveUsersOkay(None, data) self.assertTrue(form.is_valid()) # Raise a ValidationError in the form to disallow some logins according # to custom logic. class PickyAuthenticationForm(AuthenticationForm): def confirm_login_allowed(self, user): if user.username == "inactive": raise ValidationError("This user is disallowed.") raise ValidationError("Sorry, nobody's allowed in.") form = PickyAuthenticationForm(None, data) self.assertFalse(form.is_valid()) self.assertEqual(form.non_field_errors(), ["This user is disallowed."]) data = { "username": "testclient", "password": "password", } form = PickyAuthenticationForm(None, data) self.assertFalse(form.is_valid()) self.assertEqual(form.non_field_errors(), ["Sorry, nobody's allowed in."]) def test_success(self): # The success case data = { "username": "testclient", "password": "password", } form = AuthenticationForm(None, data) self.assertTrue(form.is_valid()) self.assertEqual(form.non_field_errors(), []) def test_unicode_username(self): User.objects.create_user(username="Σαρα", password="pwd") data = { "username": "Σαρα", "password": "pwd", } form = AuthenticationForm(None, data) self.assertTrue(form.is_valid()) self.assertEqual(form.non_field_errors(), []) @override_settings(AUTH_USER_MODEL="auth_tests.CustomEmailField") def test_username_field_max_length_matches_user_model(self): self.assertEqual(CustomEmailField._meta.get_field("username").max_length, 255) data = { "username": "u" * 255, "password": "pwd", "email": "test@example.com", } CustomEmailField.objects.create_user(**data) form = AuthenticationForm(None, data) self.assertEqual(form.fields["username"].max_length, 255) self.assertEqual(form.fields["username"].widget.attrs.get("maxlength"), 255) self.assertEqual(form.errors, {}) @override_settings(AUTH_USER_MODEL="auth_tests.IntegerUsernameUser") def test_username_field_max_length_defaults_to_254(self): self.assertIsNone(IntegerUsernameUser._meta.get_field("username").max_length) data = { "username": "0123456", "password": "password", } IntegerUsernameUser.objects.create_user(**data) form = AuthenticationForm(None, data) self.assertEqual(form.fields["username"].max_length, 254) self.assertEqual(form.fields["username"].widget.attrs.get("maxlength"), 254) self.assertEqual(form.errors, {}) def test_username_field_label(self): class CustomAuthenticationForm(AuthenticationForm): username = CharField(label="Name", max_length=75) form = CustomAuthenticationForm() self.assertEqual(form["username"].label, "Name") def test_username_field_label_not_set(self): class CustomAuthenticationForm(AuthenticationForm): username = CharField() form = CustomAuthenticationForm() username_field = User._meta.get_field(User.USERNAME_FIELD) self.assertEqual( form.fields["username"].label, capfirst(username_field.verbose_name) ) def test_username_field_autocapitalize_none(self): form = AuthenticationForm() self.assertEqual( form.fields["username"].widget.attrs.get("autocapitalize"), "none" ) def test_username_field_label_empty_string(self): class CustomAuthenticationForm(AuthenticationForm): username = CharField(label="") form = CustomAuthenticationForm() self.assertEqual(form.fields["username"].label, "") def test_password_whitespace_not_stripped(self): data = { "username": "testuser", "password": " pass ", } form = AuthenticationForm(None, data) form.is_valid() # Not necessary to have valid credentails for the test. self.assertEqual(form.cleaned_data["password"], data["password"]) @override_settings(AUTH_USER_MODEL="auth_tests.IntegerUsernameUser") def test_integer_username(self): class CustomAuthenticationForm(AuthenticationForm): username = IntegerField() user = IntegerUsernameUser.objects.create_user(username=0, password="pwd") data = { "username": 0, "password": "pwd", } form = CustomAuthenticationForm(None, data) self.assertTrue(form.is_valid()) self.assertEqual(form.cleaned_data["username"], data["username"]) self.assertEqual(form.cleaned_data["password"], data["password"]) self.assertEqual(form.errors, {}) self.assertEqual(form.user_cache, user) def test_get_invalid_login_error(self): error = AuthenticationForm().get_invalid_login_error() self.assertIsInstance(error, ValidationError) self.assertEqual( error.message, "Please enter a correct %(username)s and password. Note that both " "fields may be case-sensitive.", ) self.assertEqual(error.code, "invalid_login") self.assertEqual(error.params, {"username": "username"}) def test_html_autocomplete_attributes(self): form = AuthenticationForm() tests = ( ("username", "username"), ("password", "current-password"), ) for field_name, autocomplete in tests: with self.subTest(field_name=field_name, autocomplete=autocomplete): self.assertEqual( form.fields[field_name].widget.attrs["autocomplete"], autocomplete ) def test_no_password(self): data = {"username": "username"} form = AuthenticationForm(None, data) self.assertIs(form.is_valid(), False) self.assertEqual( form["password"].errors, [Field.default_error_messages["required"]] ) class SetPasswordFormTest(TestDataMixin, TestCase): def test_password_verification(self): # The two new passwords do not match. user = User.objects.get(username="testclient") data = { "new_password1": "abc123", "new_password2": "abc", } form = SetPasswordForm(user, data) self.assertFalse(form.is_valid()) self.assertEqual( form["new_password2"].errors, [str(form.error_messages["password_mismatch"])], ) @mock.patch("django.contrib.auth.password_validation.password_changed") def test_success(self, password_changed): user = User.objects.get(username="testclient") data = { "new_password1": "abc123", "new_password2": "abc123", } form = SetPasswordForm(user, data) self.assertTrue(form.is_valid()) form.save(commit=False) self.assertEqual(password_changed.call_count, 0) form.save() self.assertEqual(password_changed.call_count, 1) @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, { "NAME": ( "django.contrib.auth.password_validation.MinimumLengthValidator" ), "OPTIONS": { "min_length": 12, }, }, ] ) def test_validates_password(self): user = User.objects.get(username="testclient") data = { "new_password1": "testclient", "new_password2": "testclient", } form = SetPasswordForm(user, data) self.assertFalse(form.is_valid()) self.assertEqual(len(form["new_password2"].errors), 2) self.assertIn( "The password is too similar to the username.", form["new_password2"].errors ) self.assertIn( "This password is too short. It must contain at least 12 characters.", form["new_password2"].errors, ) # SetPasswordForm does not consider usable_password for form validation data = { "new_password1": "testclient", "new_password2": "testclient", "usable_password": "false", } form = SetPasswordForm(user, data) self.assertFalse(form.is_valid()) self.assertEqual(len(form["new_password2"].errors), 2) self.assertIn( "The password is too similar to the username.", form["new_password2"].errors ) self.assertIn( "This password is too short. It must contain at least 12 characters.", form["new_password2"].errors, ) def test_no_password(self): user = User.objects.get(username="testclient") data = {"new_password1": "new-password"} form = SetPasswordForm(user, data) self.assertIs(form.is_valid(), False) self.assertEqual( form["new_password2"].errors, [Field.default_error_messages["required"]] ) form = SetPasswordForm(user, {}) self.assertIs(form.is_valid(), False) self.assertEqual( form["new_password1"].errors, [Field.default_error_messages["required"]] ) self.assertEqual( form["new_password2"].errors, [Field.default_error_messages["required"]] ) def test_password_whitespace_not_stripped(self): user = User.objects.get(username="testclient") data = { "new_password1": " password ", "new_password2": " password ", } form = SetPasswordForm(user, data) self.assertTrue(form.is_valid()) self.assertEqual(form.cleaned_data["new_password1"], data["new_password1"]) self.assertEqual(form.cleaned_data["new_password2"], data["new_password2"]) @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, { "NAME": ( "django.contrib.auth.password_validation.MinimumLengthValidator" ), "OPTIONS": { "min_length": 12, }, }, ] ) def test_help_text_translation(self): french_help_texts = [ "Votre mot de passe ne peut pas trop ressembler à vos autres informations " "personnelles.", "Votre mot de passe doit contenir au minimum 12 caractères.", ] form = SetPasswordForm(self.u1) with translation.override("fr"): html = form.as_p() for french_text in french_help_texts: self.assertIn(french_text, html) def test_html_autocomplete_attributes(self): form = SetPasswordForm(self.u1) tests = ( ("new_password1", "new-password"), ("new_password2", "new-password"), ) for field_name, autocomplete in tests: with self.subTest(field_name=field_name, autocomplete=autocomplete): self.assertEqual( form.fields[field_name].widget.attrs["autocomplete"], autocomplete ) def test_password_extra_validations(self): class ExtraValidationForm(ExtraValidationFormMixin, SetPasswordForm): def clean_new_password1(self): return self.failing_helper("new_password1")
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
true
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_views.py
tests/auth_tests/test_views.py
import datetime import itertools import re from importlib import import_module from unittest import mock from urllib.parse import quote, urljoin from django.apps import apps from django.conf import settings from django.contrib.admin.models import LogEntry from django.contrib.auth import BACKEND_SESSION_KEY, REDIRECT_FIELD_NAME, SESSION_KEY from django.contrib.auth.forms import ( AuthenticationForm, PasswordChangeForm, SetPasswordForm, ) from django.contrib.auth.models import Permission, User from django.contrib.auth.views import ( INTERNAL_RESET_SESSION_TOKEN, LoginView, RedirectURLMixin, logout_then_login, redirect_to_login, ) from django.contrib.contenttypes.models import ContentType from django.contrib.messages import Message from django.contrib.messages.test import MessagesTestMixin from django.contrib.sessions.middleware import SessionMiddleware from django.contrib.sites.requests import RequestSite from django.core import mail from django.core.exceptions import ImproperlyConfigured from django.db import connection from django.http import HttpRequest, HttpResponse from django.middleware.csrf import CsrfViewMiddleware, get_token from django.test import Client, TestCase, modify_settings, override_settings from django.test.client import RedirectCycleError from django.urls import NoReverseMatch, reverse, reverse_lazy from django.utils.http import urlsafe_base64_encode from .client import PasswordResetConfirmClient from .models import CustomUser, CustomUserCompositePrimaryKey, UUIDUser from .settings import AUTH_TEMPLATES class RedirectURLMixinTests(TestCase): @override_settings(ROOT_URLCONF="auth_tests.urls") def test_get_default_redirect_url_next_page(self): class RedirectURLView(RedirectURLMixin): next_page = "/custom/" self.assertEqual(RedirectURLView().get_default_redirect_url(), "/custom/") def test_get_default_redirect_url_no_next_page(self): msg = "No URL to redirect to. Provide a next_page." with self.assertRaisesMessage(ImproperlyConfigured, msg): RedirectURLMixin().get_default_redirect_url() @override_settings( LANGUAGES=[("en", "English")], LANGUAGE_CODE="en", TEMPLATES=AUTH_TEMPLATES, ROOT_URLCONF="auth_tests.urls", ) class AuthViewsTestCase(TestCase): """ Helper base class for the test classes that follow. """ @classmethod def setUpTestData(cls): cls.u1 = User.objects.create_user( username="testclient", password="password", email="testclient@example.com" ) cls.u3 = User.objects.create_user( username="staff", password="password", email="staffmember@example.com" ) def login(self, username="testclient", password="password", url="/login/"): response = self.client.post( url, { "username": username, "password": password, }, ) self.assertIn(SESSION_KEY, self.client.session) return response def logout(self): response = self.client.post("/admin/logout/") self.assertEqual(response.status_code, 200) self.assertNotIn(SESSION_KEY, self.client.session) def assertFormError(self, response, error): """Assert that error is found in response.context['form'] errors""" form_errors = list(itertools.chain(*response.context["form"].errors.values())) self.assertIn(str(error), form_errors) @override_settings(ROOT_URLCONF="django.contrib.auth.urls") class AuthViewNamedURLTests(AuthViewsTestCase): def test_named_urls(self): "Named URLs should be reversible" expected_named_urls = [ ("login", [], {}), ("logout", [], {}), ("password_change", [], {}), ("password_change_done", [], {}), ("password_reset", [], {}), ("password_reset_done", [], {}), ( "password_reset_confirm", [], { "uidb64": "aaaaaaa", "token": "1111-aaaaa", }, ), ("password_reset_complete", [], {}), ] for name, args, kwargs in expected_named_urls: with self.subTest(name=name): try: reverse(name, args=args, kwargs=kwargs) except NoReverseMatch: self.fail( "Reversal of url named '%s' failed with NoReverseMatch" % name ) class PasswordResetTest(AuthViewsTestCase): def setUp(self): self.client = PasswordResetConfirmClient() def test_email_not_found(self): """If the provided email is not registered, don't raise any error but also don't send any email.""" response = self.client.get("/password_reset/") self.assertEqual(response.status_code, 200) response = self.client.post( "/password_reset/", {"email": "not_a_real_email@email.com"} ) self.assertEqual(response.status_code, 302) self.assertEqual(len(mail.outbox), 0) def test_email_found(self): "Email is sent if a valid email address is provided for password reset" response = self.client.post( "/password_reset/", {"email": "staffmember@example.com"} ) self.assertEqual(response.status_code, 302) self.assertEqual(len(mail.outbox), 1) self.assertIn("http://", mail.outbox[0].body) self.assertEqual(settings.DEFAULT_FROM_EMAIL, mail.outbox[0].from_email) # optional multipart text/html email has been added. Make sure # original, default functionality is 100% the same self.assertFalse(mail.outbox[0].message().is_multipart()) def test_extra_email_context(self): """ extra_email_context should be available in the email template context. """ response = self.client.post( "/password_reset_extra_email_context/", {"email": "staffmember@example.com"}, ) self.assertEqual(response.status_code, 302) self.assertEqual(len(mail.outbox), 1) self.assertIn('Email email context: "Hello!"', mail.outbox[0].body) self.assertIn("http://custom.example.com/reset/", mail.outbox[0].body) def test_html_mail_template(self): """ A multipart email with text/plain and text/html is sent if the html_email_template parameter is passed to the view """ response = self.client.post( "/password_reset/html_email_template/", {"email": "staffmember@example.com"} ) self.assertEqual(response.status_code, 302) self.assertEqual(len(mail.outbox), 1) message = mail.outbox[0].message() self.assertEqual(len(message.get_payload()), 2) self.assertTrue(message.is_multipart()) self.assertEqual(message.get_payload(0).get_content_type(), "text/plain") self.assertEqual(message.get_payload(1).get_content_type(), "text/html") self.assertNotIn("<html>", message.get_payload(0).get_payload()) self.assertIn("<html>", message.get_payload(1).get_payload()) def test_email_found_custom_from(self): """ Email is sent if a valid email address is provided for password reset when a custom from_email is provided. """ response = self.client.post( "/password_reset_from_email/", {"email": "staffmember@example.com"} ) self.assertEqual(response.status_code, 302) self.assertEqual(len(mail.outbox), 1) self.assertEqual("staffmember@example.com", mail.outbox[0].from_email) # Skip any 500 handler action (like sending more mail...) @override_settings(DEBUG_PROPAGATE_EXCEPTIONS=True) def test_poisoned_http_host(self): "Poisoned HTTP_HOST headers can't be used for reset emails" # This attack is based on the way browsers handle URLs. The colon # should be used to separate the port, but if the URL contains an @, # the colon is interpreted as part of a username for login purposes, # making 'evil.com' the request domain. Since HTTP_HOST is used to # produce a meaningful reset URL, we need to be certain that the # HTTP_HOST header isn't poisoned. This is done as a check when # get_host() is invoked, but we check here as a practical consequence. with self.assertLogs("django.security.DisallowedHost", "ERROR"): response = self.client.post( "/password_reset/", {"email": "staffmember@example.com"}, headers={"host": "www.example:dr.frankenstein@evil.tld"}, ) self.assertEqual(response.status_code, 400) self.assertEqual(len(mail.outbox), 0) # Skip any 500 handler action (like sending more mail...) @override_settings(DEBUG_PROPAGATE_EXCEPTIONS=True) def test_poisoned_http_host_admin_site(self): """ Poisoned HTTP_HOST headers can't be used for reset emails on admin views """ with self.assertLogs("django.security.DisallowedHost", "ERROR"): response = self.client.post( "/admin_password_reset/", {"email": "staffmember@example.com"}, headers={"host": "www.example:dr.frankenstein@evil.tld"}, ) self.assertEqual(response.status_code, 400) self.assertEqual(len(mail.outbox), 0) def _test_confirm_start(self): # Start by creating the email self.client.post("/password_reset/", {"email": "staffmember@example.com"}) self.assertEqual(len(mail.outbox), 1) return self._read_signup_email(mail.outbox[0]) def _read_signup_email(self, email): urlmatch = re.search(r"https?://[^/]*(/.*reset/\S*)", email.body) self.assertIsNotNone(urlmatch, "No URL found in sent email") return urlmatch[0], urlmatch[1] def test_confirm_valid(self): url, path = self._test_confirm_start() response = self.client.get(path) # redirect to a 'complete' page: self.assertContains(response, "Please enter your new password") def test_confirm_invalid(self): url, path = self._test_confirm_start() # Let's munge the token in the path, but keep the same length, # in case the URLconf will reject a different length. path = path[:-5] + ("0" * 4) + path[-1] response = self.client.get(path) self.assertContains(response, "The password reset link was invalid") def test_confirm_invalid_user(self): # A nonexistent user returns a 200 response, not a 404. response = self.client.get("/reset/123456/1-1/") self.assertContains(response, "The password reset link was invalid") def test_confirm_overflow_user(self): # A base36 user id that overflows int returns a 200 response. response = self.client.get("/reset/zzzzzzzzzzzzz/1-1/") self.assertContains(response, "The password reset link was invalid") def test_confirm_invalid_post(self): # Same as test_confirm_invalid, but trying to do a POST instead. url, path = self._test_confirm_start() path = path[:-5] + ("0" * 4) + path[-1] self.client.post( path, { "new_password1": "anewpassword", "new_password2": " anewpassword", }, ) # Check the password has not been changed u = User.objects.get(email="staffmember@example.com") self.assertTrue(not u.check_password("anewpassword")) def test_confirm_invalid_hash(self): """A POST with an invalid token is rejected.""" u = User.objects.get(email="staffmember@example.com") original_password = u.password url, path = self._test_confirm_start() path_parts = path.split("-") path_parts[-1] = ("0") * 20 + "/" path = "-".join(path_parts) response = self.client.post( path, { "new_password1": "anewpassword", "new_password2": "anewpassword", }, ) self.assertIs(response.context["validlink"], False) u.refresh_from_db() self.assertEqual(original_password, u.password) # password hasn't changed def test_confirm_complete(self): url, path = self._test_confirm_start() response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) # Check the password has been changed u = User.objects.get(email="staffmember@example.com") self.assertTrue(u.check_password("anewpassword")) # The reset token is deleted from the session. self.assertNotIn(INTERNAL_RESET_SESSION_TOKEN, self.client.session) # Check we can't use the link again response = self.client.get(path) self.assertContains(response, "The password reset link was invalid") def test_confirm_different_passwords(self): url, path = self._test_confirm_start() response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "x"} ) self.assertFormError( response, SetPasswordForm.error_messages["password_mismatch"] ) def test_reset_redirect_default(self): response = self.client.post( "/password_reset/", {"email": "staffmember@example.com"} ) self.assertRedirects( response, "/password_reset/done/", fetch_redirect_response=False ) def test_reset_custom_redirect(self): response = self.client.post( "/password_reset/custom_redirect/", {"email": "staffmember@example.com"} ) self.assertRedirects(response, "/custom/", fetch_redirect_response=False) def test_reset_custom_redirect_named(self): response = self.client.post( "/password_reset/custom_redirect/named/", {"email": "staffmember@example.com"}, ) self.assertRedirects( response, "/password_reset/", fetch_redirect_response=False ) def test_confirm_redirect_default(self): url, path = self._test_confirm_start() response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) self.assertRedirects(response, "/reset/done/", fetch_redirect_response=False) def test_confirm_redirect_custom(self): url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/custom/") response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) self.assertRedirects(response, "/custom/", fetch_redirect_response=False) def test_confirm_redirect_custom_named(self): url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/custom/named/") response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) self.assertRedirects( response, "/password_reset/", fetch_redirect_response=False ) def test_confirm_custom_reset_url_token(self): url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/custom/token/") self.client.reset_url_token = "set-passwordcustom" response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"}, ) self.assertRedirects(response, "/reset/done/", fetch_redirect_response=False) def test_confirm_login_post_reset(self): url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/post_reset_login/") response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) self.assertRedirects(response, "/reset/done/", fetch_redirect_response=False) self.assertIn(SESSION_KEY, self.client.session) @override_settings( AUTHENTICATION_BACKENDS=[ "django.contrib.auth.backends.ModelBackend", "django.contrib.auth.backends.AllowAllUsersModelBackend", ] ) def test_confirm_login_post_reset_custom_backend(self): # This backend is specified in the URL pattern. backend = "django.contrib.auth.backends.AllowAllUsersModelBackend" url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/post_reset_login_custom_backend/") response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) self.assertRedirects(response, "/reset/done/", fetch_redirect_response=False) self.assertIn(SESSION_KEY, self.client.session) self.assertEqual(self.client.session[BACKEND_SESSION_KEY], backend) def test_confirm_login_post_reset_already_logged_in(self): url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/post_reset_login/") self.login() response = self.client.post( path, {"new_password1": "anewpassword", "new_password2": "anewpassword"} ) self.assertRedirects(response, "/reset/done/", fetch_redirect_response=False) self.assertIn(SESSION_KEY, self.client.session) def test_confirm_display_user_from_form(self): url, path = self._test_confirm_start() response = self.client.get(path) # The password_reset_confirm() view passes the user object to the # SetPasswordForm``, even on GET requests (#16919). For this test, # {{ form.user }}`` is rendered in the template # registration/password_reset_confirm.html. username = User.objects.get(email="staffmember@example.com").username self.assertContains(response, "Hello, %s." % username) # However, the view should NOT pass any user object on a form if the # password reset link was invalid. response = self.client.get("/reset/zzzzzzzzzzzzz/1-1/") self.assertContains(response, "Hello, .") def test_confirm_link_redirects_to_set_password_page(self): url, path = self._test_confirm_start() # Don't use PasswordResetConfirmClient (self.client) here which # automatically fetches the redirect page. client = Client() response = client.get(path) token = response.resolver_match.kwargs["token"] uuidb64 = response.resolver_match.kwargs["uidb64"] self.assertRedirects(response, "/reset/%s/set-password/" % uuidb64) self.assertEqual(client.session["_password_reset_token"], token) def test_confirm_custom_reset_url_token_link_redirects_to_set_password_page(self): url, path = self._test_confirm_start() path = path.replace("/reset/", "/reset/custom/token/") client = Client() response = client.get(path) token = response.resolver_match.kwargs["token"] uuidb64 = response.resolver_match.kwargs["uidb64"] self.assertRedirects( response, "/reset/custom/token/%s/set-passwordcustom/" % uuidb64 ) self.assertEqual(client.session["_password_reset_token"], token) def test_invalid_link_if_going_directly_to_the_final_reset_password_url(self): url, path = self._test_confirm_start() _, uuidb64, _ = path.strip("/").split("/") response = Client().get("/reset/%s/set-password/" % uuidb64) self.assertContains(response, "The password reset link was invalid") def test_missing_kwargs(self): msg = "The URL path must contain 'uidb64' and 'token' parameters." with self.assertRaisesMessage(ImproperlyConfigured, msg): self.client.get("/reset/missing_parameters/") @modify_settings( MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"} ) def test_access_under_login_required_middleware(self): reset_urls = [ reverse("password_reset"), reverse("password_reset_done"), reverse("password_reset_confirm", kwargs={"uidb64": "abc", "token": "def"}), reverse("password_reset_complete"), ] for url in reset_urls: with self.subTest(url=url): response = self.client.get(url) self.assertEqual(response.status_code, 200) response = self.client.post( "/password_reset/", {"email": "staffmember@example.com"} ) self.assertRedirects( response, "/password_reset/done/", fetch_redirect_response=False ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") class CustomUserPasswordResetTest(AuthViewsTestCase): user_email = "staffmember@example.com" @classmethod def setUpTestData(cls): cls.u1 = CustomUser.custom_objects.create( email="staffmember@example.com", date_of_birth=datetime.date(1976, 11, 8), ) cls.u1.set_password("password") cls.u1.save() def setUp(self): self.client = PasswordResetConfirmClient() def _test_confirm_start(self): # Start by creating the email response = self.client.post("/password_reset/", {"email": self.user_email}) self.assertEqual(response.status_code, 302) self.assertEqual(len(mail.outbox), 1) return self._read_signup_email(mail.outbox[0]) def _read_signup_email(self, email): urlmatch = re.search(r"https?://[^/]*(/.*reset/\S*)", email.body) self.assertIsNotNone(urlmatch, "No URL found in sent email") return urlmatch[0], urlmatch[1] def test_confirm_valid_custom_user(self): url, path = self._test_confirm_start() response = self.client.get(path) # redirect to a 'complete' page: self.assertContains(response, "Please enter your new password") # then submit a new password response = self.client.post( path, { "new_password1": "anewpassword", "new_password2": "anewpassword", }, ) self.assertRedirects(response, "/reset/done/") @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserCompositePrimaryKey") class CustomUserCompositePrimaryKeyPasswordResetTest(CustomUserPasswordResetTest): @classmethod def setUpTestData(cls): cls.u1 = CustomUserCompositePrimaryKey.custom_objects.create( email="staffmember@example.com", date_of_birth=datetime.date(1976, 11, 8), ) cls.u1.set_password("password") cls.u1.save() @override_settings(AUTH_USER_MODEL="auth_tests.UUIDUser") class UUIDUserPasswordResetTest(CustomUserPasswordResetTest): def _test_confirm_start(self): # instead of fixture UUIDUser.objects.create_user( email=self.user_email, username="foo", password="foo", ) return super()._test_confirm_start() def test_confirm_invalid_uuid(self): """A uidb64 that decodes to a non-UUID doesn't crash.""" _, path = self._test_confirm_start() invalid_uidb64 = urlsafe_base64_encode(b"INVALID_UUID") first, _uuidb64_, second = path.strip("/").split("/") response = self.client.get( "/" + "/".join((first, invalid_uidb64, second)) + "/" ) self.assertContains(response, "The password reset link was invalid") class ChangePasswordTest(AuthViewsTestCase): def fail_login(self): response = self.client.post( "/login/", { "username": "testclient", "password": "password", }, ) self.assertFormError( response, AuthenticationForm.error_messages["invalid_login"] % {"username": User._meta.get_field("username").verbose_name}, ) def logout(self): self.client.post("/logout/") def test_password_change_fails_with_invalid_old_password(self): self.login() response = self.client.post( "/password_change/", { "old_password": "donuts", "new_password1": "password1", "new_password2": "password1", }, ) self.assertFormError( response, PasswordChangeForm.error_messages["password_incorrect"] ) def test_password_change_fails_with_mismatched_passwords(self): self.login() response = self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "donuts", }, ) self.assertFormError( response, SetPasswordForm.error_messages["password_mismatch"] ) def test_password_change_succeeds(self): self.login() self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.fail_login() self.login(password="password1") def test_password_change_done_succeeds(self): self.login() response = self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.assertRedirects( response, "/password_change/done/", fetch_redirect_response=False ) @override_settings(LOGIN_URL="/login/") def test_password_change_done_fails(self): response = self.client.get("/password_change/done/") self.assertRedirects( response, "/login/?next=/password_change/done/", fetch_redirect_response=False, ) def test_password_change_redirect_default(self): self.login() response = self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.assertRedirects( response, "/password_change/done/", fetch_redirect_response=False ) def test_password_change_redirect_custom(self): self.login() response = self.client.post( "/password_change/custom/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.assertRedirects(response, "/custom/", fetch_redirect_response=False) def test_password_change_redirect_custom_named(self): self.login() response = self.client.post( "/password_change/custom/named/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.assertRedirects( response, "/password_reset/", fetch_redirect_response=False ) @modify_settings( MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"} ) def test_access_under_login_required_middleware(self): response = self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.assertRedirects( response, settings.LOGIN_URL + "?next=/password_change/", fetch_redirect_response=False, ) self.login() response = self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) self.assertRedirects( response, "/password_change/done/", fetch_redirect_response=False ) class SessionAuthenticationTests(AuthViewsTestCase): def test_user_password_change_updates_session(self): """ #21649 - Ensure contrib.auth.views.password_change updates the user's session auth hash after a password change so the session isn't logged out. """ self.login() original_session_key = self.client.session.session_key response = self.client.post( "/password_change/", { "old_password": "password", "new_password1": "password1", "new_password2": "password1", }, ) # if the hash isn't updated, retrieving the redirection page will fail. self.assertRedirects(response, "/password_change/done/") # The session key is rotated. self.assertNotEqual(original_session_key, self.client.session.session_key) class LoginTest(AuthViewsTestCase): def test_current_site_in_context_after_login(self): response = self.client.get(reverse("login")) self.assertEqual(response.status_code, 200) if apps.is_installed("django.contrib.sites"): Site = apps.get_model("sites.Site") site = Site.objects.get_current() self.assertEqual(response.context["site"], site) self.assertEqual(response.context["site_name"], site.name) else: self.assertIsInstance(response.context["site"], RequestSite) self.assertIsInstance(response.context["form"], AuthenticationForm) def test_security_check(self): login_url = reverse("login") # These URLs should not pass the security check. bad_urls = ( "http://example.com", "http:///example.com", "https://example.com", "ftp://example.com", "///example.com", "//example.com", 'javascript:alert("XSS")', ) for bad_url in bad_urls: with self.subTest(bad_url=bad_url): nasty_url = "%(url)s?%(next)s=%(bad_url)s" % { "url": login_url, "next": REDIRECT_FIELD_NAME, "bad_url": quote(bad_url), } response = self.client.post( nasty_url, { "username": "testclient", "password": "password", }, ) self.assertEqual(response.status_code, 302) self.assertNotIn( bad_url, response.url, "%s should be blocked" % bad_url ) # These URLs should pass the security check. good_urls = ( "/view/?param=http://example.com", "/view/?param=https://example.com", "/view?param=ftp://example.com", "view/?param=//example.com", "https://testserver/", "HTTPS://testserver/", "//testserver/", "/url%20with%20spaces/", ) for good_url in good_urls: with self.subTest(good_url=good_url): safe_url = "%(url)s?%(next)s=%(good_url)s" % { "url": login_url, "next": REDIRECT_FIELD_NAME, "good_url": quote(good_url), } response = self.client.post( safe_url, { "username": "testclient", "password": "password", }, ) self.assertEqual(response.status_code, 302) self.assertIn(good_url, response.url, "%s should be allowed" % good_url) def test_security_check_https(self): login_url = reverse("login") non_https_next_url = "http://testserver/path" not_secured_url = "%(url)s?%(next)s=%(next_url)s" % { "url": login_url, "next": REDIRECT_FIELD_NAME, "next_url": quote(non_https_next_url), } post_data = { "username": "testclient", "password": "password", }
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
true
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_templatetags.py
tests/auth_tests/test_templatetags.py
from django.contrib.auth.hashers import make_password from django.contrib.auth.templatetags.auth import render_password_as_hash from django.test import SimpleTestCase, override_settings class RenderPasswordAsHashTests(SimpleTestCase): @override_settings( PASSWORD_HASHERS=["django.contrib.auth.hashers.PBKDF2PasswordHasher"] ) def test_valid_password(self): value = ( "pbkdf2_sha256$100000$a6Pucb1qSFcD$WmCkn9Hqidj48NVe5x0FEM6A9YiOqQcl/83m2Z5u" "dm0=" ) hashed_html = ( "<p><strong>algorithm</strong>: <bdi>pbkdf2_sha256</bdi> " "<strong>iterations</strong>: <bdi>100000</bdi> " "<strong>salt</strong>: <bdi>a6Pucb******</bdi> " "<strong>hash</strong>: <bdi>WmCkn9**************************************" "</bdi></p>" ) self.assertEqual(render_password_as_hash(value), hashed_html) def test_invalid_password(self): expected = ( "<p><strong>Invalid password format or unknown hashing algorithm.</strong>" "</p>" ) for value in ["pbkdf2_sh", "md5$password", "invalid", "testhash$password"]: with self.subTest(value=value): self.assertEqual(render_password_as_hash(value), expected) def test_no_password(self): expected = "<p><strong>No password set.</strong></p>" for value in ["", None, make_password(None)]: with self.subTest(value=value): self.assertEqual(render_password_as_hash(value), expected)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_remote_user.py
tests/auth_tests/test_remote_user.py
from datetime import UTC, datetime from django.conf import settings from django.contrib.auth import aauthenticate, authenticate from django.contrib.auth.backends import RemoteUserBackend from django.contrib.auth.middleware import RemoteUserMiddleware from django.contrib.auth.models import User from django.middleware.csrf import _get_new_csrf_string, _mask_cipher_secret from django.test import ( AsyncClient, Client, TestCase, modify_settings, override_settings, ) @override_settings(ROOT_URLCONF="auth_tests.urls") class RemoteUserTest(TestCase): middleware = "django.contrib.auth.middleware.RemoteUserMiddleware" backend = "django.contrib.auth.backends.RemoteUserBackend" header = "REMOTE_USER" email_header = "REMOTE_EMAIL" # Usernames to be passed in REMOTE_USER for the test_known_user test case. known_user = "knownuser" known_user2 = "knownuser2" @classmethod def setUpClass(cls): cls.enterClassContext( modify_settings( AUTHENTICATION_BACKENDS={"append": cls.backend}, MIDDLEWARE={"append": cls.middleware}, ) ) super().setUpClass() def test_passing_explicit_none(self): msg = "get_response must be provided." with self.assertRaisesMessage(ValueError, msg): RemoteUserMiddleware(None) def test_no_remote_user(self): """Users are not created when remote user is not specified.""" num_users = User.objects.count() response = self.client.get("/remote_user/") self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(User.objects.count(), num_users) response = self.client.get("/remote_user/", **{self.header: None}) self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(User.objects.count(), num_users) response = self.client.get("/remote_user/", **{self.header: ""}) self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(User.objects.count(), num_users) async def test_no_remote_user_async(self): """See test_no_remote_user.""" num_users = await User.objects.acount() response = await self.async_client.get("/remote_user/") self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(await User.objects.acount(), num_users) response = await self.async_client.get("/remote_user/", **{self.header: ""}) self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(await User.objects.acount(), num_users) def test_csrf_validation_passes_after_process_request_login(self): """ CSRF check must access the CSRF token from the session or cookie, rather than the request, as rotate_token() may have been called by an authentication middleware during the process_request() phase. """ csrf_client = Client(enforce_csrf_checks=True) csrf_secret = _get_new_csrf_string() csrf_token = _mask_cipher_secret(csrf_secret) csrf_token_form = _mask_cipher_secret(csrf_secret) headers = {self.header: "fakeuser"} data = {"csrfmiddlewaretoken": csrf_token_form} # Verify that CSRF is configured for the view csrf_client.cookies.load({settings.CSRF_COOKIE_NAME: csrf_token}) response = csrf_client.post("/remote_user/", **headers) self.assertEqual(response.status_code, 403) self.assertIn(b"CSRF verification failed.", response.content) # This request will call django.contrib.auth.login() which will call # django.middleware.csrf.rotate_token() thus changing the value of # request.META['CSRF_COOKIE'] from the user submitted value set by # CsrfViewMiddleware.process_request() to the new csrftoken value set # by rotate_token(). Csrf validation should still pass when the view is # later processed by CsrfViewMiddleware.process_view() csrf_client.cookies.load({settings.CSRF_COOKIE_NAME: csrf_token}) response = csrf_client.post("/remote_user/", data, **headers) self.assertEqual(response.status_code, 200) async def test_csrf_validation_passes_after_process_request_login_async(self): """See test_csrf_validation_passes_after_process_request_login.""" csrf_client = AsyncClient(enforce_csrf_checks=True) csrf_secret = _get_new_csrf_string() csrf_token = _mask_cipher_secret(csrf_secret) csrf_token_form = _mask_cipher_secret(csrf_secret) headers = {self.header: "fakeuser"} data = {"csrfmiddlewaretoken": csrf_token_form} # Verify that CSRF is configured for the view csrf_client.cookies.load({settings.CSRF_COOKIE_NAME: csrf_token}) response = await csrf_client.post("/remote_user/", **headers) self.assertEqual(response.status_code, 403) self.assertIn(b"CSRF verification failed.", response.content) # This request will call django.contrib.auth.alogin() which will call # django.middleware.csrf.rotate_token() thus changing the value of # request.META['CSRF_COOKIE'] from the user submitted value set by # CsrfViewMiddleware.process_request() to the new csrftoken value set # by rotate_token(). Csrf validation should still pass when the view is # later processed by CsrfViewMiddleware.process_view() csrf_client.cookies.load({settings.CSRF_COOKIE_NAME: csrf_token}) response = await csrf_client.post("/remote_user/", data, **headers) self.assertEqual(response.status_code, 200) def test_unknown_user(self): """ Tests the case where the username passed in the header does not exist as a User. """ num_users = User.objects.count() response = self.client.get("/remote_user/", **{self.header: "newuser"}) self.assertEqual(response.context["user"].username, "newuser") self.assertEqual(User.objects.count(), num_users + 1) User.objects.get(username="newuser") # Another request with same user should not create any new users. response = self.client.get("/remote_user/", **{self.header: "newuser"}) self.assertEqual(User.objects.count(), num_users + 1) async def test_unknown_user_async(self): """See test_unknown_user.""" num_users = await User.objects.acount() response = await self.async_client.get( "/remote_user/", **{self.header: "newuser"} ) self.assertEqual(response.context["user"].username, "newuser") self.assertEqual(await User.objects.acount(), num_users + 1) await User.objects.aget(username="newuser") # Another request with same user should not create any new users. response = await self.async_client.get( "/remote_user/", **{self.header: "newuser"} ) self.assertEqual(await User.objects.acount(), num_users + 1) def test_known_user(self): """ Tests the case where the username passed in the header is a valid User. """ User.objects.create(username="knownuser") User.objects.create(username="knownuser2") num_users = User.objects.count() response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertEqual(response.context["user"].username, "knownuser") self.assertEqual(User.objects.count(), num_users) # A different user passed in the headers causes the new user # to be logged in. response = self.client.get("/remote_user/", **{self.header: self.known_user2}) self.assertEqual(response.context["user"].username, "knownuser2") self.assertEqual(User.objects.count(), num_users) async def test_known_user_async(self): """See test_known_user.""" await User.objects.acreate(username="knownuser") await User.objects.acreate(username="knownuser2") num_users = await User.objects.acount() response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertEqual(response.context["user"].username, "knownuser") self.assertEqual(await User.objects.acount(), num_users) # A different user passed in the headers causes the new user # to be logged in. response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user2} ) self.assertEqual(response.context["user"].username, "knownuser2") self.assertEqual(await User.objects.acount(), num_users) def test_last_login(self): """ A user's last_login is set the first time they make a request but not updated in subsequent requests with the same session. """ user = User.objects.create(username="knownuser") # Set last_login to something so we can determine if it changes. default_login = datetime(2000, 1, 1) if settings.USE_TZ: default_login = default_login.replace(tzinfo=UTC) user.last_login = default_login user.save() response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertNotEqual(default_login, response.context["user"].last_login) user = User.objects.get(username="knownuser") user.last_login = default_login user.save() response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertEqual(default_login, response.context["user"].last_login) async def test_last_login_async(self): """See test_last_login.""" user = await User.objects.acreate(username="knownuser") # Set last_login to something so we can determine if it changes. default_login = datetime(2000, 1, 1) if settings.USE_TZ: default_login = default_login.replace(tzinfo=UTC) user.last_login = default_login await user.asave() response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertNotEqual(default_login, response.context["user"].last_login) user = await User.objects.aget(username="knownuser") user.last_login = default_login await user.asave() response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertEqual(default_login, response.context["user"].last_login) def test_header_disappears(self): """ A logged in user is logged out automatically when the REMOTE_USER header disappears during the same browser session. """ User.objects.create(username="knownuser") # Known user authenticates response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertEqual(response.context["user"].username, "knownuser") # During the session, the REMOTE_USER header disappears. Should trigger # logout. response = self.client.get("/remote_user/") self.assertTrue(response.context["user"].is_anonymous) # verify the remoteuser middleware will not remove a user # authenticated via another backend User.objects.create_user(username="modeluser", password="foo") self.client.login(username="modeluser", password="foo") authenticate(username="modeluser", password="foo") response = self.client.get("/remote_user/") self.assertEqual(response.context["user"].username, "modeluser") async def test_header_disappears_async(self): """See test_header_disappears.""" await User.objects.acreate(username="knownuser") # Known user authenticates response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertEqual(response.context["user"].username, "knownuser") # During the session, the REMOTE_USER header disappears. Should trigger # logout. response = await self.async_client.get("/remote_user/") self.assertTrue(response.context["user"].is_anonymous) # verify the remoteuser middleware will not remove a user # authenticated via another backend await User.objects.acreate_user(username="modeluser", password="foo") await self.async_client.alogin(username="modeluser", password="foo") await aauthenticate(username="modeluser", password="foo") response = await self.async_client.get("/remote_user/") self.assertEqual(response.context["user"].username, "modeluser") def test_user_switch_forces_new_login(self): """ If the username in the header changes between requests that the original user is logged out """ User.objects.create(username="knownuser") # Known user authenticates response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertEqual(response.context["user"].username, "knownuser") # During the session, the REMOTE_USER changes to a different user. response = self.client.get("/remote_user/", **{self.header: "newnewuser"}) # The current user is not the prior remote_user. # In backends that create a new user, username is "newnewuser" # In backends that do not create new users, it is '' (anonymous user) self.assertNotEqual(response.context["user"].username, "knownuser") async def test_user_switch_forces_new_login_async(self): """See test_user_switch_forces_new_login.""" await User.objects.acreate(username="knownuser") # Known user authenticates response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertEqual(response.context["user"].username, "knownuser") # During the session, the REMOTE_USER changes to a different user. response = await self.async_client.get( "/remote_user/", **{self.header: "newnewuser"} ) # The current user is not the prior remote_user. # In backends that create a new user, username is "newnewuser" # In backends that do not create new users, it is '' (anonymous user) self.assertNotEqual(response.context["user"].username, "knownuser") def test_inactive_user(self): User.objects.create(username="knownuser", is_active=False) response = self.client.get("/remote_user/", **{self.header: "knownuser"}) self.assertTrue(response.context["user"].is_anonymous) async def test_inactive_user_async(self): await User.objects.acreate(username="knownuser", is_active=False) response = await self.async_client.get( "/remote_user/", **{self.header: "knownuser"} ) self.assertTrue(response.context["user"].is_anonymous) class RemoteUserNoCreateBackend(RemoteUserBackend): """Backend that doesn't create unknown users.""" create_unknown_user = False class RemoteUserNoCreateTest(RemoteUserTest): """ Contains the same tests as RemoteUserTest, but using a custom auth backend class that doesn't create unknown users. """ backend = "auth_tests.test_remote_user.RemoteUserNoCreateBackend" def test_unknown_user(self): num_users = User.objects.count() response = self.client.get("/remote_user/", **{self.header: "newuser"}) self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(User.objects.count(), num_users) async def test_unknown_user_async(self): num_users = await User.objects.acount() response = await self.async_client.get( "/remote_user/", **{self.header: "newuser"} ) self.assertTrue(response.context["user"].is_anonymous) self.assertEqual(await User.objects.acount(), num_users) class AllowAllUsersRemoteUserBackendTest(RemoteUserTest): """Backend that allows inactive users.""" backend = "django.contrib.auth.backends.AllowAllUsersRemoteUserBackend" def test_inactive_user(self): user = User.objects.create(username="knownuser", is_active=False) response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertEqual(response.context["user"].username, user.username) async def test_inactive_user_async(self): user = await User.objects.acreate(username="knownuser", is_active=False) response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertEqual(response.context["user"].username, user.username) class CustomRemoteUserBackend(RemoteUserBackend): """ Backend that overrides RemoteUserBackend methods. """ def clean_username(self, username): """ Grabs username before the @ character. """ return username.split("@")[0] def configure_user(self, request, user, created=True): """ Sets user's email address using the email specified in an HTTP header. Sets user's last name for existing users. """ user.email = request.META.get(RemoteUserTest.email_header, "") if not created: user.last_name = user.username user.save() return user class RemoteUserCustomTest(RemoteUserTest): """ Tests a custom RemoteUserBackend subclass that overrides the clean_username and configure_user methods. """ backend = "auth_tests.test_remote_user.CustomRemoteUserBackend" # REMOTE_USER strings with email addresses for the custom backend to # clean. known_user = "knownuser@example.com" known_user2 = "knownuser2@example.com" def test_known_user(self): """ The strings passed in REMOTE_USER should be cleaned and the known users should not have been configured with an email address. """ super().test_known_user() knownuser = User.objects.get(username="knownuser") knownuser2 = User.objects.get(username="knownuser2") self.assertEqual(knownuser.email, "") self.assertEqual(knownuser2.email, "") self.assertEqual(knownuser.last_name, "knownuser") self.assertEqual(knownuser2.last_name, "knownuser2") def test_unknown_user(self): """ The unknown user created should be configured with an email address provided in the request header. """ num_users = User.objects.count() response = self.client.get( "/remote_user/", **{ self.header: "newuser", self.email_header: "user@example.com", }, ) self.assertEqual(response.context["user"].username, "newuser") self.assertEqual(response.context["user"].email, "user@example.com") self.assertEqual(response.context["user"].last_name, "") self.assertEqual(User.objects.count(), num_users + 1) newuser = User.objects.get(username="newuser") self.assertEqual(newuser.email, "user@example.com") class CustomHeaderMiddleware(RemoteUserMiddleware): """ Middleware that overrides custom HTTP auth user header. """ header = "HTTP_AUTHUSER" class CustomHeaderRemoteUserTest(RemoteUserTest): """ Tests a custom RemoteUserMiddleware subclass with custom HTTP auth user header. """ middleware = "auth_tests.test_remote_user.CustomHeaderMiddleware" header = "HTTP_AUTHUSER" class PersistentRemoteUserTest(RemoteUserTest): """ PersistentRemoteUserMiddleware keeps the user logged in even if the subsequent calls do not contain the header value. """ middleware = "django.contrib.auth.middleware.PersistentRemoteUserMiddleware" require_header = False def test_header_disappears(self): """ A logged in user is kept logged in even if the REMOTE_USER header disappears during the same browser session. """ User.objects.create(username="knownuser") # Known user authenticates response = self.client.get("/remote_user/", **{self.header: self.known_user}) self.assertEqual(response.context["user"].username, "knownuser") # Should stay logged in if the REMOTE_USER header disappears. response = self.client.get("/remote_user/") self.assertFalse(response.context["user"].is_anonymous) self.assertEqual(response.context["user"].username, "knownuser") async def test_header_disappears_async(self): """See test_header_disappears.""" await User.objects.acreate(username="knownuser") # Known user authenticates response = await self.async_client.get( "/remote_user/", **{self.header: self.known_user} ) self.assertEqual(response.context["user"].username, "knownuser") # Should stay logged in if the REMOTE_USER header disappears. response = await self.async_client.get("/remote_user/") self.assertFalse(response.context["user"].is_anonymous) self.assertEqual(response.context["user"].username, "knownuser")
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_migrations.py
tests/auth_tests/test_migrations.py
from importlib import import_module from django.apps import apps from django.contrib.auth.models import Permission, User from django.contrib.contenttypes.models import ContentType from django.db import connection, connections from django.test import TransactionTestCase from django.test.utils import captured_stdout from .models import Proxy, UserProxy update_proxy_permissions = import_module( "django.contrib.auth.migrations.0011_update_proxy_permissions" ) class ProxyModelWithDifferentAppLabelTests(TransactionTestCase): available_apps = [ "auth_tests", "django.contrib.auth", "django.contrib.contenttypes", ] def setUp(self): """ Create proxy permissions with content_type to the concrete model rather than the proxy model (as they were before Django 2.2 and migration 11). """ Permission.objects.all().delete() self.concrete_content_type = ContentType.objects.get_for_model(UserProxy) self.default_permission = Permission.objects.create( content_type=self.concrete_content_type, codename="add_userproxy", name="Can add userproxy", ) self.custom_permission = Permission.objects.create( content_type=self.concrete_content_type, codename="use_different_app_label", name="May use a different app label", ) def test_proxy_model_permissions_contenttype(self): proxy_model_content_type = ContentType.objects.get_for_model( UserProxy, for_concrete_model=False ) self.assertEqual( self.default_permission.content_type, self.concrete_content_type ) self.assertEqual( self.custom_permission.content_type, self.concrete_content_type ) with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) self.default_permission.refresh_from_db() self.assertEqual(self.default_permission.content_type, proxy_model_content_type) self.custom_permission.refresh_from_db() self.assertEqual(self.custom_permission.content_type, proxy_model_content_type) def test_user_has_now_proxy_model_permissions(self): user = User.objects.create() user.user_permissions.add(self.default_permission) user.user_permissions.add(self.custom_permission) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth." + permission.codename)) self.assertFalse(user.has_perm("auth_tests." + permission.codename)) with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) # Reload user to purge the _perm_cache. user = User._default_manager.get(pk=user.pk) for permission in [self.default_permission, self.custom_permission]: self.assertFalse(user.has_perm("auth." + permission.codename)) self.assertTrue(user.has_perm("auth_tests." + permission.codename)) def test_migrate_backwards(self): with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) update_proxy_permissions.revert_proxy_model_permissions(apps, editor) self.default_permission.refresh_from_db() self.assertEqual( self.default_permission.content_type, self.concrete_content_type ) self.custom_permission.refresh_from_db() self.assertEqual( self.custom_permission.content_type, self.concrete_content_type ) def test_user_keeps_same_permissions_after_migrating_backward(self): user = User.objects.create() user.user_permissions.add(self.default_permission) user.user_permissions.add(self.custom_permission) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth." + permission.codename)) self.assertFalse(user.has_perm("auth_tests." + permission.codename)) with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) update_proxy_permissions.revert_proxy_model_permissions(apps, editor) # Reload user to purge the _perm_cache. user = User._default_manager.get(pk=user.pk) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth." + permission.codename)) self.assertFalse(user.has_perm("auth_tests." + permission.codename)) class ProxyModelWithSameAppLabelTests(TransactionTestCase): available_apps = [ "auth_tests", "django.contrib.auth", "django.contrib.contenttypes", ] def setUp(self): """ Create proxy permissions with content_type to the concrete model rather than the proxy model (as they were before Django 2.2 and migration 11). """ Permission.objects.all().delete() self.concrete_content_type = ContentType.objects.get_for_model(Proxy) self.default_permission = Permission.objects.create( content_type=self.concrete_content_type, codename="add_proxy", name="Can add proxy", ) self.custom_permission = Permission.objects.create( content_type=self.concrete_content_type, codename="display_proxys", name="May display proxys information", ) def test_proxy_model_permissions_contenttype(self): proxy_model_content_type = ContentType.objects.get_for_model( Proxy, for_concrete_model=False ) self.assertEqual( self.default_permission.content_type, self.concrete_content_type ) self.assertEqual( self.custom_permission.content_type, self.concrete_content_type ) with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) self.default_permission.refresh_from_db() self.custom_permission.refresh_from_db() self.assertEqual(self.default_permission.content_type, proxy_model_content_type) self.assertEqual(self.custom_permission.content_type, proxy_model_content_type) def test_user_still_has_proxy_model_permissions(self): user = User.objects.create() user.user_permissions.add(self.default_permission) user.user_permissions.add(self.custom_permission) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth_tests." + permission.codename)) with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) # Reload user to purge the _perm_cache. user = User._default_manager.get(pk=user.pk) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth_tests." + permission.codename)) def test_migrate_backwards(self): with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) update_proxy_permissions.revert_proxy_model_permissions(apps, editor) self.default_permission.refresh_from_db() self.assertEqual( self.default_permission.content_type, self.concrete_content_type ) self.custom_permission.refresh_from_db() self.assertEqual( self.custom_permission.content_type, self.concrete_content_type ) def test_user_keeps_same_permissions_after_migrating_backward(self): user = User.objects.create() user.user_permissions.add(self.default_permission) user.user_permissions.add(self.custom_permission) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth_tests." + permission.codename)) with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) update_proxy_permissions.revert_proxy_model_permissions(apps, editor) # Reload user to purge the _perm_cache. user = User._default_manager.get(pk=user.pk) for permission in [self.default_permission, self.custom_permission]: self.assertTrue(user.has_perm("auth_tests." + permission.codename)) def test_migrate_with_existing_target_permission(self): """ Permissions may already exist: - Old workaround was to manually create permissions for proxy models. - Model may have been concrete and then converted to proxy. Output a reminder to audit relevant permissions. """ proxy_model_content_type = ContentType.objects.get_for_model( Proxy, for_concrete_model=False ) Permission.objects.create( content_type=proxy_model_content_type, codename="add_proxy", name="Can add proxy", ) Permission.objects.create( content_type=proxy_model_content_type, codename="display_proxys", name="May display proxys information", ) with captured_stdout() as stdout: with connection.schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) self.assertIn( "A problem arose migrating proxy model permissions", stdout.getvalue() ) class MultiDBProxyModelAppLabelTests(TransactionTestCase): databases = {"default", "other"} available_apps = [ "auth_tests", "django.contrib.auth", "django.contrib.contenttypes", ] def setUp(self): ContentType.objects.all().delete() Permission.objects.using("other").delete() concrete_content_type = ContentType.objects.db_manager("other").get_for_model( Proxy ) self.permission = Permission.objects.using("other").create( content_type=concrete_content_type, codename="add_proxy", name="Can add proxy", ) def test_migrate_other_database(self): proxy_model_content_type = ContentType.objects.db_manager( "other" ).get_for_model(Proxy, for_concrete_model=False) with connections["other"].schema_editor() as editor: update_proxy_permissions.update_proxy_model_permissions(apps, editor) self.permission.refresh_from_db() self.assertEqual(self.permission.content_type, proxy_model_content_type)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_admin_multidb.py
tests/auth_tests/test_admin_multidb.py
from unittest import mock from django.contrib import admin from django.contrib.auth.admin import UserAdmin from django.contrib.auth.models import User from django.test import TestCase, override_settings from django.urls import path, reverse class Router: target_db = None def db_for_read(self, model, **hints): return self.target_db db_for_write = db_for_read def allow_relation(self, obj1, obj2, **hints): return True site = admin.AdminSite(name="test_adminsite") site.register(User, admin_class=UserAdmin) urlpatterns = [ path("admin/", site.urls), ] @override_settings(ROOT_URLCONF=__name__, DATABASE_ROUTERS=["%s.Router" % __name__]) class MultiDatabaseTests(TestCase): databases = {"default", "other"} READ_ONLY_METHODS = {"get", "options", "head", "trace"} @classmethod def setUpTestData(cls): cls.superusers = {} for db in cls.databases: Router.target_db = db cls.superusers[db] = User.objects.create_superuser( username="admin", password="something", email="test@test.org", ) def tearDown(self): # Reset the routers' state between each test. Router.target_db = None @mock.patch("django.contrib.auth.admin.transaction") def test_add_view(self, mock): for db in self.databases: with self.subTest(db_connection=db): Router.target_db = db self.client.force_login(self.superusers[db]) response = self.client.post( reverse("test_adminsite:auth_user_add"), { "username": "some_user", "password1": "helloworld", "password2": "helloworld", }, ) self.assertEqual(response.status_code, 302) mock.atomic.assert_called_with(using=db) @mock.patch("django.contrib.auth.admin.transaction") def test_read_only_methods_add_view(self, mock): for db in self.databases: for method in self.READ_ONLY_METHODS: with self.subTest(db_connection=db, method=method): mock.mock_reset() Router.target_db = db self.client.force_login(self.superusers[db]) response = getattr(self.client, method)( reverse("test_adminsite:auth_user_add") ) self.assertEqual(response.status_code, 200) mock.atomic.assert_not_called()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_management.py
tests/auth_tests/test_management.py
import builtins import getpass import os import sys from datetime import date from io import StringIO from unittest import mock from django.apps import apps from django.conf import settings from django.contrib.auth import get_permission_codename, management from django.contrib.auth.management import ( RenamePermission, create_permissions, get_default_username, ) from django.contrib.auth.management.commands import changepassword, createsuperuser from django.contrib.auth.models import Group, Permission, User from django.contrib.contenttypes.models import ContentType from django.core.management import call_command from django.core.management.base import CommandError from django.db import migrations, models from django.test import TestCase, override_settings from django.test.testcases import TransactionTestCase from django.utils.translation import gettext_lazy as _ from .models import ( CustomUser, CustomUserNonUniqueUsername, CustomUserWithFK, CustomUserWithM2M, CustomUserWithUniqueConstraint, Email, Organization, UserProxy, ) MOCK_INPUT_KEY_TO_PROMPTS = { # @mock_inputs dict key: [expected prompt messages], "bypass": ["Bypass password validation and create user anyway? [y/N]: "], "email": ["Email address: "], "date_of_birth": ["Date of birth: "], "first_name": ["First name: "], "username": [ "Username: ", lambda: "Username (leave blank to use '%s'): " % get_default_username(), ], } def mock_inputs(inputs): """ Decorator to temporarily replace input/getpass to allow interactive createsuperuser. """ def inner(test_func): def wrapper(*args): class mock_getpass: @staticmethod def getpass(prompt=b"Password: ", stream=None): if callable(inputs["password"]): return inputs["password"]() return inputs["password"] def mock_input(prompt): assert "__proxy__" not in prompt response = None for key, val in inputs.items(): if val == "KeyboardInterrupt": raise KeyboardInterrupt # get() fallback because sometimes 'key' is the actual # prompt rather than a shortcut name. prompt_msgs = MOCK_INPUT_KEY_TO_PROMPTS.get(key, key) if isinstance(prompt_msgs, list): prompt_msgs = [ msg() if callable(msg) else msg for msg in prompt_msgs ] if prompt in prompt_msgs: if callable(val): response = val() else: response = val break if response is None: raise ValueError("Mock input for %r not found." % prompt) return response old_getpass = createsuperuser.getpass old_input = builtins.input createsuperuser.getpass = mock_getpass builtins.input = mock_input try: test_func(*args) finally: createsuperuser.getpass = old_getpass builtins.input = old_input return wrapper return inner class MockTTY: """ A fake stdin object that pretends to be a TTY to be used in conjunction with mock_inputs. """ def isatty(self): return True class MockInputTests(TestCase): @mock_inputs({"username": "alice"}) def test_input_not_found(self): with self.assertRaisesMessage( ValueError, "Mock input for 'Email address: ' not found." ): call_command("createsuperuser", stdin=MockTTY()) class GetDefaultUsernameTestCase(TestCase): databases = {"default", "other"} def setUp(self): self.old_get_system_username = management.get_system_username def tearDown(self): management.get_system_username = self.old_get_system_username def test_actual_implementation(self): self.assertIsInstance(management.get_system_username(), str) def test_getuser_raises_exception(self): # TODO: Drop ImportError and KeyError when dropping support for PY312. for exc in (ImportError, KeyError, OSError): with self.subTest(exc=str(exc)): with mock.patch("getpass.getuser", side_effect=exc): self.assertEqual(management.get_system_username(), "") def test_simple(self): management.get_system_username = lambda: "joe" self.assertEqual(management.get_default_username(), "joe") def test_existing(self): User.objects.create(username="joe") management.get_system_username = lambda: "joe" self.assertEqual(management.get_default_username(), "") self.assertEqual(management.get_default_username(check_db=False), "joe") def test_i18n(self): # 'Julia' with accented 'u': management.get_system_username = lambda: "J\xfalia" self.assertEqual(management.get_default_username(), "julia") def test_with_database(self): User.objects.create(username="joe") management.get_system_username = lambda: "joe" self.assertEqual(management.get_default_username(), "") self.assertEqual(management.get_default_username(database="other"), "joe") User.objects.using("other").create(username="joe") self.assertEqual(management.get_default_username(database="other"), "") @override_settings( AUTH_PASSWORD_VALIDATORS=[ {"NAME": "django.contrib.auth.password_validation.NumericPasswordValidator"}, ] ) class ChangepasswordManagementCommandTestCase(TestCase): @classmethod def setUpTestData(cls): cls.user = User.objects.create_user(username="joe", password="qwerty") def setUp(self): self.stdout = StringIO() self.addCleanup(self.stdout.close) self.stderr = StringIO() self.addCleanup(self.stderr.close) @mock.patch.object(getpass, "getpass", return_value="password") def test_get_pass(self, mock_get_pass): call_command("changepassword", username="joe", stdout=self.stdout) self.assertIs(User.objects.get(username="joe").check_password("password"), True) @mock.patch.object(getpass, "getpass", return_value="") def test_get_pass_no_input(self, mock_get_pass): with self.assertRaisesMessage(CommandError, "aborted"): call_command("changepassword", username="joe", stdout=self.stdout) @mock.patch.object(changepassword.Command, "_get_pass", return_value="new_password") def test_system_username(self, mock_get_pass): """The system username is used if --username isn't provided.""" username = getpass.getuser() User.objects.create_user(username=username, password="qwerty") call_command("changepassword", stdout=self.stdout) self.assertIs( User.objects.get(username=username).check_password("new_password"), True ) def test_nonexistent_username(self): with self.assertRaisesMessage(CommandError, "user 'test' does not exist"): call_command("changepassword", username="test", stdout=self.stdout) @mock.patch.object(changepassword.Command, "_get_pass", return_value="not qwerty") def test_that_changepassword_command_changes_joes_password(self, mock_get_pass): """ Executing the changepassword management command should change joe's password """ self.assertTrue(self.user.check_password("qwerty")) call_command("changepassword", username="joe", stdout=self.stdout) command_output = self.stdout.getvalue().strip() self.assertEqual( command_output, "Changing password for user 'joe'\n" "Password changed successfully for user 'joe'", ) self.assertTrue(User.objects.get(username="joe").check_password("not qwerty")) @mock.patch.object( changepassword.Command, "_get_pass", side_effect=lambda *args: str(args) ) def test_that_max_tries_exits_1(self, mock_get_pass): """ A CommandError should be thrown by handle() if the user enters in mismatched passwords three times. """ msg = "Aborting password change for user 'joe' after 3 attempts" with self.assertRaisesMessage(CommandError, msg): call_command( "changepassword", username="joe", stdout=self.stdout, stderr=self.stderr ) @mock.patch.object(changepassword.Command, "_get_pass", return_value="1234567890") def test_password_validation(self, mock_get_pass): """ A CommandError should be raised if the user enters in passwords which fail validation three times. """ abort_msg = "Aborting password change for user 'joe' after 3 attempts" with self.assertRaisesMessage(CommandError, abort_msg): call_command( "changepassword", username="joe", stdout=self.stdout, stderr=self.stderr ) self.assertIn("This password is entirely numeric.", self.stderr.getvalue()) @mock.patch.object(changepassword.Command, "_get_pass", return_value="not qwerty") def test_that_changepassword_command_works_with_nonascii_output( self, mock_get_pass ): """ #21627 -- Executing the changepassword management command should allow non-ASCII characters from the User object representation. """ # 'Julia' with accented 'u': User.objects.create_user(username="J\xfalia", password="qwerty") call_command("changepassword", username="J\xfalia", stdout=self.stdout) class MultiDBChangepasswordManagementCommandTestCase(TestCase): databases = {"default", "other"} @mock.patch.object(changepassword.Command, "_get_pass", return_value="not qwerty") def test_that_changepassword_command_with_database_option_uses_given_db( self, mock_get_pass ): """ changepassword --database should operate on the specified DB. """ user = User.objects.db_manager("other").create_user( username="joe", password="qwerty" ) self.assertTrue(user.check_password("qwerty")) out = StringIO() call_command("changepassword", username="joe", database="other", stdout=out) command_output = out.getvalue().strip() self.assertEqual( command_output, "Changing password for user 'joe'\n" "Password changed successfully for user 'joe'", ) self.assertTrue( User.objects.using("other").get(username="joe").check_password("not qwerty") ) @override_settings( SILENCED_SYSTEM_CHECKS=["fields.W342"], # ForeignKey(unique=True) AUTH_PASSWORD_VALIDATORS=[ {"NAME": "django.contrib.auth.password_validation.NumericPasswordValidator"} ], ) class CreatesuperuserManagementCommandTestCase(TestCase): def test_no_email_argument(self): new_io = StringIO() with self.assertRaisesMessage( CommandError, "You must use --email with --noinput." ): call_command( "createsuperuser", interactive=False, username="joe", stdout=new_io ) def test_basic_usage(self): "Check the operation of the createsuperuser management command" # We can use the management command to create a superuser new_io = StringIO() call_command( "createsuperuser", interactive=False, username="joe", email="joe@somewhere.org", stdout=new_io, ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") u = User.objects.get(username="joe") self.assertEqual(u.email, "joe@somewhere.org") # created password should be unusable self.assertFalse(u.has_usable_password()) def test_validate_username(self): msg = ( "Enter a valid username. This value may contain only letters, numbers, " "and @/./+/-/_ characters." ) with self.assertRaisesMessage(CommandError, msg): call_command( "createsuperuser", interactive=False, username="🤠", email="joe@somewhere.org", ) def test_non_ascii_verbose_name(self): @mock_inputs( { "password": "nopasswd", "Uživatel (leave blank to use '%s'): " % get_default_username(): "foo", # username (cz) "email": "nolocale@somewhere.org", } ) def test(self): username_field = User._meta.get_field("username") old_verbose_name = username_field.verbose_name username_field.verbose_name = _("u\u017eivatel") new_io = StringIO() try: call_command( "createsuperuser", interactive=True, stdout=new_io, stdin=MockTTY(), ) finally: username_field.verbose_name = old_verbose_name command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") test(self) def test_verbosity_zero(self): # We can suppress output on the management command new_io = StringIO() call_command( "createsuperuser", interactive=False, username="joe2", email="joe2@somewhere.org", verbosity=0, stdout=new_io, ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "") u = User.objects.get(username="joe2") self.assertEqual(u.email, "joe2@somewhere.org") self.assertFalse(u.has_usable_password()) def test_email_in_username(self): call_command( "createsuperuser", interactive=False, username="joe+admin@somewhere.org", email="joe@somewhere.org", verbosity=0, ) u = User._default_manager.get(username="joe+admin@somewhere.org") self.assertEqual(u.email, "joe@somewhere.org") self.assertFalse(u.has_usable_password()) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") def test_swappable_user(self): "A superuser can be created when a custom user model is in use" # We can use the management command to create a superuser # We skip validation because the temporary substitution of the # swappable User model messes with validation. new_io = StringIO() call_command( "createsuperuser", interactive=False, email="joe@somewhere.org", date_of_birth="1976-04-01", first_name="Joe", stdout=new_io, ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") u = CustomUser._default_manager.get(email="joe@somewhere.org") self.assertEqual(u.date_of_birth, date(1976, 4, 1)) # created password should be unusable self.assertFalse(u.has_usable_password()) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") def test_swappable_user_missing_required_field(self): """ A Custom superuser won't be created when a required field isn't provided """ # We can use the management command to create a superuser # We skip validation because the temporary substitution of the # swappable User model messes with validation. new_io = StringIO() with self.assertRaisesMessage( CommandError, "You must use --email with --noinput." ): call_command( "createsuperuser", interactive=False, stdout=new_io, stderr=new_io, ) self.assertEqual(CustomUser._default_manager.count(), 0) @override_settings( AUTH_USER_MODEL="auth_tests.CustomUserNonUniqueUsername", AUTHENTICATION_BACKENDS=["my.custom.backend"], ) def test_swappable_user_username_non_unique(self): @mock_inputs( { "username": "joe", "password": "nopasswd", } ) def createsuperuser(): new_io = StringIO() call_command( "createsuperuser", interactive=True, email="joe@somewhere.org", stdout=new_io, stdin=MockTTY(), ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") for i in range(2): createsuperuser() users = CustomUserNonUniqueUsername.objects.filter(username="joe") self.assertEqual(users.count(), 2) def test_skip_if_not_in_TTY(self): """ If the command is not called from a TTY, it should be skipped and a message should be displayed (#7423). """ class FakeStdin: """A fake stdin object that has isatty() return False.""" def isatty(self): return False out = StringIO() call_command( "createsuperuser", stdin=FakeStdin(), stdout=out, interactive=True, ) self.assertEqual(User._default_manager.count(), 0) self.assertIn("Superuser creation skipped", out.getvalue()) def test_passing_stdin(self): """ You can pass a stdin object as an option and it should be available on self.stdin. If no such option is passed, it defaults to sys.stdin. """ sentinel = object() command = createsuperuser.Command() call_command( command, stdin=sentinel, interactive=False, verbosity=0, username="janet", email="janet@example.com", ) self.assertIs(command.stdin, sentinel) command = createsuperuser.Command() call_command( command, interactive=False, verbosity=0, username="joe", email="joe@example.com", ) self.assertIs(command.stdin, sys.stdin) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithFK") def test_fields_with_fk(self): new_io = StringIO() group = Group.objects.create(name="mygroup") email = Email.objects.create(email="mymail@gmail.com") call_command( "createsuperuser", interactive=False, username=email.pk, email=email.email, group=group.pk, stdout=new_io, ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") u = CustomUserWithFK._default_manager.get(email=email) self.assertEqual(u.username, email) self.assertEqual(u.group, group) non_existent_email = "mymail2@gmail.com" msg = "email instance with email %r is not a valid choice." % non_existent_email with self.assertRaisesMessage(CommandError, msg): call_command( "createsuperuser", interactive=False, username=email.pk, email=non_existent_email, stdout=new_io, ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithFK") def test_fields_with_fk_interactive(self): new_io = StringIO() group = Group.objects.create(name="mygroup") email = Email.objects.create(email="mymail@gmail.com") @mock_inputs( { "password": "nopasswd", "Username (Email.id): ": email.pk, "Email (Email.email): ": email.email, "Group (Group.id): ": group.pk, } ) def test(self): call_command( "createsuperuser", interactive=True, stdout=new_io, stdin=MockTTY(), ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") u = CustomUserWithFK._default_manager.get(email=email) self.assertEqual(u.username, email) self.assertEqual(u.group, group) test(self) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithFK") def test_fields_with_fk_via_option_interactive(self): new_io = StringIO() group = Group.objects.create(name="mygroup") email = Email.objects.create(email="mymail@gmail.com") @mock_inputs({"password": "nopasswd"}) def test(self): call_command( "createsuperuser", interactive=True, username=email.pk, email=email.email, group=group.pk, stdout=new_io, stdin=MockTTY(), ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") u = CustomUserWithFK._default_manager.get(email=email) self.assertEqual(u.username, email) self.assertEqual(u.group, group) test(self) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithFK") def test_validate_fk(self): email = Email.objects.create(email="mymail@gmail.com") Group.objects.all().delete() nonexistent_group_id = 1 msg = f"group instance with id {nonexistent_group_id} is not a valid choice." with self.assertRaisesMessage(CommandError, msg): call_command( "createsuperuser", interactive=False, username=email.pk, email=email.email, group=nonexistent_group_id, verbosity=0, ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithFK") def test_validate_fk_environment_variable(self): email = Email.objects.create(email="mymail@gmail.com") Group.objects.all().delete() nonexistent_group_id = 1 msg = f"group instance with id {nonexistent_group_id} is not a valid choice." with mock.patch.dict( os.environ, {"DJANGO_SUPERUSER_GROUP": str(nonexistent_group_id)}, ): with self.assertRaisesMessage(CommandError, msg): call_command( "createsuperuser", interactive=False, username=email.pk, email=email.email, verbosity=0, ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithFK") def test_validate_fk_via_option_interactive(self): email = Email.objects.create(email="mymail@gmail.com") Group.objects.all().delete() nonexistent_group_id = 1 msg = f"group instance with id {nonexistent_group_id} is not a valid choice." @mock_inputs( { "password": "nopasswd", "Username (Email.id): ": email.pk, "Email (Email.email): ": email.email, } ) def test(self): with self.assertRaisesMessage(CommandError, msg): call_command( "createsuperuser", group=nonexistent_group_id, stdin=MockTTY(), verbosity=0, ) test(self) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithM2m") def test_fields_with_m2m(self): new_io = StringIO() org_id_1 = Organization.objects.create(name="Organization 1").pk org_id_2 = Organization.objects.create(name="Organization 2").pk call_command( "createsuperuser", interactive=False, username="joe", orgs=[org_id_1, org_id_2], stdout=new_io, ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") user = CustomUserWithM2M._default_manager.get(username="joe") self.assertEqual(user.orgs.count(), 2) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithM2M") def test_fields_with_m2m_interactive(self): new_io = StringIO() org_id_1 = Organization.objects.create(name="Organization 1").pk org_id_2 = Organization.objects.create(name="Organization 2").pk @mock_inputs( { "password": "nopasswd", "Username: ": "joe", "Orgs (Organization.id): ": "%s, %s" % (org_id_1, org_id_2), } ) def test(self): call_command( "createsuperuser", interactive=True, stdout=new_io, stdin=MockTTY(), ) command_output = new_io.getvalue().strip() self.assertEqual(command_output, "Superuser created successfully.") user = CustomUserWithM2M._default_manager.get(username="joe") self.assertEqual(user.orgs.count(), 2) test(self) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithM2M") def test_fields_with_m2m_interactive_blank(self): new_io = StringIO() org_id = Organization.objects.create(name="Organization").pk entered_orgs = [str(org_id), " "] def return_orgs(): return entered_orgs.pop() @mock_inputs( { "password": "nopasswd", "Username: ": "joe", "Orgs (Organization.id): ": return_orgs, } ) def test(self): call_command( "createsuperuser", interactive=True, stdout=new_io, stderr=new_io, stdin=MockTTY(), ) self.assertEqual( new_io.getvalue().strip(), "Error: This field cannot be blank.\n" "Superuser created successfully.", ) test(self) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithM2MThrough") def test_fields_with_m2m_and_through(self): msg = ( "Required field 'orgs' specifies a many-to-many relation through " "model, which is not supported." ) with self.assertRaisesMessage(CommandError, msg): call_command("createsuperuser") def test_default_username(self): """createsuperuser uses a default username when one isn't provided.""" # Get the default username before creating a user. default_username = get_default_username() new_io = StringIO() entered_passwords = ["password", "password"] def return_passwords(): return entered_passwords.pop(0) @mock_inputs({"password": return_passwords, "username": "", "email": ""}) def test(self): call_command( "createsuperuser", interactive=True, stdin=MockTTY(), stdout=new_io, stderr=new_io, ) self.assertEqual( new_io.getvalue().strip(), "Superuser created successfully." ) self.assertTrue(User.objects.filter(username=default_username).exists()) test(self) def test_password_validation(self): """ Creation should fail if the password fails validation. """ new_io = StringIO() entered_passwords = ["1234567890", "1234567890", "password", "password"] def bad_then_good_password(): return entered_passwords.pop(0) @mock_inputs( { "password": bad_then_good_password, "username": "joe1234567890", "email": "", "bypass": "n", } ) def test(self): call_command( "createsuperuser", interactive=True, stdin=MockTTY(), stdout=new_io, stderr=new_io, ) self.assertEqual( new_io.getvalue().strip(), "This password is entirely numeric.\n" "Superuser created successfully.", ) test(self) @override_settings( AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, ] ) def test_validate_password_against_username(self): new_io = StringIO() username = "supremelycomplex" entered_passwords = [ username, username, "superduperunguessablepassword", "superduperunguessablepassword", ] def bad_then_good_password(): return entered_passwords.pop(0) @mock_inputs( { "password": bad_then_good_password, "username": username, "email": "", "bypass": "n", } ) def test(self): call_command( "createsuperuser", interactive=True, stdin=MockTTY(), stdout=new_io, stderr=new_io, ) self.assertEqual( new_io.getvalue().strip(), "The password is too similar to the username.\n" "Superuser created successfully.", ) test(self) @override_settings( AUTH_USER_MODEL="auth_tests.CustomUser", AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, ], ) def test_validate_password_against_required_fields(self): new_io = StringIO() first_name = "josephine" entered_passwords = [ first_name, first_name, "superduperunguessablepassword", "superduperunguessablepassword", ] def bad_then_good_password(): return entered_passwords.pop(0) @mock_inputs( { "password": bad_then_good_password, "username": "whatever", "first_name": first_name, "date_of_birth": "1970-01-01", "email": "joey@example.com", "bypass": "n", } ) def test(self): call_command( "createsuperuser", interactive=True, stdin=MockTTY(), stdout=new_io, stderr=new_io, ) self.assertEqual( new_io.getvalue().strip(), "The password is too similar to the first name.\n" "Superuser created successfully.", ) test(self) @override_settings( AUTH_USER_MODEL="auth_tests.CustomUser", AUTH_PASSWORD_VALIDATORS=[ { "NAME": ( "django.contrib.auth.password_validation." "UserAttributeSimilarityValidator" ) }, ], ) def test_validate_password_against_required_fields_via_option(self): new_io = StringIO() first_name = "josephine" entered_passwords = [ first_name, first_name, "superduperunguessablepassword", "superduperunguessablepassword", ] def bad_then_good_password(): return entered_passwords.pop(0) @mock_inputs( { "password": bad_then_good_password,
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
true
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_models.py
tests/auth_tests/test_models.py
from unittest import mock from django.conf.global_settings import PASSWORD_HASHERS from django.contrib.auth import get_user_model from django.contrib.auth.backends import ModelBackend from django.contrib.auth.base_user import AbstractBaseUser from django.contrib.auth.hashers import get_hasher from django.contrib.auth.models import ( AnonymousUser, Group, Permission, User, UserManager, ) from django.contrib.contenttypes.models import ContentType from django.core import mail from django.db import connection, migrations from django.db.migrations.state import ModelState, ProjectState from django.db.models.signals import post_save from django.test import SimpleTestCase, TestCase, TransactionTestCase, override_settings from .models import CustomEmailField, IntegerUsernameUser class NaturalKeysTestCase(TestCase): def test_user_natural_key(self): staff_user = User.objects.create_user(username="staff") self.assertEqual(User.objects.get_by_natural_key("staff"), staff_user) self.assertEqual(staff_user.natural_key(), ("staff",)) async def test_auser_natural_key(self): staff_user = await User.objects.acreate_user(username="staff") self.assertEqual(await User.objects.aget_by_natural_key("staff"), staff_user) self.assertEqual(staff_user.natural_key(), ("staff",)) def test_group_natural_key(self): users_group = Group.objects.create(name="users") self.assertEqual(Group.objects.get_by_natural_key("users"), users_group) async def test_agroup_natural_key(self): users_group = await Group.objects.acreate(name="users") self.assertEqual(await Group.objects.aget_by_natural_key("users"), users_group) class LoadDataWithoutNaturalKeysTestCase(TestCase): fixtures = ["regular.json"] def test_user_is_created_and_added_to_group(self): user = User.objects.get(username="my_username") group = Group.objects.get(name="my_group") self.assertEqual(group, user.groups.get()) class LoadDataWithNaturalKeysTestCase(TestCase): fixtures = ["natural.json"] def test_user_is_created_and_added_to_group(self): user = User.objects.get(username="my_username") group = Group.objects.get(name="my_group") self.assertEqual(group, user.groups.get()) class LoadDataWithNaturalKeysAndMultipleDatabasesTestCase(TestCase): databases = {"default", "other"} def test_load_data_with_user_permissions(self): # Create test contenttypes for both databases default_objects = [ ContentType.objects.db_manager("default").create( model="examplemodela", app_label="app_a", ), ContentType.objects.db_manager("default").create( model="examplemodelb", app_label="app_b", ), ] other_objects = [ ContentType.objects.db_manager("other").create( model="examplemodelb", app_label="app_b", ), ContentType.objects.db_manager("other").create( model="examplemodela", app_label="app_a", ), ] # Now we create the test UserPermission Permission.objects.db_manager("default").create( name="Can delete example model b", codename="delete_examplemodelb", content_type=default_objects[1], ) Permission.objects.db_manager("other").create( name="Can delete example model b", codename="delete_examplemodelb", content_type=other_objects[0], ) perm_default = Permission.objects.get_by_natural_key( "delete_examplemodelb", "app_b", "examplemodelb", ) perm_other = Permission.objects.db_manager("other").get_by_natural_key( "delete_examplemodelb", "app_b", "examplemodelb", ) self.assertEqual(perm_default.content_type_id, default_objects[1].id) self.assertEqual(perm_other.content_type_id, other_objects[0].id) class UserManagerTestCase(TransactionTestCase): available_apps = [ "auth_tests", "django.contrib.auth", "django.contrib.contenttypes", ] def test_create_user(self): email_lowercase = "normal@normal.com" user = User.objects.create_user("user", email_lowercase) self.assertEqual(user.email, email_lowercase) self.assertEqual(user.username, "user") self.assertFalse(user.has_usable_password()) def test_create_user_email_domain_normalize_rfc3696(self): # According to RFC 3696 Section 3 the "@" symbol can be part of the # local part of an email address. returned = UserManager.normalize_email(r"Abc\@DEF@EXAMPLE.com") self.assertEqual(returned, r"Abc\@DEF@example.com") def test_create_user_email_domain_normalize(self): returned = UserManager.normalize_email("normal@DOMAIN.COM") self.assertEqual(returned, "normal@domain.com") def test_create_user_email_domain_normalize_with_whitespace(self): returned = UserManager.normalize_email(r"email\ with_whitespace@D.COM") self.assertEqual(returned, r"email\ with_whitespace@d.com") def test_empty_username(self): with self.assertRaisesMessage(ValueError, "The given username must be set"): User.objects.create_user(username="") def test_create_user_is_staff(self): email = "normal@normal.com" user = User.objects.create_user("user", email, is_staff=True) self.assertEqual(user.email, email) self.assertEqual(user.username, "user") self.assertTrue(user.is_staff) def test_create_super_user_raises_error_on_false_is_superuser(self): with self.assertRaisesMessage( ValueError, "Superuser must have is_superuser=True." ): User.objects.create_superuser( username="test", email="test@test.com", password="test", is_superuser=False, ) async def test_acreate_super_user_raises_error_on_false_is_superuser(self): with self.assertRaisesMessage( ValueError, "Superuser must have is_superuser=True." ): await User.objects.acreate_superuser( username="test", email="test@test.com", password="test", is_superuser=False, ) def test_create_superuser_raises_error_on_false_is_staff(self): with self.assertRaisesMessage(ValueError, "Superuser must have is_staff=True."): User.objects.create_superuser( username="test", email="test@test.com", password="test", is_staff=False, ) async def test_acreate_superuser_raises_error_on_false_is_staff(self): with self.assertRaisesMessage(ValueError, "Superuser must have is_staff=True."): await User.objects.acreate_superuser( username="test", email="test@test.com", password="test", is_staff=False, ) def test_runpython_manager_methods(self): def forwards(apps, schema_editor): UserModel = apps.get_model("auth", "User") user = UserModel.objects.create_user("user1", password="secure") self.assertIsInstance(user, UserModel) operation = migrations.RunPython(forwards, migrations.RunPython.noop) project_state = ProjectState() project_state.add_model(ModelState.from_model(User)) project_state.add_model(ModelState.from_model(Group)) project_state.add_model(ModelState.from_model(Permission)) project_state.add_model(ModelState.from_model(ContentType)) new_state = project_state.clone() with connection.schema_editor() as editor: operation.state_forwards("test_manager_methods", new_state) operation.database_forwards( "test_manager_methods", editor, project_state, new_state, ) user = User.objects.get(username="user1") self.assertTrue(user.check_password("secure")) class AbstractBaseUserTests(SimpleTestCase): def test_has_usable_password(self): """ Passwords are usable even if they don't correspond to a hasher in settings.PASSWORD_HASHERS. """ self.assertIs(User(password="some-gibbberish").has_usable_password(), True) def test_normalize_username(self): self.assertEqual(IntegerUsernameUser().normalize_username(123), 123) def test_clean_normalize_username(self): # The normalization happens in AbstractBaseUser.clean() ohm_username = "iamtheΩ" # U+2126 OHM SIGN for model in ("auth.User", "auth_tests.CustomUser"): with self.subTest(model=model), self.settings(AUTH_USER_MODEL=model): User = get_user_model() user = User(**{User.USERNAME_FIELD: ohm_username, "password": "foo"}) user.clean() username = user.get_username() self.assertNotEqual(username, ohm_username) self.assertEqual( username, "iamtheΩ" ) # U+03A9 GREEK CAPITAL LETTER OMEGA def test_default_email(self): self.assertEqual(AbstractBaseUser.get_email_field_name(), "email") def test_custom_email(self): user = CustomEmailField() self.assertEqual(user.get_email_field_name(), "email_address") class AbstractUserTestCase(TestCase): def test_email_user(self): # valid send_mail parameters kwargs = { "fail_silently": False, "auth_user": None, "auth_password": None, "connection": None, "html_message": None, } user = User(email="foo@bar.com") user.email_user( subject="Subject here", message="This is a message", from_email="from@domain.com", **kwargs, ) self.assertEqual(len(mail.outbox), 1) message = mail.outbox[0] self.assertEqual(message.subject, "Subject here") self.assertEqual(message.body, "This is a message") self.assertEqual(message.from_email, "from@domain.com") self.assertEqual(message.to, [user.email]) def test_last_login_default(self): user1 = User.objects.create(username="user1") self.assertIsNone(user1.last_login) user2 = User.objects.create_user(username="user2") self.assertIsNone(user2.last_login) def test_user_clean_normalize_email(self): user = User(username="user", password="foo", email="foo@BAR.com") user.clean() self.assertEqual(user.email, "foo@bar.com") def test_user_double_save(self): """ Calling user.save() twice should trigger password_changed() once. """ user = User.objects.create_user(username="user", password="foo") user.set_password("bar") with mock.patch( "django.contrib.auth.password_validation.password_changed" ) as pw_changed: user.save() self.assertEqual(pw_changed.call_count, 1) user.save() self.assertEqual(pw_changed.call_count, 1) @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS) def test_check_password_upgrade(self): """ password_changed() shouldn't be called if User.check_password() triggers a hash iteration upgrade. """ user = User.objects.create_user(username="user", password="foo") initial_password = user.password self.assertTrue(user.check_password("foo")) hasher = get_hasher("default") self.assertEqual("pbkdf2_sha256", hasher.algorithm) old_iterations = hasher.iterations try: # Upgrade the password iterations hasher.iterations = old_iterations + 1 with mock.patch( "django.contrib.auth.password_validation.password_changed" ) as pw_changed: user.check_password("foo") self.assertEqual(pw_changed.call_count, 0) self.assertNotEqual(initial_password, user.password) finally: hasher.iterations = old_iterations @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS) async def test_acheck_password_upgrade(self): user = await User.objects.acreate_user(username="user", password="foo") initial_password = user.password self.assertIs(await user.acheck_password("foo"), True) hasher = get_hasher("default") self.assertEqual("pbkdf2_sha256", hasher.algorithm) old_iterations = hasher.iterations try: # Upgrade the password iterations. hasher.iterations = old_iterations + 1 with mock.patch( "django.contrib.auth.password_validation.password_changed" ) as pw_changed: self.assertIs(await user.acheck_password("foo"), True) self.assertEqual(pw_changed.call_count, 0) self.assertNotEqual(initial_password, user.password) finally: hasher.iterations = old_iterations class CustomModelBackend(ModelBackend): def with_perm( self, perm, is_active=True, include_superusers=True, backend=None, obj=None ): if obj is not None and obj.username == "charliebrown": return User.objects.filter(pk=obj.pk) return User.objects.filter(username__startswith="charlie") class UserWithPermTestCase(TestCase): @classmethod def setUpTestData(cls): content_type = ContentType.objects.get_for_model(Group) cls.permission = Permission.objects.create( name="test", content_type=content_type, codename="test", ) # User with permission. cls.user1 = User.objects.create_user("user 1", "foo@example.com") cls.user1.user_permissions.add(cls.permission) # User with group permission. group1 = Group.objects.create(name="group 1") group1.permissions.add(cls.permission) group2 = Group.objects.create(name="group 2") group2.permissions.add(cls.permission) cls.user2 = User.objects.create_user("user 2", "bar@example.com") cls.user2.groups.add(group1, group2) # Users without permissions. cls.user_charlie = User.objects.create_user("charlie", "charlie@example.com") cls.user_charlie_b = User.objects.create_user( "charliebrown", "charlie@brown.com" ) # Superuser. cls.superuser = User.objects.create_superuser( "superuser", "superuser@example.com", "superpassword", ) # Inactive user with permission. cls.inactive_user = User.objects.create_user( "inactive_user", "baz@example.com", is_active=False, ) cls.inactive_user.user_permissions.add(cls.permission) def test_invalid_permission_name(self): msg = "Permission name should be in the form app_label.permission_codename." for perm in ("nodots", "too.many.dots", "...", ""): with self.subTest(perm), self.assertRaisesMessage(ValueError, msg): User.objects.with_perm(perm) def test_invalid_permission_type(self): msg = "The `perm` argument must be a string or a permission instance." for perm in (b"auth.test", object(), None): with self.subTest(perm), self.assertRaisesMessage(TypeError, msg): User.objects.with_perm(perm) def test_invalid_backend_type(self): msg = "backend must be a dotted import path string (got %r)." for backend in (b"auth_tests.CustomModelBackend", object()): with self.subTest(backend): with self.assertRaisesMessage(TypeError, msg % backend): User.objects.with_perm("auth.test", backend=backend) def test_basic(self): active_users = [self.user1, self.user2] tests = [ ({}, [*active_users, self.superuser]), ({"obj": self.user1}, []), # Only inactive users. ({"is_active": False}, [self.inactive_user]), # All users. ({"is_active": None}, [*active_users, self.superuser, self.inactive_user]), # Exclude superusers. ({"include_superusers": False}, active_users), ( {"include_superusers": False, "is_active": False}, [self.inactive_user], ), ( {"include_superusers": False, "is_active": None}, [*active_users, self.inactive_user], ), ] for kwargs, expected_users in tests: for perm in ("auth.test", self.permission): with self.subTest(perm=perm, **kwargs): self.assertCountEqual( User.objects.with_perm(perm, **kwargs), expected_users, ) @override_settings( AUTHENTICATION_BACKENDS=["django.contrib.auth.backends.BaseBackend"] ) def test_backend_without_with_perm(self): self.assertSequenceEqual(User.objects.with_perm("auth.test"), []) def test_nonexistent_permission(self): self.assertSequenceEqual(User.objects.with_perm("auth.perm"), [self.superuser]) def test_nonexistent_backend(self): with self.assertRaises(ImportError): User.objects.with_perm( "auth.test", backend="invalid.backend.CustomModelBackend", ) def test_invalid_backend_submodule(self): with self.assertRaises(ImportError): User.objects.with_perm( "auth.test", backend="json.tool", ) @override_settings( AUTHENTICATION_BACKENDS=["auth_tests.test_models.CustomModelBackend"] ) def test_custom_backend(self): for perm in ("auth.test", self.permission): with self.subTest(perm): self.assertCountEqual( User.objects.with_perm(perm), [self.user_charlie, self.user_charlie_b], ) @override_settings( AUTHENTICATION_BACKENDS=["auth_tests.test_models.CustomModelBackend"] ) def test_custom_backend_pass_obj(self): for perm in ("auth.test", self.permission): with self.subTest(perm): self.assertSequenceEqual( User.objects.with_perm(perm, obj=self.user_charlie_b), [self.user_charlie_b], ) @override_settings( AUTHENTICATION_BACKENDS=[ "auth_tests.test_models.CustomModelBackend", "django.contrib.auth.backends.ModelBackend", ] ) def test_multiple_backends(self): msg = ( "You have multiple authentication backends configured and " "therefore must provide the `backend` argument." ) with self.assertRaisesMessage(ValueError, msg): User.objects.with_perm("auth.test") backend = "auth_tests.test_models.CustomModelBackend" self.assertCountEqual( User.objects.with_perm("auth.test", backend=backend), [self.user_charlie, self.user_charlie_b], ) class IsActiveTestCase(TestCase): """ Tests the behavior of the guaranteed is_active attribute """ def test_builtin_user_isactive(self): user = User.objects.create(username="foo", email="foo@bar.com") # is_active is true by default self.assertIs(user.is_active, True) user.is_active = False user.save() user_fetched = User.objects.get(pk=user.pk) # the is_active flag is saved self.assertFalse(user_fetched.is_active) @override_settings(AUTH_USER_MODEL="auth_tests.IsActiveTestUser1") def test_is_active_field_default(self): """ tests that the default value for is_active is provided """ UserModel = get_user_model() user = UserModel(username="foo") self.assertIs(user.is_active, True) # you can set the attribute - but it will not save user.is_active = False # there should be no problem saving - but the attribute is not saved user.save() user_fetched = UserModel._default_manager.get(pk=user.pk) # the attribute is always true for newly retrieved instance self.assertIs(user_fetched.is_active, True) class TestCreateSuperUserSignals(TestCase): """ Simple test case for ticket #20541 """ def post_save_listener(self, *args, **kwargs): self.signals_count += 1 def setUp(self): self.signals_count = 0 post_save.connect(self.post_save_listener, sender=User) self.addCleanup(post_save.disconnect, self.post_save_listener, sender=User) def test_create_user(self): User.objects.create_user("JohnDoe") self.assertEqual(self.signals_count, 1) def test_create_superuser(self): User.objects.create_superuser("JohnDoe", "mail@example.com", "1") self.assertEqual(self.signals_count, 1) class AnonymousUserTests(SimpleTestCase): no_repr_msg = "Django doesn't provide a DB representation for AnonymousUser." def setUp(self): self.user = AnonymousUser() def test_properties(self): self.assertIsNone(self.user.pk) self.assertEqual(self.user.username, "") self.assertEqual(self.user.get_username(), "") self.assertIs(self.user.is_anonymous, True) self.assertIs(self.user.is_authenticated, False) self.assertIs(self.user.is_staff, False) self.assertIs(self.user.is_active, False) self.assertIs(self.user.is_superuser, False) self.assertEqual(self.user.groups.count(), 0) self.assertEqual(self.user.user_permissions.count(), 0) self.assertEqual(self.user.get_user_permissions(), set()) self.assertEqual(self.user.get_group_permissions(), set()) async def test_properties_async_versions(self): self.assertEqual(await self.user.groups.acount(), 0) self.assertEqual(await self.user.user_permissions.acount(), 0) self.assertEqual(await self.user.aget_user_permissions(), set()) self.assertEqual(await self.user.aget_group_permissions(), set()) def test_str(self): self.assertEqual(str(self.user), "AnonymousUser") def test_eq(self): self.assertEqual(self.user, AnonymousUser()) self.assertNotEqual(self.user, User("super", "super@example.com", "super")) def test_hash(self): self.assertEqual(hash(self.user), 1) def test_int(self): msg = ( "Cannot cast AnonymousUser to int. Are you trying to use it in " "place of User?" ) with self.assertRaisesMessage(TypeError, msg): int(self.user) def test_delete(self): with self.assertRaisesMessage(NotImplementedError, self.no_repr_msg): self.user.delete() def test_save(self): with self.assertRaisesMessage(NotImplementedError, self.no_repr_msg): self.user.save() def test_set_password(self): with self.assertRaisesMessage(NotImplementedError, self.no_repr_msg): self.user.set_password("password") def test_check_password(self): with self.assertRaisesMessage(NotImplementedError, self.no_repr_msg): self.user.check_password("password") class GroupTests(SimpleTestCase): def test_str(self): g = Group(name="Users") self.assertEqual(str(g), "Users") class PermissionTests(TestCase): def test_str(self): p = Permission.objects.get(codename="view_customemailfield") self.assertEqual( str(p), "Auth_Tests | custom email field | Can view custom email field" )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_tokens.py
tests/auth_tests/test_tokens.py
from datetime import datetime, timedelta from django.conf import settings from django.contrib.auth.models import User from django.contrib.auth.tokens import PasswordResetTokenGenerator from django.core.exceptions import ImproperlyConfigured from django.test import TestCase from django.test.utils import override_settings from .models import CustomEmailField class MockedPasswordResetTokenGenerator(PasswordResetTokenGenerator): def __init__(self, now): self._now_val = now super().__init__() def _now(self): return self._now_val class TokenGeneratorTest(TestCase): def test_make_token(self): user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") p0 = PasswordResetTokenGenerator() tk1 = p0.make_token(user) self.assertIs(p0.check_token(user, tk1), True) def test_10265(self): """ The token generated for a user created in the same request will work correctly. """ user = User.objects.create_user("comebackkid", "test3@example.com", "testpw") user_reload = User.objects.get(username="comebackkid") p0 = MockedPasswordResetTokenGenerator(datetime.now()) tk1 = p0.make_token(user) tk2 = p0.make_token(user_reload) self.assertEqual(tk1, tk2) def test_token_with_different_email(self): """Updating the user email address invalidates the token.""" tests = [ (CustomEmailField, None), (CustomEmailField, "test4@example.com"), (User, "test4@example.com"), ] for model, email in tests: with self.subTest(model=model.__qualname__, email=email): user = model.objects.create_user( "changeemailuser", email=email, password="testpw", ) p0 = PasswordResetTokenGenerator() tk1 = p0.make_token(user) self.assertIs(p0.check_token(user, tk1), True) setattr(user, user.get_email_field_name(), "test4new@example.com") user.save() self.assertIs(p0.check_token(user, tk1), False) def test_timeout(self): """The token is valid after n seconds, but no greater.""" # Uses a mocked version of PasswordResetTokenGenerator so we can change # the value of 'now'. user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") now = datetime.now() p0 = MockedPasswordResetTokenGenerator(now) tk1 = p0.make_token(user) p1 = MockedPasswordResetTokenGenerator( now + timedelta(seconds=settings.PASSWORD_RESET_TIMEOUT) ) self.assertIs(p1.check_token(user, tk1), True) p2 = MockedPasswordResetTokenGenerator( now + timedelta(seconds=(settings.PASSWORD_RESET_TIMEOUT + 1)) ) self.assertIs(p2.check_token(user, tk1), False) with self.settings(PASSWORD_RESET_TIMEOUT=60 * 60): p3 = MockedPasswordResetTokenGenerator( now + timedelta(seconds=settings.PASSWORD_RESET_TIMEOUT) ) self.assertIs(p3.check_token(user, tk1), True) p4 = MockedPasswordResetTokenGenerator( now + timedelta(seconds=(settings.PASSWORD_RESET_TIMEOUT + 1)) ) self.assertIs(p4.check_token(user, tk1), False) def test_check_token_with_nonexistent_token_and_user(self): user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") p0 = PasswordResetTokenGenerator() tk1 = p0.make_token(user) self.assertIs(p0.check_token(None, tk1), False) self.assertIs(p0.check_token(user, None), False) def test_token_with_different_secret(self): """ A valid token can be created with a secret other than SECRET_KEY by using the PasswordResetTokenGenerator.secret attribute. """ user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") new_secret = "abcdefghijkl" # Create and check a token with a different secret. p0 = PasswordResetTokenGenerator() p0.secret = new_secret tk0 = p0.make_token(user) self.assertIs(p0.check_token(user, tk0), True) # Create and check a token with the default secret. p1 = PasswordResetTokenGenerator() self.assertEqual(p1.secret, settings.SECRET_KEY) self.assertNotEqual(p1.secret, new_secret) tk1 = p1.make_token(user) # Tokens created with a different secret don't validate. self.assertIs(p0.check_token(user, tk1), False) self.assertIs(p1.check_token(user, tk0), False) def test_token_with_different_secret_subclass(self): class CustomPasswordResetTokenGenerator(PasswordResetTokenGenerator): secret = "test-secret" user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") custom_password_generator = CustomPasswordResetTokenGenerator() tk_custom = custom_password_generator.make_token(user) self.assertIs(custom_password_generator.check_token(user, tk_custom), True) default_password_generator = PasswordResetTokenGenerator() self.assertNotEqual( custom_password_generator.secret, default_password_generator.secret, ) self.assertEqual(default_password_generator.secret, settings.SECRET_KEY) # Tokens created with a different secret don't validate. tk_default = default_password_generator.make_token(user) self.assertIs(custom_password_generator.check_token(user, tk_default), False) self.assertIs(default_password_generator.check_token(user, tk_custom), False) @override_settings(SECRET_KEY="") def test_secret_lazy_validation(self): default_token_generator = PasswordResetTokenGenerator() msg = "The SECRET_KEY setting must not be empty." with self.assertRaisesMessage(ImproperlyConfigured, msg): default_token_generator.secret def test_check_token_secret_fallbacks(self): user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") p1 = PasswordResetTokenGenerator() p1.secret = "secret" tk = p1.make_token(user) p2 = PasswordResetTokenGenerator() p2.secret = "newsecret" p2.secret_fallbacks = ["secret"] self.assertIs(p1.check_token(user, tk), True) self.assertIs(p2.check_token(user, tk), True) @override_settings( SECRET_KEY="secret", SECRET_KEY_FALLBACKS=["oldsecret"], ) def test_check_token_secret_key_fallbacks(self): user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") p1 = PasswordResetTokenGenerator() p1.secret = "oldsecret" tk = p1.make_token(user) p2 = PasswordResetTokenGenerator() self.assertIs(p2.check_token(user, tk), True) @override_settings( SECRET_KEY="secret", SECRET_KEY_FALLBACKS=["oldsecret"], ) def test_check_token_secret_key_fallbacks_override(self): user = User.objects.create_user("tokentestuser", "test2@example.com", "testpw") p1 = PasswordResetTokenGenerator() p1.secret = "oldsecret" tk = p1.make_token(user) p2 = PasswordResetTokenGenerator() p2.secret_fallbacks = [] self.assertIs(p2.check_token(user, tk), False)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_middleware.py
tests/auth_tests/test_middleware.py
from django.conf import settings from django.contrib.auth import REDIRECT_FIELD_NAME, alogin, alogout from django.contrib.auth.middleware import ( AuthenticationMiddleware, LoginRequiredMiddleware, ) from django.contrib.auth.models import User from django.core.exceptions import ImproperlyConfigured from django.http import HttpRequest, HttpResponse from django.test import TestCase, modify_settings, override_settings from django.urls import reverse class TestAuthenticationMiddleware(TestCase): @classmethod def setUpTestData(cls): cls.user = User.objects.create_user( "test_user", "test@example.com", "test_password" ) cls.user2 = User.objects.create_user( "test_user2", "test2@example.com", "test_password2" ) def setUp(self): self.middleware = AuthenticationMiddleware(lambda req: HttpResponse()) self.client.force_login(self.user) self.request = HttpRequest() self.request.session = self.client.session def test_no_password_change_doesnt_invalidate_session(self): self.request.session = self.client.session self.middleware(self.request) self.assertIsNotNone(self.request.user) self.assertFalse(self.request.user.is_anonymous) def test_changed_password_invalidates_session(self): # After password change, user should be anonymous self.user.set_password("new_password") self.user.save() self.middleware(self.request) self.assertIsNotNone(self.request.user) self.assertTrue(self.request.user.is_anonymous) # session should be flushed self.assertIsNone(self.request.session.session_key) def test_no_session(self): msg = ( "The Django authentication middleware requires session middleware " "to be installed. Edit your MIDDLEWARE setting to insert " "'django.contrib.sessions.middleware.SessionMiddleware' before " "'django.contrib.auth.middleware.AuthenticationMiddleware'." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): self.middleware(HttpRequest()) async def test_auser(self): self.middleware(self.request) auser = await self.request.auser() self.assertEqual(auser, self.user) auser_second = await self.request.auser() self.assertIs(auser, auser_second) async def test_auser_after_alogin(self): self.middleware(self.request) auser = await self.request.auser() self.assertEqual(auser, self.user) await alogin(self.request, self.user2) auser_second = await self.request.auser() self.assertEqual(auser_second, self.user2) async def test_auser_after_alogout(self): self.middleware(self.request) auser = await self.request.auser() self.assertEqual(auser, self.user) await alogout(self.request) auser_second = await self.request.auser() self.assertTrue(auser_second.is_anonymous) @override_settings(ROOT_URLCONF="auth_tests.urls") @modify_settings( MIDDLEWARE={"append": "django.contrib.auth.middleware.LoginRequiredMiddleware"} ) class TestLoginRequiredMiddleware(TestCase): @classmethod def setUpTestData(cls): cls.user = User.objects.create_user( "test_user", "test@example.com", "test_password" ) def setUp(self): self.middleware = LoginRequiredMiddleware(lambda req: HttpResponse()) self.request = HttpRequest() def test_public_paths(self): paths = ["public_view", "public_function_view"] for path in paths: response = self.client.get(f"/{path}/") self.assertEqual(response.status_code, 200) def test_protected_paths(self): paths = ["protected_view", "protected_function_view"] for path in paths: response = self.client.get(f"/{path}/") self.assertRedirects( response, settings.LOGIN_URL + f"?next=/{path}/", fetch_redirect_response=False, ) def test_login_required_paths(self): paths = ["login_required_cbv_view", "login_required_decorator_view"] for path in paths: response = self.client.get(f"/{path}/") self.assertRedirects( response, "/custom_login/" + f"?step=/{path}/", fetch_redirect_response=False, ) def test_admin_path(self): admin_url = reverse("admin:index") response = self.client.get(admin_url) self.assertRedirects( response, reverse("admin:login") + f"?next={admin_url}", target_status_code=200, ) def test_non_existent_path(self): response = self.client.get("/non_existent/") self.assertEqual(response.status_code, 404) def test_paths_with_logged_in_user(self): paths = [ "public_view", "public_function_view", "protected_view", "protected_function_view", "login_required_cbv_view", "login_required_decorator_view", ] self.client.login(username="test_user", password="test_password") for path in paths: response = self.client.get(f"/{path}/") self.assertEqual(response.status_code, 200) def test_get_login_url_from_view_func(self): def view_func(request): return HttpResponse() view_func.login_url = "/custom_login/" login_url = self.middleware.get_login_url(view_func) self.assertEqual(login_url, "/custom_login/") @override_settings(LOGIN_URL="/settings_login/") def test_get_login_url_from_settings(self): login_url = self.middleware.get_login_url(lambda: None) self.assertEqual(login_url, "/settings_login/") @override_settings(LOGIN_URL=None) def test_get_login_url_no_login_url(self): with self.assertRaises(ImproperlyConfigured) as e: self.middleware.get_login_url(lambda: None) self.assertEqual( str(e.exception), "No login URL to redirect to. Define settings.LOGIN_URL or provide " "a login_url via the 'django.contrib.auth.decorators.login_required' " "decorator.", ) def test_get_redirect_field_name_from_view_func(self): def view_func(request): return HttpResponse() view_func.redirect_field_name = "next_page" redirect_field_name = self.middleware.get_redirect_field_name(view_func) self.assertEqual(redirect_field_name, "next_page") @override_settings( MIDDLEWARE=[ "django.contrib.sessions.middleware.SessionMiddleware", "django.contrib.auth.middleware.AuthenticationMiddleware", "auth_tests.test_checks.LoginRequiredMiddlewareSubclass", ], LOGIN_URL="/settings_login/", ) def test_login_url_resolve_logic(self): paths = ["login_required_cbv_view", "login_required_decorator_view"] for path in paths: response = self.client.get(f"/{path}/") self.assertRedirects( response, "/custom_login/" + f"?step=/{path}/", fetch_redirect_response=False, ) paths = ["protected_view", "protected_function_view"] for path in paths: response = self.client.get(f"/{path}/") self.assertRedirects( response, f"/settings_login/?redirect_to=/{path}/", fetch_redirect_response=False, ) def test_get_redirect_field_name_default(self): redirect_field_name = self.middleware.get_redirect_field_name(lambda: None) self.assertEqual(redirect_field_name, REDIRECT_FIELD_NAME) def test_public_view_logged_in_performance(self): """ Public views don't trigger fetching the user from the database. """ self.client.force_login(self.user) with self.assertNumQueries(0): response = self.client.get("/public_view/") self.assertEqual(response.status_code, 200) def test_protected_view_logged_in_performance(self): """ Protected views do trigger fetching the user from the database. """ self.client.force_login(self.user) with self.assertNumQueries(2): # session and user response = self.client.get("/protected_view/") self.assertEqual(response.status_code, 200)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/settings.py
tests/auth_tests/settings.py
import os AUTH_MIDDLEWARE = [ "django.contrib.sessions.middleware.SessionMiddleware", "django.contrib.auth.middleware.AuthenticationMiddleware", ] AUTH_TEMPLATES = [ { "BACKEND": "django.template.backends.django.DjangoTemplates", "DIRS": [os.path.join(os.path.dirname(__file__), "templates")], "APP_DIRS": True, "OPTIONS": { "context_processors": [ "django.template.context_processors.request", "django.contrib.auth.context_processors.auth", "django.contrib.messages.context_processors.messages", ], }, } ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/__init__.py
tests/auth_tests/__init__.py
# The password for the fixture data users is 'password'
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_mixins.py
tests/auth_tests/test_mixins.py
from unittest import mock from django.contrib.auth import models from django.contrib.auth.mixins import ( LoginRequiredMixin, PermissionRequiredMixin, UserPassesTestMixin, ) from django.contrib.auth.models import AnonymousUser from django.core.exceptions import PermissionDenied from django.http import HttpResponse from django.test import RequestFactory, SimpleTestCase, TestCase from django.views.generic import View class AlwaysTrueMixin(UserPassesTestMixin): def test_func(self): return True class AlwaysFalseMixin(UserPassesTestMixin): def test_func(self): return False class EmptyResponseView(View): def get(self, request, *args, **kwargs): return HttpResponse() class AlwaysTrueView(AlwaysTrueMixin, EmptyResponseView): pass class AlwaysFalseView(AlwaysFalseMixin, EmptyResponseView): pass class StackedMixinsView1( LoginRequiredMixin, PermissionRequiredMixin, EmptyResponseView ): permission_required = ["auth_tests.add_customuser", "auth_tests.change_customuser"] raise_exception = True class StackedMixinsView2( PermissionRequiredMixin, LoginRequiredMixin, EmptyResponseView ): permission_required = ["auth_tests.add_customuser", "auth_tests.change_customuser"] raise_exception = True class AccessMixinTests(TestCase): factory = RequestFactory() def test_stacked_mixins_success(self): user = models.User.objects.create(username="joe", password="qwerty") perms = models.Permission.objects.filter( codename__in=("add_customuser", "change_customuser") ) user.user_permissions.add(*perms) request = self.factory.get("/rand") request.user = user view = StackedMixinsView1.as_view() response = view(request) self.assertEqual(response.status_code, 200) view = StackedMixinsView2.as_view() response = view(request) self.assertEqual(response.status_code, 200) def test_stacked_mixins_missing_permission(self): user = models.User.objects.create(username="joe", password="qwerty") perms = models.Permission.objects.filter(codename__in=("add_customuser",)) user.user_permissions.add(*perms) request = self.factory.get("/rand") request.user = user view = StackedMixinsView1.as_view() with self.assertRaises(PermissionDenied): view(request) view = StackedMixinsView2.as_view() with self.assertRaises(PermissionDenied): view(request) def test_access_mixin_permission_denied_response(self): user = models.User.objects.create(username="joe", password="qwerty") # Authenticated users receive PermissionDenied. request = self.factory.get("/rand") request.user = user view = AlwaysFalseView.as_view() with self.assertRaises(PermissionDenied): view(request) # Anonymous users are redirected to the login page. request.user = AnonymousUser() response = view(request) self.assertEqual(response.status_code, 302) self.assertEqual(response.url, "/accounts/login/?next=/rand") def test_access_mixin_permission_denied_remote_login_url(self): class AView(AlwaysFalseView): login_url = "https://www.remote.example.com/login" view = AView.as_view() request = self.factory.get("/rand") request.user = AnonymousUser() response = view(request) self.assertEqual(response.status_code, 302) self.assertEqual( response.url, "https://www.remote.example.com/login?next=http%3A//testserver/rand", ) @mock.patch.object(models.User, "is_authenticated", False) def test_stacked_mixins_not_logged_in(self): user = models.User.objects.create(username="joe", password="qwerty") perms = models.Permission.objects.filter( codename__in=("add_customuser", "change_customuser") ) user.user_permissions.add(*perms) request = self.factory.get("/rand") request.user = user view = StackedMixinsView1.as_view() with self.assertRaises(PermissionDenied): view(request) view = StackedMixinsView2.as_view() with self.assertRaises(PermissionDenied): view(request) class UserPassesTestTests(SimpleTestCase): factory = RequestFactory() def _test_redirect(self, view=None, url="/accounts/login/?next=/rand"): if not view: view = AlwaysFalseView.as_view() request = self.factory.get("/rand") request.user = AnonymousUser() response = view(request) self.assertEqual(response.status_code, 302) self.assertEqual(response.url, url) def test_default(self): self._test_redirect() def test_custom_redirect_url(self): class AView(AlwaysFalseView): login_url = "/login/" self._test_redirect(AView.as_view(), "/login/?next=/rand") def test_custom_redirect_parameter(self): class AView(AlwaysFalseView): redirect_field_name = "goto" self._test_redirect(AView.as_view(), "/accounts/login/?goto=/rand") def test_no_redirect_parameter(self): class AView(AlwaysFalseView): redirect_field_name = None self._test_redirect(AView.as_view(), "/accounts/login/") def test_raise_exception(self): class AView(AlwaysFalseView): raise_exception = True request = self.factory.get("/rand") request.user = AnonymousUser() with self.assertRaises(PermissionDenied): AView.as_view()(request) def test_raise_exception_custom_message(self): msg = "You don't have access here" class AView(AlwaysFalseView): raise_exception = True permission_denied_message = msg request = self.factory.get("/rand") request.user = AnonymousUser() view = AView.as_view() with self.assertRaisesMessage(PermissionDenied, msg): view(request) def test_raise_exception_custom_message_function(self): msg = "You don't have access here" class AView(AlwaysFalseView): raise_exception = True def get_permission_denied_message(self): return msg request = self.factory.get("/rand") request.user = AnonymousUser() view = AView.as_view() with self.assertRaisesMessage(PermissionDenied, msg): view(request) def test_user_passes(self): view = AlwaysTrueView.as_view() request = self.factory.get("/rand") request.user = AnonymousUser() response = view(request) self.assertEqual(response.status_code, 200) class LoginRequiredMixinTests(TestCase): factory = RequestFactory() @classmethod def setUpTestData(cls): cls.user = models.User.objects.create(username="joe", password="qwerty") def test_login_required(self): """ login_required works on a simple view wrapped in a login_required decorator. """ class AView(LoginRequiredMixin, EmptyResponseView): pass view = AView.as_view() request = self.factory.get("/rand") request.user = AnonymousUser() response = view(request) self.assertEqual(response.status_code, 302) self.assertEqual("/accounts/login/?next=/rand", response.url) request = self.factory.get("/rand") request.user = self.user response = view(request) self.assertEqual(response.status_code, 200) class PermissionsRequiredMixinTests(TestCase): factory = RequestFactory() @classmethod def setUpTestData(cls): cls.user = models.User.objects.create(username="joe", password="qwerty") perms = models.Permission.objects.filter( codename__in=("add_customuser", "change_customuser") ) cls.user.user_permissions.add(*perms) def test_many_permissions_pass(self): class AView(PermissionRequiredMixin, EmptyResponseView): permission_required = [ "auth_tests.add_customuser", "auth_tests.change_customuser", ] request = self.factory.get("/rand") request.user = self.user resp = AView.as_view()(request) self.assertEqual(resp.status_code, 200) def test_single_permission_pass(self): class AView(PermissionRequiredMixin, EmptyResponseView): permission_required = "auth_tests.add_customuser" request = self.factory.get("/rand") request.user = self.user resp = AView.as_view()(request) self.assertEqual(resp.status_code, 200) def test_permissioned_denied_redirect(self): class AView(PermissionRequiredMixin, EmptyResponseView): permission_required = [ "auth_tests.add_customuser", "auth_tests.change_customuser", "nonexistent-permission", ] # Authenticated users receive PermissionDenied. request = self.factory.get("/rand") request.user = self.user with self.assertRaises(PermissionDenied): AView.as_view()(request) # Anonymous users are redirected to the login page. request.user = AnonymousUser() resp = AView.as_view()(request) self.assertEqual(resp.status_code, 302) def test_permissioned_denied_exception_raised(self): class AView(PermissionRequiredMixin, EmptyResponseView): permission_required = [ "auth_tests.add_customuser", "auth_tests.change_customuser", "nonexistent-permission", ] raise_exception = True request = self.factory.get("/rand") request.user = self.user with self.assertRaises(PermissionDenied): AView.as_view()(request)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_hashers.py
tests/auth_tests/test_hashers.py
from contextlib import contextmanager from unittest import mock, skipUnless from django.conf.global_settings import PASSWORD_HASHERS from django.contrib.auth.hashers import ( UNUSABLE_PASSWORD_PREFIX, UNUSABLE_PASSWORD_SUFFIX_LENGTH, Argon2PasswordHasher, BasePasswordHasher, BCryptPasswordHasher, BCryptSHA256PasswordHasher, MD5PasswordHasher, PBKDF2PasswordHasher, PBKDF2SHA1PasswordHasher, ScryptPasswordHasher, acheck_password, check_password, get_hasher, identify_hasher, is_password_usable, make_password, ) from django.test import SimpleTestCase from django.test.utils import override_settings try: import bcrypt except ImportError: bcrypt = None try: import argon2 except ImportError: argon2 = None # scrypt requires OpenSSL 1.1+ try: import hashlib scrypt = hashlib.scrypt except ImportError: scrypt = None class PBKDF2SingleIterationHasher(PBKDF2PasswordHasher): iterations = 1 @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS) class TestUtilsHashPass(SimpleTestCase): def test_simple(self): encoded = make_password("lètmein") self.assertTrue(encoded.startswith("pbkdf2_sha256$")) self.assertTrue(is_password_usable(encoded)) self.assertTrue(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) # Blank passwords blank_encoded = make_password("") self.assertTrue(blank_encoded.startswith("pbkdf2_sha256$")) self.assertTrue(is_password_usable(blank_encoded)) self.assertTrue(check_password("", blank_encoded)) self.assertFalse(check_password(" ", blank_encoded)) async def test_acheck_password(self): encoded = make_password("lètmein") self.assertIs(await acheck_password("lètmein", encoded), True) self.assertIs(await acheck_password("lètmeinz", encoded), False) # Blank passwords. blank_encoded = make_password("") self.assertIs(await acheck_password("", blank_encoded), True) self.assertIs(await acheck_password(" ", blank_encoded), False) def test_bytes(self): encoded = make_password(b"bytes_password") self.assertTrue(encoded.startswith("pbkdf2_sha256$")) self.assertIs(is_password_usable(encoded), True) self.assertIs(check_password(b"bytes_password", encoded), True) def test_invalid_password(self): msg = "Password must be a string or bytes, got int." with self.assertRaisesMessage(TypeError, msg): make_password(1) def test_pbkdf2(self): encoded = make_password("lètmein", "seasalt", "pbkdf2_sha256") self.assertEqual( encoded, "pbkdf2_sha256$1500000$" "seasalt$P4UiMPVduVWIL/oS1GzH+IofsccjJNM5hUTikBvi5to=", ) self.assertTrue(is_password_usable(encoded)) self.assertTrue(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) self.assertEqual(identify_hasher(encoded).algorithm, "pbkdf2_sha256") # Blank passwords blank_encoded = make_password("", "seasalt", "pbkdf2_sha256") self.assertTrue(blank_encoded.startswith("pbkdf2_sha256$")) self.assertTrue(is_password_usable(blank_encoded)) self.assertTrue(check_password("", blank_encoded)) self.assertFalse(check_password(" ", blank_encoded)) # Salt entropy check. hasher = get_hasher("pbkdf2_sha256") encoded_weak_salt = make_password("lètmein", "iodizedsalt", "pbkdf2_sha256") encoded_strong_salt = make_password("lètmein", hasher.salt(), "pbkdf2_sha256") self.assertIs(hasher.must_update(encoded_weak_salt), True) self.assertIs(hasher.must_update(encoded_strong_salt), False) @override_settings( PASSWORD_HASHERS=["django.contrib.auth.hashers.MD5PasswordHasher"] ) def test_md5(self): encoded = make_password("lètmein", "seasalt", "md5") self.assertEqual(encoded, "md5$seasalt$3f86d0d3d465b7b458c231bf3555c0e3") self.assertTrue(is_password_usable(encoded)) self.assertTrue(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) self.assertEqual(identify_hasher(encoded).algorithm, "md5") # Blank passwords blank_encoded = make_password("", "seasalt", "md5") self.assertTrue(blank_encoded.startswith("md5$")) self.assertTrue(is_password_usable(blank_encoded)) self.assertTrue(check_password("", blank_encoded)) self.assertFalse(check_password(" ", blank_encoded)) # Salt entropy check. hasher = get_hasher("md5") encoded_weak_salt = make_password("lètmein", "iodizedsalt", "md5") encoded_strong_salt = make_password("lètmein", hasher.salt(), "md5") self.assertIs(hasher.must_update(encoded_weak_salt), True) self.assertIs(hasher.must_update(encoded_strong_salt), False) @skipUnless(bcrypt, "bcrypt not installed") def test_bcrypt_sha256(self): encoded = make_password("lètmein", hasher="bcrypt_sha256") self.assertTrue(is_password_usable(encoded)) self.assertTrue(encoded.startswith("bcrypt_sha256$")) self.assertTrue(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) self.assertEqual(identify_hasher(encoded).algorithm, "bcrypt_sha256") # password truncation no longer works password = ( "VSK0UYV6FFQVZ0KG88DYN9WADAADZO1CTSIVDJUNZSUML6IBX7LN7ZS3R5" "JGB3RGZ7VI7G7DJQ9NI8BQFSRPTG6UWTTVESA5ZPUN" ) encoded = make_password(password, hasher="bcrypt_sha256") self.assertTrue(check_password(password, encoded)) self.assertFalse(check_password(password[:72], encoded)) # Blank passwords blank_encoded = make_password("", hasher="bcrypt_sha256") self.assertTrue(blank_encoded.startswith("bcrypt_sha256$")) self.assertTrue(is_password_usable(blank_encoded)) self.assertTrue(check_password("", blank_encoded)) self.assertFalse(check_password(" ", blank_encoded)) @skipUnless(bcrypt, "bcrypt not installed") @override_settings( PASSWORD_HASHERS=["django.contrib.auth.hashers.BCryptPasswordHasher"] ) def test_bcrypt(self): encoded = make_password("lètmein", hasher="bcrypt") self.assertTrue(is_password_usable(encoded)) self.assertTrue(encoded.startswith("bcrypt$")) self.assertTrue(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) self.assertEqual(identify_hasher(encoded).algorithm, "bcrypt") # Blank passwords blank_encoded = make_password("", hasher="bcrypt") self.assertTrue(blank_encoded.startswith("bcrypt$")) self.assertTrue(is_password_usable(blank_encoded)) self.assertTrue(check_password("", blank_encoded)) self.assertFalse(check_password(" ", blank_encoded)) @skipUnless(bcrypt, "bcrypt not installed") @override_settings( PASSWORD_HASHERS=["django.contrib.auth.hashers.BCryptPasswordHasher"] ) def test_bcrypt_upgrade(self): hasher = get_hasher("bcrypt") self.assertEqual("bcrypt", hasher.algorithm) self.assertNotEqual(hasher.rounds, 4) old_rounds = hasher.rounds try: # Generate a password with 4 rounds. hasher.rounds = 4 encoded = make_password("letmein", hasher="bcrypt") rounds = hasher.safe_summary(encoded)["work factor"] self.assertEqual(rounds, 4) state = {"upgraded": False} def setter(password): state["upgraded"] = True # No upgrade is triggered. self.assertTrue(check_password("letmein", encoded, setter, "bcrypt")) self.assertFalse(state["upgraded"]) # Revert to the old rounds count and ... hasher.rounds = old_rounds # ... check if the password would get updated to the new count. self.assertTrue(check_password("letmein", encoded, setter, "bcrypt")) self.assertTrue(state["upgraded"]) finally: hasher.rounds = old_rounds @skipUnless(bcrypt, "bcrypt not installed") @override_settings( PASSWORD_HASHERS=["django.contrib.auth.hashers.BCryptPasswordHasher"] ) def test_bcrypt_harden_runtime(self): hasher = get_hasher("bcrypt") self.assertEqual("bcrypt", hasher.algorithm) with mock.patch.object(hasher, "rounds", 4): encoded = make_password("letmein", hasher="bcrypt") with ( mock.patch.object(hasher, "rounds", 6), mock.patch.object(hasher, "encode", side_effect=hasher.encode), ): hasher.harden_runtime("wrong_password", encoded) # Increasing rounds from 4 to 6 means an increase of 4 in workload, # therefore hardening should run 3 times to make the timing the # same (the original encode() call already ran once). self.assertEqual(hasher.encode.call_count, 3) # Get the original salt (includes the original workload factor) algorithm, data = encoded.split("$", 1) expected_call = (("wrong_password", data[:29].encode()),) self.assertEqual(hasher.encode.call_args_list, [expected_call] * 3) def test_unusable(self): encoded = make_password(None) self.assertEqual( len(encoded), len(UNUSABLE_PASSWORD_PREFIX) + UNUSABLE_PASSWORD_SUFFIX_LENGTH, ) self.assertFalse(is_password_usable(encoded)) self.assertFalse(check_password(None, encoded)) self.assertFalse(check_password(encoded, encoded)) self.assertFalse(check_password(UNUSABLE_PASSWORD_PREFIX, encoded)) self.assertFalse(check_password("", encoded)) self.assertFalse(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) with self.assertRaisesMessage(ValueError, "Unknown password hashing algorithm"): identify_hasher(encoded) # Assert that the unusable passwords actually contain a random part. # This might fail one day due to a hash collision. self.assertNotEqual(encoded, make_password(None), "Random password collision?") def test_unspecified_password(self): """ Makes sure specifying no plain password with a valid encoded password returns `False`. """ self.assertFalse(check_password(None, make_password("lètmein"))) def test_bad_algorithm(self): msg = ( "Unknown password hashing algorithm '%s'. Did you specify it in " "the PASSWORD_HASHERS setting?" ) with self.assertRaisesMessage(ValueError, msg % "lolcat"): make_password("lètmein", hasher="lolcat") with self.assertRaisesMessage(ValueError, msg % "lolcat"): identify_hasher("lolcat$salt$hash") def test_is_password_usable(self): passwords = ("lètmein_badencoded", "", None) for password in passwords: with self.subTest(password=password): self.assertIs(is_password_usable(password), True) def test_low_level_pbkdf2(self): hasher = PBKDF2PasswordHasher() encoded = hasher.encode("lètmein", "seasalt2") self.assertEqual( encoded, "pbkdf2_sha256$1500000$" "seasalt2$xWKIh704updzhxL+vMfPbhVsHljK62FyE988AtcoHU4=", ) self.assertTrue(hasher.verify("lètmein", encoded)) def test_low_level_pbkdf2_sha1(self): hasher = PBKDF2SHA1PasswordHasher() encoded = hasher.encode("lètmein", "seasalt2") self.assertEqual( encoded, "pbkdf2_sha1$1500000$seasalt2$ep4Ou2hnt2mlvMRsIjUln0Z5MYY=" ) self.assertTrue(hasher.verify("lètmein", encoded)) @skipUnless(bcrypt, "bcrypt not installed") def test_bcrypt_salt_check(self): hasher = BCryptPasswordHasher() encoded = hasher.encode("lètmein", hasher.salt()) self.assertIs(hasher.must_update(encoded), False) @skipUnless(bcrypt, "bcrypt not installed") def test_bcryptsha256_salt_check(self): hasher = BCryptSHA256PasswordHasher() encoded = hasher.encode("lètmein", hasher.salt()) self.assertIs(hasher.must_update(encoded), False) @override_settings( PASSWORD_HASHERS=[ "django.contrib.auth.hashers.PBKDF2PasswordHasher", "django.contrib.auth.hashers.PBKDF2SHA1PasswordHasher", "django.contrib.auth.hashers.MD5PasswordHasher", ], ) def test_upgrade(self): self.assertEqual("pbkdf2_sha256", get_hasher("default").algorithm) for algo in ("pbkdf2_sha1", "md5"): with self.subTest(algo=algo): encoded = make_password("lètmein", hasher=algo) state = {"upgraded": False} def setter(password): state["upgraded"] = True self.assertTrue(check_password("lètmein", encoded, setter)) self.assertTrue(state["upgraded"]) def test_no_upgrade(self): encoded = make_password("lètmein") state = {"upgraded": False} def setter(): state["upgraded"] = True self.assertFalse(check_password("WRONG", encoded, setter)) self.assertFalse(state["upgraded"]) @override_settings( PASSWORD_HASHERS=[ "django.contrib.auth.hashers.PBKDF2PasswordHasher", "django.contrib.auth.hashers.PBKDF2SHA1PasswordHasher", "django.contrib.auth.hashers.MD5PasswordHasher", ], ) def test_no_upgrade_on_incorrect_pass(self): self.assertEqual("pbkdf2_sha256", get_hasher("default").algorithm) for algo in ("pbkdf2_sha1", "md5"): with self.subTest(algo=algo): encoded = make_password("lètmein", hasher=algo) state = {"upgraded": False} def setter(): state["upgraded"] = True self.assertFalse(check_password("WRONG", encoded, setter)) self.assertFalse(state["upgraded"]) def test_pbkdf2_upgrade(self): hasher = get_hasher("default") self.assertEqual("pbkdf2_sha256", hasher.algorithm) self.assertNotEqual(hasher.iterations, 1) old_iterations = hasher.iterations try: # Generate a password with 1 iteration. hasher.iterations = 1 encoded = make_password("letmein") algo, iterations, salt, hash = encoded.split("$", 3) self.assertEqual(iterations, "1") state = {"upgraded": False} def setter(password): state["upgraded"] = True # No upgrade is triggered self.assertTrue(check_password("letmein", encoded, setter)) self.assertFalse(state["upgraded"]) # Revert to the old iteration count and ... hasher.iterations = old_iterations # ... check if the password would get updated to the new iteration # count. self.assertTrue(check_password("letmein", encoded, setter)) self.assertTrue(state["upgraded"]) finally: hasher.iterations = old_iterations def test_pbkdf2_harden_runtime(self): hasher = get_hasher("default") self.assertEqual("pbkdf2_sha256", hasher.algorithm) with mock.patch.object(hasher, "iterations", 1): encoded = make_password("letmein") with ( mock.patch.object(hasher, "iterations", 6), mock.patch.object(hasher, "encode", side_effect=hasher.encode), ): hasher.harden_runtime("wrong_password", encoded) # Encode should get called once ... self.assertEqual(hasher.encode.call_count, 1) # ... with the original salt and 5 iterations. algorithm, iterations, salt, hash = encoded.split("$", 3) expected_call = (("wrong_password", salt, 5),) self.assertEqual(hasher.encode.call_args, expected_call) def test_pbkdf2_upgrade_new_hasher(self): hasher = get_hasher("default") self.assertEqual("pbkdf2_sha256", hasher.algorithm) self.assertNotEqual(hasher.iterations, 1) state = {"upgraded": False} def setter(password): state["upgraded"] = True with self.settings( PASSWORD_HASHERS=["auth_tests.test_hashers.PBKDF2SingleIterationHasher"] ): encoded = make_password("letmein") algo, iterations, salt, hash = encoded.split("$", 3) self.assertEqual(iterations, "1") # No upgrade is triggered self.assertTrue(check_password("letmein", encoded, setter)) self.assertFalse(state["upgraded"]) # Revert to the old iteration count and check if the password would get # updated to the new iteration count. with self.settings( PASSWORD_HASHERS=[ "django.contrib.auth.hashers.PBKDF2PasswordHasher", "auth_tests.test_hashers.PBKDF2SingleIterationHasher", ] ): self.assertTrue(check_password("letmein", encoded, setter)) self.assertTrue(state["upgraded"]) def test_check_password_calls_harden_runtime(self): hasher = get_hasher("default") encoded = make_password("letmein") with ( mock.patch.object(hasher, "harden_runtime"), mock.patch.object(hasher, "must_update", return_value=True), ): # Correct password supplied, no hardening needed check_password("letmein", encoded) self.assertEqual(hasher.harden_runtime.call_count, 0) # Wrong password supplied, hardening needed check_password("wrong_password", encoded) self.assertEqual(hasher.harden_runtime.call_count, 1) @contextmanager def assertMakePasswordCalled(self, password, encoded, hasher_side_effect): hasher = get_hasher("default") with ( mock.patch( "django.contrib.auth.hashers.identify_hasher", side_effect=hasher_side_effect, ) as mock_identify_hasher, mock.patch( "django.contrib.auth.hashers.make_password" ) as mock_make_password, mock.patch( "django.contrib.auth.hashers.get_random_string", side_effect=lambda size: "x" * size, ), mock.patch.object(hasher, "verify"), ): # Ensure make_password is called to standardize timing. yield self.assertEqual(hasher.verify.call_count, 0) self.assertEqual(mock_identify_hasher.mock_calls, [mock.call(encoded)]) self.assertEqual( mock_make_password.mock_calls, [mock.call("x" * UNUSABLE_PASSWORD_SUFFIX_LENGTH)], ) def test_check_password_calls_make_password_to_fake_runtime(self): cases = [ (None, None, None), # no plain text password provided ("foo", make_password(password=None), None), # unusable encoded ("letmein", make_password(password="letmein"), ValueError), # valid encoded ] for password, encoded, hasher_side_effect in cases: with ( self.subTest(encoded=encoded), self.assertMakePasswordCalled(password, encoded, hasher_side_effect), ): check_password(password, encoded) async def test_acheck_password_calls_make_password_to_fake_runtime(self): cases = [ (None, None, None), # no plain text password provided ("foo", make_password(password=None), None), # unusable encoded ("letmein", make_password(password="letmein"), ValueError), # valid encoded ] for password, encoded, hasher_side_effect in cases: with ( self.subTest(encoded=encoded), self.assertMakePasswordCalled(password, encoded, hasher_side_effect), ): await acheck_password(password, encoded) def test_encode_invalid_salt(self): hasher_classes = [ MD5PasswordHasher, PBKDF2PasswordHasher, PBKDF2SHA1PasswordHasher, ScryptPasswordHasher, ] msg = "salt must be provided and cannot contain $." for hasher_class in hasher_classes: hasher = hasher_class() for salt in [None, "", "sea$salt"]: with self.subTest(hasher_class.__name__, salt=salt): with self.assertRaisesMessage(ValueError, msg): hasher.encode("password", salt) def test_password_and_salt_in_str_and_bytes(self): hasher_classes = [ MD5PasswordHasher, PBKDF2PasswordHasher, PBKDF2SHA1PasswordHasher, ScryptPasswordHasher, ] for hasher_class in hasher_classes: hasher = hasher_class() with self.subTest(hasher_class.__name__): passwords = ["password", b"password"] for password in passwords: for salt in [hasher.salt(), hasher.salt().encode()]: encoded = hasher.encode(password, salt) for password_to_verify in passwords: self.assertIs( hasher.verify(password_to_verify, encoded), True ) @skipUnless(argon2, "argon2-cffi not installed") def test_password_and_salt_in_str_and_bytes_argon2(self): hasher = Argon2PasswordHasher() passwords = ["password", b"password"] for password in passwords: for salt in [hasher.salt(), hasher.salt().encode()]: encoded = hasher.encode(password, salt) for password_to_verify in passwords: self.assertIs(hasher.verify(password_to_verify, encoded), True) @skipUnless(bcrypt, "bcrypt not installed") def test_password_and_salt_in_str_and_bytes_bcrypt(self): hasher_classes = [ BCryptPasswordHasher, BCryptSHA256PasswordHasher, ] for hasher_class in hasher_classes: hasher = hasher_class() with self.subTest(hasher_class.__name__): passwords = ["password", b"password"] for password in passwords: salts = [hasher.salt().decode(), hasher.salt()] for salt in salts: encoded = hasher.encode(password, salt) for password_to_verify in passwords: self.assertIs( hasher.verify(password_to_verify, encoded), True ) def test_encode_password_required(self): hasher_classes = [ MD5PasswordHasher, PBKDF2PasswordHasher, PBKDF2SHA1PasswordHasher, ScryptPasswordHasher, ] msg = "password must be provided." for hasher_class in hasher_classes: hasher = hasher_class() with self.subTest(hasher_class.__name__): with self.assertRaisesMessage(TypeError, msg): hasher.encode(None, "seasalt") class BasePasswordHasherTests(SimpleTestCase): not_implemented_msg = "subclasses of BasePasswordHasher must provide %s() method" def setUp(self): self.hasher = BasePasswordHasher() def test_load_library_no_algorithm(self): msg = "Hasher 'BasePasswordHasher' doesn't specify a library attribute" with self.assertRaisesMessage(ValueError, msg): self.hasher._load_library() def test_load_library_importerror(self): PlainHasher = type( "PlainHasher", (BasePasswordHasher,), {"algorithm": "plain", "library": "plain"}, ) msg = "Couldn't load 'PlainHasher' algorithm library: No module named 'plain'" with self.assertRaisesMessage(ValueError, msg): PlainHasher()._load_library() def test_attributes(self): self.assertIsNone(self.hasher.algorithm) self.assertIsNone(self.hasher.library) def test_encode(self): msg = self.not_implemented_msg % "an encode" with self.assertRaisesMessage(NotImplementedError, msg): self.hasher.encode("password", "salt") def test_decode(self): msg = self.not_implemented_msg % "a decode" with self.assertRaisesMessage(NotImplementedError, msg): self.hasher.decode("encoded") def test_harden_runtime(self): msg = ( "subclasses of BasePasswordHasher should provide a harden_runtime() method" ) with self.assertWarnsMessage(Warning, msg): self.hasher.harden_runtime("password", "encoded") def test_must_update(self): self.assertIs(self.hasher.must_update("encoded"), False) def test_safe_summary(self): msg = self.not_implemented_msg % "a safe_summary" with self.assertRaisesMessage(NotImplementedError, msg): self.hasher.safe_summary("encoded") def test_verify(self): msg = self.not_implemented_msg % "a verify" with self.assertRaisesMessage(NotImplementedError, msg): self.hasher.verify("password", "encoded") @skipUnless(argon2, "argon2-cffi not installed") @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS) class TestUtilsHashPassArgon2(SimpleTestCase): def test_argon2(self): encoded = make_password("lètmein", hasher="argon2") self.assertTrue(is_password_usable(encoded)) self.assertTrue(encoded.startswith("argon2$argon2id$")) self.assertTrue(check_password("lètmein", encoded)) self.assertFalse(check_password("lètmeinz", encoded)) self.assertEqual(identify_hasher(encoded).algorithm, "argon2") # Blank passwords blank_encoded = make_password("", hasher="argon2") self.assertTrue(blank_encoded.startswith("argon2$argon2id$")) self.assertTrue(is_password_usable(blank_encoded)) self.assertTrue(check_password("", blank_encoded)) self.assertFalse(check_password(" ", blank_encoded)) # Old hashes without version attribute encoded = ( "argon2$argon2i$m=8,t=1,p=1$c29tZXNhbHQ$gwQOXSNhxiOxPOA0+PY10P9QFO" "4NAYysnqRt1GSQLE55m+2GYDt9FEjPMHhP2Cuf0nOEXXMocVrsJAtNSsKyfg" ) self.assertTrue(check_password("secret", encoded)) self.assertFalse(check_password("wrong", encoded)) # Old hashes with version attribute. encoded = "argon2$argon2i$v=19$m=8,t=1,p=1$c2FsdHNhbHQ$YC9+jJCrQhs5R6db7LlN8Q" self.assertIs(check_password("secret", encoded), True) self.assertIs(check_password("wrong", encoded), False) # Salt entropy check. hasher = get_hasher("argon2") encoded_weak_salt = make_password("lètmein", "iodizedsalt", "argon2") encoded_strong_salt = make_password("lètmein", hasher.salt(), "argon2") self.assertIs(hasher.must_update(encoded_weak_salt), True) self.assertIs(hasher.must_update(encoded_strong_salt), False) def test_argon2_decode(self): salt = "abcdefghijk" encoded = make_password("lètmein", salt=salt, hasher="argon2") hasher = get_hasher("argon2") decoded = hasher.decode(encoded) self.assertEqual(decoded["memory_cost"], hasher.memory_cost) self.assertEqual(decoded["parallelism"], hasher.parallelism) self.assertEqual(decoded["salt"], salt) self.assertEqual(decoded["time_cost"], hasher.time_cost) def test_argon2_upgrade(self): self._test_argon2_upgrade("time_cost", "time cost", 1) self._test_argon2_upgrade("memory_cost", "memory cost", 64) self._test_argon2_upgrade("parallelism", "parallelism", 1) def test_argon2_version_upgrade(self): hasher = get_hasher("argon2") state = {"upgraded": False} encoded = ( "argon2$argon2id$v=19$m=102400,t=2,p=8$Y041dExhNkljRUUy$TMa6A8fPJh" "CAUXRhJXCXdw" ) def setter(password): state["upgraded"] = True old_m = hasher.memory_cost old_t = hasher.time_cost old_p = hasher.parallelism try: hasher.memory_cost = 8 hasher.time_cost = 1 hasher.parallelism = 1 self.assertTrue(check_password("secret", encoded, setter, "argon2")) self.assertTrue(state["upgraded"]) finally: hasher.memory_cost = old_m hasher.time_cost = old_t hasher.parallelism = old_p def _test_argon2_upgrade(self, attr, summary_key, new_value): hasher = get_hasher("argon2") self.assertEqual("argon2", hasher.algorithm) self.assertNotEqual(getattr(hasher, attr), new_value) old_value = getattr(hasher, attr) try: # Generate hash with attr set to 1 setattr(hasher, attr, new_value) encoded = make_password("letmein", hasher="argon2") attr_value = hasher.safe_summary(encoded)[summary_key] self.assertEqual(attr_value, new_value) state = {"upgraded": False} def setter(password): state["upgraded"] = True # No upgrade is triggered. self.assertTrue(check_password("letmein", encoded, setter, "argon2")) self.assertFalse(state["upgraded"]) # Revert to the old rounds count and ... setattr(hasher, attr, old_value) # ... check if the password would get updated to the new count. self.assertTrue(check_password("letmein", encoded, setter, "argon2")) self.assertTrue(state["upgraded"]) finally: setattr(hasher, attr, old_value) @skipUnless(scrypt, "scrypt not available") @override_settings(PASSWORD_HASHERS=PASSWORD_HASHERS) class TestUtilsHashPassScrypt(SimpleTestCase): def test_scrypt(self): encoded = make_password("lètmein", "seasalt", "scrypt") self.assertEqual( encoded, "scrypt$16384$seasalt$8$5$ECMIUp+LMxMSK8xB/IVyba+KYGTI7FTnet025q/1f" "/vBAVnnP3hdYqJuRi+mJn6ji6ze3Fbb7JEFPKGpuEf5vw==", ) self.assertIs(is_password_usable(encoded), True) self.assertIs(check_password("lètmein", encoded), True) self.assertIs(check_password("lètmeinz", encoded), False) self.assertEqual(identify_hasher(encoded).algorithm, "scrypt") # Blank passwords. blank_encoded = make_password("", "seasalt", "scrypt") self.assertIs(blank_encoded.startswith("scrypt$"), True) self.assertIs(is_password_usable(blank_encoded), True) self.assertIs(check_password("", blank_encoded), True) self.assertIs(check_password(" ", blank_encoded), False) def test_scrypt_decode(self): encoded = make_password("lètmein", "seasalt", "scrypt") hasher = get_hasher("scrypt") decoded = hasher.decode(encoded) tests = [ ("block_size", hasher.block_size), ("parallelism", hasher.parallelism), ("salt", "seasalt"), ("work_factor", hasher.work_factor), ] for key, excepted in tests: with self.subTest(key=key): self.assertEqual(decoded[key], excepted) def _test_scrypt_upgrade(self, attr, summary_key, new_value): hasher = get_hasher("scrypt") self.assertEqual(hasher.algorithm, "scrypt") self.assertNotEqual(getattr(hasher, attr), new_value) old_value = getattr(hasher, attr) try: # Generate hash with attr set to the new value. setattr(hasher, attr, new_value) encoded = make_password("lètmein", "seasalt", "scrypt") attr_value = hasher.safe_summary(encoded)[summary_key] self.assertEqual(attr_value, new_value) state = {"upgraded": False} def setter(password):
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
true
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_signals.py
tests/auth_tests/test_signals.py
from django.apps import apps from django.contrib.auth import authenticate, signals from django.contrib.auth.models import User from django.core.exceptions import FieldDoesNotExist from django.test import TestCase, override_settings from django.test.client import RequestFactory from .models import MinimalUser, UserWithDisabledLastLoginField @override_settings(ROOT_URLCONF="auth_tests.urls") class SignalTestCase(TestCase): @classmethod def setUpTestData(cls): cls.u1 = User.objects.create_user(username="testclient", password="password") cls.u3 = User.objects.create_user(username="staff", password="password") def listener_login(self, user, **kwargs): self.logged_in.append(user) def listener_logout(self, user, **kwargs): self.logged_out.append(user) def listener_login_failed(self, sender, **kwargs): self.login_failed.append(kwargs) def setUp(self): """Set up the listeners and reset the logged in/logged out counters""" self.logged_in = [] self.logged_out = [] self.login_failed = [] signals.user_logged_in.connect(self.listener_login) self.addCleanup(signals.user_logged_in.disconnect, self.listener_login) signals.user_logged_out.connect(self.listener_logout) self.addCleanup(signals.user_logged_out.disconnect, self.listener_logout) signals.user_login_failed.connect(self.listener_login_failed) self.addCleanup( signals.user_login_failed.disconnect, self.listener_login_failed ) def test_login(self): # Only a successful login will trigger the success signal. self.client.login(username="testclient", password="bad") self.assertEqual(len(self.logged_in), 0) self.assertEqual(len(self.login_failed), 1) self.assertEqual(self.login_failed[0]["credentials"]["username"], "testclient") # verify the password is cleansed self.assertIn("***", self.login_failed[0]["credentials"]["password"]) self.assertIn("request", self.login_failed[0]) # Like this: self.client.login(username="testclient", password="password") self.assertEqual(len(self.logged_in), 1) self.assertEqual(self.logged_in[0].username, "testclient") # Ensure there were no more failures. self.assertEqual(len(self.login_failed), 1) def test_logout_anonymous(self): # The log_out function will still trigger the signal for anonymous # users. self.client.post("/logout/next_page/") self.assertEqual(len(self.logged_out), 1) self.assertIsNone(self.logged_out[0]) def test_logout(self): self.client.login(username="testclient", password="password") self.client.post("/logout/next_page/") self.assertEqual(len(self.logged_out), 1) self.assertEqual(self.logged_out[0].username, "testclient") def test_update_last_login(self): """Only `last_login` is updated in `update_last_login`""" user = self.u3 old_last_login = user.last_login user.username = "This username shouldn't get saved" request = RequestFactory().get("/login") signals.user_logged_in.send(sender=user.__class__, request=request, user=user) user = User.objects.get(pk=user.pk) self.assertEqual(user.username, "staff") self.assertNotEqual(user.last_login, old_last_login) def test_failed_login_without_request(self): authenticate(username="testclient", password="bad") self.assertIsNone(self.login_failed[0]["request"]) def test_login_with_custom_user_without_last_login_field(self): """ The user_logged_in signal is only registered if the user model has a last_login field. """ last_login_receivers = signals.user_logged_in.receivers try: signals.user_logged_in.receivers = [] with self.assertRaises(FieldDoesNotExist): MinimalUser._meta.get_field("last_login") with self.settings(AUTH_USER_MODEL="auth_tests.MinimalUser"): apps.get_app_config("auth").ready() self.assertEqual(signals.user_logged_in.receivers, []) # last_login is a property whose value is None. self.assertIsNone(UserWithDisabledLastLoginField().last_login) with self.settings( AUTH_USER_MODEL="auth_tests.UserWithDisabledLastLoginField" ): apps.get_app_config("auth").ready() self.assertEqual(signals.user_logged_in.receivers, []) with self.settings(AUTH_USER_MODEL="auth.User"): apps.get_app_config("auth").ready() self.assertEqual(len(signals.user_logged_in.receivers), 1) finally: signals.user_logged_in.receivers = last_login_receivers
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_auth_backends.py
tests/auth_tests/test_auth_backends.py
import sys from datetime import date from unittest import mock from unittest.mock import patch from asgiref.sync import sync_to_async from django.contrib.auth import ( BACKEND_SESSION_KEY, SESSION_KEY, _clean_credentials, aauthenticate, authenticate, get_user, signals, ) from django.contrib.auth.backends import BaseBackend, ModelBackend from django.contrib.auth.forms import PasswordChangeForm, SetPasswordForm from django.contrib.auth.hashers import MD5PasswordHasher from django.contrib.auth.models import AnonymousUser, Group, Permission, User from django.contrib.contenttypes.models import ContentType from django.core.exceptions import ImproperlyConfigured, PermissionDenied from django.http import HttpRequest from django.test import ( Client, RequestFactory, SimpleTestCase, TestCase, modify_settings, override_settings, ) from django.urls import reverse from django.views.debug import ExceptionReporter, technical_500_response from django.views.decorators.debug import sensitive_variables from .models import ( CustomPermissionsUser, CustomUser, CustomUserWithoutIsActiveField, ExtensionUser, UUIDUser, ) class FilteredExceptionReporter(ExceptionReporter): def get_traceback_frames(self): frames = super().get_traceback_frames() return [ frame for frame in frames if not isinstance(dict(frame["vars"]).get("self"), Client) ] class SimpleBackend(BaseBackend): def get_user_permissions(self, user_obj, obj=None): return ["user_perm"] def get_group_permissions(self, user_obj, obj=None): return ["group_perm"] @override_settings( AUTHENTICATION_BACKENDS=["auth_tests.test_auth_backends.SimpleBackend"] ) class BaseBackendTest(TestCase): @classmethod def setUpTestData(cls): cls.user = User.objects.create_user("test", "test@example.com", "test") def test_get_user_permissions(self): self.assertEqual(self.user.get_user_permissions(), {"user_perm"}) async def test_aget_user_permissions(self): self.assertEqual(await self.user.aget_user_permissions(), {"user_perm"}) def test_get_group_permissions(self): self.assertEqual(self.user.get_group_permissions(), {"group_perm"}) async def test_aget_group_permissions(self): self.assertEqual(await self.user.aget_group_permissions(), {"group_perm"}) def test_get_all_permissions(self): self.assertEqual(self.user.get_all_permissions(), {"user_perm", "group_perm"}) async def test_aget_all_permissions(self): self.assertEqual( await self.user.aget_all_permissions(), {"user_perm", "group_perm"} ) def test_has_perm(self): self.assertIs(self.user.has_perm("user_perm"), True) self.assertIs(self.user.has_perm("group_perm"), True) self.assertIs(self.user.has_perm("other_perm", TestObj()), False) async def test_ahas_perm(self): self.assertIs(await self.user.ahas_perm("user_perm"), True) self.assertIs(await self.user.ahas_perm("group_perm"), True) self.assertIs(await self.user.ahas_perm("other_perm", TestObj()), False) def test_has_perms_perm_list_invalid(self): msg = "perm_list must be an iterable of permissions." with self.assertRaisesMessage(ValueError, msg): self.user.has_perms("user_perm") with self.assertRaisesMessage(ValueError, msg): self.user.has_perms(object()) async def test_ahas_perms_perm_list_invalid(self): msg = "perm_list must be an iterable of permissions." with self.assertRaisesMessage(ValueError, msg): await self.user.ahas_perms("user_perm") with self.assertRaisesMessage(ValueError, msg): await self.user.ahas_perms(object()) class CountingMD5PasswordHasher(MD5PasswordHasher): """Hasher that counts how many times it computes a hash.""" calls = 0 def encode(self, *args, **kwargs): type(self).calls += 1 return super().encode(*args, **kwargs) class BaseModelBackendTest: """ A base class for tests that need to validate the ModelBackend with different User models. Subclasses should define a class level UserModel attribute, and a create_users() method to construct two users for test purposes. """ backend = "django.contrib.auth.backends.ModelBackend" @classmethod def setUpClass(cls): cls.enterClassContext( modify_settings(AUTHENTICATION_BACKENDS={"append": cls.backend}) ) super().setUpClass() def setUp(self): # The custom_perms test messes with ContentTypes, which will be cached. # Flush the cache to ensure there are no side effects. self.addCleanup(ContentType.objects.clear_cache) self.create_users() def test_has_perm(self): user = self.UserModel._default_manager.get(pk=self.user.pk) self.assertIs(user.has_perm("auth.test"), False) user.is_staff = True user.save() self.assertIs(user.has_perm("auth.test"), False) user.is_superuser = True user.save() self.assertIs(user.has_perm("auth.test"), True) user.is_staff = True user.is_superuser = True user.is_active = False user.save() self.assertIs(user.has_perm("auth.test"), False) async def test_ahas_perm(self): user = await self.UserModel._default_manager.aget(pk=self.user.pk) self.assertIs(await user.ahas_perm("auth.test"), False) user.is_staff = True await user.asave() self.assertIs(await user.ahas_perm("auth.test"), False) user.is_superuser = True await user.asave() self.assertIs(await user.ahas_perm("auth.test"), True) self.assertIs(await user.ahas_module_perms("auth"), True) user.is_staff = True user.is_superuser = True user.is_active = False await user.asave() self.assertIs(await user.ahas_perm("auth.test"), False) def test_custom_perms(self): user = self.UserModel._default_manager.get(pk=self.user.pk) content_type = ContentType.objects.get_for_model(Group) perm = Permission.objects.create( name="test", content_type=content_type, codename="test" ) user.user_permissions.add(perm) # reloading user to purge the _perm_cache user = self.UserModel._default_manager.get(pk=self.user.pk) self.assertEqual(user.get_all_permissions(), {"auth.test"}) self.assertEqual(user.get_user_permissions(), {"auth.test"}) self.assertEqual(user.get_group_permissions(), set()) self.assertIs(user.has_module_perms("Group"), False) self.assertIs(user.has_module_perms("auth"), True) perm = Permission.objects.create( name="test2", content_type=content_type, codename="test2" ) user.user_permissions.add(perm) perm = Permission.objects.create( name="test3", content_type=content_type, codename="test3" ) user.user_permissions.add(perm) user = self.UserModel._default_manager.get(pk=self.user.pk) expected_user_perms = {"auth.test2", "auth.test", "auth.test3"} self.assertEqual(user.get_all_permissions(), expected_user_perms) self.assertIs(user.has_perm("test"), False) self.assertIs(user.has_perm("auth.test"), True) self.assertIs(user.has_perms(["auth.test2", "auth.test3"]), True) perm = Permission.objects.create( name="test_group", content_type=content_type, codename="test_group" ) group = Group.objects.create(name="test_group") group.permissions.add(perm) user.groups.add(group) user = self.UserModel._default_manager.get(pk=self.user.pk) self.assertEqual( user.get_all_permissions(), {*expected_user_perms, "auth.test_group"} ) self.assertEqual(user.get_user_permissions(), expected_user_perms) self.assertEqual(user.get_group_permissions(), {"auth.test_group"}) self.assertIs(user.has_perms(["auth.test3", "auth.test_group"]), True) user = AnonymousUser() self.assertIs(user.has_perm("test"), False) self.assertIs(user.has_perms(["auth.test2", "auth.test3"]), False) async def test_acustom_perms(self): user = await self.UserModel._default_manager.aget(pk=self.user.pk) content_type = await sync_to_async(ContentType.objects.get_for_model)(Group) perm = await Permission.objects.acreate( name="test", content_type=content_type, codename="test" ) await user.user_permissions.aadd(perm) # Reloading user to purge the _perm_cache. user = await self.UserModel._default_manager.aget(pk=self.user.pk) self.assertEqual(await user.aget_all_permissions(), {"auth.test"}) self.assertEqual(await user.aget_user_permissions(), {"auth.test"}) self.assertEqual(await user.aget_group_permissions(), set()) self.assertIs(await user.ahas_module_perms("Group"), False) self.assertIs(await user.ahas_module_perms("auth"), True) perm = await Permission.objects.acreate( name="test2", content_type=content_type, codename="test2" ) await user.user_permissions.aadd(perm) perm = await Permission.objects.acreate( name="test3", content_type=content_type, codename="test3" ) await user.user_permissions.aadd(perm) user = await self.UserModel._default_manager.aget(pk=self.user.pk) expected_user_perms = {"auth.test2", "auth.test", "auth.test3"} self.assertEqual(await user.aget_all_permissions(), expected_user_perms) self.assertIs(await user.ahas_perm("test"), False) self.assertIs(await user.ahas_perm("auth.test"), True) self.assertIs(await user.ahas_perms(["auth.test2", "auth.test3"]), True) perm = await Permission.objects.acreate( name="test_group", content_type=content_type, codename="test_group" ) group = await Group.objects.acreate(name="test_group") await group.permissions.aadd(perm) await user.groups.aadd(group) user = await self.UserModel._default_manager.aget(pk=self.user.pk) self.assertEqual( await user.aget_all_permissions(), {*expected_user_perms, "auth.test_group"} ) self.assertEqual(await user.aget_user_permissions(), expected_user_perms) self.assertEqual(await user.aget_group_permissions(), {"auth.test_group"}) self.assertIs(await user.ahas_perms(["auth.test3", "auth.test_group"]), True) user = AnonymousUser() self.assertIs(await user.ahas_perm("test"), False) self.assertIs(await user.ahas_perms(["auth.test2", "auth.test3"]), False) def test_has_no_object_perm(self): """Regressiontest for #12462""" user = self.UserModel._default_manager.get(pk=self.user.pk) content_type = ContentType.objects.get_for_model(Group) perm = Permission.objects.create( name="test", content_type=content_type, codename="test" ) user.user_permissions.add(perm) self.assertIs(user.has_perm("auth.test", "object"), False) self.assertEqual(user.get_all_permissions("object"), set()) self.assertIs(user.has_perm("auth.test"), True) self.assertEqual(user.get_all_permissions(), {"auth.test"}) async def test_ahas_no_object_perm(self): """See test_has_no_object_perm()""" user = await self.UserModel._default_manager.aget(pk=self.user.pk) content_type = await sync_to_async(ContentType.objects.get_for_model)(Group) perm = await Permission.objects.acreate( name="test", content_type=content_type, codename="test" ) await user.user_permissions.aadd(perm) self.assertIs(await user.ahas_perm("auth.test", "object"), False) self.assertEqual(await user.aget_all_permissions("object"), set()) self.assertIs(await user.ahas_perm("auth.test"), True) self.assertEqual(await user.aget_all_permissions(), {"auth.test"}) def test_anonymous_has_no_permissions(self): """ #17903 -- Anonymous users shouldn't have permissions in ModelBackend.get_(all|user|group)_permissions(). """ backend = ModelBackend() user = self.UserModel._default_manager.get(pk=self.user.pk) content_type = ContentType.objects.get_for_model(Group) user_perm = Permission.objects.create( name="test", content_type=content_type, codename="test_user" ) group_perm = Permission.objects.create( name="test2", content_type=content_type, codename="test_group" ) user.user_permissions.add(user_perm) group = Group.objects.create(name="test_group") user.groups.add(group) group.permissions.add(group_perm) self.assertEqual( backend.get_all_permissions(user), {"auth.test_user", "auth.test_group"} ) self.assertEqual(backend.get_user_permissions(user), {"auth.test_user"}) self.assertEqual(backend.get_group_permissions(user), {"auth.test_group"}) with mock.patch.object(self.UserModel, "is_anonymous", True): self.assertEqual(backend.get_all_permissions(user), set()) self.assertEqual(backend.get_user_permissions(user), set()) self.assertEqual(backend.get_group_permissions(user), set()) async def test_aanonymous_has_no_permissions(self): """See test_anonymous_has_no_permissions()""" backend = ModelBackend() user = await self.UserModel._default_manager.aget(pk=self.user.pk) content_type = await sync_to_async(ContentType.objects.get_for_model)(Group) user_perm = await Permission.objects.acreate( name="test", content_type=content_type, codename="test_user" ) group_perm = await Permission.objects.acreate( name="test2", content_type=content_type, codename="test_group" ) await user.user_permissions.aadd(user_perm) group = await Group.objects.acreate(name="test_group") await user.groups.aadd(group) await group.permissions.aadd(group_perm) self.assertEqual( await backend.aget_all_permissions(user), {"auth.test_user", "auth.test_group"}, ) self.assertEqual(await backend.aget_user_permissions(user), {"auth.test_user"}) self.assertEqual( await backend.aget_group_permissions(user), {"auth.test_group"} ) with mock.patch.object(self.UserModel, "is_anonymous", True): self.assertEqual(await backend.aget_all_permissions(user), set()) self.assertEqual(await backend.aget_user_permissions(user), set()) self.assertEqual(await backend.aget_group_permissions(user), set()) def test_inactive_has_no_permissions(self): """ #17903 -- Inactive users shouldn't have permissions in ModelBackend.get_(all|user|group)_permissions(). """ backend = ModelBackend() user = self.UserModel._default_manager.get(pk=self.user.pk) content_type = ContentType.objects.get_for_model(Group) user_perm = Permission.objects.create( name="test", content_type=content_type, codename="test_user" ) group_perm = Permission.objects.create( name="test2", content_type=content_type, codename="test_group" ) user.user_permissions.add(user_perm) group = Group.objects.create(name="test_group") user.groups.add(group) group.permissions.add(group_perm) self.assertEqual( backend.get_all_permissions(user), {"auth.test_user", "auth.test_group"} ) self.assertEqual(backend.get_user_permissions(user), {"auth.test_user"}) self.assertEqual(backend.get_group_permissions(user), {"auth.test_group"}) user.is_active = False user.save() self.assertEqual(backend.get_all_permissions(user), set()) self.assertEqual(backend.get_user_permissions(user), set()) self.assertEqual(backend.get_group_permissions(user), set()) async def test_ainactive_has_no_permissions(self): """See test_inactive_has_no_permissions()""" backend = ModelBackend() user = await self.UserModel._default_manager.aget(pk=self.user.pk) content_type = await sync_to_async(ContentType.objects.get_for_model)(Group) user_perm = await Permission.objects.acreate( name="test", content_type=content_type, codename="test_user" ) group_perm = await Permission.objects.acreate( name="test2", content_type=content_type, codename="test_group" ) await user.user_permissions.aadd(user_perm) group = await Group.objects.acreate(name="test_group") await user.groups.aadd(group) await group.permissions.aadd(group_perm) self.assertEqual( await backend.aget_all_permissions(user), {"auth.test_user", "auth.test_group"}, ) self.assertEqual(await backend.aget_user_permissions(user), {"auth.test_user"}) self.assertEqual( await backend.aget_group_permissions(user), {"auth.test_group"} ) user.is_active = False await user.asave() self.assertEqual(await backend.aget_all_permissions(user), set()) self.assertEqual(await backend.aget_user_permissions(user), set()) self.assertEqual(await backend.aget_group_permissions(user), set()) def test_get_all_superuser_permissions(self): """A superuser has all permissions. Refs #14795.""" user = self.UserModel._default_manager.get(pk=self.superuser.pk) self.assertEqual(len(user.get_all_permissions()), len(Permission.objects.all())) async def test_aget_all_superuser_permissions(self): """See test_get_all_superuser_permissions()""" user = await self.UserModel._default_manager.aget(pk=self.superuser.pk) self.assertEqual( len(await user.aget_all_permissions()), await Permission.objects.acount() ) @override_settings( PASSWORD_HASHERS=["auth_tests.test_auth_backends.CountingMD5PasswordHasher"] ) def test_authentication_timing(self): """ Hasher is run once regardless of whether the user exists. Refs #20760. """ # Re-set the password, because this tests overrides PASSWORD_HASHERS self.user.set_password("test") self.user.save() CountingMD5PasswordHasher.calls = 0 username = getattr(self.user, self.UserModel.USERNAME_FIELD) authenticate(username=username, password="test") self.assertEqual(CountingMD5PasswordHasher.calls, 1) CountingMD5PasswordHasher.calls = 0 authenticate(username="no_such_user", password="test") self.assertEqual(CountingMD5PasswordHasher.calls, 1) @override_settings( PASSWORD_HASHERS=["auth_tests.test_auth_backends.CountingMD5PasswordHasher"] ) async def test_aauthentication_timing(self): """See test_authentication_timing()""" # Re-set the password, because this tests overrides PASSWORD_HASHERS. self.user.set_password("test") await self.user.asave() CountingMD5PasswordHasher.calls = 0 username = getattr(self.user, self.UserModel.USERNAME_FIELD) await aauthenticate(username=username, password="test") self.assertEqual(CountingMD5PasswordHasher.calls, 1) CountingMD5PasswordHasher.calls = 0 await aauthenticate(username="no_such_user", password="test") self.assertEqual(CountingMD5PasswordHasher.calls, 1) @override_settings( PASSWORD_HASHERS=["auth_tests.test_auth_backends.CountingMD5PasswordHasher"] ) def test_authentication_without_credentials(self): CountingMD5PasswordHasher.calls = 0 for credentials in ( {}, {"username": getattr(self.user, self.UserModel.USERNAME_FIELD)}, {"password": "test"}, ): with self.subTest(credentials=credentials): with self.assertNumQueries(0): authenticate(**credentials) self.assertEqual(CountingMD5PasswordHasher.calls, 0) class ModelBackendTest(BaseModelBackendTest, TestCase): """ Tests for the ModelBackend using the default User model. """ UserModel = User user_credentials = {"username": "test", "password": "test"} def create_users(self): self.user = User.objects.create_user( email="test@example.com", **self.user_credentials ) self.superuser = User.objects.create_superuser( username="test2", email="test2@example.com", password="test", ) def test_authenticate_inactive(self): """ An inactive user can't authenticate. """ self.assertEqual(authenticate(**self.user_credentials), self.user) self.user.is_active = False self.user.save() self.assertIsNone(authenticate(**self.user_credentials)) async def test_aauthenticate_inactive(self): """ An inactive user can't authenticate. """ self.assertEqual(await aauthenticate(**self.user_credentials), self.user) self.user.is_active = False await self.user.asave() self.assertIsNone(await aauthenticate(**self.user_credentials)) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithoutIsActiveField") def test_authenticate_user_without_is_active_field(self): """ A custom user without an `is_active` field is allowed to authenticate. """ user = CustomUserWithoutIsActiveField.objects._create_user( username="test", email="test@example.com", password="test", ) self.assertEqual(authenticate(username="test", password="test"), user) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUserWithoutIsActiveField") async def test_aauthenticate_user_without_is_active_field(self): """ A custom user without an `is_active` field is allowed to authenticate. """ user = await CustomUserWithoutIsActiveField.objects._acreate_user( username="test", email="test@example.com", password="test", ) self.assertEqual(await aauthenticate(username="test", password="test"), user) @override_settings(AUTH_USER_MODEL="auth_tests.ExtensionUser") class ExtensionUserModelBackendTest(BaseModelBackendTest, TestCase): """ Tests for the ModelBackend using the custom ExtensionUser model. This isn't a perfect test, because both the User and ExtensionUser are synchronized to the database, which wouldn't ordinary happen in production. As a result, it doesn't catch errors caused by the non- existence of the User table. The specific problem is queries on .filter(groups__user) et al, which makes an implicit assumption that the user model is called 'User'. In production, the auth.User table won't exist, so the requested join won't exist either; in testing, the auth.User *does* exist, and so does the join. However, the join table won't contain any useful data; for testing, we check that the data we expect actually does exist. """ UserModel = ExtensionUser def create_users(self): self.user = ExtensionUser._default_manager.create_user( username="test", email="test@example.com", password="test", date_of_birth=date(2006, 4, 25), ) self.superuser = ExtensionUser._default_manager.create_superuser( username="test2", email="test2@example.com", password="test", date_of_birth=date(1976, 11, 8), ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomPermissionsUser") class CustomPermissionsUserModelBackendTest(BaseModelBackendTest, TestCase): """ Tests for the ModelBackend using the CustomPermissionsUser model. As with the ExtensionUser test, this isn't a perfect test, because both the User and CustomPermissionsUser are synchronized to the database, which wouldn't ordinary happen in production. """ UserModel = CustomPermissionsUser def create_users(self): self.user = CustomPermissionsUser._default_manager.create_user( email="test@example.com", password="test", date_of_birth=date(2006, 4, 25) ) self.superuser = CustomPermissionsUser._default_manager.create_superuser( email="test2@example.com", password="test", date_of_birth=date(1976, 11, 8) ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") class CustomUserModelBackendAuthenticateTest(TestCase): """ The model backend can accept a credentials kwarg labeled with custom user model's USERNAME_FIELD. """ def test_authenticate(self): test_user = CustomUser._default_manager.create_user( email="test@example.com", password="test", date_of_birth=date(2006, 4, 25) ) authenticated_user = authenticate(email="test@example.com", password="test") self.assertEqual(test_user, authenticated_user) async def test_aauthenticate(self): test_user = await CustomUser._default_manager.acreate_user( email="test@example.com", password="test", date_of_birth=date(2006, 4, 25) ) authenticated_user = await aauthenticate( email="test@example.com", password="test" ) self.assertEqual(test_user, authenticated_user) @override_settings(AUTH_USER_MODEL="auth_tests.UUIDUser") class UUIDUserTests(TestCase): def test_login(self): """ A custom user with a UUID primary key should be able to login. """ user = UUIDUser.objects.create_user(username="uuid", password="test") self.assertTrue(self.client.login(username="uuid", password="test")) self.assertEqual( UUIDUser.objects.get(pk=self.client.session[SESSION_KEY]), user ) async def test_alogin(self): """See test_login()""" user = await UUIDUser.objects.acreate_user(username="uuid", password="test") self.assertTrue(await self.client.alogin(username="uuid", password="test")) session_key = await self.client.session.aget(SESSION_KEY) self.assertEqual(await UUIDUser.objects.aget(pk=session_key), user) class TestObj: pass class SimpleRowlevelBackend: def has_perm(self, user, perm, obj=None): if not obj: return # We only support row level perms if isinstance(obj, TestObj): if user.username == "test2": return True elif user.is_anonymous and perm == "anon": return True elif not user.is_active and perm == "inactive": return True return False async def ahas_perm(self, user, perm, obj=None): return self.has_perm(user, perm, obj) def has_module_perms(self, user, app_label): return (user.is_anonymous or user.is_active) and app_label == "app1" async def ahas_module_perms(self, user, app_label): return self.has_module_perms(user, app_label) def get_all_permissions(self, user, obj=None): if not obj: return [] # We only support row level perms if not isinstance(obj, TestObj): return ["none"] if user.is_anonymous: return ["anon"] if user.username == "test2": return ["simple", "advanced"] else: return ["simple"] async def aget_all_permissions(self, user, obj=None): return self.get_all_permissions(user, obj) def get_group_permissions(self, user, obj=None): if not obj: return # We only support row level perms if not isinstance(obj, TestObj): return ["none"] if "test_group" in [group.name for group in user.groups.all()]: return ["group_perm"] else: return ["none"] @modify_settings( AUTHENTICATION_BACKENDS={ "append": "auth_tests.test_auth_backends.SimpleRowlevelBackend", } ) class RowlevelBackendTest(TestCase): """ Tests for auth backend that supports object level permissions """ @classmethod def setUpTestData(cls): cls.user1 = User.objects.create_user("test", "test@example.com", "test") cls.user2 = User.objects.create_user("test2", "test2@example.com", "test") cls.user3 = User.objects.create_user("test3", "test3@example.com", "test") def tearDown(self): # The get_group_permissions test messes with ContentTypes, which will # be cached; flush the cache to ensure there are no side effects # Refs #14975, #14925 ContentType.objects.clear_cache() def test_has_perm(self): self.assertIs(self.user1.has_perm("perm", TestObj()), False) self.assertIs(self.user2.has_perm("perm", TestObj()), True) self.assertIs(self.user2.has_perm("perm"), False) self.assertIs(self.user2.has_perms(["simple", "advanced"], TestObj()), True) self.assertIs(self.user3.has_perm("perm", TestObj()), False) self.assertIs(self.user3.has_perm("anon", TestObj()), False) self.assertIs(self.user3.has_perms(["simple", "advanced"], TestObj()), False) def test_get_all_permissions(self): self.assertEqual(self.user1.get_all_permissions(TestObj()), {"simple"}) self.assertEqual( self.user2.get_all_permissions(TestObj()), {"simple", "advanced"} ) self.assertEqual(self.user2.get_all_permissions(), set()) def test_get_group_permissions(self): group = Group.objects.create(name="test_group") self.user3.groups.add(group) self.assertEqual(self.user3.get_group_permissions(TestObj()), {"group_perm"}) @override_settings( AUTHENTICATION_BACKENDS=["auth_tests.test_auth_backends.SimpleRowlevelBackend"], ) class AnonymousUserBackendTest(SimpleTestCase): """ Tests for AnonymousUser delegating to backend. """ def setUp(self): self.user1 = AnonymousUser() def test_has_perm(self): self.assertIs(self.user1.has_perm("perm", TestObj()), False) self.assertIs(self.user1.has_perm("anon", TestObj()), True) async def test_ahas_perm(self): self.assertIs(await self.user1.ahas_perm("perm", TestObj()), False) self.assertIs(await self.user1.ahas_perm("anon", TestObj()), True) def test_has_perms(self): self.assertIs(self.user1.has_perms(["anon"], TestObj()), True) self.assertIs(self.user1.has_perms(["anon", "perm"], TestObj()), False) async def test_ahas_perms(self): self.assertIs(await self.user1.ahas_perms(["anon"], TestObj()), True) self.assertIs(await self.user1.ahas_perms(["anon", "perm"], TestObj()), False) def test_has_perms_perm_list_invalid(self): msg = "perm_list must be an iterable of permissions." with self.assertRaisesMessage(ValueError, msg): self.user1.has_perms("perm") with self.assertRaisesMessage(ValueError, msg): self.user1.has_perms(object()) async def test_ahas_perms_perm_list_invalid(self): msg = "perm_list must be an iterable of permissions." with self.assertRaisesMessage(ValueError, msg): await self.user1.ahas_perms("perm") with self.assertRaisesMessage(ValueError, msg): await self.user1.ahas_perms(object()) def test_has_module_perms(self): self.assertIs(self.user1.has_module_perms("app1"), True) self.assertIs(self.user1.has_module_perms("app2"), False) async def test_ahas_module_perms(self): self.assertIs(await self.user1.ahas_module_perms("app1"), True) self.assertIs(await self.user1.ahas_module_perms("app2"), False) def test_get_all_permissions(self): self.assertEqual(self.user1.get_all_permissions(TestObj()), {"anon"}) async def test_aget_all_permissions(self): self.assertEqual(await self.user1.aget_all_permissions(TestObj()), {"anon"}) @override_settings(AUTHENTICATION_BACKENDS=[]) class NoBackendsTest(TestCase):
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
true
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_templates.py
tests/auth_tests/test_templates.py
from datetime import date from django.contrib.auth import authenticate from django.contrib.auth.models import User from django.contrib.auth.tokens import PasswordResetTokenGenerator from django.contrib.auth.views import ( PasswordChangeDoneView, PasswordChangeView, PasswordResetCompleteView, PasswordResetDoneView, PasswordResetView, ) from django.test import RequestFactory, TestCase, override_settings from django.urls import reverse from django.utils.http import urlsafe_base64_encode from .client import PasswordResetConfirmClient from .models import CustomUser @override_settings(ROOT_URLCONF="auth_tests.urls") class AuthTemplateTests(TestCase): request_factory = RequestFactory() @classmethod def setUpTestData(cls): user = User.objects.create_user("jsmith", "jsmith@example.com", "pass") user = authenticate(username=user.username, password="pass") request = cls.request_factory.get("/somepath/") request.user = user cls.user, cls.request = user, request def test_password_reset_view(self): response = PasswordResetView.as_view(success_url="dummy/")(self.request) self.assertContains( response, "<title>Password reset | Django site admin</title>" ) self.assertContains(response, "<h1>Password reset</h1>") def test_password_reset_view_error_title(self): response = self.client.post(reverse("password_reset"), {}) self.assertContains( response, "<title>Error: Password reset | Django site admin</title>" ) def test_password_reset_done_view(self): response = PasswordResetDoneView.as_view()(self.request) self.assertContains( response, "<title>Password reset sent | Django site admin</title>" ) self.assertContains(response, "<h1>Password reset sent</h1>") def test_password_reset_confirm_view_invalid_token(self): # PasswordResetConfirmView invalid token client = PasswordResetConfirmClient() url = reverse( "password_reset_confirm", kwargs={"uidb64": "Bad", "token": "Bad-Token"} ) response = client.get(url) self.assertContains( response, "<title>Password reset unsuccessful | Django site admin</title>" ) self.assertContains(response, "<h1>Password reset unsuccessful</h1>") def test_password_reset_confirm_view_valid_token(self): # PasswordResetConfirmView valid token client = PasswordResetConfirmClient() default_token_generator = PasswordResetTokenGenerator() token = default_token_generator.make_token(self.user) uidb64 = urlsafe_base64_encode(str(self.user.pk).encode()) url = reverse( "password_reset_confirm", kwargs={"uidb64": uidb64, "token": token} ) response = client.get(url) self.assertContains( response, "<title>Enter new password | Django site admin</title>" ) self.assertContains(response, "<h1>Enter new password</h1>") # The username is added to the password reset confirmation form to help # browser's password managers. self.assertContains( response, '<input class="hidden" autocomplete="username" value="jsmith">', ) def test_password_reset_confirm_view_error_title(self): client = PasswordResetConfirmClient() default_token_generator = PasswordResetTokenGenerator() token = default_token_generator.make_token(self.user) uidb64 = urlsafe_base64_encode(str(self.user.pk).encode()) url = reverse( "password_reset_confirm", kwargs={"uidb64": uidb64, "token": token} ) response = client.post(url, {}) self.assertContains( response, "<title>Error: Enter new password | Django site admin</title>" ) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") def test_password_reset_confirm_view_custom_username_hint(self): custom_user = CustomUser.custom_objects.create_user( email="joe@example.com", date_of_birth=date(1986, 11, 11), first_name="Joe", ) client = PasswordResetConfirmClient() default_token_generator = PasswordResetTokenGenerator() token = default_token_generator.make_token(custom_user) uidb64 = urlsafe_base64_encode(str(custom_user.pk).encode()) url = reverse( "password_reset_confirm", kwargs={"uidb64": uidb64, "token": token} ) response = client.get(url) self.assertContains( response, "<title>Enter new password | Django site admin</title>", ) self.assertContains(response, "<h1>Enter new password</h1>") # The username field is added to the password reset confirmation form # to help browser's password managers. self.assertContains( response, '<input class="hidden" autocomplete="username" value="joe@example.com">', ) def test_password_reset_complete_view(self): response = PasswordResetCompleteView.as_view()(self.request) self.assertContains( response, "<title>Password reset complete | Django site admin</title>" ) self.assertContains(response, "<h1>Password reset complete</h1>") def test_password_reset_change_view(self): response = PasswordChangeView.as_view(success_url="dummy/")(self.request) self.assertContains( response, "<title>Password change | Django site admin</title>" ) self.assertContains(response, "<h1>Password change</h1>") def test_password_change_done_view(self): response = PasswordChangeDoneView.as_view()(self.request) self.assertContains( response, "<title>Password change successful | Django site admin</title>" ) self.assertContains(response, "<h1>Password change successful</h1>")
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/urls_custom_user_admin.py
tests/auth_tests/urls_custom_user_admin.py
from django.contrib import admin from django.contrib.auth import get_user_model from django.contrib.auth.admin import UserAdmin from django.urls import path site = admin.AdminSite(name="custom_user_admin") class CustomUserAdmin(UserAdmin): def log_change(self, request, obj, message): # LogEntry.user column doesn't get altered to expect a UUID, so set an # integer manually to avoid causing an error. original_pk = request.user.pk request.user.pk = 1 super().log_change(request, obj, message) request.user.pk = original_pk site.register(get_user_model(), CustomUserAdmin) urlpatterns = [ path("admin/", site.urls), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_basic.py
tests/auth_tests/test_basic.py
from django.conf import settings from django.contrib.auth import aget_user, get_user, get_user_model from django.contrib.auth.models import AnonymousUser, User from django.core.exceptions import ImproperlyConfigured from django.db import IntegrityError from django.http import HttpRequest from django.test import TestCase, override_settings from django.utils import translation from .models import CustomUser class BasicTestCase(TestCase): def test_user(self): "Users can be created and can set their password" u = User.objects.create_user("testuser", "test@example.com", "testpw") self.assertTrue(u.has_usable_password()) self.assertFalse(u.check_password("bad")) self.assertTrue(u.check_password("testpw")) # Check we can manually set an unusable password u.set_unusable_password() u.save() self.assertFalse(u.check_password("testpw")) self.assertFalse(u.has_usable_password()) u.set_password("testpw") self.assertTrue(u.check_password("testpw")) u.set_password(None) self.assertFalse(u.has_usable_password()) # Check username getter self.assertEqual(u.get_username(), "testuser") # Check authentication/permissions self.assertFalse(u.is_anonymous) self.assertTrue(u.is_authenticated) self.assertFalse(u.is_staff) self.assertTrue(u.is_active) self.assertFalse(u.is_superuser) # Check API-based user creation with no password u2 = User.objects.create_user("testuser2", "test2@example.com") self.assertFalse(u2.has_usable_password()) async def test_acreate(self): u = await User.objects.acreate_user("testuser", "test@example.com", "testpw") self.assertTrue(u.has_usable_password()) self.assertFalse(await u.acheck_password("bad")) self.assertTrue(await u.acheck_password("testpw")) def test_unicode_username(self): User.objects.create_user("jörg") User.objects.create_user("Григорий") # Two equivalent Unicode normalized usernames are duplicates. omega_username = "iamtheΩ" # U+03A9 GREEK CAPITAL LETTER OMEGA ohm_username = "iamtheΩ" # U+2126 OHM SIGN User.objects.create_user(ohm_username) with self.assertRaises(IntegrityError): User.objects.create_user(omega_username) def test_user_no_email(self): "Users can be created without an email" cases = [ {}, {"email": ""}, {"email": None}, ] for i, kwargs in enumerate(cases): with self.subTest(**kwargs): u = User.objects.create_user("testuser{}".format(i), **kwargs) self.assertEqual(u.email, "") def test_superuser(self): "Check the creation and properties of a superuser" super = User.objects.create_superuser("super", "super@example.com", "super") self.assertTrue(super.is_superuser) self.assertTrue(super.is_active) self.assertTrue(super.is_staff) async def test_asuperuser(self): "Check the creation and properties of a superuser" super = await User.objects.acreate_superuser( "super", "super@example.com", "super" ) self.assertTrue(super.is_superuser) self.assertTrue(super.is_active) self.assertTrue(super.is_staff) def test_superuser_no_email_or_password(self): cases = [ {}, {"email": ""}, {"email": None}, {"password": None}, ] for i, kwargs in enumerate(cases): with self.subTest(**kwargs): superuser = User.objects.create_superuser("super{}".format(i), **kwargs) self.assertEqual(superuser.email, "") self.assertFalse(superuser.has_usable_password()) def test_get_user_model(self): "The current user model can be retrieved" self.assertEqual(get_user_model(), User) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") def test_swappable_user(self): "The current user model can be swapped out for another" self.assertEqual(get_user_model(), CustomUser) with self.assertRaises(AttributeError): User.objects.all() @override_settings(AUTH_USER_MODEL="badsetting") def test_swappable_user_bad_setting(self): """ The alternate user setting must point to something in the format app.model """ msg = "AUTH_USER_MODEL must be of the form 'app_label.model_name'" with self.assertRaisesMessage(ImproperlyConfigured, msg): get_user_model() @override_settings(AUTH_USER_MODEL="thismodel.doesntexist") def test_swappable_user_nonexistent_model(self): "The current user model must point to an installed model" msg = ( "AUTH_USER_MODEL refers to model 'thismodel.doesntexist' " "that has not been installed" ) with self.assertRaisesMessage(ImproperlyConfigured, msg): get_user_model() def test_user_verbose_names_translatable(self): "Default User model verbose names are translatable (#19945)" with translation.override("en"): self.assertEqual(User._meta.verbose_name, "user") self.assertEqual(User._meta.verbose_name_plural, "users") with translation.override("es"): self.assertEqual(User._meta.verbose_name, "usuario") self.assertEqual(User._meta.verbose_name_plural, "usuarios") class TestGetUser(TestCase): def test_get_user_anonymous(self): request = HttpRequest() request.session = self.client.session user = get_user(request) self.assertIsInstance(user, AnonymousUser) async def test_aget_user_anonymous(self): request = HttpRequest() request.session = await self.client.asession() user = await aget_user(request) self.assertIsInstance(user, AnonymousUser) def test_get_user(self): created_user = User.objects.create_user( "testuser", "test@example.com", "testpw" ) self.client.login(username="testuser", password="testpw") request = HttpRequest() request.session = self.client.session user = get_user(request) self.assertIsInstance(user, User) self.assertEqual(user.username, created_user.username) def test_get_user_fallback_secret(self): created_user = User.objects.create_user( "testuser", "test@example.com", "testpw" ) self.client.login(username="testuser", password="testpw") request = HttpRequest() request.session = self.client.session prev_session_key = request.session.session_key with override_settings( SECRET_KEY="newsecret", SECRET_KEY_FALLBACKS=[settings.SECRET_KEY], ): user = get_user(request) self.assertIsInstance(user, User) self.assertEqual(user.username, created_user.username) self.assertNotEqual(request.session.session_key, prev_session_key) # Remove the fallback secret. # The session hash should be updated using the current secret. with override_settings(SECRET_KEY="newsecret"): user = get_user(request) self.assertIsInstance(user, User) self.assertEqual(user.username, created_user.username) async def test_aget_user_fallback_secret(self): created_user = await User.objects.acreate_user( "testuser", "test@example.com", "testpw" ) await self.client.alogin(username="testuser", password="testpw") request = HttpRequest() request.session = await self.client.asession() prev_session_key = request.session.session_key with override_settings( SECRET_KEY="newsecret", SECRET_KEY_FALLBACKS=[settings.SECRET_KEY], ): user = await aget_user(request) self.assertIsInstance(user, User) self.assertEqual(user.username, created_user.username) self.assertNotEqual(request.session.session_key, prev_session_key) # Remove the fallback secret. # The session hash should be updated using the current secret. with override_settings(SECRET_KEY="newsecret"): user = await aget_user(request) self.assertIsInstance(user, User) self.assertEqual(user.username, created_user.username)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_handlers.py
tests/auth_tests/test_handlers.py
from django.contrib.auth.handlers.modwsgi import check_password, groups_for_user from django.contrib.auth.models import Group, User from django.test import TransactionTestCase, override_settings from .models import CustomUser # This must be a TransactionTestCase because the WSGI auth handler performs # its own transaction management. class ModWsgiHandlerTestCase(TransactionTestCase): """ Tests for the mod_wsgi authentication handler """ available_apps = [ "django.contrib.auth", "django.contrib.contenttypes", "auth_tests", ] def test_check_password(self): """ check_password() returns the correct values as per https://modwsgi.readthedocs.io/en/develop/user-guides/access-control-mechanisms.html#apache-authentication-provider """ User.objects.create_user("test", "test@example.com", "test") # User not in database self.assertIsNone(check_password({}, "unknown", "")) # Valid user with correct password self.assertIs(check_password({}, "test", "test"), True) # Valid user with incorrect password self.assertIs(check_password({}, "test", "incorrect"), False) # correct password, but user is inactive User.objects.filter(username="test").update(is_active=False) self.assertIsNone(check_password({}, "test", "test")) @override_settings(AUTH_USER_MODEL="auth_tests.CustomUser") def test_check_password_custom_user(self): """ check_password() returns the correct values as per https://modwsgi.readthedocs.io/en/develop/user-guides/access-control-mechanisms.html#apache-authentication-provider with a custom user installed. """ CustomUser._default_manager.create_user( "test@example.com", "1990-01-01", "test" ) # User not in database self.assertIsNone(check_password({}, "unknown", "")) # Valid user with correct password' self.assertIs(check_password({}, "test@example.com", "test"), True) # Valid user with incorrect password self.assertIs(check_password({}, "test@example.com", "incorrect"), False) def test_groups_for_user(self): """ groups_for_user() returns correct values as per https://modwsgi.readthedocs.io/en/develop/user-guides/access-control-mechanisms.html#apache-group-authorisation """ user1 = User.objects.create_user("test", "test@example.com", "test") User.objects.create_user("test1", "test1@example.com", "test1") group = Group.objects.create(name="test_group") user1.groups.add(group) # User not in database self.assertEqual(groups_for_user({}, "unknown"), []) self.assertEqual(groups_for_user({}, "test"), [b"test_group"]) self.assertEqual(groups_for_user({}, "test1"), [])
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/urls.py
tests/auth_tests/urls.py
from django.contrib import admin from django.contrib.auth import views from django.contrib.auth.decorators import ( login_not_required, login_required, permission_required, ) from django.contrib.auth.forms import AuthenticationForm from django.contrib.auth.urls import urlpatterns as auth_urlpatterns from django.contrib.auth.views import LoginView from django.contrib.messages.api import info from django.http import HttpRequest, HttpResponse from django.shortcuts import render from django.template import RequestContext, Template from django.urls import path, re_path, reverse_lazy from django.utils.decorators import method_decorator from django.views import View from django.views.decorators.cache import never_cache from django.views.i18n import set_language class CustomRequestAuthenticationForm(AuthenticationForm): def __init__(self, request, *args, **kwargs): assert isinstance(request, HttpRequest) super().__init__(request, *args, **kwargs) @never_cache def remote_user_auth_view(request): "Dummy view for remote user tests" t = Template("Username is {{ user }}.") c = RequestContext(request, {}) return HttpResponse(t.render(c)) def auth_processor_no_attr_access(request): render(request, "context_processors/auth_attrs_no_access.html") # *After* rendering, we check whether the session was accessed return render( request, "context_processors/auth_attrs_test_access.html", {"session_accessed": request.session.accessed}, ) def auth_processor_attr_access(request): render(request, "context_processors/auth_attrs_access.html") return render( request, "context_processors/auth_attrs_test_access.html", {"session_accessed": request.session.accessed}, ) def auth_processor_user(request): return render(request, "context_processors/auth_attrs_user.html") def auth_processor_perms(request): return render(request, "context_processors/auth_attrs_perms.html") def auth_processor_perm_in_perms(request): return render(request, "context_processors/auth_attrs_perm_in_perms.html") def auth_processor_messages(request): info(request, "Message 1") return render(request, "context_processors/auth_attrs_messages.html") def userpage(request): pass @permission_required("unknown.permission") def permission_required_redirect(request): pass @permission_required("unknown.permission", raise_exception=True) def permission_required_exception(request): pass @login_required @permission_required("unknown.permission", raise_exception=True) def login_and_permission_required_exception(request): pass class CustomDefaultRedirectURLLoginView(LoginView): def get_default_redirect_url(self): return "/custom/" class EmptyResponseBaseView(View): def get(self, request, *args, **kwargs): return HttpResponse() @method_decorator(login_not_required, name="dispatch") class PublicView(EmptyResponseBaseView): pass class ProtectedView(EmptyResponseBaseView): pass @method_decorator( login_required(login_url="/custom_login/", redirect_field_name="step"), name="dispatch", ) class ProtectedViewWithCustomLoginRequired(EmptyResponseBaseView): pass @login_not_required def public_view(request): return HttpResponse() def protected_view(request): return HttpResponse() @login_required(login_url="/custom_login/", redirect_field_name="step") def protected_view_with_login_required_decorator(request): return HttpResponse() # special urls for auth test cases urlpatterns = auth_urlpatterns + [ path( "logout/custom_query/", views.LogoutView.as_view(redirect_field_name="follow") ), path("logout/next_page/", views.LogoutView.as_view(next_page="/somewhere/")), path( "logout/next_page/named/", views.LogoutView.as_view(next_page="password_reset") ), path( "logout/allowed_hosts/", views.LogoutView.as_view(success_url_allowed_hosts={"otherserver"}), ), path("remote_user/", remote_user_auth_view), path( "password_reset_from_email/", views.PasswordResetView.as_view(from_email="staffmember@example.com"), ), path( "password_reset_extra_email_context/", views.PasswordResetView.as_view( extra_email_context={"greeting": "Hello!", "domain": "custom.example.com"}, ), ), path( "password_reset/custom_redirect/", views.PasswordResetView.as_view(success_url="/custom/"), ), path( "password_reset/custom_redirect/named/", views.PasswordResetView.as_view(success_url=reverse_lazy("password_reset")), ), path( "password_reset/html_email_template/", views.PasswordResetView.as_view( html_email_template_name="registration/html_password_reset_email.html" ), ), path( "reset/custom/<uidb64>/<token>/", views.PasswordResetConfirmView.as_view(success_url="/custom/"), ), path( "reset/custom/named/<uidb64>/<token>/", views.PasswordResetConfirmView.as_view( success_url=reverse_lazy("password_reset") ), ), path( "reset/custom/token/<uidb64>/<token>/", views.PasswordResetConfirmView.as_view(reset_url_token="set-passwordcustom"), ), path( "reset/post_reset_login/<uidb64>/<token>/", views.PasswordResetConfirmView.as_view(post_reset_login=True), ), path( "reset/post_reset_login_custom_backend/<uidb64>/<token>/", views.PasswordResetConfirmView.as_view( post_reset_login=True, post_reset_login_backend=( "django.contrib.auth.backends.AllowAllUsersModelBackend" ), ), ), path("reset/missing_parameters/", views.PasswordResetConfirmView.as_view()), path( "password_change/custom/", views.PasswordChangeView.as_view(success_url="/custom/"), ), path( "password_change/custom/named/", views.PasswordChangeView.as_view(success_url=reverse_lazy("password_reset")), ), path("login_required/", login_required(views.PasswordResetView.as_view())), path( "login_required_login_url/", login_required(views.PasswordResetView.as_view(), login_url="/somewhere/"), ), path("auth_processor_no_attr_access/", auth_processor_no_attr_access), path("auth_processor_attr_access/", auth_processor_attr_access), path("auth_processor_user/", auth_processor_user), path("auth_processor_perms/", auth_processor_perms), path("auth_processor_perm_in_perms/", auth_processor_perm_in_perms), path("auth_processor_messages/", auth_processor_messages), path( "custom_request_auth_login/", views.LoginView.as_view(authentication_form=CustomRequestAuthenticationForm), ), re_path("^userpage/(.+)/$", userpage, name="userpage"), path("login/redirect_authenticated_user_default/", views.LoginView.as_view()), path( "login/redirect_authenticated_user/", views.LoginView.as_view(redirect_authenticated_user=True), ), path( "login/allowed_hosts/", views.LoginView.as_view(success_url_allowed_hosts={"otherserver"}), ), path( "login/get_default_redirect_url/", CustomDefaultRedirectURLLoginView.as_view() ), path("login/next_page/", views.LoginView.as_view(next_page="/somewhere/")), path("login/next_page/named/", views.LoginView.as_view(next_page="password_reset")), path("permission_required_redirect/", permission_required_redirect), path("permission_required_exception/", permission_required_exception), path( "login_and_permission_required_exception/", login_and_permission_required_exception, ), path("public_view/", PublicView.as_view()), path("public_function_view/", public_view), path("protected_view/", ProtectedView.as_view()), path("protected_function_view/", protected_view), path( "login_required_decorator_view/", protected_view_with_login_required_decorator ), path("login_required_cbv_view/", ProtectedViewWithCustomLoginRequired.as_view()), path("setlang/", set_language, name="set_language"), path("admin/", admin.site.urls), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/backend_alias.py
tests/auth_tests/backend_alias.py
# For testing that auth backends can be referenced using a convenience import from .test_auth_backends import ImportedModelBackend __all__ = ["ImportedModelBackend"]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/test_validators.py
tests/auth_tests/test_validators.py
import os from unittest import mock from django.contrib.auth import validators from django.contrib.auth.models import User from django.contrib.auth.password_validation import ( CommonPasswordValidator, MinimumLengthValidator, NumericPasswordValidator, UserAttributeSimilarityValidator, get_default_password_validators, get_password_validators, password_changed, password_validators_help_text_html, password_validators_help_texts, validate_password, ) from django.core.exceptions import ImproperlyConfigured, ValidationError from django.db import models from django.test import SimpleTestCase, TestCase, override_settings from django.test.utils import isolate_apps from django.utils.html import conditional_escape @override_settings( AUTH_PASSWORD_VALIDATORS=[ {"NAME": "django.contrib.auth.password_validation.CommonPasswordValidator"}, { "NAME": "django.contrib.auth.password_validation.MinimumLengthValidator", "OPTIONS": { "min_length": 12, }, }, ] ) class PasswordValidationTest(SimpleTestCase): def test_get_default_password_validators(self): validators = get_default_password_validators() self.assertEqual(len(validators), 2) self.assertEqual(validators[0].__class__.__name__, "CommonPasswordValidator") self.assertEqual(validators[1].__class__.__name__, "MinimumLengthValidator") self.assertEqual(validators[1].min_length, 12) def test_get_password_validators_custom(self): validator_config = [ {"NAME": "django.contrib.auth.password_validation.CommonPasswordValidator"} ] validators = get_password_validators(validator_config) self.assertEqual(len(validators), 1) self.assertEqual(validators[0].__class__.__name__, "CommonPasswordValidator") self.assertEqual(get_password_validators([]), []) def test_get_password_validators_custom_invalid(self): validator_config = [{"NAME": "json.tool"}] msg = ( "The module in NAME could not be imported: json.tool. " "Check your AUTH_PASSWORD_VALIDATORS setting." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): get_password_validators(validator_config) def test_validate_password(self): self.assertIsNone(validate_password("sufficiently-long")) msg_too_short = ( "This password is too short. It must contain at least 12 characters." ) with self.assertRaises(ValidationError) as cm: validate_password("django4242") self.assertEqual(cm.exception.messages, [msg_too_short]) self.assertEqual(cm.exception.error_list[0].code, "password_too_short") with self.assertRaises(ValidationError) as cm: validate_password("password") self.assertEqual( cm.exception.messages, ["This password is too common.", msg_too_short] ) self.assertEqual(cm.exception.error_list[0].code, "password_too_common") self.assertIsNone(validate_password("password", password_validators=[])) def test_password_changed(self): self.assertIsNone(password_changed("password")) def test_password_changed_with_custom_validator(self): class Validator: def password_changed(self, password, user): self.password = password self.user = user user = object() validator = Validator() password_changed("password", user=user, password_validators=(validator,)) self.assertIs(validator.user, user) self.assertEqual(validator.password, "password") def test_password_validators_help_texts(self): help_texts = password_validators_help_texts() self.assertEqual(len(help_texts), 2) self.assertIn("12 characters", help_texts[1]) self.assertEqual(password_validators_help_texts(password_validators=[]), []) def test_password_validators_help_text_html(self): help_text = password_validators_help_text_html() self.assertEqual(help_text.count("<li>"), 2) self.assertIn("12 characters", help_text) def test_password_validators_help_text_html_escaping(self): class AmpersandValidator: def get_help_text(self): return "Must contain &" help_text = password_validators_help_text_html([AmpersandValidator()]) self.assertEqual(help_text, "<ul><li>Must contain &amp;</li></ul>") # help_text is marked safe and therefore unchanged by # conditional_escape(). self.assertEqual(help_text, conditional_escape(help_text)) @override_settings(AUTH_PASSWORD_VALIDATORS=[]) def test_empty_password_validator_help_text_html(self): self.assertEqual(password_validators_help_text_html(), "") class MinimumLengthValidatorTest(SimpleTestCase): def test_validate(self): expected_error = ( "This password is too short. It must contain at least %d characters." ) self.assertIsNone(MinimumLengthValidator().validate("12345678")) self.assertIsNone(MinimumLengthValidator(min_length=3).validate("123")) with self.assertRaises(ValidationError) as cm: MinimumLengthValidator().validate("1234567") self.assertEqual(cm.exception.messages, [expected_error % 8]) error = cm.exception.error_list[0] self.assertEqual(error.code, "password_too_short") self.assertEqual(error.params, {"min_length": 8}) with self.assertRaises(ValidationError) as cm: MinimumLengthValidator(min_length=3).validate("12") self.assertEqual(cm.exception.messages, [expected_error % 3]) error = cm.exception.error_list[0] self.assertEqual(error.code, "password_too_short") self.assertEqual(error.params, {"min_length": 3}) def test_help_text(self): self.assertEqual( MinimumLengthValidator().get_help_text(), "Your password must contain at least 8 characters.", ) @mock.patch("django.contrib.auth.password_validation.ngettext") def test_l10n(self, mock_ngettext): with self.subTest("get_error_message"): MinimumLengthValidator().get_error_message() mock_ngettext.assert_called_with( "This password is too short. It must contain at least %d character.", "This password is too short. It must contain at least %d characters.", 8, ) mock_ngettext.reset() with self.subTest("get_help_text"): MinimumLengthValidator().get_help_text() mock_ngettext.assert_called_with( "Your password must contain at least %(min_length)d " "character.", "Your password must contain at least %(min_length)d " "characters.", 8, ) def test_custom_error(self): class CustomMinimumLengthValidator(MinimumLengthValidator): def get_error_message(self): return "Your password must be %d characters long" % self.min_length expected_error = "Your password must be %d characters long" with self.assertRaisesMessage(ValidationError, expected_error % 8) as cm: CustomMinimumLengthValidator().validate("1234567") self.assertEqual(cm.exception.error_list[0].code, "password_too_short") with self.assertRaisesMessage(ValidationError, expected_error % 3) as cm: CustomMinimumLengthValidator(min_length=3).validate("12") class UserAttributeSimilarityValidatorTest(TestCase): def test_validate(self): user = User.objects.create_user( username="testclient", password="password", email="testclient@example.com", first_name="Test", last_name="Client", ) expected_error = "The password is too similar to the %s." self.assertIsNone(UserAttributeSimilarityValidator().validate("testclient")) with self.assertRaises(ValidationError) as cm: UserAttributeSimilarityValidator().validate("testclient", user=user) self.assertEqual(cm.exception.messages, [expected_error % "username"]) self.assertEqual(cm.exception.error_list[0].code, "password_too_similar") msg = expected_error % "email address" with self.assertRaisesMessage(ValidationError, msg): UserAttributeSimilarityValidator().validate("example.com", user=user) msg = expected_error % "first name" with self.assertRaisesMessage(ValidationError, msg): UserAttributeSimilarityValidator( user_attributes=["first_name"], max_similarity=0.3, ).validate("testclient", user=user) # max_similarity=1 doesn't allow passwords that are identical to the # attribute's value. msg = expected_error % "first name" with self.assertRaisesMessage(ValidationError, msg): UserAttributeSimilarityValidator( user_attributes=["first_name"], max_similarity=1, ).validate(user.first_name, user=user) # Very low max_similarity is rejected. msg = "max_similarity must be at least 0.1" with self.assertRaisesMessage(ValueError, msg): UserAttributeSimilarityValidator(max_similarity=0.09) # Passes validation. self.assertIsNone( UserAttributeSimilarityValidator(user_attributes=["first_name"]).validate( "testclient", user=user ) ) @isolate_apps("auth_tests") def test_validate_property(self): class TestUser(models.Model): pass @property def username(self): return "foobar" msg = "The password is too similar to the username." with self.assertRaisesMessage(ValidationError, msg): UserAttributeSimilarityValidator().validate("foobar", user=TestUser()) def test_help_text(self): self.assertEqual( UserAttributeSimilarityValidator().get_help_text(), "Your password can’t be too similar to your other personal information.", ) def test_custom_error(self): class CustomUserAttributeSimilarityValidator(UserAttributeSimilarityValidator): def get_error_message(self): return "The password is too close to the %(verbose_name)s." user = User.objects.create_user( username="testclient", password="password", email="testclient@example.com", first_name="Test", last_name="Client", ) expected_error = "The password is too close to the %s." with self.assertRaisesMessage(ValidationError, expected_error % "username"): CustomUserAttributeSimilarityValidator().validate("testclient", user=user) def test_custom_error_verbose_name_not_used(self): class CustomUserAttributeSimilarityValidator(UserAttributeSimilarityValidator): def get_error_message(self): return "The password is too close to a user attribute." user = User.objects.create_user( username="testclient", password="password", email="testclient@example.com", first_name="Test", last_name="Client", ) expected_error = "The password is too close to a user attribute." with self.assertRaisesMessage(ValidationError, expected_error): CustomUserAttributeSimilarityValidator().validate("testclient", user=user) class CommonPasswordValidatorTest(SimpleTestCase): def test_validate(self): expected_error = "This password is too common." self.assertIsNone(CommonPasswordValidator().validate("a-safe-password")) with self.assertRaisesMessage(ValidationError, expected_error): CommonPasswordValidator().validate("godzilla") def test_common_hexed_codes(self): expected_error = "This password is too common." common_hexed_passwords = ["asdfjkl:", "&#2336:"] for password in common_hexed_passwords: with self.subTest(password=password): with self.assertRaisesMessage(ValidationError, expected_error): CommonPasswordValidator().validate(password) def test_validate_custom_list(self): path = os.path.join( os.path.dirname(os.path.realpath(__file__)), "common-passwords-custom.txt" ) validator = CommonPasswordValidator(password_list_path=path) expected_error = "This password is too common." self.assertIsNone(validator.validate("a-safe-password")) with self.assertRaises(ValidationError) as cm: validator.validate("from-my-custom-list") self.assertEqual(cm.exception.messages, [expected_error]) self.assertEqual(cm.exception.error_list[0].code, "password_too_common") def test_validate_django_supplied_file(self): validator = CommonPasswordValidator() for password in validator.passwords: self.assertEqual(password, password.lower()) def test_help_text(self): self.assertEqual( CommonPasswordValidator().get_help_text(), "Your password can’t be a commonly used password.", ) def test_custom_error(self): class CustomCommonPasswordValidator(CommonPasswordValidator): def get_error_message(self): return "This password has been used too much." expected_error = "This password has been used too much." with self.assertRaisesMessage(ValidationError, expected_error): CustomCommonPasswordValidator().validate("godzilla") class NumericPasswordValidatorTest(SimpleTestCase): def test_validate(self): expected_error = "This password is entirely numeric." self.assertIsNone(NumericPasswordValidator().validate("a-safe-password")) with self.assertRaises(ValidationError) as cm: NumericPasswordValidator().validate("42424242") self.assertEqual(cm.exception.messages, [expected_error]) self.assertEqual(cm.exception.error_list[0].code, "password_entirely_numeric") def test_help_text(self): self.assertEqual( NumericPasswordValidator().get_help_text(), "Your password can’t be entirely numeric.", ) def test_custom_error(self): class CustomNumericPasswordValidator(NumericPasswordValidator): def get_error_message(self): return "This password is all digits." expected_error = "This password is all digits." with self.assertRaisesMessage(ValidationError, expected_error): CustomNumericPasswordValidator().validate("42424242") class UsernameValidatorsTests(SimpleTestCase): def test_unicode_validator(self): valid_usernames = ["joe", "René", "ᴮᴵᴳᴮᴵᴿᴰ", "أحمد"] invalid_usernames = [ "o'connell", "عبد ال", "zerowidth\u200bspace", "nonbreaking\u00a0space", "en\u2013dash", "trailingnewline\u000a", ] v = validators.UnicodeUsernameValidator() for valid in valid_usernames: with self.subTest(valid=valid): v(valid) for invalid in invalid_usernames: with self.subTest(invalid=invalid): with self.assertRaises(ValidationError): v(invalid) def test_ascii_validator(self): valid_usernames = ["glenn", "GLEnN", "jean-marc"] invalid_usernames = [ "o'connell", "Éric", "jean marc", "أحمد", "trailingnewline\n", ] v = validators.ASCIIUsernameValidator() for valid in valid_usernames: with self.subTest(valid=valid): v(valid) for invalid in invalid_usernames: with self.subTest(invalid=invalid): with self.assertRaises(ValidationError): v(invalid)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/no_password.py
tests/auth_tests/models/no_password.py
from django.contrib.auth.base_user import AbstractBaseUser, BaseUserManager from django.db import models class UserManager(BaseUserManager): def _create_user(self, username, **extra_fields): user = self.model(username=username, **extra_fields) user.save(using=self._db) return user def create_superuser(self, username=None, **extra_fields): return self._create_user(username, **extra_fields) class NoPasswordUser(AbstractBaseUser): password = None last_login = None username = models.CharField(max_length=50, unique=True) USERNAME_FIELD = "username" objects = UserManager()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/with_last_login_attr.py
tests/auth_tests/models/with_last_login_attr.py
from django.contrib.auth.base_user import AbstractBaseUser class UserWithDisabledLastLoginField(AbstractBaseUser): last_login = None
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/custom_user.py
tests/auth_tests/models/custom_user.py
from django.contrib.auth.models import ( AbstractBaseUser, AbstractUser, BaseUserManager, Group, Permission, PermissionsMixin, UserManager, ) from django.db import models # The custom user uses email as the unique identifier, and requires # that every user provide a date of birth. This lets us test # changes in username datatype, and non-text required fields. class CustomUserManager(BaseUserManager): def create_user(self, email, date_of_birth, password=None, **fields): """ Creates and saves a User with the given email and password. """ if not email: raise ValueError("Users must have an email address") user = self.model( email=self.normalize_email(email), date_of_birth=date_of_birth, **fields ) user.set_password(password) user.save(using=self._db) return user async def acreate_user(self, email, date_of_birth, password=None, **fields): """See create_user()""" if not email: raise ValueError("Users must have an email address") user = self.model( email=self.normalize_email(email), date_of_birth=date_of_birth, **fields ) user.set_password(password) await user.asave(using=self._db) return user def create_superuser(self, email, password, date_of_birth, **fields): u = self.create_user( email, password=password, date_of_birth=date_of_birth, **fields ) u.is_admin = True u.save(using=self._db) return u class CustomUser(AbstractBaseUser): email = models.EmailField(verbose_name="email address", max_length=255, unique=True) is_active = models.BooleanField(default=True) is_admin = models.BooleanField(default=False) date_of_birth = models.DateField() first_name = models.CharField(max_length=50) custom_objects = CustomUserManager() USERNAME_FIELD = "email" REQUIRED_FIELDS = ["date_of_birth", "first_name"] def __str__(self): return self.email # Maybe required? def get_group_permissions(self, obj=None): return set() def get_all_permissions(self, obj=None): return set() def has_perm(self, perm, obj=None): return True def has_perms(self, perm_list, obj=None): return True def has_module_perms(self, app_label): return True # Admin required fields @property def is_staff(self): return self.is_admin class RemoveGroupsAndPermissions: """ A context manager to temporarily remove the groups and user_permissions M2M fields from the AbstractUser class, so they don't clash with the related_name sets. """ def __enter__(self): self._old_au_local_m2m = AbstractUser._meta.local_many_to_many self._old_pm_local_m2m = PermissionsMixin._meta.local_many_to_many groups = models.ManyToManyField(Group, blank=True) groups.contribute_to_class(PermissionsMixin, "groups") user_permissions = models.ManyToManyField(Permission, blank=True) user_permissions.contribute_to_class(PermissionsMixin, "user_permissions") PermissionsMixin._meta.local_many_to_many = [groups, user_permissions] AbstractUser._meta.local_many_to_many = [groups, user_permissions] def __exit__(self, exc_type, exc_value, traceback): AbstractUser._meta.local_many_to_many = self._old_au_local_m2m PermissionsMixin._meta.local_many_to_many = self._old_pm_local_m2m class CustomUserWithoutIsActiveField(AbstractBaseUser): username = models.CharField(max_length=150, unique=True) email = models.EmailField(unique=True) objects = UserManager() USERNAME_FIELD = "username" class CustomUserCompositePrimaryKey(AbstractBaseUser): pk = models.CompositePrimaryKey("email", "date_of_birth") email = models.EmailField(verbose_name="email address", max_length=255, unique=True) is_active = models.BooleanField(default=True) is_admin = models.BooleanField(default=False) date_of_birth = models.DateField() custom_objects = CustomUserManager() USERNAME_FIELD = "email" REQUIRED_FIELDS = ["date_of_birth"] # The extension user is a simple extension of the built-in user class, # adding a required date_of_birth field. This allows us to check for # any hard references to the name "User" in forms/handlers etc. with RemoveGroupsAndPermissions(): class ExtensionUser(AbstractUser): date_of_birth = models.DateField() custom_objects = UserManager() REQUIRED_FIELDS = AbstractUser.REQUIRED_FIELDS + ["date_of_birth"]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/with_custom_email_field.py
tests/auth_tests/models/with_custom_email_field.py
from django.contrib.auth.base_user import AbstractBaseUser from django.contrib.auth.models import BaseUserManager from django.db import models class CustomEmailFieldUserManager(BaseUserManager): def create_user(self, username, password, email): user = self.model(username=username) user.set_password(password) user.email_address = email user.save(using=self._db) return user class CustomEmailField(AbstractBaseUser): username = models.CharField(max_length=255) password = models.CharField(max_length=255) email_address = models.EmailField(null=True) is_active = models.BooleanField(default=True) EMAIL_FIELD = "email_address" USERNAME_FIELD = "username" objects = CustomEmailFieldUserManager()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/with_unique_constraint.py
tests/auth_tests/models/with_unique_constraint.py
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager from django.db import models class CustomUserWithUniqueConstraintManager(BaseUserManager): def create_superuser(self, username, password): user = self.model(username=username) user.set_password(password) user.save(using=self._db) return user class CustomUserWithUniqueConstraint(AbstractBaseUser): username = models.CharField(max_length=150) objects = CustomUserWithUniqueConstraintManager() USERNAME_FIELD = "username" class Meta: constraints = [ models.UniqueConstraint(fields=["username"], name="unique_custom_username"), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/minimal.py
tests/auth_tests/models/minimal.py
from django.db import models class MinimalUser(models.Model): REQUIRED_FIELDS = () USERNAME_FIELD = "id"
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/with_foreign_key.py
tests/auth_tests/models/with_foreign_key.py
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager, Group from django.db import models class Email(models.Model): email = models.EmailField(verbose_name="email address", max_length=255, unique=True) class CustomUserWithFKManager(BaseUserManager): def create_superuser(self, username, email, group, password): user = self.model(username_id=username, email_id=email, group_id=group) user.set_password(password) user.save(using=self._db) return user class CustomUserWithFK(AbstractBaseUser): username = models.ForeignKey(Email, models.CASCADE, related_name="primary") email = models.ForeignKey( Email, models.CASCADE, to_field="email", related_name="secondary" ) group = models.ForeignKey(Group, models.CASCADE) custom_objects = CustomUserWithFKManager() USERNAME_FIELD = "username" REQUIRED_FIELDS = ["email", "group"]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/with_many_to_many.py
tests/auth_tests/models/with_many_to_many.py
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager from django.db import models class Organization(models.Model): name = models.CharField(max_length=255) class CustomUserWithM2MManager(BaseUserManager): def create_superuser(self, username, orgs, password): user = self.model(username=username) user.set_password(password) user.save(using=self._db) user.orgs.add(*orgs) return user class CustomUserWithM2M(AbstractBaseUser): username = models.CharField(max_length=30, unique=True) orgs = models.ManyToManyField(Organization) custom_objects = CustomUserWithM2MManager() USERNAME_FIELD = "username" REQUIRED_FIELDS = ["orgs"] class CustomUserWithM2MThrough(AbstractBaseUser): username = models.CharField(max_length=30, unique=True) orgs = models.ManyToManyField(Organization, through="Membership") custom_objects = CustomUserWithM2MManager() USERNAME_FIELD = "username" REQUIRED_FIELDS = ["orgs"] class Membership(models.Model): user = models.ForeignKey(CustomUserWithM2MThrough, on_delete=models.CASCADE) organization = models.ForeignKey(Organization, on_delete=models.CASCADE)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/custom_permissions.py
tests/auth_tests/models/custom_permissions.py
""" The CustomPermissionsUser users email as the identifier, but uses the normal Django permissions model. This allows us to check that the PermissionsMixin includes everything that is needed to interact with the ModelBackend. """ from django.contrib.auth.models import AbstractBaseUser, PermissionsMixin from django.db import models from .custom_user import CustomUserManager, RemoveGroupsAndPermissions class CustomPermissionsUserManager(CustomUserManager): def create_superuser(self, email, password, date_of_birth): u = self.create_user(email, password=password, date_of_birth=date_of_birth) u.is_superuser = True u.save(using=self._db) return u with RemoveGroupsAndPermissions(): class CustomPermissionsUser(AbstractBaseUser, PermissionsMixin): email = models.EmailField( verbose_name="email address", max_length=255, unique=True ) date_of_birth = models.DateField() custom_objects = CustomPermissionsUserManager() USERNAME_FIELD = "email" REQUIRED_FIELDS = ["date_of_birth"] def __str__(self): return self.email
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/with_integer_username.py
tests/auth_tests/models/with_integer_username.py
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager from django.db import models class IntegerUsernameUserManager(BaseUserManager): def create_user(self, username, password): user = self.model(username=username) user.set_password(password) user.save(using=self._db) return user def get_by_natural_key(self, username): return self.get(username=username) class IntegerUsernameUser(AbstractBaseUser): username = models.IntegerField() password = models.CharField(max_length=255) USERNAME_FIELD = "username" REQUIRED_FIELDS = ["username", "password"] objects = IntegerUsernameUserManager()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/__init__.py
tests/auth_tests/models/__init__.py
from .custom_permissions import CustomPermissionsUser from .custom_user import ( CustomUser, CustomUserCompositePrimaryKey, CustomUserWithoutIsActiveField, ExtensionUser, ) from .invalid_models import CustomUserNonUniqueUsername from .is_active import IsActiveTestUser1 from .minimal import MinimalUser from .no_password import NoPasswordUser from .proxy import Proxy, UserProxy from .uuid_pk import UUIDUser from .with_custom_email_field import CustomEmailField from .with_foreign_key import CustomUserWithFK, Email from .with_integer_username import IntegerUsernameUser from .with_last_login_attr import UserWithDisabledLastLoginField from .with_many_to_many import CustomUserWithM2M, CustomUserWithM2MThrough, Organization from .with_unique_constraint import CustomUserWithUniqueConstraint __all__ = ( "CustomEmailField", "CustomPermissionsUser", "CustomUser", "CustomUserCompositePrimaryKey", "CustomUserNonUniqueUsername", "CustomUserWithFK", "CustomUserWithM2M", "CustomUserWithM2MThrough", "CustomUserWithUniqueConstraint", "CustomUserWithoutIsActiveField", "Email", "ExtensionUser", "IntegerUsernameUser", "IsActiveTestUser1", "MinimalUser", "NoPasswordUser", "Organization", "Proxy", "UUIDUser", "UserProxy", "UserWithDisabledLastLoginField", )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/uuid_pk.py
tests/auth_tests/models/uuid_pk.py
import uuid from django.contrib.auth.models import AbstractUser from django.db import models from .custom_user import RemoveGroupsAndPermissions with RemoveGroupsAndPermissions(): class UUIDUser(AbstractUser): """A user with a UUID as primary key""" id = models.UUIDField(default=uuid.uuid4, primary_key=True)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/invalid_models.py
tests/auth_tests/models/invalid_models.py
from django.contrib.auth.models import AbstractBaseUser, UserManager from django.db import models class CustomUserNonUniqueUsername(AbstractBaseUser): """ A user with a non-unique username. This model is not invalid if it is used with a custom authentication backend which supports non-unique usernames. """ username = models.CharField(max_length=30) email = models.EmailField(blank=True) is_staff = models.BooleanField(default=False) is_superuser = models.BooleanField(default=False) USERNAME_FIELD = "username" REQUIRED_FIELDS = ["email"] objects = UserManager()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/is_active.py
tests/auth_tests/models/is_active.py
from django.contrib.auth.models import AbstractBaseUser, BaseUserManager from django.db import models class IsActiveTestUser1(AbstractBaseUser): """ This test user class and derivatives test the default is_active behavior """ username = models.CharField(max_length=30, unique=True) custom_objects = BaseUserManager() USERNAME_FIELD = "username" # the is_active attr is provided by AbstractBaseUser
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/models/proxy.py
tests/auth_tests/models/proxy.py
from django.contrib.auth.models import User from django.db import models class Concrete(models.Model): pass class Proxy(Concrete): class Meta: proxy = True permissions = (("display_proxys", "May display proxys information"),) class UserProxy(User): class Meta: proxy = True permissions = (("use_different_app_label", "May use a different app label"),)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/operations_migrations/0001_initial.py
tests/auth_tests/operations_migrations/0001_initial.py
from django.db import migrations, models class Migration(migrations.Migration): initial = True operations = [ migrations.CreateModel( name="OldModel", fields=[ ("id", models.AutoField(primary_key=True)), ], ), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/operations_migrations/__init__.py
tests/auth_tests/operations_migrations/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/auth_tests/operations_migrations/0002_rename_oldmodel_to_newmodel.py
tests/auth_tests/operations_migrations/0002_rename_oldmodel_to_newmodel.py
from django.db import migrations class Migration(migrations.Migration): dependencies = [ ("auth_tests", "0001_initial"), ] operations = [ migrations.RenameModel( old_name="OldModel", new_name="NewModel", ), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/syndication_tests/models.py
tests/syndication_tests/models.py
from django.db import models class Entry(models.Model): title = models.CharField(max_length=200) updated = models.DateTimeField() published = models.DateTimeField() class Meta: ordering = ("updated",) def __str__(self): return self.title def get_absolute_url(self): return "/blog/%s/" % self.pk class Article(models.Model): title = models.CharField(max_length=200) entry = models.ForeignKey(Entry, models.CASCADE) updated = models.DateTimeField() published = models.DateTimeField() class Meta: ordering = ["updated"]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/syndication_tests/__init__.py
tests/syndication_tests/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/syndication_tests/tests.py
tests/syndication_tests/tests.py
import datetime from xml.dom import minidom from django.contrib.sites.models import Site from django.contrib.syndication import views from django.core.exceptions import ImproperlyConfigured from django.templatetags.static import static from django.test import TestCase, override_settings from django.test.utils import requires_tz_support from django.urls import reverse, reverse_lazy from django.utils import timezone from django.utils.feedgenerator import ( Atom1Feed, Rss201rev2Feed, Stylesheet, SyndicationFeed, rfc2822_date, rfc3339_date, ) from .models import Article, Entry TZ = timezone.get_default_timezone() class FeedTestCase(TestCase): @classmethod def setUpTestData(cls): cls.e1 = Entry.objects.create( title="My first entry", updated=datetime.datetime(1980, 1, 1, 12, 30), published=datetime.datetime(1986, 9, 25, 20, 15, 00), ) cls.e2 = Entry.objects.create( title="My second entry", updated=datetime.datetime(2008, 1, 2, 12, 30), published=datetime.datetime(2006, 3, 17, 18, 0), ) cls.e3 = Entry.objects.create( title="My third entry", updated=datetime.datetime(2008, 1, 2, 13, 30), published=datetime.datetime(2005, 6, 14, 10, 45), ) cls.e4 = Entry.objects.create( title="A & B < C > D", updated=datetime.datetime(2008, 1, 3, 13, 30), published=datetime.datetime(2005, 11, 25, 12, 11, 23), ) cls.e5 = Entry.objects.create( title="My last entry", updated=datetime.datetime(2013, 1, 20, 0, 0), published=datetime.datetime(2013, 3, 25, 20, 0), ) cls.a1 = Article.objects.create( title="My first article", entry=cls.e1, updated=datetime.datetime(1986, 11, 21, 9, 12, 18), published=datetime.datetime(1986, 10, 21, 9, 12, 18), ) def assertChildNodes(self, elem, expected): actual = {n.nodeName for n in elem.childNodes} expected = set(expected) self.assertEqual(actual, expected) def assertChildNodeContent(self, elem, expected): for k, v in expected.items(): self.assertEqual(elem.getElementsByTagName(k)[0].firstChild.wholeText, v) def assertCategories(self, elem, expected): self.assertEqual( { i.firstChild.wholeText for i in elem.childNodes if i.nodeName == "category" }, set(expected), ) @override_settings(ROOT_URLCONF="syndication_tests.urls") class SyndicationFeedTest(FeedTestCase): """ Tests for the high-level syndication feed framework. """ @classmethod def setUpClass(cls): super().setUpClass() # This cleanup is necessary because contrib.sites cache # makes tests interfere with each other, see #11505 Site.objects.clear_cache() def test_rss2_feed(self): """ Test the structure and content of feeds generated by Rss201rev2Feed. """ response = self.client.get("/syndication/rss2/") doc = minidom.parseString(response.content) # Making sure there's only 1 `rss` element and that the correct # RSS version was specified. feed_elem = doc.getElementsByTagName("rss") self.assertEqual(len(feed_elem), 1) feed = feed_elem[0] self.assertEqual(feed.getAttribute("version"), "2.0") self.assertEqual( feed.getElementsByTagName("language")[0].firstChild.nodeValue, "en" ) # Making sure there's only one `channel` element w/in the # `rss` element. chan_elem = feed.getElementsByTagName("channel") self.assertEqual(len(chan_elem), 1) chan = chan_elem[0] # Find the last build date d = Entry.objects.latest("published").published last_build_date = rfc2822_date(timezone.make_aware(d, TZ)) self.assertChildNodes( chan, [ "title", "link", "description", "language", "lastBuildDate", "item", "atom:link", "ttl", "copyright", "category", ], ) self.assertChildNodeContent( chan, { "title": "My blog", "description": "A more thorough description of my blog.", "link": "http://example.com/blog/", "language": "en", "lastBuildDate": last_build_date, "ttl": "600", "copyright": "Copyright (c) 2007, Sally Smith", }, ) self.assertCategories(chan, ["python", "django"]) # Ensure the content of the channel is correct self.assertChildNodeContent( chan, { "title": "My blog", "link": "http://example.com/blog/", }, ) # Check feed_url is passed self.assertEqual( chan.getElementsByTagName("atom:link")[0].getAttribute("href"), "http://example.com/syndication/rss2/", ) # Find the pubdate of the first feed item d = Entry.objects.get(pk=self.e1.pk).published pub_date = rfc2822_date(timezone.make_aware(d, TZ)) items = chan.getElementsByTagName("item") self.assertEqual(len(items), Entry.objects.count()) self.assertChildNodeContent( items[0], { "title": "My first entry", "description": "Overridden description: My first entry", "link": "http://example.com/blog/%s/" % self.e1.pk, "guid": "http://example.com/blog/%s/" % self.e1.pk, "pubDate": pub_date, "author": "test@example.com (Sally Smith)", "comments": "/blog/%s/comments" % self.e1.pk, }, ) self.assertCategories(items[0], ["python", "testing"]) for item in items: self.assertChildNodes( item, [ "title", "link", "description", "guid", "category", "pubDate", "author", "comments", ], ) # Assert that <guid> does not have any 'isPermaLink' attribute self.assertIsNone( item.getElementsByTagName("guid")[0].attributes.get("isPermaLink") ) def test_rss2_feed_with_callable_object(self): response = self.client.get("/syndication/rss2/with-callable-object/") doc = minidom.parseString(response.content) chan = doc.getElementsByTagName("rss")[0].getElementsByTagName("channel")[0] self.assertChildNodeContent(chan, {"ttl": "700"}) def test_rss2_feed_with_decorated_methods(self): response = self.client.get("/syndication/rss2/with-decorated-methods/") doc = minidom.parseString(response.content) chan = doc.getElementsByTagName("rss")[0].getElementsByTagName("channel")[0] self.assertCategories(chan, ["javascript", "vue"]) self.assertChildNodeContent( chan, { "title": "Overridden title -- decorated by @wraps.", "description": "Overridden description -- decorated by @wraps.", "ttl": "800 -- decorated by @wraps.", "copyright": "Copyright (c) 2022, John Doe -- decorated by @wraps.", }, ) items = chan.getElementsByTagName("item") self.assertChildNodeContent( items[0], { "title": ( f"Overridden item title: {self.e1.title} -- decorated by @wraps." ), "description": "Overridden item description -- decorated by @wraps.", }, ) def test_rss2_feed_with_wrong_decorated_methods(self): msg = ( "Feed method 'item_description' decorated by 'wrapper' needs to use " "@functools.wraps." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): self.client.get("/syndication/rss2/with-wrong-decorated-methods/") def test_rss2_feed_guid_permalink_false(self): """ Test if the 'isPermaLink' attribute of <guid> element of an item in the RSS feed is 'false'. """ response = self.client.get("/syndication/rss2/guid_ispermalink_false/") doc = minidom.parseString(response.content) chan = doc.getElementsByTagName("rss")[0].getElementsByTagName("channel")[0] items = chan.getElementsByTagName("item") for item in items: self.assertEqual( item.getElementsByTagName("guid")[0] .attributes.get("isPermaLink") .value, "false", ) def test_rss2_feed_guid_permalink_true(self): """ Test if the 'isPermaLink' attribute of <guid> element of an item in the RSS feed is 'true'. """ response = self.client.get("/syndication/rss2/guid_ispermalink_true/") doc = minidom.parseString(response.content) chan = doc.getElementsByTagName("rss")[0].getElementsByTagName("channel")[0] items = chan.getElementsByTagName("item") for item in items: self.assertEqual( item.getElementsByTagName("guid")[0] .attributes.get("isPermaLink") .value, "true", ) def test_rss2_single_enclosure(self): response = self.client.get("/syndication/rss2/single-enclosure/") doc = minidom.parseString(response.content) chan = doc.getElementsByTagName("rss")[0].getElementsByTagName("channel")[0] items = chan.getElementsByTagName("item") for item in items: enclosures = item.getElementsByTagName("enclosure") self.assertEqual(len(enclosures), 1) def test_rss2_multiple_enclosures(self): with self.assertRaisesMessage( ValueError, "RSS feed items may only have one enclosure, see " "http://www.rssboard.org/rss-profile#element-channel-item-enclosure", ): self.client.get("/syndication/rss2/multiple-enclosure/") def test_rss091_feed(self): """ Test the structure and content of feeds generated by RssUserland091Feed. """ response = self.client.get("/syndication/rss091/") doc = minidom.parseString(response.content) # Making sure there's only 1 `rss` element and that the correct # RSS version was specified. feed_elem = doc.getElementsByTagName("rss") self.assertEqual(len(feed_elem), 1) feed = feed_elem[0] self.assertEqual(feed.getAttribute("version"), "0.91") # Making sure there's only one `channel` element w/in the # `rss` element. chan_elem = feed.getElementsByTagName("channel") self.assertEqual(len(chan_elem), 1) chan = chan_elem[0] self.assertChildNodes( chan, [ "title", "link", "description", "language", "lastBuildDate", "item", "atom:link", "ttl", "copyright", "category", ], ) # Ensure the content of the channel is correct self.assertChildNodeContent( chan, { "title": "My blog", "link": "http://example.com/blog/", }, ) self.assertCategories(chan, ["python", "django"]) # Check feed_url is passed self.assertEqual( chan.getElementsByTagName("atom:link")[0].getAttribute("href"), "http://example.com/syndication/rss091/", ) items = chan.getElementsByTagName("item") self.assertEqual(len(items), Entry.objects.count()) self.assertChildNodeContent( items[0], { "title": "My first entry", "description": "Overridden description: My first entry", "link": "http://example.com/blog/%s/" % self.e1.pk, }, ) for item in items: self.assertChildNodes(item, ["title", "link", "description"]) self.assertCategories(item, []) def test_atom_feed(self): """ Test the structure and content of feeds generated by Atom1Feed. """ response = self.client.get("/syndication/atom/") feed = minidom.parseString(response.content).firstChild self.assertEqual(feed.nodeName, "feed") self.assertEqual(feed.getAttribute("xmlns"), "http://www.w3.org/2005/Atom") self.assertChildNodes( feed, [ "title", "subtitle", "link", "id", "updated", "entry", "rights", "category", "author", ], ) for link in feed.getElementsByTagName("link"): if link.getAttribute("rel") == "self": self.assertEqual( link.getAttribute("href"), "http://example.com/syndication/atom/" ) entries = feed.getElementsByTagName("entry") self.assertEqual(len(entries), Entry.objects.count()) for entry in entries: self.assertChildNodes( entry, [ "title", "link", "id", "summary", "category", "updated", "published", "rights", "author", ], ) summary = entry.getElementsByTagName("summary")[0] self.assertEqual(summary.getAttribute("type"), "html") def test_atom_feed_published_and_updated_elements(self): """ The published and updated elements are not the same and now adhere to RFC 4287. """ response = self.client.get("/syndication/atom/") feed = minidom.parseString(response.content).firstChild entries = feed.getElementsByTagName("entry") published = entries[0].getElementsByTagName("published")[0].firstChild.wholeText updated = entries[0].getElementsByTagName("updated")[0].firstChild.wholeText self.assertNotEqual(published, updated) def test_atom_single_enclosure(self): response = self.client.get("/syndication/atom/single-enclosure/") feed = minidom.parseString(response.content).firstChild items = feed.getElementsByTagName("entry") for item in items: links = item.getElementsByTagName("link") links = [link for link in links if link.getAttribute("rel") == "enclosure"] self.assertEqual(len(links), 1) def test_atom_multiple_enclosures(self): response = self.client.get("/syndication/atom/multiple-enclosure/") feed = minidom.parseString(response.content).firstChild items = feed.getElementsByTagName("entry") for item in items: links = item.getElementsByTagName("link") links = [link for link in links if link.getAttribute("rel") == "enclosure"] self.assertEqual(len(links), 2) def test_latest_post_date(self): """ Both the published and updated dates are considered when determining the latest post date. """ # this feed has a `published` element with the latest date response = self.client.get("/syndication/atom/") feed = minidom.parseString(response.content).firstChild updated = feed.getElementsByTagName("updated")[0].firstChild.wholeText d = Entry.objects.latest("published").published latest_published = rfc3339_date(timezone.make_aware(d, TZ)) self.assertEqual(updated, latest_published) # this feed has an `updated` element with the latest date response = self.client.get("/syndication/latest/") feed = minidom.parseString(response.content).firstChild updated = feed.getElementsByTagName("updated")[0].firstChild.wholeText d = Entry.objects.exclude(title="My last entry").latest("updated").updated latest_updated = rfc3339_date(timezone.make_aware(d, TZ)) self.assertEqual(updated, latest_updated) def test_custom_feed_generator(self): response = self.client.get("/syndication/custom/") feed = minidom.parseString(response.content).firstChild self.assertEqual(feed.nodeName, "feed") self.assertEqual(feed.getAttribute("django"), "rocks") self.assertChildNodes( feed, [ "title", "subtitle", "link", "id", "updated", "entry", "spam", "rights", "category", "author", ], ) entries = feed.getElementsByTagName("entry") self.assertEqual(len(entries), Entry.objects.count()) for entry in entries: self.assertEqual(entry.getAttribute("bacon"), "yum") self.assertChildNodes( entry, [ "title", "link", "id", "summary", "ministry", "rights", "author", "updated", "published", "category", ], ) summary = entry.getElementsByTagName("summary")[0] self.assertEqual(summary.getAttribute("type"), "html") def test_feed_generator_language_attribute(self): response = self.client.get("/syndication/language/") feed = minidom.parseString(response.content).firstChild self.assertEqual( feed.firstChild.getElementsByTagName("language")[0].firstChild.nodeValue, "de", ) def test_title_escaping(self): """ Titles are escaped correctly in RSS feeds. """ response = self.client.get("/syndication/rss2/") doc = minidom.parseString(response.content) for item in doc.getElementsByTagName("item"): link = item.getElementsByTagName("link")[0] if link.firstChild.wholeText == "http://example.com/blog/4/": title = item.getElementsByTagName("title")[0] self.assertEqual(title.firstChild.wholeText, "A &amp; B &lt; C &gt; D") def test_naive_datetime_conversion(self): """ Datetimes are correctly converted to the local time zone. """ # Naive date times passed in get converted to the local time zone, so # check the received zone offset against the local offset. response = self.client.get("/syndication/naive-dates/") doc = minidom.parseString(response.content) updated = doc.getElementsByTagName("updated")[0].firstChild.wholeText d = Entry.objects.latest("published").published latest = rfc3339_date(timezone.make_aware(d, TZ)) self.assertEqual(updated, latest) def test_aware_datetime_conversion(self): """ Datetimes with timezones don't get trodden on. """ response = self.client.get("/syndication/aware-dates/") doc = minidom.parseString(response.content) published = doc.getElementsByTagName("published")[0].firstChild.wholeText self.assertEqual(published[-6:], "+00:42") def test_feed_no_content_self_closing_tag(self): tests = [ (Atom1Feed, "link"), (Rss201rev2Feed, "atom:link"), ] for feedgenerator, tag in tests: with self.subTest(feedgenerator=feedgenerator.__name__): feed = feedgenerator( title="title", link="https://example.com", description="self closing tags test", feed_url="https://feed.url.com", ) doc = feed.writeString("utf-8") self.assertIn(f'<{tag} href="https://feed.url.com" rel="self"/>', doc) def test_stylesheets_none(self): feed = Rss201rev2Feed( title="test", link="https://example.com", description="test", stylesheets=None, ) self.assertNotIn("xml-stylesheet", feed.writeString("utf-8")) def test_stylesheets(self): testdata = [ # Plain strings. ("/test.xsl", 'href="/test.xsl" media="screen" type="text/xsl"'), ("/test.xslt", 'href="/test.xslt" media="screen" type="text/xsl"'), ("/test.css", 'href="/test.css" media="screen" type="text/css"'), ("/test", 'href="/test" media="screen"'), ( "https://example.com/test.xsl", 'href="https://example.com/test.xsl" media="screen" type="text/xsl"', ), ( "https://example.com/test.css", 'href="https://example.com/test.css" media="screen" type="text/css"', ), ( "https://example.com/test", 'href="https://example.com/test" media="screen"', ), ("/♥.xsl", 'href="/%E2%99%A5.xsl" media="screen" type="text/xsl"'), ( static("stylesheet.xsl"), 'href="/static/stylesheet.xsl" media="screen" type="text/xsl"', ), ( static("stylesheet.css"), 'href="/static/stylesheet.css" media="screen" type="text/css"', ), (static("stylesheet"), 'href="/static/stylesheet" media="screen"'), ( reverse("syndication-xsl-stylesheet"), 'href="/syndication/stylesheet.xsl" media="screen" type="text/xsl"', ), ( reverse_lazy("syndication-xsl-stylesheet"), 'href="/syndication/stylesheet.xsl" media="screen" type="text/xsl"', ), # Stylesheet objects. ( Stylesheet("/test.xsl"), 'href="/test.xsl" media="screen" type="text/xsl"', ), (Stylesheet("/test.xsl", mimetype=None), 'href="/test.xsl" media="screen"'), (Stylesheet("/test.xsl", media=None), 'href="/test.xsl" type="text/xsl"'), (Stylesheet("/test.xsl", mimetype=None, media=None), 'href="/test.xsl"'), ( Stylesheet("/test.xsl", mimetype="text/xml"), 'href="/test.xsl" media="screen" type="text/xml"', ), ] for stylesheet, expected in testdata: feed = Rss201rev2Feed( title="test", link="https://example.com", description="test", stylesheets=[stylesheet], ) doc = feed.writeString("utf-8") with self.subTest(expected=expected): self.assertIn(f"<?xml-stylesheet {expected}?>", doc) def test_stylesheets_instructions_are_at_the_top(self): response = self.client.get("/syndication/stylesheet/") doc = minidom.parseString(response.content) self.assertEqual(doc.childNodes[0].nodeName, "xml-stylesheet") self.assertEqual( doc.childNodes[0].data, 'href="/stylesheet1.xsl" media="screen" type="text/xsl"', ) self.assertEqual(doc.childNodes[1].nodeName, "xml-stylesheet") self.assertEqual( doc.childNodes[1].data, 'href="/stylesheet2.xsl" media="screen" type="text/xsl"', ) def test_stylesheets_typeerror_if_str_or_stylesheet(self): for stylesheet, error_message in [ ("/stylesheet.xsl", "stylesheets should be a list, not <class 'str'>"), ( Stylesheet("/stylesheet.xsl"), "stylesheets should be a list, " "not <class 'django.utils.feedgenerator.Stylesheet'>", ), ]: args = ("title", "/link", "description") with self.subTest(stylesheets=stylesheet): self.assertRaisesMessage( TypeError, error_message, SyndicationFeed, *args, stylesheets=stylesheet, ) def test_stylesheets_repr(self): testdata = [ (Stylesheet("/test.xsl", mimetype=None), "('/test.xsl', None, 'screen')"), (Stylesheet("/test.xsl", media=None), "('/test.xsl', 'text/xsl', None)"), ( Stylesheet("/test.xsl", mimetype=None, media=None), "('/test.xsl', None, None)", ), ( Stylesheet("/test.xsl", mimetype="text/xml"), "('/test.xsl', 'text/xml', 'screen')", ), ] for stylesheet, expected in testdata: self.assertEqual(repr(stylesheet), expected) @requires_tz_support def test_feed_last_modified_time_naive_date(self): """ Tests the Last-Modified header with naive publication dates. """ response = self.client.get("/syndication/naive-dates/") self.assertEqual( response.headers["Last-Modified"], "Tue, 26 Mar 2013 01:00:00 GMT" ) def test_feed_last_modified_time(self): """ Tests the Last-Modified header with aware publication dates. """ response = self.client.get("/syndication/aware-dates/") self.assertEqual( response.headers["Last-Modified"], "Mon, 25 Mar 2013 19:18:00 GMT" ) # No last-modified when feed has no item_pubdate response = self.client.get("/syndication/no_pubdate/") self.assertFalse(response.has_header("Last-Modified")) def test_feed_url(self): """ The feed_url can be overridden. """ response = self.client.get("/syndication/feedurl/") doc = minidom.parseString(response.content) for link in doc.getElementsByTagName("link"): if link.getAttribute("rel") == "self": self.assertEqual( link.getAttribute("href"), "http://example.com/customfeedurl/" ) def test_secure_urls(self): """ Test URLs are prefixed with https:// when feed is requested over HTTPS. """ response = self.client.get( "/syndication/rss2/", **{ "wsgi.url_scheme": "https", }, ) doc = minidom.parseString(response.content) chan = doc.getElementsByTagName("channel")[0] self.assertEqual( chan.getElementsByTagName("link")[0].firstChild.wholeText[0:5], "https" ) atom_link = chan.getElementsByTagName("atom:link")[0] self.assertEqual(atom_link.getAttribute("href")[0:5], "https") for link in doc.getElementsByTagName("link"): if link.getAttribute("rel") == "self": self.assertEqual(link.getAttribute("href")[0:5], "https") def test_item_link_error(self): """ An ImproperlyConfigured is raised if no link could be found for the item(s). """ msg = ( "Give your Article class a get_absolute_url() method, or define " "an item_link() method in your Feed class." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): self.client.get("/syndication/articles/") def test_template_feed(self): """ The item title and description can be overridden with templates. """ response = self.client.get("/syndication/template/") doc = minidom.parseString(response.content) feed = doc.getElementsByTagName("rss")[0] chan = feed.getElementsByTagName("channel")[0] items = chan.getElementsByTagName("item") self.assertChildNodeContent( items[0], { "title": "Title in your templates: My first entry\n", "description": "Description in your templates: My first entry\n", "link": "http://example.com/blog/%s/" % self.e1.pk, }, ) def test_template_context_feed(self): """ Custom context data can be passed to templates for title and description. """ response = self.client.get("/syndication/template_context/") doc = minidom.parseString(response.content) feed = doc.getElementsByTagName("rss")[0] chan = feed.getElementsByTagName("channel")[0] items = chan.getElementsByTagName("item") self.assertChildNodeContent( items[0], { "title": "My first entry (foo is bar)\n", "description": "My first entry (foo is bar)\n", }, ) def test_add_domain(self): """ add_domain() prefixes domains onto the correct URLs. """ prefix_domain_mapping = ( (("example.com", "/foo/?arg=value"), "http://example.com/foo/?arg=value"), ( ("example.com", "/foo/?arg=value", True), "https://example.com/foo/?arg=value", ), ( ("example.com", "http://djangoproject.com/doc/"), "http://djangoproject.com/doc/", ), ( ("example.com", "https://djangoproject.com/doc/"), "https://djangoproject.com/doc/", ), ( ("example.com", "mailto:uhoh@djangoproject.com"), "mailto:uhoh@djangoproject.com", ), ( ("example.com", "//example.com/foo/?arg=value"), "http://example.com/foo/?arg=value", ), ) for prefix in prefix_domain_mapping: with self.subTest(prefix=prefix): self.assertEqual(views.add_domain(*prefix[0]), prefix[1]) def test_get_object(self): response = self.client.get("/syndication/rss2/articles/%s/" % self.e1.pk) doc = minidom.parseString(response.content) feed = doc.getElementsByTagName("rss")[0] chan = feed.getElementsByTagName("channel")[0] items = chan.getElementsByTagName("item") self.assertChildNodeContent( items[0], { "comments": "/blog/%s/article/%s/comments" % (self.e1.pk, self.a1.pk), "description": "Article description: My first article", "link": "http://example.com/blog/%s/article/%s/" % (self.e1.pk, self.a1.pk), "title": "Title: My first article", "pubDate": rfc2822_date(timezone.make_aware(self.a1.published, TZ)), }, ) def test_get_non_existent_object(self): response = self.client.get("/syndication/rss2/articles/0/") self.assertEqual(response.status_code, 404)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/syndication_tests/feeds.py
tests/syndication_tests/feeds.py
from functools import wraps from django.contrib.syndication import views from django.utils import feedgenerator from django.utils.timezone import get_fixed_timezone from .models import Article, Entry def wraps_decorator(f): @wraps(f) def wrapper(*args, **kwargs): value = f(*args, **kwargs) return f"{value} -- decorated by @wraps." return wrapper def common_decorator(f): def wrapper(*args, **kwargs): value = f(*args, **kwargs) return f"{value} -- common decorated." return wrapper class TestRss2Feed(views.Feed): title = "My blog" description = "A more thorough description of my blog." link = "/blog/" feed_guid = "/foo/bar/1234" author_name = "Sally Smith" author_email = "test@example.com" author_link = "http://www.example.com/" categories = ("python", "django") feed_copyright = "Copyright (c) 2007, Sally Smith" ttl = 600 def items(self): return Entry.objects.all() def item_description(self, item): return "Overridden description: %s" % item def item_pubdate(self, item): return item.published def item_updateddate(self, item): return item.updated def item_comments(self, item): return "%scomments" % item.get_absolute_url() item_author_name = "Sally Smith" item_author_email = "test@example.com" item_author_link = "http://www.example.com/" item_categories = ("python", "testing") item_copyright = "Copyright (c) 2007, Sally Smith" class TestRss2FeedWithCallableObject(TestRss2Feed): class TimeToLive: def __call__(self): return 700 ttl = TimeToLive() class TestRss2FeedWithDecoratedMethod(TestRss2Feed): class TimeToLive: @wraps_decorator def __call__(self): return 800 @staticmethod @wraps_decorator def feed_copyright(): return "Copyright (c) 2022, John Doe" ttl = TimeToLive() @staticmethod def categories(): return ("javascript", "vue") @wraps_decorator def title(self): return "Overridden title" @wraps_decorator def item_title(self, item): return f"Overridden item title: {item.title}" @wraps_decorator def description(self, obj): return "Overridden description" @wraps_decorator def item_description(self): return "Overridden item description" class TestRss2FeedWithWrongDecoratedMethod(TestRss2Feed): @common_decorator def item_description(self, item): return f"Overridden item description: {item.title}" class TestRss2FeedWithGuidIsPermaLinkTrue(TestRss2Feed): def item_guid_is_permalink(self, item): return True class TestRss2FeedWithGuidIsPermaLinkFalse(TestRss2Feed): def item_guid(self, item): return str(item.pk) def item_guid_is_permalink(self, item): return False class TestRss091Feed(TestRss2Feed): feed_type = feedgenerator.RssUserland091Feed class TestNoPubdateFeed(views.Feed): title = "Test feed" link = "/feed/" def items(self): return Entry.objects.all() class TestAtomFeed(TestRss2Feed): feed_type = feedgenerator.Atom1Feed subtitle = TestRss2Feed.description class TestLatestFeed(TestRss2Feed): """ A feed where the latest entry date is an `updated` element. """ feed_type = feedgenerator.Atom1Feed subtitle = TestRss2Feed.description def items(self): return Entry.objects.exclude(title="My last entry") class ArticlesFeed(TestRss2Feed): """ A feed to test no link being defined. Articles have no get_absolute_url() method, and item_link() is not defined. """ def items(self): return Article.objects.all() class TestSingleEnclosureRSSFeed(TestRss2Feed): """ A feed to test that RSS feeds work with a single enclosure. """ def item_enclosure_url(self, item): return "http://example.com" def item_enclosure_size(self, item): return 0 def item_mime_type(self, item): return "image/png" class TestMultipleEnclosureRSSFeed(TestRss2Feed): """ A feed to test that RSS feeds raise an exception with multiple enclosures. """ def item_enclosures(self, item): return [ feedgenerator.Enclosure("http://example.com/hello.png", 0, "image/png"), feedgenerator.Enclosure("http://example.com/goodbye.png", 0, "image/png"), ] class TemplateFeed(TestRss2Feed): """ A feed to test defining item titles and descriptions with templates. """ title_template = "syndication/title.html" description_template = "syndication/description.html" # Defining a template overrides any item_title definition def item_title(self): return "Not in a template" class TemplateContextFeed(TestRss2Feed): """ A feed to test custom context data in templates for title or description. """ title_template = "syndication/title_context.html" description_template = "syndication/description_context.html" def get_context_data(self, **kwargs): context = super().get_context_data(**kwargs) context["foo"] = "bar" return context class TestLanguageFeed(TestRss2Feed): language = "de" class TestGetObjectFeed(TestRss2Feed): def get_object(self, request, entry_id): return Entry.objects.get(pk=entry_id) def items(self, obj): return Article.objects.filter(entry=obj) def item_link(self, item): return "%sarticle/%s/" % (item.entry.get_absolute_url(), item.pk) def item_comments(self, item): return "%scomments" % self.item_link(item) def item_description(self, item): return "Article description: %s" % item.title def item_title(self, item): return "Title: %s" % item.title class TestFeedWithStylesheets(TestRss2Feed): stylesheets = [ "/stylesheet1.xsl", feedgenerator.Stylesheet("/stylesheet2.xsl"), ] class NaiveDatesFeed(TestAtomFeed): """ A feed with naive (non-timezone-aware) dates. """ def item_pubdate(self, item): return item.published class TZAwareDatesFeed(TestAtomFeed): """ A feed with timezone-aware dates. """ def item_pubdate(self, item): # Provide a weird offset so that the test can know it's getting this # specific offset and not accidentally getting on from # settings.TIME_ZONE. return item.published.replace(tzinfo=get_fixed_timezone(42)) class TestFeedUrlFeed(TestAtomFeed): feed_url = "http://example.com/customfeedurl/" class MyCustomAtom1Feed(feedgenerator.Atom1Feed): """ Test of a custom feed generator class. """ def root_attributes(self): attrs = super().root_attributes() attrs["django"] = "rocks" return attrs def add_root_elements(self, handler): super().add_root_elements(handler) handler.addQuickElement("spam", "eggs") def item_attributes(self, item): attrs = super().item_attributes(item) attrs["bacon"] = "yum" return attrs def add_item_elements(self, handler, item): super().add_item_elements(handler, item) handler.addQuickElement("ministry", "silly walks") class TestCustomFeed(TestAtomFeed): feed_type = MyCustomAtom1Feed class TestSingleEnclosureAtomFeed(TestAtomFeed): """ A feed to test that Atom feeds work with a single enclosure. """ def item_enclosure_url(self, item): return "http://example.com" def item_enclosure_size(self, item): return 0 def item_mime_type(self, item): return "image/png" class TestMultipleEnclosureAtomFeed(TestAtomFeed): """ A feed to test that Atom feeds work with multiple enclosures. """ def item_enclosures(self, item): return [ feedgenerator.Enclosure("http://example.com/hello.png", "0", "image/png"), feedgenerator.Enclosure("http://example.com/goodbye.png", "0", "image/png"), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/syndication_tests/urls.py
tests/syndication_tests/urls.py
from django.urls import path from . import feeds urlpatterns = [ path("syndication/rss2/", feeds.TestRss2Feed()), path( "syndication/rss2/with-callable-object/", feeds.TestRss2FeedWithCallableObject() ), path( "syndication/rss2/with-decorated-methods/", feeds.TestRss2FeedWithDecoratedMethod(), ), path( "syndication/rss2/with-wrong-decorated-methods/", feeds.TestRss2FeedWithWrongDecoratedMethod(), ), path("syndication/rss2/articles/<int:entry_id>/", feeds.TestGetObjectFeed()), path( "syndication/rss2/guid_ispermalink_true/", feeds.TestRss2FeedWithGuidIsPermaLinkTrue(), ), path( "syndication/rss2/guid_ispermalink_false/", feeds.TestRss2FeedWithGuidIsPermaLinkFalse(), ), path("syndication/rss091/", feeds.TestRss091Feed()), path("syndication/no_pubdate/", feeds.TestNoPubdateFeed()), path("syndication/atom/", feeds.TestAtomFeed()), path("syndication/latest/", feeds.TestLatestFeed()), path("syndication/custom/", feeds.TestCustomFeed()), path("syndication/language/", feeds.TestLanguageFeed()), path("syndication/naive-dates/", feeds.NaiveDatesFeed()), path("syndication/aware-dates/", feeds.TZAwareDatesFeed()), path("syndication/feedurl/", feeds.TestFeedUrlFeed()), path("syndication/articles/", feeds.ArticlesFeed()), path("syndication/template/", feeds.TemplateFeed()), path("syndication/template_context/", feeds.TemplateContextFeed()), path("syndication/stylesheet/", feeds.TestFeedWithStylesheets()), path("syndication/rss2/single-enclosure/", feeds.TestSingleEnclosureRSSFeed()), path("syndication/rss2/multiple-enclosure/", feeds.TestMultipleEnclosureRSSFeed()), path("syndication/atom/single-enclosure/", feeds.TestSingleEnclosureAtomFeed()), path("syndication/atom/multiple-enclosure/", feeds.TestMultipleEnclosureAtomFeed()), path( "syndication/stylesheet.xsl", lambda request: None, name="syndication-xsl-stylesheet", ), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/admin_ordering/models.py
tests/admin_ordering/models.py
from django.contrib import admin from django.db import models class Band(models.Model): name = models.CharField(max_length=100) bio = models.TextField() rank = models.IntegerField() class Meta: ordering = ("name",) class Song(models.Model): band = models.ForeignKey(Band, models.CASCADE) name = models.CharField(max_length=100) duration = models.IntegerField() other_interpreters = models.ManyToManyField(Band, related_name="covers") class Meta: ordering = ("name",) class SongInlineDefaultOrdering(admin.StackedInline): model = Song class SongInlineNewOrdering(admin.StackedInline): model = Song ordering = ("duration",) class DynOrderingBandAdmin(admin.ModelAdmin): def get_ordering(self, request): if request.user.is_superuser: return ["rank"] else: return ["name"]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/admin_ordering/__init__.py
tests/admin_ordering/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/admin_ordering/tests.py
tests/admin_ordering/tests.py
from django.contrib import admin from django.contrib.admin.options import ModelAdmin from django.contrib.auth.models import User from django.db.models import F from django.test import RequestFactory, TestCase from .models import ( Band, DynOrderingBandAdmin, Song, SongInlineDefaultOrdering, SongInlineNewOrdering, ) class MockRequest: pass class MockSuperUser: def has_perm(self, perm, obj=None): return True def has_module_perms(self, module): return True request = MockRequest() request.user = MockSuperUser() site = admin.AdminSite() class TestAdminOrdering(TestCase): """ Let's make sure that ModelAdmin.get_queryset uses the ordering we define in ModelAdmin rather that ordering defined in the model's inner Meta class. """ request_factory = RequestFactory() @classmethod def setUpTestData(cls): Band.objects.bulk_create( [ Band(name="Aerosmith", bio="", rank=3), Band(name="Radiohead", bio="", rank=1), Band(name="Van Halen", bio="", rank=2), ] ) def test_default_ordering(self): """ The default ordering should be by name, as specified in the inner Meta class. """ ma = ModelAdmin(Band, site) names = [b.name for b in ma.get_queryset(request)] self.assertEqual(["Aerosmith", "Radiohead", "Van Halen"], names) def test_specified_ordering(self): """ Let's use a custom ModelAdmin that changes the ordering, and make sure it actually changes. """ class BandAdmin(ModelAdmin): ordering = ("rank",) # default ordering is ('name',) ma = BandAdmin(Band, site) names = [b.name for b in ma.get_queryset(request)] self.assertEqual(["Radiohead", "Van Halen", "Aerosmith"], names) def test_specified_ordering_by_f_expression(self): class BandAdmin(ModelAdmin): ordering = (F("rank").desc(nulls_last=True),) band_admin = BandAdmin(Band, site) names = [b.name for b in band_admin.get_queryset(request)] self.assertEqual(["Aerosmith", "Van Halen", "Radiohead"], names) def test_dynamic_ordering(self): """ Let's use a custom ModelAdmin that changes the ordering dynamically. """ super_user = User.objects.create(username="admin", is_superuser=True) other_user = User.objects.create(username="other") request = self.request_factory.get("/") request.user = super_user ma = DynOrderingBandAdmin(Band, site) names = [b.name for b in ma.get_queryset(request)] self.assertEqual(["Radiohead", "Van Halen", "Aerosmith"], names) request.user = other_user names = [b.name for b in ma.get_queryset(request)] self.assertEqual(["Aerosmith", "Radiohead", "Van Halen"], names) class TestInlineModelAdminOrdering(TestCase): """ Let's make sure that InlineModelAdmin.get_queryset uses the ordering we define in InlineModelAdmin. """ @classmethod def setUpTestData(cls): cls.band = Band.objects.create(name="Aerosmith", bio="", rank=3) Song.objects.bulk_create( [ Song(band=cls.band, name="Pink", duration=235), Song(band=cls.band, name="Dude (Looks Like a Lady)", duration=264), Song(band=cls.band, name="Jaded", duration=214), ] ) def test_default_ordering(self): """ The default ordering should be by name, as specified in the inner Meta class. """ inline = SongInlineDefaultOrdering(self.band, site) names = [s.name for s in inline.get_queryset(request)] self.assertEqual(["Dude (Looks Like a Lady)", "Jaded", "Pink"], names) def test_specified_ordering(self): """ Let's check with ordering set to something different than the default. """ inline = SongInlineNewOrdering(self.band, site) names = [s.name for s in inline.get_queryset(request)] self.assertEqual(["Jaded", "Pink", "Dude (Looks Like a Lady)"], names) class TestRelatedFieldsAdminOrdering(TestCase): @classmethod def setUpTestData(cls): cls.b1 = Band.objects.create(name="Pink Floyd", bio="", rank=1) cls.b2 = Band.objects.create(name="Foo Fighters", bio="", rank=5) def setUp(self): # we need to register a custom ModelAdmin (instead of just using # ModelAdmin) because the field creator tries to find the ModelAdmin # for the related model class SongAdmin(admin.ModelAdmin): pass site.register(Song, SongAdmin) def tearDown(self): site.unregister(Song) if site.is_registered(Band): site.unregister(Band) def check_ordering_of_field_choices(self, correct_ordering): fk_field = site.get_model_admin(Song).formfield_for_foreignkey( Song.band.field, request=None ) m2m_field = site.get_model_admin(Song).formfield_for_manytomany( Song.other_interpreters.field, request=None ) self.assertEqual(list(fk_field.queryset), correct_ordering) self.assertEqual(list(m2m_field.queryset), correct_ordering) def test_no_admin_fallback_to_model_ordering(self): # should be ordered by name (as defined by the model) self.check_ordering_of_field_choices([self.b2, self.b1]) def test_admin_with_no_ordering_fallback_to_model_ordering(self): class NoOrderingBandAdmin(admin.ModelAdmin): pass site.register(Band, NoOrderingBandAdmin) # should be ordered by name (as defined by the model) self.check_ordering_of_field_choices([self.b2, self.b1]) def test_admin_ordering_beats_model_ordering(self): class StaticOrderingBandAdmin(admin.ModelAdmin): ordering = ("rank",) site.register(Band, StaticOrderingBandAdmin) # should be ordered by rank (defined by the ModelAdmin) self.check_ordering_of_field_choices([self.b1, self.b2]) def test_custom_queryset_still_wins(self): """Custom queryset has still precedence (#21405)""" class SongAdmin(admin.ModelAdmin): # Exclude one of the two Bands from the querysets def formfield_for_foreignkey(self, db_field, request, **kwargs): if db_field.name == "band": kwargs["queryset"] = Band.objects.filter(rank__gt=2) return super().formfield_for_foreignkey(db_field, request, **kwargs) def formfield_for_manytomany(self, db_field, request, **kwargs): if db_field.name == "other_interpreters": kwargs["queryset"] = Band.objects.filter(rank__gt=2) return super().formfield_for_foreignkey(db_field, request, **kwargs) class StaticOrderingBandAdmin(admin.ModelAdmin): ordering = ("rank",) site.unregister(Song) site.register(Song, SongAdmin) site.register(Band, StaticOrderingBandAdmin) self.check_ordering_of_field_choices([self.b2])
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/project_template/views.py
tests/project_template/views.py
from django.http import HttpResponse def empty_view(request, *args, **kwargs): return HttpResponse()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/project_template/__init__.py
tests/project_template/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/project_template/test_settings.py
tests/project_template/test_settings.py
import os import shutil import tempfile from django import conf from django.test import SimpleTestCase from django.test.utils import extend_sys_path class TestStartProjectSettings(SimpleTestCase): def setUp(self): self.temp_dir = tempfile.TemporaryDirectory() self.addCleanup(self.temp_dir.cleanup) template_settings_py = os.path.join( os.path.dirname(conf.__file__), "project_template", "project_name", "settings.py-tpl", ) test_settings_py = os.path.join(self.temp_dir.name, "test_settings.py") shutil.copyfile(template_settings_py, test_settings_py) def test_middleware_headers(self): """ Ensure headers sent by the default MIDDLEWARE don't inadvertently change. For example, we never want "Vary: Cookie" to appear in the list since it prevents the caching of responses. """ with extend_sys_path(self.temp_dir.name): from test_settings import MIDDLEWARE with self.settings( MIDDLEWARE=MIDDLEWARE, ROOT_URLCONF="project_template.urls", ): response = self.client.get("/empty/") headers = sorted(response.serialize_headers().split(b"\r\n")) self.assertEqual( headers, [ b"Content-Length: 0", b"Content-Type: text/html; charset=utf-8", b"Cross-Origin-Opener-Policy: same-origin", b"Referrer-Policy: same-origin", b"X-Content-Type-Options: nosniff", b"X-Frame-Options: DENY", ], )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/project_template/urls.py
tests/project_template/urls.py
from django.urls import path from . import views urlpatterns = [ path("empty/", views.empty_view), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/test_default_pk.py
tests/model_options/test_default_pk.py
from django.core.exceptions import ImproperlyConfigured from django.db import models from django.test import SimpleTestCase, override_settings from django.test.utils import isolate_apps class MyBigAutoField(models.BigAutoField): pass @isolate_apps("model_options") class TestDefaultPK(SimpleTestCase): def test_default_value_of_default_auto_field_setting(self): """django.conf.global_settings defaults to BigAutoField.""" class MyModel(models.Model): pass self.assertIsInstance(MyModel._meta.pk, models.BigAutoField) @override_settings(DEFAULT_AUTO_FIELD="django.db.models.NonexistentAutoField") def test_default_auto_field_setting_nonexistent(self): msg = ( "DEFAULT_AUTO_FIELD refers to the module " "'django.db.models.NonexistentAutoField' that could not be " "imported." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): class Model(models.Model): pass @isolate_apps("model_options.apps.ModelPKNonexistentConfig") def test_app_default_auto_field_nonexistent(self): msg = ( "model_options.apps.ModelPKNonexistentConfig.default_auto_field " "refers to the module 'django.db.models.NonexistentAutoField' " "that could not be imported." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): class Model(models.Model): pass @override_settings(DEFAULT_AUTO_FIELD="django.db.models.TextField") def test_default_auto_field_setting_non_auto(self): msg = ( "Primary key 'django.db.models.TextField' referred by " "DEFAULT_AUTO_FIELD must subclass AutoField." ) with self.assertRaisesMessage(ValueError, msg): class Model(models.Model): pass @isolate_apps("model_options.apps.ModelPKNonAutoConfig") def test_app_default_auto_field_non_auto(self): msg = ( "Primary key 'django.db.models.TextField' referred by " "model_options.apps.ModelPKNonAutoConfig.default_auto_field must " "subclass AutoField." ) with self.assertRaisesMessage(ValueError, msg): class Model(models.Model): pass @override_settings(DEFAULT_AUTO_FIELD=None) def test_default_auto_field_setting_none(self): msg = "DEFAULT_AUTO_FIELD must not be empty." with self.assertRaisesMessage(ImproperlyConfigured, msg): class Model(models.Model): pass @isolate_apps("model_options.apps.ModelPKNoneConfig") def test_app_default_auto_field_none(self): msg = ( "model_options.apps.ModelPKNoneConfig.default_auto_field must not " "be empty." ) with self.assertRaisesMessage(ImproperlyConfigured, msg): class Model(models.Model): pass @isolate_apps("model_options.apps.ModelDefaultPKConfig") @override_settings(DEFAULT_AUTO_FIELD="django.db.models.SmallAutoField") def test_default_auto_field_setting(self): class Model(models.Model): pass self.assertIsInstance(Model._meta.pk, models.SmallAutoField) @override_settings( DEFAULT_AUTO_FIELD="model_options.test_default_pk.MyBigAutoField" ) def test_default_auto_field_setting_bigautofield_subclass(self): class Model(models.Model): pass self.assertIsInstance(Model._meta.pk, MyBigAutoField) @isolate_apps("model_options.apps.ModelPKConfig") @override_settings(DEFAULT_AUTO_FIELD="django.db.models.AutoField") def test_app_default_auto_field(self): class Model(models.Model): pass self.assertIsInstance(Model._meta.pk, models.SmallAutoField) @isolate_apps("model_options.apps.ModelDefaultPKConfig") @override_settings(DEFAULT_AUTO_FIELD="django.db.models.SmallAutoField") def test_m2m_default_auto_field_setting(self): class M2MModel(models.Model): m2m = models.ManyToManyField("self") m2m_pk = M2MModel._meta.get_field("m2m").remote_field.through._meta.pk self.assertIsInstance(m2m_pk, models.SmallAutoField) @isolate_apps("model_options.apps.ModelPKConfig") @override_settings(DEFAULT_AUTO_FIELD="django.db.models.AutoField") def test_m2m_app_default_auto_field(self): class M2MModel(models.Model): m2m = models.ManyToManyField("self") m2m_pk = M2MModel._meta.get_field("m2m").remote_field.through._meta.pk self.assertIsInstance(m2m_pk, models.SmallAutoField)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/__init__.py
tests/model_options/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/apps.py
tests/model_options/apps.py
from django.apps import AppConfig class ModelDefaultPKConfig(AppConfig): name = "model_options" class ModelPKConfig(AppConfig): name = "model_options" default_auto_field = "django.db.models.SmallAutoField" class ModelPKNonAutoConfig(AppConfig): name = "model_options" default_auto_field = "django.db.models.TextField" class ModelPKNoneConfig(AppConfig): name = "model_options" default_auto_field = None class ModelPKNonexistentConfig(AppConfig): name = "model_options" default_auto_field = "django.db.models.NonexistentAutoField"
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/test_default_related_name.py
tests/model_options/test_default_related_name.py
from django.core.exceptions import FieldError from django.test import TestCase from .models.default_related_name import Author, Book, Editor class DefaultRelatedNameTests(TestCase): @classmethod def setUpTestData(cls): cls.author = Author.objects.create(first_name="Dave", last_name="Loper") cls.editor = Editor.objects.create( name="Test Editions", bestselling_author=cls.author ) cls.book = Book.objects.create(title="Test Book", editor=cls.editor) cls.book.authors.add(cls.author) def test_no_default_related_name(self): self.assertEqual(list(self.author.editor_set.all()), [self.editor]) def test_default_related_name(self): self.assertEqual(list(self.author.books.all()), [self.book]) def test_default_related_name_in_queryset_lookup(self): self.assertEqual(Author.objects.get(books=self.book), self.author) def test_model_name_not_available_in_queryset_lookup(self): msg = "Cannot resolve keyword 'book' into field." with self.assertRaisesMessage(FieldError, msg): Author.objects.get(book=self.book) def test_related_name_overrides_default_related_name(self): self.assertEqual(list(self.editor.edited_books.all()), [self.book]) def test_inheritance(self): # model_options is the name of the application for this test. self.assertEqual(list(self.book.model_options_bookstores.all()), []) def test_inheritance_with_overridden_default_related_name(self): self.assertEqual(list(self.book.editor_stores.all()), [])
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/test_tablespaces.py
tests/model_options/test_tablespaces.py
from django.apps import apps from django.conf import settings from django.db import connection from django.test import TransactionTestCase, skipIfDBFeature, skipUnlessDBFeature from .models.tablespaces import ( Article, ArticleRef, Authors, Reviewers, Scientist, ScientistRef, ) def sql_for_table(model): with connection.schema_editor(collect_sql=True) as editor: editor.create_model(model) return editor.collected_sql[0] def sql_for_index(model): return "\n".join( str(sql) for sql in connection.schema_editor()._model_indexes_sql(model) ) # We can't test the DEFAULT_TABLESPACE and DEFAULT_INDEX_TABLESPACE settings # because they're evaluated when the model class is defined. As a consequence, # @override_settings doesn't work, and the tests depend class TablespacesTests(TransactionTestCase): available_apps = ["model_options"] def setUp(self): # The unmanaged models need to be removed after the test in order to # prevent bad interactions with the flush operation in other tests. self._old_models = apps.app_configs["model_options"].models.copy() for model in Article, Authors, Reviewers, Scientist: model._meta.managed = True def tearDown(self): for model in Article, Authors, Reviewers, Scientist: model._meta.managed = False apps.app_configs["model_options"].models = self._old_models apps.all_models["model_options"] = self._old_models apps.clear_cache() def assertNumContains(self, haystack, needle, count): real_count = haystack.count(needle) self.assertEqual( real_count, count, "Found %d instances of '%s', expected %d" % (real_count, needle, count), ) @skipUnlessDBFeature("supports_tablespaces") def test_tablespace_for_model(self): sql = sql_for_table(Scientist).lower() if settings.DEFAULT_INDEX_TABLESPACE: # 1 for the table self.assertNumContains(sql, "tbl_tbsp", 1) # 1 for the index on the primary key self.assertNumContains(sql, settings.DEFAULT_INDEX_TABLESPACE, 1) else: # 1 for the table + 1 for the index on the primary key self.assertNumContains(sql, "tbl_tbsp", 2) @skipIfDBFeature("supports_tablespaces") def test_tablespace_ignored_for_model(self): # No tablespace-related SQL self.assertEqual(sql_for_table(Scientist), sql_for_table(ScientistRef)) @skipUnlessDBFeature("supports_tablespaces") def test_tablespace_for_indexed_field(self): sql = sql_for_table(Article).lower() if settings.DEFAULT_INDEX_TABLESPACE: # 1 for the table self.assertNumContains(sql, "tbl_tbsp", 1) # 1 for the primary key + 1 for the index on code self.assertNumContains(sql, settings.DEFAULT_INDEX_TABLESPACE, 2) else: # 1 for the table + 1 for the primary key + 1 for the index on code self.assertNumContains(sql, "tbl_tbsp", 3) # 1 for the index on reference self.assertNumContains(sql, "idx_tbsp", 1) @skipIfDBFeature("supports_tablespaces") def test_tablespace_ignored_for_indexed_field(self): # No tablespace-related SQL self.assertEqual(sql_for_table(Article), sql_for_table(ArticleRef)) @skipUnlessDBFeature("supports_tablespaces") def test_tablespace_for_many_to_many_field(self): sql = sql_for_table(Authors).lower() # The join table of the ManyToManyField goes to the model's tablespace, # and its indexes too, unless DEFAULT_INDEX_TABLESPACE is set. if settings.DEFAULT_INDEX_TABLESPACE: # 1 for the table self.assertNumContains(sql, "tbl_tbsp", 1) # 1 for the primary key self.assertNumContains(sql, settings.DEFAULT_INDEX_TABLESPACE, 1) else: # 1 for the table + 1 for the index on the primary key self.assertNumContains(sql, "tbl_tbsp", 2) self.assertNumContains(sql, "idx_tbsp", 0) sql = sql_for_index(Authors).lower() # The ManyToManyField declares no db_tablespace, its indexes go to # the model's tablespace, unless DEFAULT_INDEX_TABLESPACE is set. if settings.DEFAULT_INDEX_TABLESPACE: self.assertNumContains(sql, settings.DEFAULT_INDEX_TABLESPACE, 2) else: self.assertNumContains(sql, "tbl_tbsp", 2) self.assertNumContains(sql, "idx_tbsp", 0) sql = sql_for_table(Reviewers).lower() # The join table of the ManyToManyField goes to the model's tablespace, # and its indexes too, unless DEFAULT_INDEX_TABLESPACE is set. if settings.DEFAULT_INDEX_TABLESPACE: # 1 for the table self.assertNumContains(sql, "tbl_tbsp", 1) # 1 for the primary key self.assertNumContains(sql, settings.DEFAULT_INDEX_TABLESPACE, 1) else: # 1 for the table + 1 for the index on the primary key self.assertNumContains(sql, "tbl_tbsp", 2) self.assertNumContains(sql, "idx_tbsp", 0) sql = sql_for_index(Reviewers).lower() # The ManyToManyField declares db_tablespace, its indexes go there. self.assertNumContains(sql, "tbl_tbsp", 0) self.assertNumContains(sql, "idx_tbsp", 2)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/models/tablespaces.py
tests/model_options/models/tablespaces.py
from django.db import models # Since the test database doesn't have tablespaces, it's impossible for Django # to create the tables for models where db_tablespace is set. To avoid this # problem, we mark the models as unmanaged, and temporarily revert them to # managed during each test. We also set them to use the same tables as the # "reference" models to avoid errors when other tests run 'migrate' # (proxy_models_inheritance does). class ScientistRef(models.Model): name = models.CharField(max_length=50) class ArticleRef(models.Model): title = models.CharField(max_length=50, unique=True) code = models.CharField(max_length=50, unique=True) authors = models.ManyToManyField(ScientistRef, related_name="articles_written_set") reviewers = models.ManyToManyField( ScientistRef, related_name="articles_reviewed_set" ) class Scientist(models.Model): name = models.CharField(max_length=50) class Meta: db_table = "model_options_scientistref" db_tablespace = "tbl_tbsp" managed = False class Article(models.Model): title = models.CharField(max_length=50, unique=True) code = models.CharField(max_length=50, unique=True, db_tablespace="idx_tbsp") authors = models.ManyToManyField(Scientist, related_name="articles_written_set") reviewers = models.ManyToManyField( Scientist, related_name="articles_reviewed_set", db_tablespace="idx_tbsp" ) class Meta: db_table = "model_options_articleref" db_tablespace = "tbl_tbsp" managed = False # Also set the tables for automatically created models Authors = Article._meta.get_field("authors").remote_field.through Authors._meta.db_table = "model_options_articleref_authors" Reviewers = Article._meta.get_field("reviewers").remote_field.through Reviewers._meta.db_table = "model_options_articleref_reviewers"
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/models/default_related_name.py
tests/model_options/models/default_related_name.py
from django.db import models class Author(models.Model): first_name = models.CharField(max_length=128) last_name = models.CharField(max_length=128) class Editor(models.Model): name = models.CharField(max_length=128) bestselling_author = models.ForeignKey(Author, models.CASCADE) class Book(models.Model): title = models.CharField(max_length=128) authors = models.ManyToManyField(Author) editor = models.ForeignKey(Editor, models.CASCADE, related_name="edited_books") class Meta: default_related_name = "books" class Store(models.Model): name = models.CharField(max_length=128) address = models.CharField(max_length=128) class Meta: abstract = True default_related_name = "%(app_label)s_%(model_name)ss" class BookStore(Store): available_books = models.ManyToManyField(Book) class EditorStore(Store): editor = models.ForeignKey(Editor, models.CASCADE) available_books = models.ManyToManyField(Book) class Meta: default_related_name = "editor_stores"
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/model_options/models/__init__.py
tests/model_options/models/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/signals/models.py
tests/signals/models.py
""" Testing signals before/after saving and deleting. """ from django.db import models class Person(models.Model): first_name = models.CharField(max_length=20) last_name = models.CharField(max_length=20) def __str__(self): return "%s %s" % (self.first_name, self.last_name) class Car(models.Model): make = models.CharField(max_length=20) model = models.CharField(max_length=20) class Author(models.Model): name = models.CharField(max_length=20) def __str__(self): return self.name class Book(models.Model): name = models.CharField(max_length=20) authors = models.ManyToManyField(Author) def __str__(self): return self.name class Page(models.Model): book = models.ForeignKey(Book, on_delete=models.CASCADE) text = models.TextField()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/signals/__init__.py
tests/signals/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/signals/tests.py
tests/signals/tests.py
import contextvars from unittest import mock from asgiref.sync import markcoroutinefunction from django import dispatch from django.apps.registry import Apps from django.db import models from django.db.models import signals from django.dispatch import receiver from django.test import SimpleTestCase, TestCase from django.test.utils import isolate_apps from .models import Author, Book, Car, Page, Person class BaseSignalSetup: def setUp(self): # Save up the number of connected signals so that we can check at the # end that all the signals we register get properly unregistered # (#9989) self.pre_signals = ( len(signals.pre_save.receivers), len(signals.post_save.receivers), len(signals.pre_delete.receivers), len(signals.post_delete.receivers), ) def tearDown(self): # All our signals got disconnected properly. post_signals = ( len(signals.pre_save.receivers), len(signals.post_save.receivers), len(signals.pre_delete.receivers), len(signals.post_delete.receivers), ) self.assertEqual(self.pre_signals, post_signals) class SignalTests(BaseSignalSetup, TestCase): def test_model_pre_init_and_post_init(self): data = [] def pre_init_callback(sender, args, **kwargs): data.append(kwargs["kwargs"]) signals.pre_init.connect(pre_init_callback) def post_init_callback(sender, instance, **kwargs): data.append(instance) signals.post_init.connect(post_init_callback) p1 = Person(first_name="John", last_name="Doe") self.assertEqual(data, [{}, p1]) def test_save_signals(self): data = [] def pre_save_handler(signal, sender, instance, **kwargs): data.append((instance, sender, kwargs.get("raw", False))) def post_save_handler(signal, sender, instance, **kwargs): data.append( (instance, sender, kwargs.get("created"), kwargs.get("raw", False)) ) signals.pre_save.connect(pre_save_handler, weak=False) signals.post_save.connect(post_save_handler, weak=False) try: p1 = Person.objects.create(first_name="John", last_name="Smith") self.assertEqual( data, [ (p1, Person, False), (p1, Person, True, False), ], ) data[:] = [] p1.first_name = "Tom" p1.save() self.assertEqual( data, [ (p1, Person, False), (p1, Person, False, False), ], ) data[:] = [] # Calling an internal method purely so that we can trigger a "raw" # save. p1.save_base(raw=True) self.assertEqual( data, [ (p1, Person, True), (p1, Person, False, True), ], ) data[:] = [] p2 = Person(first_name="James", last_name="Jones") p2.id = 99999 p2.save() self.assertEqual( data, [ (p2, Person, False), (p2, Person, True, False), ], ) data[:] = [] p2.id = 99998 p2.save() self.assertEqual( data, [ (p2, Person, False), (p2, Person, True, False), ], ) # The sender should stay the same when using defer(). data[:] = [] p3 = Person.objects.defer("first_name").get(pk=p1.pk) p3.last_name = "Reese" p3.save() self.assertEqual( data, [ (p3, Person, False), (p3, Person, False, False), ], ) finally: signals.pre_save.disconnect(pre_save_handler) signals.post_save.disconnect(post_save_handler) def test_delete_signals(self): data = [] def pre_delete_handler(signal, sender, instance, origin, **kwargs): data.append((instance, sender, instance.id is None, origin)) # #8285: signals can be any callable class PostDeleteHandler: def __init__(self, data): self.data = data def __call__(self, signal, sender, instance, origin, **kwargs): self.data.append((instance, sender, instance.id is None, origin)) post_delete_handler = PostDeleteHandler(data) signals.pre_delete.connect(pre_delete_handler, weak=False) signals.post_delete.connect(post_delete_handler, weak=False) try: p1 = Person.objects.create(first_name="John", last_name="Smith") p1.delete() self.assertEqual( data, [ (p1, Person, False, p1), (p1, Person, False, p1), ], ) data[:] = [] p2 = Person(first_name="James", last_name="Jones") p2.id = 99999 p2.save() p2.id = 99998 p2.save() p2.delete() self.assertEqual( data, [ (p2, Person, False, p2), (p2, Person, False, p2), ], ) data[:] = [] self.assertQuerySetEqual( Person.objects.all(), [ "James Jones", ], str, ) finally: signals.pre_delete.disconnect(pre_delete_handler) signals.post_delete.disconnect(post_delete_handler) def test_delete_signals_origin_model(self): data = [] def pre_delete_handler(signal, sender, instance, origin, **kwargs): data.append((sender, origin)) def post_delete_handler(signal, sender, instance, origin, **kwargs): data.append((sender, origin)) person = Person.objects.create(first_name="John", last_name="Smith") book = Book.objects.create(name="Rayuela") Page.objects.create(text="Page 1", book=book) Page.objects.create(text="Page 2", book=book) signals.pre_delete.connect(pre_delete_handler, weak=False) signals.post_delete.connect(post_delete_handler, weak=False) try: # Instance deletion. person.delete() self.assertEqual(data, [(Person, person), (Person, person)]) data[:] = [] # Cascade deletion. book.delete() self.assertEqual( data, [ (Page, book), (Page, book), (Book, book), (Page, book), (Page, book), (Book, book), ], ) finally: signals.pre_delete.disconnect(pre_delete_handler) signals.post_delete.disconnect(post_delete_handler) def test_delete_signals_origin_queryset(self): data = [] def pre_delete_handler(signal, sender, instance, origin, **kwargs): data.append((sender, origin)) def post_delete_handler(signal, sender, instance, origin, **kwargs): data.append((sender, origin)) Person.objects.create(first_name="John", last_name="Smith") book = Book.objects.create(name="Rayuela") Page.objects.create(text="Page 1", book=book) Page.objects.create(text="Page 2", book=book) signals.pre_delete.connect(pre_delete_handler, weak=False) signals.post_delete.connect(post_delete_handler, weak=False) try: # Queryset deletion. qs = Person.objects.all() qs.delete() self.assertEqual(data, [(Person, qs), (Person, qs)]) data[:] = [] # Cascade deletion. qs = Book.objects.all() qs.delete() self.assertEqual( data, [ (Page, qs), (Page, qs), (Book, qs), (Page, qs), (Page, qs), (Book, qs), ], ) finally: signals.pre_delete.disconnect(pre_delete_handler) signals.post_delete.disconnect(post_delete_handler) def test_decorators(self): data = [] @receiver(signals.pre_save, weak=False) def decorated_handler(signal, sender, instance, **kwargs): data.append(instance) @receiver(signals.pre_save, sender=Car, weak=False) def decorated_handler_with_sender_arg(signal, sender, instance, **kwargs): data.append(instance) try: c1 = Car.objects.create(make="Volkswagen", model="Passat") self.assertEqual(data, [c1, c1]) finally: signals.pre_save.disconnect(decorated_handler) signals.pre_save.disconnect(decorated_handler_with_sender_arg, sender=Car) def test_save_and_delete_signals_with_m2m(self): data = [] def pre_save_handler(signal, sender, instance, **kwargs): data.append("pre_save signal, %s" % instance) if kwargs.get("raw"): data.append("Is raw") def post_save_handler(signal, sender, instance, **kwargs): data.append("post_save signal, %s" % instance) if "created" in kwargs: if kwargs["created"]: data.append("Is created") else: data.append("Is updated") if kwargs.get("raw"): data.append("Is raw") def pre_delete_handler(signal, sender, instance, **kwargs): data.append("pre_delete signal, %s" % instance) data.append("instance.id is not None: %s" % (instance.id is not None)) def post_delete_handler(signal, sender, instance, **kwargs): data.append("post_delete signal, %s" % instance) data.append("instance.id is not None: %s" % (instance.id is not None)) signals.pre_save.connect(pre_save_handler, weak=False) signals.post_save.connect(post_save_handler, weak=False) signals.pre_delete.connect(pre_delete_handler, weak=False) signals.post_delete.connect(post_delete_handler, weak=False) try: a1 = Author.objects.create(name="Neal Stephenson") self.assertEqual( data, [ "pre_save signal, Neal Stephenson", "post_save signal, Neal Stephenson", "Is created", ], ) data[:] = [] b1 = Book.objects.create(name="Snow Crash") self.assertEqual( data, [ "pre_save signal, Snow Crash", "post_save signal, Snow Crash", "Is created", ], ) data[:] = [] # Assigning and removing to/from m2m shouldn't generate an m2m # signal. b1.authors.set([a1]) self.assertEqual(data, []) b1.authors.set([]) self.assertEqual(data, []) finally: signals.pre_save.disconnect(pre_save_handler) signals.post_save.disconnect(post_save_handler) signals.pre_delete.disconnect(pre_delete_handler) signals.post_delete.disconnect(post_delete_handler) def test_disconnect_in_dispatch(self): """ Signals that disconnect when being called don't mess future dispatching. """ class Handler: def __init__(self, param): self.param = param self._run = False def __call__(self, signal, sender, **kwargs): self._run = True signal.disconnect(receiver=self, sender=sender) a, b = Handler(1), Handler(2) signals.post_save.connect(a, sender=Person, weak=False) signals.post_save.connect(b, sender=Person, weak=False) Person.objects.create(first_name="John", last_name="Smith") self.assertTrue(a._run) self.assertTrue(b._run) self.assertEqual(signals.post_save.receivers, []) @mock.patch("weakref.ref") def test_lazy_model_signal(self, ref): def callback(sender, args, **kwargs): pass signals.pre_init.connect(callback) signals.pre_init.disconnect(callback) self.assertTrue(ref.called) ref.reset_mock() signals.pre_init.connect(callback, weak=False) signals.pre_init.disconnect(callback) ref.assert_not_called() @isolate_apps("signals", kwarg_name="apps") def test_disconnect_model(self, apps): received = [] def receiver(**kwargs): received.append(kwargs) class Created(models.Model): pass signals.post_init.connect(receiver, sender=Created, apps=apps) try: self.assertIs( signals.post_init.disconnect(receiver, sender=Created, apps=apps), True, ) self.assertIs( signals.post_init.disconnect(receiver, sender=Created, apps=apps), False, ) Created() self.assertEqual(received, []) finally: signals.post_init.disconnect(receiver, sender=Created) class LazyModelRefTests(BaseSignalSetup, SimpleTestCase): def setUp(self): super().setUp() self.received = [] def receiver(self, **kwargs): self.received.append(kwargs) def test_invalid_sender_model_name(self): msg = ( "Invalid model reference 'invalid'. String model references must be of the " "form 'app_label.ModelName'." ) with self.assertRaisesMessage(ValueError, msg): signals.post_init.connect(self.receiver, sender="invalid") def test_already_loaded_model(self): signals.post_init.connect(self.receiver, sender="signals.Book", weak=False) try: instance = Book() self.assertEqual( self.received, [{"signal": signals.post_init, "sender": Book, "instance": instance}], ) finally: signals.post_init.disconnect(self.receiver, sender=Book) @isolate_apps("signals", kwarg_name="apps") def test_not_loaded_model(self, apps): signals.post_init.connect( self.receiver, sender="signals.Created", weak=False, apps=apps ) try: class Created(models.Model): pass instance = Created() self.assertEqual( self.received, [ { "signal": signals.post_init, "sender": Created, "instance": instance, } ], ) finally: signals.post_init.disconnect(self.receiver, sender=Created) @isolate_apps("signals", kwarg_name="apps") def test_disconnect_registered_model(self, apps): received = [] def receiver(**kwargs): received.append(kwargs) class Created(models.Model): pass signals.post_init.connect(receiver, sender="signals.Created", apps=apps) try: self.assertIsNone( signals.post_init.disconnect( receiver, sender="signals.Created", apps=apps ) ) self.assertIsNone( signals.post_init.disconnect( receiver, sender="signals.Created", apps=apps ) ) Created() self.assertEqual(received, []) finally: signals.post_init.disconnect(receiver, sender="signals.Created") @isolate_apps("signals", kwarg_name="apps") def test_disconnect_unregistered_model(self, apps): received = [] def receiver(**kwargs): received.append(kwargs) signals.post_init.connect(receiver, sender="signals.Created", apps=apps) try: self.assertIsNone( signals.post_init.disconnect( receiver, sender="signals.Created", apps=apps ) ) self.assertIsNone( signals.post_init.disconnect( receiver, sender="signals.Created", apps=apps ) ) class Created(models.Model): pass Created() self.assertEqual(received, []) finally: signals.post_init.disconnect(receiver, sender="signals.Created") def test_register_model_class_senders_immediately(self): """ Model signals registered with model classes as senders don't use the Apps.lazy_model_operation() mechanism. """ # Book isn't registered with apps2, so it will linger in # apps2._pending_operations if ModelSignal does the wrong thing. apps2 = Apps() signals.post_init.connect(self.receiver, sender=Book, apps=apps2) self.assertEqual(list(apps2._pending_operations), []) class SyncHandler: param = 0 def __call__(self, **kwargs): self.param += 1 return self.param class AsyncHandler: param = 0 def __init__(self): markcoroutinefunction(self) async def __call__(self, **kwargs): self.param += 1 return self.param class AsyncReceiversTests(SimpleTestCase): async def test_asend(self): sync_handler = SyncHandler() async_handler = AsyncHandler() signal = dispatch.Signal() signal.connect(sync_handler) signal.connect(async_handler) result = await signal.asend(self.__class__) self.assertEqual(result, [(sync_handler, 1), (async_handler, 1)]) def test_send(self): sync_handler = SyncHandler() async_handler = AsyncHandler() signal = dispatch.Signal() signal.connect(sync_handler) signal.connect(async_handler) result = signal.send(self.__class__) self.assertEqual(result, [(sync_handler, 1), (async_handler, 1)]) def test_send_robust(self): class ReceiverException(Exception): pass receiver_exception = ReceiverException() async def failing_async_handler(**kwargs): raise receiver_exception sync_handler = SyncHandler() async_handler = AsyncHandler() signal = dispatch.Signal() signal.connect(failing_async_handler) signal.connect(async_handler) signal.connect(sync_handler) result = signal.send_robust(self.__class__) # The ordering here is different than the order that signals were # connected in. self.assertEqual( result, [ (sync_handler, 1), (failing_async_handler, receiver_exception), (async_handler, 1), ], ) async def test_asend_robust(self): class ReceiverException(Exception): pass receiver_exception = ReceiverException() async def failing_async_handler(**kwargs): raise receiver_exception sync_handler = SyncHandler() async_handler = AsyncHandler() signal = dispatch.Signal() signal.connect(failing_async_handler) signal.connect(async_handler) signal.connect(sync_handler) result = await signal.asend_robust(self.__class__) # The ordering here is different than the order that signals were # connected in. self.assertEqual( result, [ (sync_handler, 1), (failing_async_handler, receiver_exception), (async_handler, 1), ], ) async def test_asend_only_async_receivers(self): async_handler = AsyncHandler() signal = dispatch.Signal() signal.connect(async_handler) result = await signal.asend(self.__class__) self.assertEqual(result, [(async_handler, 1)]) async def test_asend_robust_only_async_receivers(self): async_handler = AsyncHandler() signal = dispatch.Signal() signal.connect(async_handler) result = await signal.asend_robust(self.__class__) self.assertEqual(result, [(async_handler, 1)]) class TestReceiversContextVarsSharing(SimpleTestCase): def setUp(self): self.ctx_var = contextvars.ContextVar("test_var", default=0) class CtxSyncHandler: def __init__(self, ctx_var): self.ctx_var = ctx_var self.values = [] def __call__(self, **kwargs): val = self.ctx_var.get() self.ctx_var.set(val + 1) self.values.append(self.ctx_var.get()) return self.ctx_var.get() class CtxAsyncHandler: def __init__(self, ctx_var): self.ctx_var = ctx_var self.values = [] markcoroutinefunction(self) async def __call__(self, **kwargs): val = self.ctx_var.get() self.ctx_var.set(val + 1) self.values.append(self.ctx_var.get()) return self.ctx_var.get() self.CtxSyncHandler = CtxSyncHandler self.CtxAsyncHandler = CtxAsyncHandler async def test_asend_correct_contextvars_sharing_async_receivers(self): handler1 = self.CtxAsyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) await signal.asend(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) async def test_asend_correct_contextvars_sharing_sync_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxSyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) await signal.asend(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) async def test_asend_correct_contextvars_sharing_mix_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) await signal.asend(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) async def test_asend_robust_correct_contextvars_sharing_async_receivers(self): handler1 = self.CtxAsyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) await signal.asend_robust(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) async def test_asend_robust_correct_contextvars_sharing_sync_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxSyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) await signal.asend_robust(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) async def test_asend_robust_correct_contextvars_sharing_mix_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) await signal.asend_robust(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) def test_send_correct_contextvars_sharing_async_receivers(self): handler1 = self.CtxAsyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) signal.send(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) def test_send_correct_contextvars_sharing_sync_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxSyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) signal.send(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) def test_send_correct_contextvars_sharing_mix_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) signal.send(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) def test_send_robust_correct_contextvars_sharing_async_receivers(self): handler1 = self.CtxAsyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) signal.send_robust(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) def test_send_robust_correct_contextvars_sharing_sync_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxSyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) signal.send_robust(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3) def test_send_robust_correct_contextvars_sharing_mix_receivers(self): handler1 = self.CtxSyncHandler(self.ctx_var) handler2 = self.CtxAsyncHandler(self.ctx_var) signal = dispatch.Signal() signal.connect(handler1) signal.connect(handler2) # set custom value outer signal self.ctx_var.set(1) signal.send_robust(self.__class__) self.assertEqual(len(handler1.values), 1) self.assertEqual(len(handler2.values), 1) self.assertEqual(sorted([*handler1.values, *handler2.values]), [2, 3]) self.assertEqual(self.ctx_var.get(), 3)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/filtered_relation/models.py
tests/filtered_relation/models.py
from django.contrib.contenttypes.fields import GenericForeignKey, GenericRelation from django.contrib.contenttypes.models import ContentType from django.db import models class Author(models.Model): name = models.CharField(max_length=50, unique=True) favorite_books = models.ManyToManyField( "Book", related_name="preferred_by_authors", related_query_name="preferred_by_authors", ) content_type = models.ForeignKey(ContentType, models.CASCADE, null=True) object_id = models.PositiveIntegerField(null=True) content_object = GenericForeignKey() class Editor(models.Model): name = models.CharField(max_length=255) class Book(models.Model): AVAILABLE = "available" RESERVED = "reserved" RENTED = "rented" STATES = ( (AVAILABLE, "Available"), (RESERVED, "reserved"), (RENTED, "Rented"), ) title = models.CharField(max_length=255) author = models.ForeignKey( Author, models.CASCADE, related_name="books", related_query_name="book", ) editor = models.ForeignKey(Editor, models.CASCADE) number_editor = models.IntegerField(default=-1) editor_number = models.IntegerField(default=-2) generic_author = GenericRelation(Author) state = models.CharField(max_length=9, choices=STATES, default=AVAILABLE) class Borrower(models.Model): name = models.CharField(max_length=50, unique=True) class Reservation(models.Model): NEW = "new" STOPPED = "stopped" STATES = ( (NEW, "New"), (STOPPED, "Stopped"), ) borrower = models.ForeignKey( Borrower, models.CASCADE, related_name="reservations", related_query_name="reservation", ) book = models.ForeignKey( Book, models.CASCADE, related_name="reservations", related_query_name="reservation", ) state = models.CharField(max_length=7, choices=STATES, default=NEW) class RentalSession(models.Model): NEW = "new" STOPPED = "stopped" STATES = ( (NEW, "New"), (STOPPED, "Stopped"), ) borrower = models.ForeignKey( Borrower, models.CASCADE, related_name="rental_sessions", related_query_name="rental_session", ) book = models.ForeignKey( Book, models.CASCADE, related_name="rental_sessions", related_query_name="rental_session", ) state = models.CharField(max_length=7, choices=STATES, default=NEW) class Seller(models.Model): name = models.CharField(max_length=255) class Currency(models.Model): currency = models.CharField(max_length=3) class ExchangeRate(models.Model): rate_date = models.DateField() from_currency = models.ForeignKey( Currency, models.CASCADE, related_name="rates_from", ) to_currency = models.ForeignKey( Currency, models.CASCADE, related_name="rates_to", ) rate = models.DecimalField(max_digits=6, decimal_places=4) class BookDailySales(models.Model): book = models.ForeignKey(Book, models.CASCADE, related_name="daily_sales") sale_date = models.DateField() currency = models.ForeignKey(Currency, models.CASCADE) seller = models.ForeignKey(Seller, models.CASCADE) sales = models.DecimalField(max_digits=10, decimal_places=2)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/filtered_relation/__init__.py
tests/filtered_relation/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/filtered_relation/tests.py
tests/filtered_relation/tests.py
from datetime import date from decimal import Decimal from unittest import mock from django.db import connection, transaction from django.db.models import ( BooleanField, Case, Count, DecimalField, ExpressionWrapper, F, FilteredRelation, Q, Sum, Value, When, ) from django.db.models.functions import Concat from django.db.models.lookups import Exact, IStartsWith from django.test import TestCase from django.test.testcases import skipUnlessDBFeature from .models import ( Author, Book, BookDailySales, Borrower, Currency, Editor, ExchangeRate, RentalSession, Reservation, Seller, ) class FilteredRelationTests(TestCase): @classmethod def setUpTestData(cls): cls.author1 = Author.objects.create(name="Alice") cls.author2 = Author.objects.create(name="Jane") cls.editor_a = Editor.objects.create(name="a") cls.editor_b = Editor.objects.create(name="b") cls.book1 = Book.objects.create( title="Poem by Alice", editor=cls.editor_a, author=cls.author1, ) cls.book1.generic_author.set([cls.author2]) cls.book2 = Book.objects.create( title="The book by Jane A", editor=cls.editor_b, author=cls.author2, ) cls.book3 = Book.objects.create( title="The book by Jane B", editor=cls.editor_b, author=cls.author2, ) cls.book4 = Book.objects.create( title="The book by Alice", editor=cls.editor_a, author=cls.author1, ) cls.author1.favorite_books.add(cls.book2) cls.author1.favorite_books.add(cls.book3) def test_select_related(self): qs = ( Author.objects.annotate( book_join=FilteredRelation("book"), ) .select_related("book_join__editor") .order_by("pk", "book_join__pk") ) with self.assertNumQueries(1): self.assertQuerySetEqual( qs, [ (self.author1, self.book1, self.editor_a, self.author1), (self.author1, self.book4, self.editor_a, self.author1), (self.author2, self.book2, self.editor_b, self.author2), (self.author2, self.book3, self.editor_b, self.author2), ], lambda x: (x, x.book_join, x.book_join.editor, x.book_join.author), ) def test_select_related_multiple(self): qs = ( Book.objects.annotate( author_join=FilteredRelation("author"), editor_join=FilteredRelation("editor"), ) .select_related("author_join", "editor_join") .order_by("pk") ) self.assertQuerySetEqual( qs, [ (self.book1, self.author1, self.editor_a), (self.book2, self.author2, self.editor_b), (self.book3, self.author2, self.editor_b), (self.book4, self.author1, self.editor_a), ], lambda x: (x, x.author_join, x.editor_join), ) def test_select_related_with_empty_relation(self): qs = ( Author.objects.annotate( book_join=FilteredRelation("book", condition=Q(pk=-1)), ) .select_related("book_join") .order_by("pk") ) self.assertSequenceEqual(qs, [self.author1, self.author2]) def test_select_related_foreign_key(self): qs = ( Book.objects.annotate( author_join=FilteredRelation("author"), ) .select_related("author_join") .order_by("pk") ) with self.assertNumQueries(1): self.assertQuerySetEqual( qs, [ (self.book1, self.author1), (self.book2, self.author2), (self.book3, self.author2), (self.book4, self.author1), ], lambda x: (x, x.author_join), ) @skipUnlessDBFeature("has_select_for_update", "has_select_for_update_of") def test_select_related_foreign_key_for_update_of(self): with transaction.atomic(): qs = ( Book.objects.annotate( author_join=FilteredRelation("author"), ) .select_related("author_join") .select_for_update(of=("self",)) .order_by("pk") ) with self.assertNumQueries(1): self.assertQuerySetEqual( qs, [ (self.book1, self.author1), (self.book2, self.author2), (self.book3, self.author2), (self.book4, self.author1), ], lambda x: (x, x.author_join), ) def test_without_join(self): self.assertCountEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ), [self.author1, self.author2], ) def test_with_join(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False), [self.author1], ) def test_with_exclude(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).exclude(book_alice__isnull=False), [self.author2], ) def test_with_join_and_complex_condition(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q( Q(book__title__iexact="poem by alice") | Q(book__state=Book.RENTED) ), ), ).filter(book_alice__isnull=False), [self.author1], ) def test_internal_queryset_alias_mapping(self): queryset = Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False) self.assertIn( "INNER JOIN {} book_alice ON".format( connection.ops.quote_name("filtered_relation_book") ), str(queryset.query), ) def test_multiple(self): qs = ( Author.objects.annotate( book_title_alice=FilteredRelation( "book", condition=Q(book__title__contains="Alice") ), book_title_jane=FilteredRelation( "book", condition=Q(book__title__icontains="Jane") ), ) .filter(name="Jane") .values("book_title_alice__title", "book_title_jane__title") ) empty = "" if connection.features.interprets_empty_strings_as_nulls else None self.assertCountEqual( qs, [ { "book_title_alice__title": empty, "book_title_jane__title": "The book by Jane A", }, { "book_title_alice__title": empty, "book_title_jane__title": "The book by Jane B", }, ], ) def test_with_multiple_filter(self): self.assertSequenceEqual( Author.objects.annotate( book_editor_a=FilteredRelation( "book", condition=Q( book__title__icontains="book", book__editor_id=self.editor_a.pk ), ), ).filter(book_editor_a__isnull=False), [self.author1], ) def test_multiple_times(self): self.assertSequenceEqual( Author.objects.annotate( book_title_alice=FilteredRelation( "book", condition=Q(book__title__icontains="alice") ), ) .filter(book_title_alice__isnull=False) .filter(book_title_alice__isnull=False) .distinct(), [self.author1], ) def test_exclude_relation_with_join(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=~Q(book__title__icontains="alice") ), ) .filter(book_alice__isnull=False) .distinct(), [self.author2], ) def test_with_m2m(self): qs = Author.objects.annotate( favorite_books_written_by_jane=FilteredRelation( "favorite_books", condition=Q(favorite_books__in=[self.book2]), ), ).filter(favorite_books_written_by_jane__isnull=False) self.assertSequenceEqual(qs, [self.author1]) def test_with_m2m_deep(self): qs = Author.objects.annotate( favorite_books_written_by_jane=FilteredRelation( "favorite_books", condition=Q(favorite_books__author=self.author2), ), ).filter(favorite_books_written_by_jane__title="The book by Jane B") self.assertSequenceEqual(qs, [self.author1]) def test_with_m2m_multijoin(self): qs = ( Author.objects.annotate( favorite_books_written_by_jane=FilteredRelation( "favorite_books", condition=Q(favorite_books__author=self.author2), ) ) .filter(favorite_books_written_by_jane__editor__name="b") .distinct() ) self.assertSequenceEqual(qs, [self.author1]) def test_values_list(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ) .filter(book_alice__isnull=False) .values_list("book_alice__title", flat=True), ["Poem by Alice"], ) def test_values(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ) .filter(book_alice__isnull=False) .values(), [ { "id": self.author1.pk, "name": "Alice", "content_type_id": None, "object_id": None, } ], ) def test_extra(self): self.assertSequenceEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ) .filter(book_alice__isnull=False) .extra(where=["1 = 1"]), [self.author1], ) @skipUnlessDBFeature("supports_select_union") def test_union(self): qs1 = Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False) qs2 = Author.objects.annotate( book_jane=FilteredRelation( "book", condition=Q(book__title__iexact="the book by jane a") ), ).filter(book_jane__isnull=False) self.assertSequenceEqual(qs1.union(qs2), [self.author1, self.author2]) @skipUnlessDBFeature("supports_select_intersection") def test_intersection(self): qs1 = Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False) qs2 = Author.objects.annotate( book_jane=FilteredRelation( "book", condition=Q(book__title__iexact="the book by jane a") ), ).filter(book_jane__isnull=False) self.assertSequenceEqual(qs1.intersection(qs2), []) @skipUnlessDBFeature("supports_select_difference") def test_difference(self): qs1 = Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False) qs2 = Author.objects.annotate( book_jane=FilteredRelation( "book", condition=Q(book__title__iexact="the book by jane a") ), ).filter(book_jane__isnull=False) self.assertSequenceEqual(qs1.difference(qs2), [self.author1]) def test_select_for_update(self): self.assertSequenceEqual( Author.objects.annotate( book_jane=FilteredRelation( "book", condition=Q(book__title__iexact="the book by jane a") ), ) .filter(book_jane__isnull=False) .select_for_update(), [self.author2], ) def test_defer(self): # One query for the list and one query for the deferred title. with self.assertNumQueries(2): self.assertQuerySetEqual( Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ) .filter(book_alice__isnull=False) .select_related("book_alice") .defer("book_alice__title"), ["Poem by Alice"], lambda author: author.book_alice.title, ) def test_only_not_supported(self): msg = "only() is not supported with FilteredRelation." with self.assertRaisesMessage(ValueError, msg): Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False).select_related("book_alice").only( "book_alice__state" ) def test_as_subquery(self): inner_qs = Author.objects.annotate( book_alice=FilteredRelation( "book", condition=Q(book__title__iexact="poem by alice") ), ).filter(book_alice__isnull=False) qs = Author.objects.filter(id__in=inner_qs) self.assertSequenceEqual(qs, [self.author1]) def test_nested_foreign_key(self): qs = ( Author.objects.annotate( book_editor_worked_with=FilteredRelation( "book__editor", condition=Q(book__title__icontains="book by"), ), ) .filter( book_editor_worked_with__isnull=False, ) .select_related( "book_editor_worked_with", ) .order_by("pk", "book_editor_worked_with__pk") ) with self.assertNumQueries(1): self.assertQuerySetEqual( qs, [ (self.author1, self.editor_a), (self.author2, self.editor_b), (self.author2, self.editor_b), ], lambda x: (x, x.book_editor_worked_with), ) def test_nested_foreign_key_nested_field(self): qs = ( Author.objects.annotate( book_editor_worked_with=FilteredRelation( "book__editor", condition=Q(book__title__icontains="book by") ), ) .filter( book_editor_worked_with__isnull=False, ) .values( "name", "book_editor_worked_with__name", ) .order_by("name", "book_editor_worked_with__name") .distinct() ) self.assertSequenceEqual( qs, [ { "name": self.author1.name, "book_editor_worked_with__name": self.editor_a.name, }, { "name": self.author2.name, "book_editor_worked_with__name": self.editor_b.name, }, ], ) def test_nested_foreign_key_filtered_base_object(self): qs = ( Author.objects.annotate( alice_editors=FilteredRelation( "book__editor", condition=Q(name="Alice"), ), ) .values( "name", "alice_editors__pk", ) .order_by("name", "alice_editors__name") .distinct() ) self.assertSequenceEqual( qs, [ {"name": self.author1.name, "alice_editors__pk": self.editor_a.pk}, {"name": self.author2.name, "alice_editors__pk": None}, ], ) def test_nested_m2m_filtered(self): qs = ( Book.objects.annotate( favorite_book=FilteredRelation( "author__favorite_books", condition=Q(author__favorite_books__title__icontains="book by"), ), ) .values( "title", "favorite_book__pk", ) .order_by("title", "favorite_book__title") ) self.assertSequenceEqual( qs, [ {"title": self.book1.title, "favorite_book__pk": self.book2.pk}, {"title": self.book1.title, "favorite_book__pk": self.book3.pk}, {"title": self.book4.title, "favorite_book__pk": self.book2.pk}, {"title": self.book4.title, "favorite_book__pk": self.book3.pk}, {"title": self.book2.title, "favorite_book__pk": None}, {"title": self.book3.title, "favorite_book__pk": None}, ], ) def test_nested_chained_relations(self): qs = ( Author.objects.annotate( my_books=FilteredRelation( "book", condition=Q(book__title__icontains="book by"), ), preferred_by_authors=FilteredRelation( "my_books__preferred_by_authors", condition=Q(my_books__preferred_by_authors__name="Alice"), ), ) .annotate( author=F("name"), book_title=F("my_books__title"), preferred_by_author_pk=F("preferred_by_authors"), ) .order_by("author", "book_title", "preferred_by_author_pk") ) self.assertQuerySetEqual( qs, [ ("Alice", "The book by Alice", None), ("Jane", "The book by Jane A", self.author1.pk), ("Jane", "The book by Jane B", self.author1.pk), ], lambda x: (x.author, x.book_title, x.preferred_by_author_pk), ) def test_three_level_nested_chained_relations(self): borrower = Borrower.objects.create(name="Jenny") Reservation.objects.create( borrower=borrower, book=self.book1, state=Reservation.STOPPED, ) qs = Author.objects.annotate( my_books=FilteredRelation("book"), my_reserved_books=FilteredRelation( "my_books__reservation", condition=Q(my_books__reservation__state=Reservation.STOPPED), ), my_readers=FilteredRelation( "my_reserved_books__borrower", condition=Q(my_reserved_books__borrower=borrower), ), ) self.assertSequenceEqual( qs.filter(my_readers=borrower).values_list("name", flat=True), ["Alice"] ) def test_reuse_same_filtered_relation(self): borrower = Borrower.objects.create(name="Jenny") Reservation.objects.create( borrower=borrower, book=self.book1, state=Reservation.STOPPED, ) condition = Q(book__reservation__state=Reservation.STOPPED) my_reserved_books = FilteredRelation("book__reservation", condition=condition) first_query = list( Author.objects.annotate( my_reserved_books=my_reserved_books, ) ) self.assertEqual(my_reserved_books.condition, condition) second_query = list( Author.objects.annotate( my_reserved_books=my_reserved_books, ) ) self.assertEqual(first_query, second_query) def test_deep_nested_foreign_key(self): qs = ( Book.objects.annotate( author_favorite_book_editor=FilteredRelation( "author__favorite_books__editor", condition=Q(author__favorite_books__title__icontains="Jane A"), ), ) .filter( author_favorite_book_editor__isnull=False, ) .select_related( "author_favorite_book_editor", ) .order_by("pk", "author_favorite_book_editor__pk") ) with self.assertNumQueries(1): self.assertQuerySetEqual( qs, [ (self.book1, self.editor_b), (self.book4, self.editor_b), ], lambda x: (x, x.author_favorite_book_editor), ) def test_relation_name_lookup(self): msg = ( "FilteredRelation's relation_name cannot contain lookups (got " "'book__title__icontains')." ) with self.assertRaisesMessage(ValueError, msg): Author.objects.annotate( book_title=FilteredRelation( "book__title__icontains", condition=Q(book__title="Poem by Alice"), ), ) def test_condition_outside_relation_name(self): msg = ( "FilteredRelation's condition doesn't support relations outside " "the 'book__editor' (got 'book__author__name__icontains')." ) with self.assertRaisesMessage(ValueError, msg): Author.objects.annotate( book_editor=FilteredRelation( "book__editor", condition=Q(book__author__name__icontains="book"), ), ) def test_condition_with_exact_lookup_outside_relation_name(self): qs = Author.objects.annotate( book_editor=FilteredRelation( "book__editor", condition=Q(book__author__name="book"), ), ).filter(book_editor__isnull=True) self.assertEqual(qs.count(), 4) def test_condition_with_func_and_lookup_outside_relation_name(self): qs = Author.objects.annotate( book_editor=FilteredRelation( "book__editor", condition=Q( book__title=Concat(Value("The book by "), F("book__author__name")) ), ), ).filter(book_editor__isnull=False) self.assertEqual(qs.count(), 1) def test_condition_deeper_relation_name(self): msg = ( "FilteredRelation's condition doesn't support nested relations " "deeper than the relation_name (got " "'book__editor__name__icontains' for 'book')." ) with self.assertRaisesMessage(ValueError, msg): Author.objects.annotate( book_editor=FilteredRelation( "book", condition=Q(book__editor__name__icontains="b"), ), ) def test_condition_deeper_relation_name_implicit_exact(self): msg = ( "FilteredRelation's condition doesn't support nested relations " "deeper than the relation_name (got 'book__editor__name' for 'book')." ) with self.assertRaisesMessage(ValueError, msg): Author.objects.annotate( book_editor=FilteredRelation( "book", condition=Q(book__editor__name="b"), ), ) def test_with_empty_relation_name_error(self): with self.assertRaisesMessage(ValueError, "relation_name cannot be empty."): FilteredRelation("", condition=Q(blank="")) def test_with_condition_as_expression_error(self): msg = "condition argument must be a Q() instance." expression = Case( When(book__title__iexact="poem by alice", then=True), default=False, ) with self.assertRaisesMessage(ValueError, msg): FilteredRelation("book", condition=expression) def test_with_prefetch_related(self): msg = "prefetch_related() is not supported with FilteredRelation." qs = Author.objects.annotate( book_title_contains_b=FilteredRelation( "book", condition=Q(book__title__icontains="b") ), ).filter( book_title_contains_b__isnull=False, ) with self.assertRaisesMessage(ValueError, msg): qs.prefetch_related("book_title_contains_b") with self.assertRaisesMessage(ValueError, msg): qs.prefetch_related("book_title_contains_b__editor") def test_with_generic_foreign_key(self): self.assertSequenceEqual( Book.objects.annotate( generic_authored_book=FilteredRelation( "generic_author", condition=Q(generic_author__isnull=False) ), ).filter(generic_authored_book__isnull=False), [self.book1], ) def test_eq(self): self.assertEqual( FilteredRelation("book", condition=Q(book__title="b")), mock.ANY ) def test_conditional_expression(self): qs = Author.objects.annotate( the_book=FilteredRelation("book", condition=Q(Value(False))), ).filter(the_book__isnull=False) self.assertSequenceEqual(qs, []) def test_expression_outside_relation_name(self): qs = Author.objects.annotate( book_editor=FilteredRelation( "book__editor", condition=Q( Exact(F("book__author__name"), "Alice"), Value(True), book__title__startswith="Poem", ), ), ).filter(book_editor__isnull=False) self.assertSequenceEqual(qs, [self.author1]) def test_conditional_expression_with_case(self): qs = Book.objects.annotate( alice_author=FilteredRelation( "author", condition=Q( Case(When(author__name="Alice", then=True), default=False), ), ), ).filter(alice_author__isnull=False) self.assertCountEqual(qs, [self.book1, self.book4]) def test_conditional_expression_outside_relation_name(self): tests = [ Q(Case(When(book__author__name="Alice", then=True), default=False)), Q( ExpressionWrapper( Q(Value(True), Exact(F("book__author__name"), "Alice")), output_field=BooleanField(), ), ), ] for condition in tests: with self.subTest(condition=condition): qs = Author.objects.annotate( book_editor=FilteredRelation("book__editor", condition=condition), ).filter(book_editor__isnull=True) self.assertSequenceEqual(qs, [self.author2, self.author2]) def test_conditional_expression_with_lookup(self): lookups = [ Q(book__title__istartswith="poem"), Q(IStartsWith(F("book__title"), "poem")), ] for condition in lookups: with self.subTest(condition=condition): qs = Author.objects.annotate( poem_book=FilteredRelation("book", condition=condition) ).filter(poem_book__isnull=False) self.assertSequenceEqual(qs, [self.author1]) def test_conditional_expression_with_expressionwrapper(self): qs = Author.objects.annotate( poem_book=FilteredRelation( "book", condition=Q( ExpressionWrapper( Q(Exact(F("book__title"), "Poem by Alice")), output_field=BooleanField(), ), ), ), ).filter(poem_book__isnull=False) self.assertSequenceEqual(qs, [self.author1]) def test_conditional_expression_with_multiple_fields(self): qs = Author.objects.annotate( my_books=FilteredRelation( "book__author", condition=Q(Exact(F("book__author__name"), F("book__author__name"))), ), ).filter(my_books__isnull=True) self.assertSequenceEqual(qs, []) def test_conditional_expression_rhs_contains_relation_name(self): qs = Book.objects.annotate( rel=FilteredRelation( "editor", condition=Q(id=1 * F("number_editor")), ) ).filter(rel__isnull=True) self.assertSequenceEqual(qs, []) def test_conditional_expression_rhs_startswith_relation_name(self): qs = Book.objects.annotate( rel=FilteredRelation( "editor", condition=Q(id=1 * F("editor_number")), ) ).filter(rel__isnull=True) self.assertSequenceEqual(qs, []) def test_conditional_expression_lhs_startswith_relation_name(self): qs = Book.objects.annotate( rel=FilteredRelation( "editor", condition=Q(editor_number__gt=1), ) ).filter(rel__isnull=True) self.assertSequenceEqual(qs, []) def test_conditional_expression_lhs_contains_relation_name(self): qs = Book.objects.annotate( rel=FilteredRelation( "editor", condition=Q(number_editor__gt=1), ) ).filter(rel__isnull=True) self.assertSequenceEqual(qs, []) def test_conditional_expression_does_not_support_queryset(self): msg = "Passing a QuerySet within a FilteredRelation is not supported." with self.assertRaisesMessage(ValueError, msg): Author.objects.annotate( poem_book=FilteredRelation( "book", condition=Q(book__in=Book.objects.filter(title__istartswith="a")), ), ).filter(poem_book__isnull=False) class FilteredRelationAggregationTests(TestCase): @classmethod def setUpTestData(cls): cls.author1 = Author.objects.create(name="Alice") cls.editor_a = Editor.objects.create(name="a") cls.book1 = Book.objects.create( title="Poem by Alice", editor=cls.editor_a, author=cls.author1, ) cls.borrower1 = Borrower.objects.create(name="Jenny") cls.borrower2 = Borrower.objects.create(name="Kevin") # borrower 1 reserves, rents, and returns book1. Reservation.objects.create( borrower=cls.borrower1, book=cls.book1, state=Reservation.STOPPED, ) RentalSession.objects.create( borrower=cls.borrower1, book=cls.book1,
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
true
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_through_regress/models.py
tests/m2m_through_regress/models.py
from django.contrib.auth.models import User from django.db import models # Forward declared intermediate model class Membership(models.Model): person = models.ForeignKey("Person", models.CASCADE) group = models.ForeignKey("Group", models.CASCADE) price = models.IntegerField(default=100) # using custom id column to test ticket #11107 class UserMembership(models.Model): id = models.AutoField(db_column="usermembership_id", primary_key=True) user = models.ForeignKey(User, models.CASCADE) group = models.ForeignKey("Group", models.CASCADE) price = models.IntegerField(default=100) class Person(models.Model): name = models.CharField(max_length=128) def __str__(self): return self.name class Group(models.Model): name = models.CharField(max_length=128) # Membership object defined as a class members = models.ManyToManyField(Person, through=Membership) user_members = models.ManyToManyField(User, through="UserMembership") def __str__(self): return self.name # Using to_field on the through model class Car(models.Model): make = models.CharField(max_length=20, unique=True, null=True) drivers = models.ManyToManyField("Driver", through="CarDriver") def __str__(self): return str(self.make) class Driver(models.Model): name = models.CharField(max_length=20, unique=True, null=True) class Meta: ordering = ("name",) def __str__(self): return str(self.name) class CarDriver(models.Model): car = models.ForeignKey("Car", models.CASCADE, to_field="make") driver = models.ForeignKey("Driver", models.CASCADE, to_field="name") def __str__(self): return "pk=%s car=%s driver=%s" % (str(self.pk), self.car, self.driver) # Through models using multi-table inheritance class Event(models.Model): name = models.CharField(max_length=50, unique=True) people = models.ManyToManyField("Person", through="IndividualCompetitor") special_people = models.ManyToManyField( "Person", through="ProxiedIndividualCompetitor", related_name="special_event_set", ) teams = models.ManyToManyField("Group", through="CompetingTeam") class Competitor(models.Model): event = models.ForeignKey(Event, models.CASCADE) class IndividualCompetitor(Competitor): person = models.ForeignKey(Person, models.CASCADE) class CompetingTeam(Competitor): team = models.ForeignKey(Group, models.CASCADE) class ProxiedIndividualCompetitor(IndividualCompetitor): class Meta: proxy = True
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_through_regress/test_multitable.py
tests/m2m_through_regress/test_multitable.py
from django.test import TestCase from .models import ( CompetingTeam, Event, Group, IndividualCompetitor, Membership, Person, ) class MultiTableTests(TestCase): @classmethod def setUpTestData(cls): cls.alice = Person.objects.create(name="Alice") cls.bob = Person.objects.create(name="Bob") cls.chris = Person.objects.create(name="Chris") cls.dan = Person.objects.create(name="Dan") cls.team_alpha = Group.objects.create(name="Alpha") Membership.objects.create(person=cls.alice, group=cls.team_alpha) Membership.objects.create(person=cls.bob, group=cls.team_alpha) cls.event = Event.objects.create(name="Exposition Match") IndividualCompetitor.objects.create(event=cls.event, person=cls.chris) IndividualCompetitor.objects.create(event=cls.event, person=cls.dan) CompetingTeam.objects.create(event=cls.event, team=cls.team_alpha) def test_m2m_query(self): result = self.event.teams.all() self.assertCountEqual(result, [self.team_alpha]) def test_m2m_reverse_query(self): result = self.chris.event_set.all() self.assertCountEqual(result, [self.event]) def test_m2m_query_proxied(self): result = self.event.special_people.all() self.assertCountEqual(result, [self.chris, self.dan]) def test_m2m_reverse_query_proxied(self): result = self.chris.special_event_set.all() self.assertCountEqual(result, [self.event]) def test_m2m_prefetch_proxied(self): result = Event.objects.filter(name="Exposition Match").prefetch_related( "special_people" ) with self.assertNumQueries(2): self.assertCountEqual(result, [self.event]) self.assertEqual( sorted(p.name for p in result[0].special_people.all()), ["Chris", "Dan"] ) def test_m2m_prefetch_reverse_proxied(self): result = Person.objects.filter(name="Dan").prefetch_related("special_event_set") with self.assertNumQueries(2): self.assertCountEqual(result, [self.dan]) self.assertEqual( [event.name for event in result[0].special_event_set.all()], ["Exposition Match"], )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_through_regress/__init__.py
tests/m2m_through_regress/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_through_regress/tests.py
tests/m2m_through_regress/tests.py
from io import StringIO from django.contrib.auth.models import User from django.core import management from django.test import TestCase from .models import Car, CarDriver, Driver, Group, Membership, Person, UserMembership class M2MThroughTestCase(TestCase): @classmethod def setUpTestData(cls): cls.bob = Person.objects.create(name="Bob") cls.jim = Person.objects.create(name="Jim") cls.rock = Group.objects.create(name="Rock") cls.roll = Group.objects.create(name="Roll") cls.frank = User.objects.create_user("frank", "frank@example.com", "password") cls.jane = User.objects.create_user("jane", "jane@example.com", "password") # normal intermediate model cls.bob_rock = Membership.objects.create(person=cls.bob, group=cls.rock) cls.bob_roll = Membership.objects.create( person=cls.bob, group=cls.roll, price=50 ) cls.jim_rock = Membership.objects.create( person=cls.jim, group=cls.rock, price=50 ) # intermediate model with custom id column cls.frank_rock = UserMembership.objects.create(user=cls.frank, group=cls.rock) cls.frank_roll = UserMembership.objects.create(user=cls.frank, group=cls.roll) cls.jane_rock = UserMembership.objects.create(user=cls.jane, group=cls.rock) def test_retrieve_reverse_m2m_items(self): self.assertCountEqual(self.bob.group_set.all(), [self.rock, self.roll]) def test_retrieve_forward_m2m_items(self): self.assertSequenceEqual(self.roll.members.all(), [self.bob]) def test_retrieve_reverse_m2m_items_via_custom_id_intermediary(self): self.assertCountEqual(self.frank.group_set.all(), [self.rock, self.roll]) def test_retrieve_forward_m2m_items_via_custom_id_intermediary(self): self.assertSequenceEqual(self.roll.user_members.all(), [self.frank]) def test_join_trimming_forwards(self): """ Too many copies of the intermediate table aren't involved when doing a join (#8046, #8254). """ self.assertSequenceEqual( self.rock.members.filter(membership__price=50), [self.jim], ) def test_join_trimming_reverse(self): self.assertSequenceEqual( self.bob.group_set.filter(membership__price=50), [self.roll], ) class M2MThroughSerializationTestCase(TestCase): @classmethod def setUpTestData(cls): cls.bob = Person.objects.create(name="Bob") cls.roll = Group.objects.create(name="Roll") cls.bob_roll = Membership.objects.create(person=cls.bob, group=cls.roll) def test_serialization(self): "m2m-through models aren't serialized as m2m fields. Refs #8134" pks = { "p_pk": self.bob.pk, "g_pk": self.roll.pk, "m_pk": self.bob_roll.pk, "app_label": "m2m_through_regress", } out = StringIO() management.call_command( "dumpdata", "m2m_through_regress", format="json", stdout=out ) self.assertJSONEqual( out.getvalue().strip(), '[{"pk": %(m_pk)s, "model": "m2m_through_regress.membership", ' '"fields": {"person": %(p_pk)s, "price": 100, "group": %(g_pk)s}}, ' '{"pk": %(p_pk)s, "model": "m2m_through_regress.person", ' '"fields": {"name": "Bob"}}, ' '{"pk": %(g_pk)s, "model": "m2m_through_regress.group", ' '"fields": {"name": "Roll"}}]' % pks, ) out = StringIO() management.call_command( "dumpdata", "m2m_through_regress", format="xml", indent=2, stdout=out ) self.assertXMLEqual( out.getvalue().strip(), """ <?xml version="1.0" encoding="utf-8"?> <django-objects version="1.0"> <object pk="%(m_pk)s" model="%(app_label)s.membership"> <field to="%(app_label)s.person" name="person" rel="ManyToOneRel">%(p_pk)s</field> <field to="%(app_label)s.group" name="group" rel="ManyToOneRel">%(g_pk)s</field> <field type="IntegerField" name="price">100</field> </object> <object pk="%(p_pk)s" model="%(app_label)s.person"> <field type="CharField" name="name">Bob</field> </object> <object pk="%(g_pk)s" model="%(app_label)s.group"> <field type="CharField" name="name">Roll</field> </object> </django-objects> """.strip() % pks, ) class ToFieldThroughTests(TestCase): @classmethod def setUpTestData(cls): cls.car = Car.objects.create(make="Toyota") cls.driver = Driver.objects.create(name="Ryan Briscoe") CarDriver.objects.create(car=cls.car, driver=cls.driver) # We are testing if wrong objects get deleted due to using wrong # field value in m2m queries. So, it is essential that the pk # numberings do not match. # Create one intentionally unused driver to mix up the autonumbering cls.unused_driver = Driver.objects.create(name="Barney Gumble") # And two intentionally unused cars. cls.unused_car1 = Car.objects.create(make="Trabant") cls.unused_car2 = Car.objects.create(make="Wartburg") def test_to_field(self): self.assertSequenceEqual(self.car.drivers.all(), [self.driver]) def test_to_field_reverse(self): self.assertSequenceEqual(self.driver.car_set.all(), [self.car]) def test_to_field_clear_reverse(self): self.driver.car_set.clear() self.assertSequenceEqual(self.driver.car_set.all(), []) def test_to_field_clear(self): self.car.drivers.clear() self.assertSequenceEqual(self.car.drivers.all(), []) # Low level tests for _add_items and _remove_items. We test these methods # because .add/.remove aren't available for m2m fields with through, but # through is the only way to set to_field currently. We do want to make # sure these methods are ready if the ability to use .add or .remove with # to_field relations is added some day. def test_add(self): self.assertSequenceEqual(self.car.drivers.all(), [self.driver]) # Yikes - barney is going to drive... self.car.drivers._add_items("car", "driver", self.unused_driver) self.assertSequenceEqual( self.car.drivers.all(), [self.unused_driver, self.driver], ) def test_m2m_relations_unusable_on_null_to_field(self): nullcar = Car(make=None) msg = ( '"<Car: None>" needs to have a value for field "make" before this ' "many-to-many relationship can be used." ) with self.assertRaisesMessage(ValueError, msg): nullcar.drivers.all() def test_m2m_relations_unusable_on_null_pk_obj(self): msg = ( "'Car' instance needs to have a primary key value before a " "many-to-many relationship can be used." ) with self.assertRaisesMessage(ValueError, msg): Car(make="Ford").drivers.all() def test_add_related_null(self): nulldriver = Driver.objects.create(name=None) msg = 'Cannot add "<Driver: None>": the value for field "driver" is None' with self.assertRaisesMessage(ValueError, msg): self.car.drivers._add_items("car", "driver", nulldriver) def test_add_reverse(self): car2 = Car.objects.create(make="Honda") self.assertCountEqual(self.driver.car_set.all(), [self.car]) self.driver.car_set._add_items("driver", "car", car2) self.assertCountEqual(self.driver.car_set.all(), [self.car, car2]) def test_add_null_reverse(self): nullcar = Car.objects.create(make=None) msg = 'Cannot add "<Car: None>": the value for field "car" is None' with self.assertRaisesMessage(ValueError, msg): self.driver.car_set._add_items("driver", "car", nullcar) def test_add_null_reverse_related(self): nulldriver = Driver.objects.create(name=None) msg = ( '"<Driver: None>" needs to have a value for field "name" before ' "this many-to-many relationship can be used." ) with self.assertRaisesMessage(ValueError, msg): nulldriver.car_set._add_items("driver", "car", self.car) def test_remove(self): self.assertSequenceEqual(self.car.drivers.all(), [self.driver]) self.car.drivers._remove_items("car", "driver", self.driver) self.assertSequenceEqual(self.car.drivers.all(), []) def test_remove_reverse(self): self.assertSequenceEqual(self.driver.car_set.all(), [self.car]) self.driver.car_set._remove_items("driver", "car", self.car) self.assertSequenceEqual(self.driver.car_set.all(), []) class ThroughLoadDataTestCase(TestCase): fixtures = ["m2m_through"] def test_sequence_creation(self): """ Sequences on an m2m_through are created for the through model, not a phantom auto-generated m2m table (#11107). """ out = StringIO() management.call_command( "dumpdata", "m2m_through_regress", format="json", stdout=out ) self.assertJSONEqual( out.getvalue().strip(), '[{"pk": 1, "model": "m2m_through_regress.usermembership", ' '"fields": {"price": 100, "group": 1, "user": 1}}, ' '{"pk": 1, "model": "m2m_through_regress.person", ' '"fields": {"name": "Guido"}}, ' '{"pk": 1, "model": "m2m_through_regress.group", ' '"fields": {"name": "Python Core Group"}}]', )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_regress/models.py
tests/m2m_regress/models.py
from django.contrib.auth import models as auth from django.db import models # No related name is needed here, since symmetrical relations are not # explicitly reversible. class SelfRefer(models.Model): name = models.CharField(max_length=10) references = models.ManyToManyField("self") related = models.ManyToManyField("self") def __str__(self): return self.name class Tag(models.Model): name = models.CharField(max_length=10) def __str__(self): return self.name # Regression for #11956 -- a many to many to the base class class TagCollection(Tag): tags = models.ManyToManyField(Tag, related_name="tag_collections") def __str__(self): return self.name # A related_name is required on one of the ManyToManyField entries here because # they are both addressable as reverse relations from Tag. class Entry(models.Model): name = models.CharField(max_length=10) topics = models.ManyToManyField(Tag) related = models.ManyToManyField(Tag, related_name="similar") def __str__(self): return self.name # Two models both inheriting from a base model with a self-referential m2m # field class SelfReferChild(SelfRefer): pass class SelfReferChildSibling(SelfRefer): pass # Many-to-Many relation between models, where one of the PK's isn't an # Autofield class Line(models.Model): name = models.CharField(max_length=100) def __str__(self): return self.name class Worksheet(models.Model): id = models.CharField(primary_key=True, max_length=100) lines = models.ManyToManyField(Line, blank=True) # Regression for #11226 -- A model with the same name that another one to # which it has a m2m relation. This shouldn't cause a name clash between # the automatically created m2m intermediary table FK field names when # running migrate class User(models.Model): name = models.CharField(max_length=30) friends = models.ManyToManyField(auth.User) class BadModelWithSplit(models.Model): name = models.CharField(max_length=1) class Meta: abstract = True def split(self): raise RuntimeError("split should not be called") class RegressionModelSplit(BadModelWithSplit): """ Model with a split method should not cause an error in add_lazy_relation """ others = models.ManyToManyField("self") # Regression for #24505 -- Two ManyToManyFields with the same "to" model # and related_name set to '+'. class Post(models.Model): primary_lines = models.ManyToManyField(Line, related_name="+") secondary_lines = models.ManyToManyField(Line, related_name="+")
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_regress/__init__.py
tests/m2m_regress/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_regress/tests.py
tests/m2m_regress/tests.py
from django.core.exceptions import FieldError from django.test import TestCase from .models import ( Entry, Line, Post, RegressionModelSplit, SelfRefer, SelfReferChild, SelfReferChildSibling, Tag, TagCollection, Worksheet, ) class M2MRegressionTests(TestCase): def test_multiple_m2m(self): # Multiple m2m references to model must be distinguished when # accessing the relations through an instance attribute. s1 = SelfRefer.objects.create(name="s1") s2 = SelfRefer.objects.create(name="s2") s3 = SelfRefer.objects.create(name="s3") s1.references.add(s2) s1.related.add(s3) e1 = Entry.objects.create(name="e1") t1 = Tag.objects.create(name="t1") t2 = Tag.objects.create(name="t2") e1.topics.add(t1) e1.related.add(t2) self.assertSequenceEqual(s1.references.all(), [s2]) self.assertSequenceEqual(s1.related.all(), [s3]) self.assertSequenceEqual(e1.topics.all(), [t1]) self.assertSequenceEqual(e1.related.all(), [t2]) def test_internal_related_name_not_in_error_msg(self): # The secret internal related names for self-referential many-to-many # fields shouldn't appear in the list when an error is made. msg = ( "Choices are: id, name, references, related, selfreferchild, " "selfreferchildsibling" ) with self.assertRaisesMessage(FieldError, msg): SelfRefer.objects.filter(porcupine="fred") def test_m2m_inheritance_symmetry(self): # Test to ensure that the relationship between two inherited models # with a self-referential m2m field maintains symmetry sr_child = SelfReferChild(name="Hanna") sr_child.save() sr_sibling = SelfReferChildSibling(name="Beth") sr_sibling.save() sr_child.related.add(sr_sibling) self.assertSequenceEqual(sr_child.related.all(), [sr_sibling.selfrefer_ptr]) self.assertSequenceEqual(sr_sibling.related.all(), [sr_child.selfrefer_ptr]) def test_m2m_pk_field_type(self): # Regression for #11311 - The primary key for models in a m2m relation # doesn't have to be an AutoField w = Worksheet(id="abc") w.save() w.delete() def test_create_copy_with_m2m(self): t1 = Tag.objects.create(name="t1") Entry.objects.create(name="e1") entry = Entry.objects.first() entry.topics.set([t1]) old_topics = entry.topics.all() entry.pk = None entry._state.adding = True entry.save() entry.topics.set(old_topics) entry = Entry.objects.get(pk=entry.pk) self.assertCountEqual(entry.topics.all(), old_topics) self.assertSequenceEqual(entry.topics.all(), [t1]) def test_add_m2m_with_base_class(self): # Regression for #11956 -- You can add an object to a m2m with the # base class without causing integrity errors t1 = Tag.objects.create(name="t1") t2 = Tag.objects.create(name="t2") c1 = TagCollection.objects.create(name="c1") c1.tags.set([t1, t2]) c1 = TagCollection.objects.get(name="c1") self.assertCountEqual(c1.tags.all(), [t1, t2]) self.assertCountEqual(t1.tag_collections.all(), [c1]) def test_manager_class_caching(self): e1 = Entry.objects.create() e2 = Entry.objects.create() t1 = Tag.objects.create() t2 = Tag.objects.create() # Get same manager twice in a row: self.assertIs(t1.entry_set.__class__, t1.entry_set.__class__) self.assertIs(e1.topics.__class__, e1.topics.__class__) # Get same manager for different instances self.assertIs(e1.topics.__class__, e2.topics.__class__) self.assertIs(t1.entry_set.__class__, t2.entry_set.__class__) def test_m2m_abstract_split(self): # Regression for #19236 - an abstract class with a 'split' method # causes a TypeError in add_lazy_relation m1 = RegressionModelSplit(name="1") m1.save() def test_assigning_invalid_data_to_m2m_doesnt_clear_existing_relations(self): t1 = Tag.objects.create(name="t1") t2 = Tag.objects.create(name="t2") c1 = TagCollection.objects.create(name="c1") c1.tags.set([t1, t2]) with self.assertRaisesMessage(TypeError, "'int' object is not iterable"): c1.tags.set(7) c1.refresh_from_db() self.assertSequenceEqual(c1.tags.order_by("name"), [t1, t2]) def test_multiple_forwards_only_m2m(self): # Regression for #24505 - Multiple ManyToManyFields to same "to" # model with related_name set to '+'. foo = Line.objects.create(name="foo") bar = Line.objects.create(name="bar") post = Post.objects.create() post.primary_lines.add(foo) post.secondary_lines.add(bar) self.assertSequenceEqual(post.primary_lines.all(), [foo]) self.assertSequenceEqual(post.secondary_lines.all(), [bar])
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/handlers/test_exception.py
tests/handlers/test_exception.py
from django.core.handlers.wsgi import WSGIHandler from django.test import SimpleTestCase, override_settings from django.test.client import ( BOUNDARY, MULTIPART_CONTENT, FakePayload, encode_multipart, ) class ExceptionHandlerTests(SimpleTestCase): def get_suspicious_environ(self): payload = FakePayload("a=1&a=2&a=3\r\n") return { "REQUEST_METHOD": "POST", "CONTENT_TYPE": "application/x-www-form-urlencoded", "CONTENT_LENGTH": len(payload), "wsgi.input": payload, "SERVER_NAME": "test", "SERVER_PORT": "8000", } @override_settings(DATA_UPLOAD_MAX_MEMORY_SIZE=12) def test_data_upload_max_memory_size_exceeded(self): response = WSGIHandler()(self.get_suspicious_environ(), lambda *a, **k: None) self.assertEqual(response.status_code, 400) @override_settings(DATA_UPLOAD_MAX_NUMBER_FIELDS=2) def test_data_upload_max_number_fields_exceeded(self): response = WSGIHandler()(self.get_suspicious_environ(), lambda *a, **k: None) self.assertEqual(response.status_code, 400) @override_settings(DATA_UPLOAD_MAX_NUMBER_FILES=2) def test_data_upload_max_number_files_exceeded(self): payload = FakePayload( encode_multipart( BOUNDARY, { "a.txt": "Hello World!", "b.txt": "Hello Django!", "c.txt": "Hello Python!", }, ) ) environ = { "REQUEST_METHOD": "POST", "CONTENT_TYPE": MULTIPART_CONTENT, "CONTENT_LENGTH": len(payload), "wsgi.input": payload, "SERVER_NAME": "test", "SERVER_PORT": "8000", } response = WSGIHandler()(environ, lambda *a, **k: None) self.assertEqual(response.status_code, 400)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/handlers/views.py
tests/handlers/views.py
import asyncio from http import HTTPStatus from django.core.exceptions import BadRequest, SuspiciousOperation from django.db import connection, transaction from django.http import HttpResponse, StreamingHttpResponse from django.views.decorators.csrf import csrf_exempt def regular(request): return HttpResponse(b"regular content") def no_response(request): pass class NoResponse: def __call__(self, request): pass def streaming(request): return StreamingHttpResponse([b"streaming", b" ", b"content"]) def in_transaction(request): return HttpResponse(str(connection.in_atomic_block)) @transaction.non_atomic_requests def not_in_transaction(request): return HttpResponse(str(connection.in_atomic_block)) @transaction.non_atomic_requests(using=None) def not_in_transaction_using_none(request): return HttpResponse(str(connection.in_atomic_block)) @transaction.non_atomic_requests(using="incorrect") def not_in_transaction_using_text(request): return HttpResponse(str(connection.in_atomic_block)) def bad_request(request): raise BadRequest() def suspicious(request): raise SuspiciousOperation("dubious") @csrf_exempt def malformed_post(request): request.POST return HttpResponse() def httpstatus_enum(request): return HttpResponse(status=HTTPStatus.OK) async def async_regular(request): return HttpResponse(b"regular content") async def async_streaming(request): async def async_streaming_generator(): yield b"streaming" yield b" " yield b"content" return StreamingHttpResponse(async_streaming_generator()) class CoroutineClearingView: def __call__(self, request): """Return an unawaited coroutine (common error for async views).""" # Store coroutine to suppress 'unawaited' warning message self._unawaited_coroutine = asyncio.sleep(0) return self._unawaited_coroutine def __del__(self): try: self._unawaited_coroutine.close() except AttributeError: # View was never called. pass async_unawaited = CoroutineClearingView()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/handlers/tests_custom_error_handlers.py
tests/handlers/tests_custom_error_handlers.py
from django.core.exceptions import PermissionDenied from django.template.response import TemplateResponse from django.test import SimpleTestCase, modify_settings, override_settings from django.urls import path class MiddlewareAccessingContent: def __init__(self, get_response): self.get_response = get_response def __call__(self, request): response = self.get_response(request) # Response.content should be available in the middleware even with a # TemplateResponse-based exception response. assert response.content return response def template_response_error_handler(request, exception=None): return TemplateResponse(request, "test_handler.html", status=403) def permission_denied_view(request): raise PermissionDenied urlpatterns = [ path("", permission_denied_view), ] handler403 = template_response_error_handler @override_settings(ROOT_URLCONF="handlers.tests_custom_error_handlers") @modify_settings( MIDDLEWARE={ "append": "handlers.tests_custom_error_handlers.MiddlewareAccessingContent" } ) class CustomErrorHandlerTests(SimpleTestCase): def test_handler_renders_template_response(self): """ BaseHandler should render TemplateResponse if necessary. """ response = self.client.get("/") self.assertContains(response, "Error handler content", status_code=403)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/handlers/__init__.py
tests/handlers/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/handlers/tests.py
tests/handlers/tests.py
from django.core.exceptions import ImproperlyConfigured from django.core.handlers.wsgi import WSGIHandler, WSGIRequest, get_script_name from django.core.signals import request_finished, request_started from django.db import close_old_connections, connection from django.test import ( AsyncRequestFactory, RequestFactory, SimpleTestCase, TransactionTestCase, override_settings, ) class HandlerTests(SimpleTestCase): request_factory = RequestFactory() def setUp(self): request_started.disconnect(close_old_connections) self.addCleanup(request_started.connect, close_old_connections) def test_middleware_initialized(self): handler = WSGIHandler() self.assertIsNotNone(handler._middleware_chain) def test_bad_path_info(self): """ A non-UTF-8 path populates PATH_INFO with an URL-encoded path and produces a 404. """ environ = self.request_factory.get("/").environ environ["PATH_INFO"] = "\xed" handler = WSGIHandler() response = handler(environ, lambda *a, **k: None) # The path of the request will be encoded to '/%ED'. self.assertEqual(response.status_code, 404) def test_non_ascii_query_string(self): """ Non-ASCII query strings are properly decoded (#20530, #22996). """ environ = self.request_factory.get("/").environ raw_query_strings = [ b"want=caf%C3%A9", # This is the proper way to encode 'café' b"want=caf\xc3\xa9", # UA forgot to quote bytes b"want=caf%E9", # UA quoted, but not in UTF-8 # UA forgot to convert Latin-1 to UTF-8 and to quote (typical of # MSIE). b"want=caf\xe9", ] got = [] for raw_query_string in raw_query_strings: # Simulate http.server.BaseHTTPRequestHandler.parse_request # handling of raw request. environ["QUERY_STRING"] = str(raw_query_string, "iso-8859-1") request = WSGIRequest(environ) got.append(request.GET["want"]) # %E9 is converted to the Unicode replacement character by parse_qsl self.assertEqual(got, ["café", "café", "caf\ufffd", "café"]) def test_non_ascii_cookie(self): """ Non-ASCII cookies set in JavaScript are properly decoded (#20557). """ environ = self.request_factory.get("/").environ raw_cookie = 'want="café"'.encode("utf-8").decode("iso-8859-1") environ["HTTP_COOKIE"] = raw_cookie request = WSGIRequest(environ) self.assertEqual(request.COOKIES["want"], "café") def test_invalid_unicode_cookie(self): """ Invalid cookie content should result in an absent cookie, but not in a crash while trying to decode it (#23638). """ environ = self.request_factory.get("/").environ environ["HTTP_COOKIE"] = "x=W\x03c(h]\x8e" request = WSGIRequest(environ) # We don't test COOKIES content, as the result might differ between # Python version because parsing invalid content became stricter in # latest versions. self.assertIsInstance(request.COOKIES, dict) @override_settings(ROOT_URLCONF="handlers.urls") def test_invalid_multipart_boundary(self): """ Invalid boundary string should produce a "Bad Request" response, not a server error (#23887). """ environ = self.request_factory.post("/malformed_post/").environ environ["CONTENT_TYPE"] = "multipart/form-data; boundary=WRONG\x07" handler = WSGIHandler() response = handler(environ, lambda *a, **k: None) # Expect "bad request" response self.assertEqual(response.status_code, 400) @override_settings(ROOT_URLCONF="handlers.urls", MIDDLEWARE=[]) class TransactionsPerRequestTests(TransactionTestCase): available_apps = [] def test_no_transaction(self): response = self.client.get("/in_transaction/") self.assertContains(response, "False") def test_auto_transaction(self): old_atomic_requests = connection.settings_dict["ATOMIC_REQUESTS"] try: connection.settings_dict["ATOMIC_REQUESTS"] = True response = self.client.get("/in_transaction/") finally: connection.settings_dict["ATOMIC_REQUESTS"] = old_atomic_requests self.assertContains(response, "True") async def test_auto_transaction_async_view(self): old_atomic_requests = connection.settings_dict["ATOMIC_REQUESTS"] try: connection.settings_dict["ATOMIC_REQUESTS"] = True msg = "You cannot use ATOMIC_REQUESTS with async views." with self.assertRaisesMessage(RuntimeError, msg): await self.async_client.get("/async_regular/") finally: connection.settings_dict["ATOMIC_REQUESTS"] = old_atomic_requests def test_no_auto_transaction(self): old_atomic_requests = connection.settings_dict["ATOMIC_REQUESTS"] try: connection.settings_dict["ATOMIC_REQUESTS"] = True response = self.client.get("/not_in_transaction/") finally: connection.settings_dict["ATOMIC_REQUESTS"] = old_atomic_requests self.assertContains(response, "False") try: connection.settings_dict["ATOMIC_REQUESTS"] = True response = self.client.get("/not_in_transaction_using_none/") finally: connection.settings_dict["ATOMIC_REQUESTS"] = old_atomic_requests self.assertContains(response, "False") try: connection.settings_dict["ATOMIC_REQUESTS"] = True response = self.client.get("/not_in_transaction_using_text/") finally: connection.settings_dict["ATOMIC_REQUESTS"] = old_atomic_requests # The non_atomic_requests decorator is used for an incorrect table. self.assertContains(response, "True") @override_settings(ROOT_URLCONF="handlers.urls") class SignalsTests(SimpleTestCase): def setUp(self): self.signals = [] self.signaled_environ = None request_started.connect(self.register_started) self.addCleanup(request_started.disconnect, self.register_started) request_finished.connect(self.register_finished) self.addCleanup(request_finished.disconnect, self.register_finished) def register_started(self, **kwargs): self.signals.append("started") self.signaled_environ = kwargs.get("environ") def register_finished(self, **kwargs): self.signals.append("finished") def test_request_signals(self): response = self.client.get("/regular/") self.assertEqual(self.signals, ["started", "finished"]) self.assertEqual(response.content, b"regular content") self.assertEqual(self.signaled_environ, response.wsgi_request.environ) def test_request_signals_streaming_response(self): response = self.client.get("/streaming/") self.assertEqual(self.signals, ["started"]) self.assertEqual(b"".join(list(response)), b"streaming content") self.assertEqual(self.signals, ["started", "finished"]) def empty_middleware(get_response): pass @override_settings(ROOT_URLCONF="handlers.urls") class HandlerRequestTests(SimpleTestCase): request_factory = RequestFactory() def test_async_view(self): """Calling an async view down the normal synchronous path.""" response = self.client.get("/async_regular/") self.assertEqual(response.status_code, 200) def test_suspiciousop_in_view_returns_400(self): response = self.client.get("/suspicious/") self.assertEqual(response.status_code, 400) def test_bad_request_in_view_returns_400(self): response = self.client.get("/bad_request/") self.assertEqual(response.status_code, 400) def test_invalid_urls(self): response = self.client.get("~%A9helloworld") self.assertEqual(response.status_code, 404) self.assertEqual(response.context["request_path"], "/~%25A9helloworld") response = self.client.get("d%aao%aaw%aan%aal%aao%aaa%aad%aa/") self.assertEqual( response.context["request_path"], "/d%25AAo%25AAw%25AAn%25AAl%25AAo%25AAa%25AAd%25AA", ) response = self.client.get("/%E2%99%E2%99%A5/") self.assertEqual(response.context["request_path"], "/%25E2%2599%E2%99%A5/") response = self.client.get("/%E2%98%8E%E2%A9%E2%99%A5/") self.assertEqual( response.context["request_path"], "/%E2%98%8E%25E2%25A9%E2%99%A5/" ) def test_environ_path_info_type(self): environ = self.request_factory.get("/%E2%A8%87%87%A5%E2%A8%A0").environ self.assertIsInstance(environ["PATH_INFO"], str) def test_handle_accepts_httpstatus_enum_value(self): def start_response(status, headers): start_response.status = status environ = self.request_factory.get("/httpstatus_enum/").environ WSGIHandler()(environ, start_response) self.assertEqual(start_response.status, "200 OK") @override_settings(MIDDLEWARE=["handlers.tests.empty_middleware"]) def test_middleware_returns_none(self): msg = "Middleware factory handlers.tests.empty_middleware returned None." with self.assertRaisesMessage(ImproperlyConfigured, msg): self.client.get("/") def test_no_response(self): msg = ( "The view %s didn't return an HttpResponse object. It returned None " "instead." ) tests = ( ("/no_response_fbv/", "handlers.views.no_response"), ("/no_response_cbv/", "handlers.views.NoResponse.__call__"), ) for url, view in tests: with ( self.subTest(url=url), self.assertRaisesMessage(ValueError, msg % view), ): self.client.get(url) def test_streaming(self): response = self.client.get("/streaming/") self.assertEqual(response.status_code, 200) self.assertEqual(b"".join(list(response)), b"streaming content") def test_async_streaming(self): response = self.client.get("/async_streaming/") self.assertEqual(response.status_code, 200) msg = ( "StreamingHttpResponse must consume asynchronous iterators in order to " "serve them synchronously. Use a synchronous iterator instead." ) with self.assertWarnsMessage(Warning, msg) as ctx: self.assertEqual(b"".join(list(response)), b"streaming content") self.assertEqual(ctx.filename, __file__) class ScriptNameTests(SimpleTestCase): def test_get_script_name(self): # Regression test for #23173 # Test first without PATH_INFO script_name = get_script_name({"SCRIPT_URL": "/foobar/"}) self.assertEqual(script_name, "/foobar/") script_name = get_script_name({"SCRIPT_URL": "/foobar/", "PATH_INFO": "/"}) self.assertEqual(script_name, "/foobar") def test_get_script_name_double_slashes(self): """ WSGI squashes multiple successive slashes in PATH_INFO, get_script_name should take that into account when forming SCRIPT_NAME (#17133). """ script_name = get_script_name( { "SCRIPT_URL": "/mst/milestones//accounts/login//help", "PATH_INFO": "/milestones/accounts/login/help", } ) self.assertEqual(script_name, "/mst") @override_settings(ROOT_URLCONF="handlers.urls") class AsyncHandlerRequestTests(SimpleTestCase): """Async variants of the normal handler request tests.""" async def test_sync_view(self): """Calling a sync view down the asynchronous path.""" response = await self.async_client.get("/regular/") self.assertEqual(response.status_code, 200) async def test_async_view(self): """Calling an async view down the asynchronous path.""" response = await self.async_client.get("/async_regular/") self.assertEqual(response.status_code, 200) async def test_suspiciousop_in_view_returns_400(self): response = await self.async_client.get("/suspicious/") self.assertEqual(response.status_code, 400) async def test_bad_request_in_view_returns_400(self): response = await self.async_client.get("/bad_request/") self.assertEqual(response.status_code, 400) async def test_no_response(self): msg = ( "The view handlers.views.no_response didn't return an " "HttpResponse object. It returned None instead." ) with self.assertRaisesMessage(ValueError, msg): await self.async_client.get("/no_response_fbv/") async def test_unawaited_response(self): msg = ( "The view handlers.views.CoroutineClearingView.__call__ didn't" " return an HttpResponse object. It returned an unawaited" " coroutine instead. You may need to add an 'await'" " into your view." ) with self.assertRaisesMessage(ValueError, msg): await self.async_client.get("/unawaited/") def test_root_path(self): async_request_factory = AsyncRequestFactory() request = async_request_factory.request( **{"path": "/root/somepath/", "root_path": "/root"} ) self.assertEqual(request.path, "/root/somepath/") self.assertEqual(request.script_name, "/root") self.assertEqual(request.path_info, "/somepath/") @override_settings(FORCE_SCRIPT_NAME="/FORCED_PREFIX") def test_force_script_name(self): async_request_factory = AsyncRequestFactory() request = async_request_factory.request(**{"path": "/FORCED_PREFIX/somepath/"}) self.assertEqual(request.path, "/FORCED_PREFIX/somepath/") self.assertEqual(request.script_name, "/FORCED_PREFIX") self.assertEqual(request.path_info, "/somepath/") async def test_sync_streaming(self): response = await self.async_client.get("/streaming/") self.assertEqual(response.status_code, 200) msg = ( "StreamingHttpResponse must consume synchronous iterators in order to " "serve them asynchronously. Use an asynchronous iterator instead." ) with self.assertWarnsMessage(Warning, msg) as ctx: self.assertEqual( b"".join([chunk async for chunk in response]), b"streaming content" ) self.assertEqual(ctx.filename, __file__) async def test_async_streaming(self): response = await self.async_client.get("/async_streaming/") self.assertEqual(response.status_code, 200) self.assertEqual( b"".join([chunk async for chunk in response]), b"streaming content" )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/handlers/urls.py
tests/handlers/urls.py
from django.urls import path from . import views urlpatterns = [ path("regular/", views.regular), path("async_regular/", views.async_regular), path("no_response_fbv/", views.no_response), path("no_response_cbv/", views.NoResponse()), path("streaming/", views.streaming), path("async_streaming/", views.async_streaming), path("in_transaction/", views.in_transaction), path("not_in_transaction/", views.not_in_transaction), path("not_in_transaction_using_none/", views.not_in_transaction_using_none), path("not_in_transaction_using_text/", views.not_in_transaction_using_text), path("bad_request/", views.bad_request), path("suspicious/", views.suspicious), path("malformed_post/", views.malformed_post), path("httpstatus_enum/", views.httpstatus_enum), path("unawaited/", views.async_unawaited), ]
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/update/models.py
tests/update/models.py
""" Tests for the update() queryset method that allows in-place, multi-object updates. """ from django.db import models class DataPoint(models.Model): name = models.CharField(max_length=20) value = models.CharField(max_length=20) another_value = models.CharField(max_length=20, blank=True) is_active = models.BooleanField(default=True) class RelatedPoint(models.Model): name = models.CharField(max_length=20) data = models.ForeignKey(DataPoint, models.CASCADE) class A(models.Model): x = models.IntegerField(default=10) class B(models.Model): a = models.ForeignKey(A, models.CASCADE) y = models.IntegerField(default=10) class C(models.Model): y = models.IntegerField(default=10) class D(C): a = models.ForeignKey(A, models.CASCADE) class Foo(models.Model): target = models.CharField(max_length=10, unique=True) class Bar(models.Model): foo = models.ForeignKey(Foo, models.CASCADE, to_field="target") o2o_foo = models.OneToOneField( Foo, models.CASCADE, related_name="o2o_bar", null=True ) m2m_foo = models.ManyToManyField(Foo, related_name="m2m_foo") x = models.IntegerField(default=0) class UniqueNumber(models.Model): number = models.IntegerField(unique=True) class UniqueNumberChild(UniqueNumber): pass
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/update/__init__.py
tests/update/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/update/tests.py
tests/update/tests.py
import unittest from django.core.exceptions import FieldError from django.db import IntegrityError, connection, transaction from django.db.models import Case, CharField, Count, F, IntegerField, Max, When from django.db.models.functions import Abs, Concat, Lower from django.test import TestCase from django.test.utils import register_lookup from .models import ( A, B, Bar, D, DataPoint, Foo, RelatedPoint, UniqueNumber, UniqueNumberChild, ) class SimpleTest(TestCase): @classmethod def setUpTestData(cls): cls.a1 = A.objects.create() cls.a2 = A.objects.create() B.objects.bulk_create(B(a=cls.a1) for _ in range(20)) for x in range(20): D.objects.create(a=cls.a1) def test_nonempty_update(self): """ Update changes the right number of rows for a nonempty queryset """ num_updated = self.a1.b_set.update(y=100) self.assertEqual(num_updated, 20) cnt = B.objects.filter(y=100).count() self.assertEqual(cnt, 20) def test_empty_update(self): """ Update changes the right number of rows for an empty queryset """ num_updated = self.a2.b_set.update(y=100) self.assertEqual(num_updated, 0) cnt = B.objects.filter(y=100).count() self.assertEqual(cnt, 0) def test_nonempty_update_with_inheritance(self): """ Update changes the right number of rows for an empty queryset when the update affects only a base table """ num_updated = self.a1.d_set.update(y=100) self.assertEqual(num_updated, 20) cnt = D.objects.filter(y=100).count() self.assertEqual(cnt, 20) def test_empty_update_with_inheritance(self): """ Update changes the right number of rows for an empty queryset when the update affects only a base table """ num_updated = self.a2.d_set.update(y=100) self.assertEqual(num_updated, 0) cnt = D.objects.filter(y=100).count() self.assertEqual(cnt, 0) def test_foreign_key_update_with_id(self): """ Update works using <field>_id for foreign keys """ num_updated = self.a1.d_set.update(a_id=self.a2) self.assertEqual(num_updated, 20) self.assertEqual(self.a2.d_set.count(), 20) class AdvancedTests(TestCase): @classmethod def setUpTestData(cls): cls.d0 = DataPoint.objects.create(name="d0", value="apple") cls.d2 = DataPoint.objects.create(name="d2", value="banana") cls.d3 = DataPoint.objects.create(name="d3", value="banana", is_active=False) cls.r1 = RelatedPoint.objects.create(name="r1", data=cls.d3) def test_update(self): """ Objects are updated by first filtering the candidates into a queryset and then calling the update() method. It executes immediately and returns nothing. """ resp = DataPoint.objects.filter(value="apple").update(name="d1") self.assertEqual(resp, 1) resp = DataPoint.objects.filter(value="apple") self.assertEqual(list(resp), [self.d0]) def test_update_multiple_objects(self): """ We can update multiple objects at once. """ resp = DataPoint.objects.filter(value="banana").update(value="pineapple") self.assertEqual(resp, 2) self.assertEqual(DataPoint.objects.get(name="d2").value, "pineapple") def test_update_fk(self): """ Foreign key fields can also be updated, although you can only update the object referred to, not anything inside the related object. """ resp = RelatedPoint.objects.filter(name="r1").update(data=self.d0) self.assertEqual(resp, 1) resp = RelatedPoint.objects.filter(data__name="d0") self.assertEqual(list(resp), [self.r1]) def test_update_multiple_fields(self): """ Multiple fields can be updated at once """ resp = DataPoint.objects.filter(value="apple").update( value="fruit", another_value="peach" ) self.assertEqual(resp, 1) d = DataPoint.objects.get(name="d0") self.assertEqual(d.value, "fruit") self.assertEqual(d.another_value, "peach") def test_update_all(self): """ In the rare case you want to update every instance of a model, update() is also a manager method. """ self.assertEqual(DataPoint.objects.update(value="thing"), 3) resp = DataPoint.objects.values("value").distinct() self.assertEqual(list(resp), [{"value": "thing"}]) def test_update_slice_fail(self): """ We do not support update on already sliced query sets. """ method = DataPoint.objects.all()[:2].update msg = "Cannot update a query once a slice has been taken." with self.assertRaisesMessage(TypeError, msg): method(another_value="another thing") def test_update_respects_to_field(self): """ Update of an FK field which specifies a to_field works. """ a_foo = Foo.objects.create(target="aaa") b_foo = Foo.objects.create(target="bbb") bar = Bar.objects.create(foo=a_foo) self.assertEqual(bar.foo_id, a_foo.target) bar_qs = Bar.objects.filter(pk=bar.pk) self.assertEqual(bar_qs[0].foo_id, a_foo.target) bar_qs.update(foo=b_foo) self.assertEqual(bar_qs[0].foo_id, b_foo.target) def test_update_m2m_field(self): rel = "<django.db.models.fields.related.ManyToManyField: m2m_foo>" msg = f"Cannot update model field {rel} (only concrete fields are permitted)." with self.assertRaisesMessage(FieldError, msg): Bar.objects.update(m2m_foo="whatever") def test_update_reverse_m2m_descriptor(self): rel = "<ManyToManyRel: update.bar>" msg = f"Cannot update model field {rel} (only concrete fields are permitted)." with self.assertRaisesMessage(FieldError, msg): Foo.objects.update(m2m_foo="whatever") def test_update_reverse_fk_descriptor(self): rel = "<ManyToOneRel: update.bar>" msg = f"Cannot update model field {rel} (only concrete fields are permitted)." with self.assertRaisesMessage(FieldError, msg): Foo.objects.update(bar="whatever") def test_update_reverse_o2o_descriptor(self): rel = "<OneToOneRel: update.bar>" msg = f"Cannot update model field {rel} (only concrete fields are permitted)." with self.assertRaisesMessage(FieldError, msg): Foo.objects.update(o2o_bar="whatever") def test_update_reverse_mti_parent_link_descriptor(self): rel = "<OneToOneRel: update.uniquenumberchild>" msg = f"Cannot update model field {rel} (only concrete fields are permitted)." with self.assertRaisesMessage(FieldError, msg): UniqueNumber.objects.update(uniquenumberchild="whatever") def test_update_transformed_field(self): A.objects.create(x=5) A.objects.create(x=-6) with register_lookup(IntegerField, Abs): A.objects.update(x=F("x__abs")) self.assertCountEqual(A.objects.values_list("x", flat=True), [5, 6]) def test_update_annotated_queryset(self): """ Update of a queryset that's been annotated. """ # Trivial annotated update qs = DataPoint.objects.annotate(alias=F("value")) self.assertEqual(qs.update(another_value="foo"), 3) # Update where annotation is used for filtering qs = DataPoint.objects.annotate(alias=F("value")).filter(alias="apple") self.assertEqual(qs.update(another_value="foo"), 1) # Update where annotation is used in update parameters qs = DataPoint.objects.annotate(alias=F("value")) self.assertEqual(qs.update(another_value=F("alias")), 3) # Update where aggregation annotation is used in update parameters qs = DataPoint.objects.annotate(max=Max("value")) msg = ( "Aggregate functions are not allowed in this query " "(another_value=Max(Col(update_datapoint, update.DataPoint.value)))." ) with self.assertRaisesMessage(FieldError, msg): qs.update(another_value=F("max")) def test_update_annotated_multi_table_queryset(self): """ Update of a queryset that's been annotated and involves multiple tables. """ # Trivial annotated update qs = DataPoint.objects.annotate(related_count=Count("relatedpoint")) self.assertEqual(qs.update(value="Foo"), 3) # Update where annotation is used for filtering qs = DataPoint.objects.annotate(related_count=Count("relatedpoint")) self.assertEqual(qs.filter(related_count=1).update(value="Foo"), 1) # Update where aggregation annotation is used in update parameters qs = RelatedPoint.objects.annotate(max=Max("data__value")) msg = "Joined field references are not permitted in this query" with self.assertRaisesMessage(FieldError, msg): qs.update(name=F("max")) def test_update_with_joined_field_annotation(self): msg = "Joined field references are not permitted in this query" with register_lookup(CharField, Lower): for annotation in ( F("data__name"), F("data__name__lower"), Lower("data__name"), Concat("data__name", "data__value"), ): with self.subTest(annotation=annotation): with self.assertRaisesMessage(FieldError, msg): RelatedPoint.objects.annotate( new_name=annotation, ).update(name=F("new_name")) def test_update_ordered_by_m2m_aggregation_annotation(self): msg = ( "Cannot update when ordering by an aggregate: " "Count(Col(update_bar_m2m_foo, update.Bar_m2m_foo.foo))" ) with self.assertRaisesMessage(FieldError, msg): Bar.objects.annotate(m2m_count=Count("m2m_foo")).order_by( "m2m_count" ).update(x=2) def test_update_ordered_by_inline_m2m_annotation(self): foo = Foo.objects.create(target="test") Bar.objects.create(foo=foo) Bar.objects.order_by(Abs("m2m_foo")).update(x=2) self.assertEqual(Bar.objects.get().x, 2) def test_update_ordered_by_m2m_annotation(self): foo = Foo.objects.create(target="test") Bar.objects.create(foo=foo) Bar.objects.annotate(abs_id=Abs("m2m_foo")).order_by("abs_id").update(x=3) self.assertEqual(Bar.objects.get().x, 3) def test_update_ordered_by_m2m_annotation_desc(self): foo = Foo.objects.create(target="test") Bar.objects.create(foo=foo) Bar.objects.annotate(abs_id=Abs("m2m_foo")).order_by("-abs_id").update(x=4) self.assertEqual(Bar.objects.get().x, 4) def test_update_values_annotation(self): RelatedPoint.objects.annotate(abs_id=Abs("id")).filter( data__is_active=False ).values("id", "abs_id").update(data=self.d0) self.r1.refresh_from_db(fields=["data"]) self.assertEqual(self.r1.data, self.d0) def test_update_negated_f(self): DataPoint.objects.update(is_active=~F("is_active")) self.assertCountEqual( DataPoint.objects.values_list("name", "is_active"), [("d0", False), ("d2", False), ("d3", True)], ) DataPoint.objects.update(is_active=~F("is_active")) self.assertCountEqual( DataPoint.objects.values_list("name", "is_active"), [("d0", True), ("d2", True), ("d3", False)], ) def test_update_negated_f_conditional_annotation(self): DataPoint.objects.annotate( is_d2=Case(When(name="d2", then=True), default=False) ).update(is_active=~F("is_d2")) self.assertCountEqual( DataPoint.objects.values_list("name", "is_active"), [("d0", True), ("d2", False), ("d3", True)], ) def test_updating_non_conditional_field(self): msg = "Cannot negate non-conditional expressions." with self.assertRaisesMessage(TypeError, msg): DataPoint.objects.update(is_active=~F("name")) @unittest.skipUnless( connection.vendor == "mysql", "UPDATE...ORDER BY syntax is supported on MySQL/MariaDB", ) class MySQLUpdateOrderByTest(TestCase): """Update field with a unique constraint using an ordered queryset.""" @classmethod def setUpTestData(cls): UniqueNumber.objects.bulk_create( [UniqueNumber(number=1), UniqueNumber(number=2)] ) def test_order_by_update_on_unique_constraint(self): tests = [ ("-number", "id"), (F("number").desc(), "id"), (F("number") * -1, "id"), ] for ordering in tests: with self.subTest(ordering=ordering), transaction.atomic(): updated = UniqueNumber.objects.order_by(*ordering).update( number=F("number") + 1, ) self.assertEqual(updated, 2) def test_order_by_update_on_unique_constraint_annotation(self): updated = ( UniqueNumber.objects.annotate(number_inverse=F("number").desc()) .order_by("number_inverse") .update(number=F("number") + 1) ) self.assertEqual(updated, 2) def test_order_by_update_on_unique_constraint_annotation_desc(self): updated = ( UniqueNumber.objects.annotate(number_annotation=F("number")) .order_by("-number_annotation") .update(number=F("number") + 1) ) self.assertEqual(updated, 2) def test_order_by_update_on_parent_unique_constraint(self): # Ordering by inherited fields is omitted because joined fields cannot # be used in the ORDER BY clause. UniqueNumberChild.objects.create(number=3) UniqueNumberChild.objects.create(number=4) with self.assertRaises(IntegrityError): UniqueNumberChild.objects.order_by("number").update( number=F("number") + 1, ) def test_order_by_update_on_related_field(self): # Ordering by related fields is omitted because joined fields cannot be # used in the ORDER BY clause. data = DataPoint.objects.create(name="d0", value="apple") related = RelatedPoint.objects.create(name="r0", data=data) with self.assertNumQueries(1) as ctx: updated = RelatedPoint.objects.order_by("data__name").update(name="new") sql = ctx.captured_queries[0]["sql"] self.assertNotIn("ORDER BY", sql) self.assertEqual(updated, 1) related.refresh_from_db() self.assertEqual(related.name, "new")
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_recursive/models.py
tests/m2m_recursive/models.py
""" Many-to-many relationships between the same two tables In this example, a ``Person`` can have many friends, who are also ``Person`` objects. Friendship is a symmetrical relationship - if I am your friend, you are my friend. Here, ``friends`` is an example of a symmetrical ``ManyToManyField``. A ``Person`` can also have many idols - but while I may idolize you, you may not think the same of me. Here, ``idols`` is an example of a non-symmetrical ``ManyToManyField``. Only recursive ``ManyToManyField`` fields may be non-symmetrical, and they are symmetrical by default. This test validates that the many-to-many table is created using a mangled name if there is a name clash, and tests that symmetry is preserved where appropriate. """ from django.db import models class Person(models.Model): name = models.CharField(max_length=20) friends = models.ManyToManyField("self") colleagues = models.ManyToManyField("self", symmetrical=True, through="Colleague") idols = models.ManyToManyField("self", symmetrical=False, related_name="stalkers") def __str__(self): return self.name class Colleague(models.Model): first = models.ForeignKey(Person, models.CASCADE) second = models.ForeignKey(Person, models.CASCADE, related_name="+") first_meet = models.DateField()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_recursive/__init__.py
tests/m2m_recursive/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/m2m_recursive/tests.py
tests/m2m_recursive/tests.py
import datetime from django.test import TestCase from .models import Person class RecursiveM2MTests(TestCase): @classmethod def setUpTestData(cls): cls.a, cls.b, cls.c, cls.d = [ Person.objects.create(name=name) for name in ["Anne", "Bill", "Chuck", "David"] ] cls.a.friends.add(cls.b, cls.c) # Add m2m for Anne and Chuck in reverse direction. cls.d.friends.add(cls.a, cls.c) def test_recursive_m2m_all(self): for person, friends in ( (self.a, [self.b, self.c, self.d]), (self.b, [self.a]), (self.c, [self.a, self.d]), (self.d, [self.a, self.c]), ): with self.subTest(person=person): self.assertSequenceEqual(person.friends.all(), friends) def test_recursive_m2m_reverse_add(self): # Add m2m for Anne in reverse direction. self.b.friends.add(self.a) self.assertSequenceEqual(self.a.friends.all(), [self.b, self.c, self.d]) self.assertSequenceEqual(self.b.friends.all(), [self.a]) def test_recursive_m2m_remove(self): self.b.friends.remove(self.a) self.assertSequenceEqual(self.a.friends.all(), [self.c, self.d]) self.assertSequenceEqual(self.b.friends.all(), []) def test_recursive_m2m_clear(self): # Clear m2m for Anne. self.a.friends.clear() self.assertSequenceEqual(self.a.friends.all(), []) # Reverse m2m relationships should be removed. self.assertSequenceEqual(self.c.friends.all(), [self.d]) self.assertSequenceEqual(self.d.friends.all(), [self.c]) def test_recursive_m2m_add_via_related_name(self): # Add m2m with custom related name for Anne in reverse direction. self.d.stalkers.add(self.a) self.assertSequenceEqual(self.a.idols.all(), [self.d]) self.assertSequenceEqual(self.a.stalkers.all(), []) def test_recursive_m2m_add_in_both_directions(self): # Adding the same relation twice results in a single relation. self.a.idols.add(self.d) self.d.stalkers.add(self.a) self.assertSequenceEqual(self.a.idols.all(), [self.d]) def test_recursive_m2m_related_to_self(self): self.a.idols.add(self.a) self.assertSequenceEqual(self.a.idols.all(), [self.a]) self.assertSequenceEqual(self.a.stalkers.all(), [self.a]) class RecursiveSymmetricalM2MThroughTests(TestCase): @classmethod def setUpTestData(cls): cls.a, cls.b, cls.c, cls.d = [ Person.objects.create(name=name) for name in ["Anne", "Bill", "Chuck", "David"] ] cls.a.colleagues.add( cls.b, cls.c, through_defaults={ "first_meet": datetime.date(2013, 1, 5), }, ) # Add m2m for Anne and Chuck in reverse direction. cls.d.colleagues.add( cls.a, cls.c, through_defaults={ "first_meet": datetime.date(2015, 6, 15), }, ) def test_recursive_m2m_all(self): for person, colleagues in ( (self.a, [self.b, self.c, self.d]), (self.b, [self.a]), (self.c, [self.a, self.d]), (self.d, [self.a, self.c]), ): with self.subTest(person=person): self.assertSequenceEqual(person.colleagues.all(), colleagues) def test_recursive_m2m_reverse_add(self): # Add m2m for Anne in reverse direction. self.b.colleagues.add( self.a, through_defaults={ "first_meet": datetime.date(2013, 1, 5), }, ) self.assertCountEqual(self.a.colleagues.all(), [self.b, self.c, self.d]) self.assertSequenceEqual(self.b.colleagues.all(), [self.a]) def test_recursive_m2m_remove(self): self.b.colleagues.remove(self.a) self.assertSequenceEqual(self.a.colleagues.all(), [self.c, self.d]) self.assertSequenceEqual(self.b.colleagues.all(), []) def test_recursive_m2m_clear(self): # Clear m2m for Anne. self.a.colleagues.clear() self.assertSequenceEqual(self.a.friends.all(), []) # Reverse m2m relationships is removed. self.assertSequenceEqual(self.c.colleagues.all(), [self.d]) self.assertSequenceEqual(self.d.colleagues.all(), [self.c]) def test_recursive_m2m_set(self): # Set new relationships for Chuck. self.c.colleagues.set( [self.b, self.d], through_defaults={ "first_meet": datetime.date(2013, 1, 5), }, ) self.assertSequenceEqual(self.c.colleagues.order_by("name"), [self.b, self.d]) # Reverse m2m relationships is removed. self.assertSequenceEqual(self.a.colleagues.order_by("name"), [self.b, self.d])
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/many_to_one_null/models.py
tests/many_to_one_null/models.py
""" Many-to-one relationships that can be null To define a many-to-one relationship that can have a null foreign key, use ``ForeignKey()`` with ``null=True`` . """ from django.db import models class Reporter(models.Model): name = models.CharField(max_length=30) class Article(models.Model): headline = models.CharField(max_length=100) reporter = models.ForeignKey(Reporter, models.SET_NULL, null=True) class Meta: ordering = ("headline",) def __str__(self): return self.headline class Car(models.Model): make = models.CharField(max_length=100, null=True, unique=True) class Driver(models.Model): car = models.ForeignKey( Car, models.SET_NULL, to_field="make", null=True, related_name="drivers" )
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/many_to_one_null/__init__.py
tests/many_to_one_null/__init__.py
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/many_to_one_null/tests.py
tests/many_to_one_null/tests.py
from django.test import TestCase from .models import Article, Car, Driver, Reporter class ManyToOneNullTests(TestCase): @classmethod def setUpTestData(cls): # Create a Reporter. cls.r = Reporter(name="John Smith") cls.r.save() # Create an Article. cls.a = Article(headline="First", reporter=cls.r) cls.a.save() # Create an Article via the Reporter object. cls.a2 = cls.r.article_set.create(headline="Second") # Create an Article with no Reporter by passing "reporter=None". cls.a3 = Article(headline="Third", reporter=None) cls.a3.save() # Create another article and reporter cls.r2 = Reporter(name="Paul Jones") cls.r2.save() cls.a4 = cls.r2.article_set.create(headline="Fourth") def test_get_related(self): self.assertEqual(self.a.reporter.id, self.r.id) # Article objects have access to their related Reporter objects. r = self.a.reporter self.assertEqual(r.id, self.r.id) def test_created_via_related_set(self): self.assertEqual(self.a2.reporter.id, self.r.id) def test_related_set(self): # Reporter objects have access to their related Article objects. self.assertSequenceEqual(self.r.article_set.all(), [self.a, self.a2]) self.assertSequenceEqual( self.r.article_set.filter(headline__startswith="Fir"), [self.a] ) self.assertEqual(self.r.article_set.count(), 2) def test_created_without_related(self): self.assertIsNone(self.a3.reporter) # Need to reget a3 to refresh the cache a3 = Article.objects.get(pk=self.a3.pk) with self.assertRaises(AttributeError): getattr(a3.reporter, "id") # Accessing an article's 'reporter' attribute returns None # if the reporter is set to None. self.assertIsNone(a3.reporter) # To retrieve the articles with no reporters set, use # "reporter__isnull=True". self.assertSequenceEqual( Article.objects.filter(reporter__isnull=True), [self.a3] ) # We can achieve the same thing by filtering for the case where the # reporter is None. self.assertSequenceEqual(Article.objects.filter(reporter=None), [self.a3]) # Set the reporter for the Third article self.assertSequenceEqual(self.r.article_set.all(), [self.a, self.a2]) self.r.article_set.add(a3) self.assertSequenceEqual( self.r.article_set.all(), [self.a, self.a2, self.a3], ) # Remove an article from the set, and check that it was removed. self.r.article_set.remove(a3) self.assertSequenceEqual(self.r.article_set.all(), [self.a, self.a2]) self.assertSequenceEqual( Article.objects.filter(reporter__isnull=True), [self.a3] ) def test_remove_from_wrong_set(self): self.assertSequenceEqual(self.r2.article_set.all(), [self.a4]) # Try to remove a4 from a set it does not belong to with self.assertRaises(Reporter.DoesNotExist): self.r.article_set.remove(self.a4) self.assertSequenceEqual(self.r2.article_set.all(), [self.a4]) def test_set(self): # Use manager.set() to allocate ForeignKey. Null is legal, so existing # members of the set that are not in the assignment set are set to # null. self.r2.article_set.set([self.a2, self.a3]) self.assertSequenceEqual(self.r2.article_set.all(), [self.a2, self.a3]) # Use manager.set(clear=True) self.r2.article_set.set([self.a3, self.a4], clear=True) self.assertSequenceEqual(self.r2.article_set.all(), [self.a4, self.a3]) # Clear the rest of the set self.r2.article_set.set([]) self.assertSequenceEqual(self.r2.article_set.all(), []) self.assertSequenceEqual( Article.objects.filter(reporter__isnull=True), [self.a4, self.a2, self.a3], ) def test_set_clear_non_bulk(self): # 2 queries for clear(), 1 for add(), and 1 to select objects. with self.assertNumQueries(4): self.r.article_set.set([self.a], bulk=False, clear=True) def test_assign_clear_related_set(self): # Use descriptor assignment to allocate ForeignKey. Null is legal, so # existing members of the set that are not in the assignment set are # set to null. self.r2.article_set.set([self.a2, self.a3]) self.assertSequenceEqual(self.r2.article_set.all(), [self.a2, self.a3]) # Clear the rest of the set self.r.article_set.clear() self.assertSequenceEqual(self.r.article_set.all(), []) self.assertSequenceEqual( Article.objects.filter(reporter__isnull=True), [self.a, self.a4], ) def test_assign_with_queryset(self): # Querysets used in reverse FK assignments are pre-evaluated # so their value isn't affected by the clearing operation in # RelatedManager.set() (#19816). self.r2.article_set.set([self.a2, self.a3]) qs = self.r2.article_set.filter(headline="Second") self.r2.article_set.set(qs) self.assertEqual(1, self.r2.article_set.count()) self.assertEqual(1, qs.count()) def test_add_efficiency(self): r = Reporter.objects.create() articles = [] for _ in range(3): articles.append(Article.objects.create()) with self.assertNumQueries(1): r.article_set.add(*articles) self.assertEqual(r.article_set.count(), 3) def test_clear_efficiency(self): r = Reporter.objects.create() for _ in range(3): r.article_set.create() with self.assertNumQueries(1): r.article_set.clear() self.assertEqual(r.article_set.count(), 0) def test_related_null_to_field(self): c1 = Car.objects.create() d1 = Driver.objects.create() self.assertIs(d1.car, None) with self.assertNumQueries(0): self.assertEqual(list(c1.drivers.all()), []) def test_unsaved(self): msg = ( "'Car' instance needs to have a primary key value before this relationship " "can be used." ) with self.assertRaisesMessage(ValueError, msg): Car(make="Ford").drivers.all() def test_related_null_to_field_related_managers(self): car = Car.objects.create(make=None) driver = Driver.objects.create() msg = ( f'"{car!r}" needs to have a value for field "make" before this ' f"relationship can be used." ) with self.assertRaisesMessage(ValueError, msg): car.drivers.add(driver) with self.assertRaisesMessage(ValueError, msg): car.drivers.create() with self.assertRaisesMessage(ValueError, msg): car.drivers.get_or_create() with self.assertRaisesMessage(ValueError, msg): car.drivers.update_or_create() with self.assertRaisesMessage(ValueError, msg): car.drivers.remove(driver) with self.assertRaisesMessage(ValueError, msg): car.drivers.clear() with self.assertRaisesMessage(ValueError, msg): car.drivers.set([driver]) with self.assertNumQueries(0): self.assertEqual(car.drivers.count(), 0)
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/resolve_url/views.py
tests/resolve_url/views.py
from django.http import HttpResponse from django.views import View def some_view(request): return HttpResponse("ok") def params_view(request, slug): return HttpResponse(f"Params: {slug}") class SomeView(View): def get(self, request): return HttpResponse("ok") class ParamsView(View): def get(self, request, pk): return HttpResponse(f"Params: {pk}") some_cbv = SomeView.as_view() params_cbv = ParamsView.as_view()
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false
django/django
https://github.com/django/django/blob/3201a895cba335000827b28768a7b7105c81b415/tests/resolve_url/models.py
tests/resolve_url/models.py
""" Regression tests for the resolve_url function. """ from django.db import models class UnimportantThing(models.Model): importance = models.IntegerField() def get_absolute_url(self): return "/importance/%d/" % self.importance
python
BSD-3-Clause
3201a895cba335000827b28768a7b7105c81b415
2026-01-04T14:38:15.489092Z
false