| import os |
| import re |
| import tempfile |
| import threading |
| import unittest |
| from pathlib import Path |
| from unittest import mock |
|
|
| from django.db import NotSupportedError, connection, transaction |
| from django.db.models import Aggregate, Avg, CharField, StdDev, Sum, Variance |
| from django.db.utils import ConnectionHandler |
| from django.test import ( |
| TestCase, |
| TransactionTestCase, |
| override_settings, |
| skipIfDBFeature, |
| ) |
| from django.test.utils import isolate_apps |
|
|
| from ..models import Author, Item, Object, Square |
|
|
|
|
| @unittest.skipUnless(connection.vendor == "sqlite", "SQLite tests") |
| class Tests(TestCase): |
| longMessage = True |
|
|
| def test_aggregation(self): |
| """Raise NotSupportedError when aggregating on date/time fields.""" |
| for aggregate in (Sum, Avg, Variance, StdDev): |
| with self.assertRaises(NotSupportedError): |
| Item.objects.aggregate(aggregate("time")) |
| with self.assertRaises(NotSupportedError): |
| Item.objects.aggregate(aggregate("date")) |
| with self.assertRaises(NotSupportedError): |
| Item.objects.aggregate(aggregate("last_modified")) |
| with self.assertRaises(NotSupportedError): |
| Item.objects.aggregate( |
| **{ |
| "complex": aggregate("last_modified") |
| + aggregate("last_modified") |
| } |
| ) |
|
|
| def test_distinct_aggregation(self): |
| class DistinctAggregate(Aggregate): |
| allow_distinct = True |
|
|
| aggregate = DistinctAggregate("first", "second", distinct=True) |
| msg = ( |
| "SQLite doesn't support DISTINCT on aggregate functions accepting " |
| "multiple arguments." |
| ) |
| with self.assertRaisesMessage(NotSupportedError, msg): |
| connection.ops.check_expression_support(aggregate) |
|
|
| def test_distinct_aggregation_multiple_args_no_distinct(self): |
| |
| |
| class DistinctAggregate(Aggregate): |
| allow_distinct = True |
|
|
| aggregate = DistinctAggregate("first", "second", distinct=False) |
| connection.ops.check_expression_support(aggregate) |
|
|
| def test_memory_db_test_name(self): |
| """A named in-memory db should be allowed where supported.""" |
| from django.db.backends.sqlite3.base import DatabaseWrapper |
|
|
| settings_dict = { |
| "TEST": { |
| "NAME": "file:memorydb_test?mode=memory&cache=shared", |
| } |
| } |
| creation = DatabaseWrapper(settings_dict).creation |
| self.assertEqual( |
| creation._get_test_db_name(), |
| creation.connection.settings_dict["TEST"]["NAME"], |
| ) |
|
|
| def test_regexp_function(self): |
| tests = ( |
| ("test", r"[0-9]+", False), |
| ("test", r"[a-z]+", True), |
| ("test", None, None), |
| (None, r"[a-z]+", None), |
| (None, None, None), |
| ) |
| for string, pattern, expected in tests: |
| with self.subTest((string, pattern)): |
| with connection.cursor() as cursor: |
| cursor.execute("SELECT %s REGEXP %s", [string, pattern]) |
| value = cursor.fetchone()[0] |
| value = bool(value) if value in {0, 1} else value |
| self.assertIs(value, expected) |
|
|
| def test_pathlib_name(self): |
| with tempfile.TemporaryDirectory() as tmp: |
| settings_dict = { |
| "default": { |
| "ENGINE": "django.db.backends.sqlite3", |
| "NAME": Path(tmp) / "test.db", |
| }, |
| } |
| connections = ConnectionHandler(settings_dict) |
| connections["default"].ensure_connection() |
| connections["default"].close() |
| self.assertTrue(os.path.isfile(os.path.join(tmp, "test.db"))) |
|
|
| @mock.patch.object(connection, "get_database_version", return_value=(3, 20)) |
| def test_check_database_version_supported(self, mocked_get_database_version): |
| msg = "SQLite 3.21 or later is required (found 3.20)." |
| with self.assertRaisesMessage(NotSupportedError, msg): |
| connection.check_database_version_supported() |
| self.assertTrue(mocked_get_database_version.called) |
|
|
|
|
| @unittest.skipUnless(connection.vendor == "sqlite", "SQLite tests") |
| @isolate_apps("backends") |
| class SchemaTests(TransactionTestCase): |
| available_apps = ["backends"] |
|
|
| def test_autoincrement(self): |
| """ |
| auto_increment fields are created with the AUTOINCREMENT keyword |
| in order to be monotonically increasing (#10164). |
| """ |
| with connection.schema_editor(collect_sql=True) as editor: |
| editor.create_model(Square) |
| statements = editor.collected_sql |
| match = re.search('"id" ([^,]+),', statements[0]) |
| self.assertIsNotNone(match) |
| self.assertEqual( |
| "integer NOT NULL PRIMARY KEY AUTOINCREMENT", |
| match[1], |
| "Wrong SQL used to create an auto-increment column on SQLite", |
| ) |
|
|
| def test_disable_constraint_checking_failure_disallowed(self): |
| """ |
| SQLite schema editor is not usable within an outer transaction if |
| foreign key constraint checks are not disabled beforehand. |
| """ |
| msg = ( |
| "SQLite schema editor cannot be used while foreign key " |
| "constraint checks are enabled. Make sure to disable them " |
| "before entering a transaction.atomic() context because " |
| "SQLite does not support disabling them in the middle of " |
| "a multi-statement transaction." |
| ) |
| with self.assertRaisesMessage(NotSupportedError, msg): |
| with transaction.atomic(), connection.schema_editor(atomic=True): |
| pass |
|
|
| def test_constraint_checks_disabled_atomic_allowed(self): |
| """ |
| SQLite schema editor is usable within an outer transaction as long as |
| foreign key constraints checks are disabled beforehand. |
| """ |
|
|
| def constraint_checks_enabled(): |
| with connection.cursor() as cursor: |
| return bool(cursor.execute("PRAGMA foreign_keys").fetchone()[0]) |
|
|
| with connection.constraint_checks_disabled(), transaction.atomic(): |
| with connection.schema_editor(atomic=True): |
| self.assertFalse(constraint_checks_enabled()) |
| self.assertFalse(constraint_checks_enabled()) |
| self.assertTrue(constraint_checks_enabled()) |
|
|
| @skipIfDBFeature("supports_atomic_references_rename") |
| def test_field_rename_inside_atomic_block(self): |
| """ |
| NotImplementedError is raised when a model field rename is attempted |
| inside an atomic block. |
| """ |
| new_field = CharField(max_length=255, unique=True) |
| new_field.set_attributes_from_name("renamed") |
| msg = ( |
| "Renaming the 'backends_author'.'name' column while in a " |
| "transaction is not supported on SQLite < 3.26 because it would " |
| "break referential integrity. Try adding `atomic = False` to the " |
| "Migration class." |
| ) |
| with self.assertRaisesMessage(NotSupportedError, msg): |
| with connection.schema_editor(atomic=True) as editor: |
| editor.alter_field(Author, Author._meta.get_field("name"), new_field) |
|
|
| @skipIfDBFeature("supports_atomic_references_rename") |
| def test_table_rename_inside_atomic_block(self): |
| """ |
| NotImplementedError is raised when a table rename is attempted inside |
| an atomic block. |
| """ |
| msg = ( |
| "Renaming the 'backends_author' table while in a transaction is " |
| "not supported on SQLite < 3.26 because it would break referential " |
| "integrity. Try adding `atomic = False` to the Migration class." |
| ) |
| with self.assertRaisesMessage(NotSupportedError, msg): |
| with connection.schema_editor(atomic=True) as editor: |
| editor.alter_db_table(Author, "backends_author", "renamed_table") |
|
|
|
|
| @unittest.skipUnless(connection.vendor == "sqlite", "Test only for SQLite") |
| @override_settings(DEBUG=True) |
| class LastExecutedQueryTest(TestCase): |
| def test_no_interpolation(self): |
| |
| query = "SELECT strftime('%Y', 'now');" |
| with connection.cursor() as cursor: |
| cursor.execute(query) |
| self.assertEqual(connection.queries[-1]["sql"], query) |
|
|
| def test_parameter_quoting(self): |
| |
| |
| query = "SELECT %s" |
| params = ["\"'\\"] |
| with connection.cursor() as cursor: |
| cursor.execute(query, params) |
| |
| substituted = "SELECT '\"''\\'" |
| self.assertEqual(connection.queries[-1]["sql"], substituted) |
|
|
| def test_large_number_of_parameters(self): |
| |
| |
| |
| with connection.cursor() as cursor: |
| sql = "SELECT MAX(%s)" % ", ".join(["%s"] * 2001) |
| params = list(range(2001)) |
| |
| cursor.db.ops.last_executed_query(cursor.cursor, sql, params) |
|
|
|
|
| @unittest.skipUnless(connection.vendor == "sqlite", "SQLite tests") |
| class EscapingChecks(TestCase): |
| """ |
| All tests in this test case are also run with settings.DEBUG=True in |
| EscapingChecksDebug test case, to also test CursorDebugWrapper. |
| """ |
|
|
| def test_parameter_escaping(self): |
| |
| with connection.cursor() as cursor: |
| cursor.execute("select strftime('%s', date('now'))") |
| response = cursor.fetchall()[0][0] |
| |
| self.assertTrue(int(response)) |
|
|
|
|
| @unittest.skipUnless(connection.vendor == "sqlite", "SQLite tests") |
| @override_settings(DEBUG=True) |
| class EscapingChecksDebug(EscapingChecks): |
| pass |
|
|
|
|
| @unittest.skipUnless(connection.vendor == "sqlite", "SQLite tests") |
| class ThreadSharing(TransactionTestCase): |
| available_apps = ["backends"] |
|
|
| def test_database_sharing_in_threads(self): |
| def create_object(): |
| Object.objects.create() |
|
|
| create_object() |
| thread = threading.Thread(target=create_object) |
| thread.start() |
| thread.join() |
| self.assertEqual(Object.objects.count(), 2) |
|
|