2009-05-08 10:56:51 +00:00
|
|
|
# -*- coding: utf-8 -*-
|
2013-07-29 17:19:04 +00:00
|
|
|
from __future__ import unicode_literals
|
2012-04-05 15:44:04 +00:00
|
|
|
|
2011-05-26 08:21:35 +00:00
|
|
|
import errno
|
2011-10-13 18:51:33 +00:00
|
|
|
import os
|
2008-10-10 22:13:16 +00:00
|
|
|
import shutil
|
2012-09-05 15:05:28 +00:00
|
|
|
import sys
|
2008-10-10 22:13:16 +00:00
|
|
|
import tempfile
|
2015-01-28 14:55:52 +00:00
|
|
|
import threading
|
2009-05-08 10:56:51 +00:00
|
|
|
import time
|
2013-07-01 12:22:27 +00:00
|
|
|
import unittest
|
2010-10-08 15:11:59 +00:00
|
|
|
from datetime import datetime, timedelta
|
2010-11-21 17:51:41 +00:00
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
from django.core.cache import cache
|
2015-01-28 12:35:27 +00:00
|
|
|
from django.core.exceptions import SuspiciousFileOperation, SuspiciousOperation
|
|
|
|
from django.core.files.base import ContentFile, File
|
2010-09-13 23:15:06 +00:00
|
|
|
from django.core.files.storage import FileSystemStorage, get_storage_class
|
2015-01-28 12:35:27 +00:00
|
|
|
from django.core.files.uploadedfile import (
|
|
|
|
InMemoryUploadedFile, SimpleUploadedFile, TemporaryUploadedFile,
|
|
|
|
)
|
2015-10-01 17:00:44 +00:00
|
|
|
from django.db.models.fields.files import FileDescriptor
|
2015-04-13 15:56:58 +00:00
|
|
|
from django.test import (
|
2016-02-09 15:00:14 +00:00
|
|
|
LiveServerTestCase, SimpleTestCase, TestCase, ignore_warnings,
|
|
|
|
override_settings,
|
2015-04-13 15:56:58 +00:00
|
|
|
)
|
2016-02-09 15:00:14 +00:00
|
|
|
from django.test.utils import requires_tz_support
|
|
|
|
from django.utils import six, timezone
|
2012-12-08 10:13:52 +00:00
|
|
|
from django.utils._os import upath
|
2016-02-09 15:00:14 +00:00
|
|
|
from django.utils.deprecation import RemovedInDjango20Warning
|
2015-01-28 12:35:27 +00:00
|
|
|
from django.utils.six.moves.urllib.request import urlopen
|
2010-10-11 12:55:17 +00:00
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
from .models import Storage, temp_storage, temp_storage_location
|
2009-05-08 10:56:51 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
try:
|
|
|
|
import pytz
|
|
|
|
except ImportError:
|
|
|
|
pytz = None
|
|
|
|
|
|
|
|
|
2014-08-08 14:20:08 +00:00
|
|
|
FILE_SUFFIX_REGEX = '[A-Za-z0-9]{7}'
|
|
|
|
|
|
|
|
|
2011-08-13 00:42:08 +00:00
|
|
|
class GetStorageClassTests(SimpleTestCase):
|
2010-09-13 23:15:06 +00:00
|
|
|
|
|
|
|
def test_get_filesystem_storage(self):
|
|
|
|
"""
|
|
|
|
get_storage_class returns the class for a storage backend name/path.
|
|
|
|
"""
|
|
|
|
self.assertEqual(
|
|
|
|
get_storage_class('django.core.files.storage.FileSystemStorage'),
|
|
|
|
FileSystemStorage)
|
|
|
|
|
|
|
|
def test_get_invalid_storage_module(self):
|
|
|
|
"""
|
|
|
|
get_storage_class raises an error if the requested import don't exist.
|
|
|
|
"""
|
2014-01-20 20:15:14 +00:00
|
|
|
with six.assertRaisesRegex(self, ImportError, "No module named '?storage'?"):
|
2013-02-04 17:00:19 +00:00
|
|
|
get_storage_class('storage.NonExistingStorage')
|
2010-09-13 23:15:06 +00:00
|
|
|
|
|
|
|
def test_get_nonexisting_storage_class(self):
|
|
|
|
"""
|
|
|
|
get_storage_class raises an error if the requested class don't exist.
|
|
|
|
"""
|
2016-01-17 11:26:39 +00:00
|
|
|
with self.assertRaises(ImportError):
|
|
|
|
get_storage_class('django.core.files.storage.NonExistingStorage')
|
2010-09-13 23:15:06 +00:00
|
|
|
|
|
|
|
def test_get_nonexisting_storage_module(self):
|
|
|
|
"""
|
|
|
|
get_storage_class raises an error if the requested module don't exist.
|
|
|
|
"""
|
2010-11-11 23:03:53 +00:00
|
|
|
# Error message may or may not be the fully qualified path.
|
2016-04-08 02:04:45 +00:00
|
|
|
with six.assertRaisesRegex(self, ImportError, "No module named '?(django.core.files.)?non_existing_storage'?"):
|
|
|
|
get_storage_class('django.core.files.non_existing_storage.NonExistingStorage')
|
2010-09-13 23:15:06 +00:00
|
|
|
|
2013-11-03 04:36:09 +00:00
|
|
|
|
2014-05-07 05:23:23 +00:00
|
|
|
class FileStorageDeconstructionTests(unittest.TestCase):
|
|
|
|
|
|
|
|
def test_deconstruction(self):
|
|
|
|
path, args, kwargs = temp_storage.deconstruct()
|
|
|
|
self.assertEqual(path, "django.core.files.storage.FileSystemStorage")
|
|
|
|
self.assertEqual(args, tuple())
|
|
|
|
self.assertEqual(kwargs, {'location': temp_storage_location})
|
|
|
|
|
|
|
|
kwargs_orig = {
|
|
|
|
'location': temp_storage_location,
|
|
|
|
'base_url': 'http://myfiles.example.com/'
|
|
|
|
}
|
|
|
|
storage = FileSystemStorage(**kwargs_orig)
|
|
|
|
path, args, kwargs = storage.deconstruct()
|
|
|
|
self.assertEqual(kwargs, kwargs_orig)
|
|
|
|
|
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
# Tests for TZ-aware time methods need pytz.
|
|
|
|
requires_pytz = unittest.skipIf(pytz is None, "this test requires pytz")
|
|
|
|
|
|
|
|
|
|
|
|
class FileStorageTests(TestCase):
|
|
|
|
# Changing TIME_ZONE may issue a query to set the database's timezone,
|
|
|
|
# hence TestCase.
|
2009-05-08 10:56:51 +00:00
|
|
|
storage_class = FileSystemStorage
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
def setUp(self):
|
2011-05-22 23:56:42 +00:00
|
|
|
self.temp_dir = tempfile.mkdtemp()
|
2016-04-08 02:04:45 +00:00
|
|
|
self.storage = self.storage_class(location=self.temp_dir, base_url='/test_media_url/')
|
2011-05-22 23:56:42 +00:00
|
|
|
# Set up a second temporary directory which is ensured to have a mixed
|
|
|
|
# case name.
|
|
|
|
self.temp_dir2 = tempfile.mkdtemp(suffix='aBc')
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
def tearDown(self):
|
2010-09-13 23:15:06 +00:00
|
|
|
shutil.rmtree(self.temp_dir)
|
2011-05-22 23:56:42 +00:00
|
|
|
shutil.rmtree(self.temp_dir2)
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2014-05-28 17:03:26 +00:00
|
|
|
def test_empty_location(self):
|
2011-09-21 15:58:32 +00:00
|
|
|
"""
|
|
|
|
Makes sure an exception is raised if the location is empty
|
|
|
|
"""
|
|
|
|
storage = self.storage_class(location='')
|
|
|
|
self.assertEqual(storage.base_location, '')
|
2012-12-08 10:13:52 +00:00
|
|
|
self.assertEqual(storage.location, upath(os.getcwd()))
|
2011-09-21 15:58:32 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
def test_file_access_options(self):
|
|
|
|
"""
|
|
|
|
Standard file access options are available, and work as expected.
|
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('storage_test'))
|
2009-05-08 10:56:51 +00:00
|
|
|
f = self.storage.open('storage_test', 'w')
|
|
|
|
f.write('storage contents')
|
|
|
|
f.close()
|
2011-03-03 15:04:39 +00:00
|
|
|
self.assertTrue(self.storage.exists('storage_test'))
|
2009-05-08 10:56:51 +00:00
|
|
|
|
|
|
|
f = self.storage.open('storage_test', 'r')
|
|
|
|
self.assertEqual(f.read(), 'storage contents')
|
|
|
|
f.close()
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
self.storage.delete('storage_test')
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('storage_test'))
|
2009-05-08 10:56:51 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
def _test_file_time_getter(self, getter):
|
|
|
|
# Check for correct behavior under both USE_TZ=True and USE_TZ=False.
|
|
|
|
# The tests are similar since they both set up a situation where the
|
|
|
|
# system time zone, Django's TIME_ZONE, and UTC are distinct.
|
|
|
|
self._test_file_time_getter_tz_handling_on(getter)
|
|
|
|
self._test_file_time_getter_tz_handling_off(getter)
|
|
|
|
|
|
|
|
@override_settings(USE_TZ=True, TIME_ZONE='Africa/Algiers')
|
|
|
|
def _test_file_time_getter_tz_handling_on(self, getter):
|
|
|
|
# Django's TZ (and hence the system TZ) is set to Africa/Algiers which
|
|
|
|
# is UTC+1 and has no DST change. We can set the Django TZ to something
|
|
|
|
# else so that UTC, Django's TIME_ZONE, and the system timezone are all
|
|
|
|
# different.
|
|
|
|
now_in_algiers = timezone.make_aware(datetime.now())
|
|
|
|
|
|
|
|
# Use a fixed offset timezone so we don't need pytz.
|
|
|
|
with timezone.override(timezone.get_fixed_timezone(-300)):
|
|
|
|
# At this point the system TZ is +1 and the Django TZ
|
|
|
|
# is -5. The following will be aware in UTC.
|
|
|
|
now = timezone.now()
|
|
|
|
self.assertFalse(self.storage.exists('test.file.tz.on'))
|
|
|
|
|
|
|
|
f = ContentFile('custom contents')
|
|
|
|
f_name = self.storage.save('test.file.tz.on', f)
|
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
|
|
|
dt = getter(f_name)
|
|
|
|
# dt should be aware, in UTC
|
|
|
|
self.assertTrue(timezone.is_aware(dt))
|
|
|
|
self.assertEqual(now.tzname(), dt.tzname())
|
|
|
|
|
|
|
|
# Check that the three timezones are indeed distinct.
|
|
|
|
naive_now = datetime.now()
|
|
|
|
algiers_offset = now_in_algiers.tzinfo.utcoffset(naive_now)
|
|
|
|
django_offset = timezone.get_current_timezone().utcoffset(naive_now)
|
|
|
|
utc_offset = timezone.utc.utcoffset(naive_now)
|
|
|
|
self.assertGreater(algiers_offset, utc_offset)
|
|
|
|
self.assertLess(django_offset, utc_offset)
|
|
|
|
|
|
|
|
# dt and now should be the same effective time.
|
|
|
|
self.assertLess(abs(dt - now), timedelta(seconds=2))
|
|
|
|
|
|
|
|
@override_settings(USE_TZ=False, TIME_ZONE='Africa/Algiers')
|
|
|
|
def _test_file_time_getter_tz_handling_off(self, getter):
|
|
|
|
# Django's TZ (and hence the system TZ) is set to Africa/Algiers which
|
|
|
|
# is UTC+1 and has no DST change. We can set the Django TZ to something
|
|
|
|
# else so that UTC, Django's TIME_ZONE, and the system timezone are all
|
|
|
|
# different.
|
|
|
|
now_in_algiers = timezone.make_aware(datetime.now())
|
|
|
|
|
|
|
|
# Use a fixed offset timezone so we don't need pytz.
|
|
|
|
with timezone.override(timezone.get_fixed_timezone(-300)):
|
|
|
|
# At this point the system TZ is +1 and the Django TZ
|
|
|
|
# is -5.
|
|
|
|
self.assertFalse(self.storage.exists('test.file.tz.off'))
|
|
|
|
|
|
|
|
f = ContentFile('custom contents')
|
|
|
|
f_name = self.storage.save('test.file.tz.off', f)
|
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
|
|
|
dt = getter(f_name)
|
|
|
|
# dt should be naive, in system (+1) TZ
|
|
|
|
self.assertTrue(timezone.is_naive(dt))
|
|
|
|
|
|
|
|
# Check that the three timezones are indeed distinct.
|
|
|
|
naive_now = datetime.now()
|
|
|
|
algiers_offset = now_in_algiers.tzinfo.utcoffset(naive_now)
|
|
|
|
django_offset = timezone.get_current_timezone().utcoffset(naive_now)
|
|
|
|
utc_offset = timezone.utc.utcoffset(naive_now)
|
|
|
|
self.assertGreater(algiers_offset, utc_offset)
|
|
|
|
self.assertLess(django_offset, utc_offset)
|
|
|
|
|
|
|
|
# dt and naive_now should be the same effective time.
|
|
|
|
self.assertLess(abs(dt - naive_now), timedelta(seconds=2))
|
|
|
|
# If we convert dt to an aware object using the Algiers
|
|
|
|
# timezone then it should be the same effective time to
|
|
|
|
# now_in_algiers.
|
|
|
|
_dt = timezone.make_aware(dt, now_in_algiers.tzinfo)
|
|
|
|
self.assertLess(abs(_dt - now_in_algiers), timedelta(seconds=2))
|
|
|
|
|
|
|
|
@requires_pytz
|
|
|
|
def test_file_get_accessed_time(self):
|
2010-10-08 15:11:59 +00:00
|
|
|
"""
|
|
|
|
File storage returns a Datetime object for the last accessed time of
|
|
|
|
a file.
|
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
f = ContentFile('custom contents')
|
2010-10-08 15:11:59 +00:00
|
|
|
f_name = self.storage.save('test.file', f)
|
2016-02-09 15:00:14 +00:00
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
|
|
|
atime = self.storage.get_accessed_time(f_name)
|
|
|
|
|
|
|
|
self.assertEqual(atime, datetime.fromtimestamp(os.path.getatime(self.storage.path(f_name))))
|
|
|
|
self.assertLess(timezone.now() - self.storage.get_accessed_time(f_name), timedelta(seconds=2))
|
|
|
|
|
|
|
|
@requires_pytz
|
|
|
|
@requires_tz_support
|
|
|
|
def test_file_get_accessed_time_timezone(self):
|
|
|
|
self._test_file_time_getter(self.storage.get_accessed_time)
|
|
|
|
|
|
|
|
@ignore_warnings(category=RemovedInDjango20Warning)
|
|
|
|
def test_file_accessed_time(self):
|
|
|
|
"""
|
|
|
|
File storage returns a datetime for the last accessed time of a file.
|
|
|
|
"""
|
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
|
|
|
|
|
|
|
f = ContentFile('custom contents')
|
|
|
|
f_name = self.storage.save('test.file', f)
|
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
2010-10-08 15:11:59 +00:00
|
|
|
atime = self.storage.accessed_time(f_name)
|
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
self.assertEqual(atime, datetime.fromtimestamp(os.path.getatime(self.storage.path(f_name))))
|
2014-10-28 10:02:56 +00:00
|
|
|
self.assertLess(datetime.now() - self.storage.accessed_time(f_name), timedelta(seconds=2))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
@requires_pytz
|
|
|
|
def test_file_get_created_time(self):
|
|
|
|
"""
|
|
|
|
File storage returns a datetime for the creation time of a file.
|
|
|
|
"""
|
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
|
|
|
|
|
|
|
f = ContentFile('custom contents')
|
|
|
|
f_name = self.storage.save('test.file', f)
|
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
|
|
|
ctime = self.storage.get_created_time(f_name)
|
|
|
|
|
|
|
|
self.assertEqual(ctime, datetime.fromtimestamp(os.path.getctime(self.storage.path(f_name))))
|
|
|
|
self.assertLess(timezone.now() - self.storage.get_created_time(f_name), timedelta(seconds=2))
|
|
|
|
|
|
|
|
@requires_pytz
|
|
|
|
@requires_tz_support
|
|
|
|
def test_file_get_created_time_timezone(self):
|
|
|
|
self._test_file_time_getter(self.storage.get_created_time)
|
|
|
|
|
|
|
|
@ignore_warnings(category=RemovedInDjango20Warning)
|
2010-10-08 15:11:59 +00:00
|
|
|
def test_file_created_time(self):
|
|
|
|
"""
|
2016-02-09 15:00:14 +00:00
|
|
|
File storage returns a datetime for the creation time of a file.
|
2010-10-08 15:11:59 +00:00
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
f = ContentFile('custom contents')
|
2010-10-08 15:11:59 +00:00
|
|
|
f_name = self.storage.save('test.file', f)
|
|
|
|
ctime = self.storage.created_time(f_name)
|
2016-02-09 15:00:14 +00:00
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
self.assertEqual(ctime, datetime.fromtimestamp(os.path.getctime(self.storage.path(f_name))))
|
2014-10-28 10:02:56 +00:00
|
|
|
self.assertLess(datetime.now() - self.storage.created_time(f_name), timedelta(seconds=2))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
@requires_pytz
|
|
|
|
def test_file_get_modified_time(self):
|
|
|
|
"""
|
|
|
|
File storage returns a datetime for the last modified time of a file.
|
|
|
|
"""
|
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
|
|
|
|
|
|
|
f = ContentFile('custom contents')
|
|
|
|
f_name = self.storage.save('test.file', f)
|
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
|
|
|
mtime = self.storage.get_modified_time(f_name)
|
|
|
|
|
|
|
|
self.assertEqual(mtime, datetime.fromtimestamp(os.path.getmtime(self.storage.path(f_name))))
|
|
|
|
self.assertLess(timezone.now() - self.storage.get_modified_time(f_name), timedelta(seconds=2))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
@requires_pytz
|
|
|
|
@requires_tz_support
|
|
|
|
def test_file_get_modified_time_timezone(self):
|
|
|
|
self._test_file_time_getter(self.storage.get_modified_time)
|
|
|
|
|
|
|
|
@ignore_warnings(category=RemovedInDjango20Warning)
|
2010-10-08 15:11:59 +00:00
|
|
|
def test_file_modified_time(self):
|
|
|
|
"""
|
2016-02-09 15:00:14 +00:00
|
|
|
File storage returns a datetime for the last modified time of a file.
|
2010-10-08 15:11:59 +00:00
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
f = ContentFile('custom contents')
|
2010-10-08 15:11:59 +00:00
|
|
|
f_name = self.storage.save('test.file', f)
|
2016-02-09 15:00:14 +00:00
|
|
|
self.addCleanup(self.storage.delete, f_name)
|
2010-10-08 15:11:59 +00:00
|
|
|
mtime = self.storage.modified_time(f_name)
|
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
self.assertEqual(mtime, datetime.fromtimestamp(os.path.getmtime(self.storage.path(f_name))))
|
2014-10-28 10:02:56 +00:00
|
|
|
self.assertLess(datetime.now() - self.storage.modified_time(f_name), timedelta(seconds=2))
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2010-09-13 23:15:06 +00:00
|
|
|
def test_file_save_without_name(self):
|
|
|
|
"""
|
|
|
|
File storage extracts the filename from the content object if no
|
|
|
|
name is given explicitly.
|
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
2010-09-13 23:15:06 +00:00
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
f = ContentFile('custom contents')
|
2010-09-13 23:15:06 +00:00
|
|
|
f.name = 'test.file'
|
|
|
|
|
|
|
|
storage_f_name = self.storage.save(None, f)
|
|
|
|
|
|
|
|
self.assertEqual(storage_f_name, f.name)
|
|
|
|
|
2011-03-03 15:04:39 +00:00
|
|
|
self.assertTrue(os.path.exists(os.path.join(self.temp_dir, f.name)))
|
2010-09-13 23:15:06 +00:00
|
|
|
|
|
|
|
self.storage.delete(storage_f_name)
|
|
|
|
|
2011-05-26 08:21:35 +00:00
|
|
|
def test_file_save_with_path(self):
|
|
|
|
"""
|
|
|
|
Saving a pathname should create intermediate directories as necessary.
|
|
|
|
"""
|
|
|
|
self.assertFalse(self.storage.exists('path/to'))
|
2016-04-08 02:04:45 +00:00
|
|
|
self.storage.save('path/to/test.file', ContentFile('file saved with path'))
|
2011-05-26 08:21:35 +00:00
|
|
|
|
|
|
|
self.assertTrue(self.storage.exists('path/to'))
|
2012-08-15 09:04:40 +00:00
|
|
|
with self.storage.open('path/to/test.file') as f:
|
|
|
|
self.assertEqual(f.read(), b'file saved with path')
|
2011-05-26 08:21:35 +00:00
|
|
|
|
|
|
|
self.assertTrue(os.path.exists(
|
|
|
|
os.path.join(self.temp_dir, 'path', 'to', 'test.file')))
|
|
|
|
|
|
|
|
self.storage.delete('path/to/test.file')
|
|
|
|
|
2014-05-25 20:52:47 +00:00
|
|
|
def test_save_doesnt_close(self):
|
|
|
|
with TemporaryUploadedFile('test', 'text/plain', 1, 'utf8') as file:
|
|
|
|
file.write(b'1')
|
|
|
|
file.seek(0)
|
|
|
|
self.assertFalse(file.closed)
|
|
|
|
self.storage.save('path/to/test.file', file)
|
|
|
|
self.assertFalse(file.closed)
|
|
|
|
self.assertFalse(file.file.closed)
|
|
|
|
|
2016-04-08 02:04:45 +00:00
|
|
|
file = InMemoryUploadedFile(six.StringIO('1'), '', 'test', 'text/plain', 1, 'utf8')
|
2014-05-25 20:52:47 +00:00
|
|
|
with file:
|
|
|
|
self.assertFalse(file.closed)
|
|
|
|
self.storage.save('path/to/test.file', file)
|
|
|
|
self.assertFalse(file.closed)
|
|
|
|
self.assertFalse(file.file.closed)
|
|
|
|
|
2010-09-13 23:15:06 +00:00
|
|
|
def test_file_path(self):
|
|
|
|
"""
|
|
|
|
File storage returns the full path of a file
|
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('test.file'))
|
2010-09-13 23:15:06 +00:00
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
f = ContentFile('custom contents')
|
2010-09-13 23:15:06 +00:00
|
|
|
f_name = self.storage.save('test.file', f)
|
|
|
|
|
2016-04-08 02:04:45 +00:00
|
|
|
self.assertEqual(self.storage.path(f_name), os.path.join(self.temp_dir, f_name))
|
2010-09-13 23:15:06 +00:00
|
|
|
|
|
|
|
self.storage.delete(f_name)
|
|
|
|
|
|
|
|
def test_file_url(self):
|
|
|
|
"""
|
2010-10-09 08:12:50 +00:00
|
|
|
File storage returns a url to access a given file from the Web.
|
2010-09-13 23:15:06 +00:00
|
|
|
"""
|
2016-04-08 02:04:45 +00:00
|
|
|
self.assertEqual(self.storage.url('test.file'), self.storage.base_url + 'test.file')
|
2010-09-13 23:15:06 +00:00
|
|
|
|
2011-02-04 14:43:10 +00:00
|
|
|
# should encode special chars except ~!*()'
|
|
|
|
# like encodeURIComponent() JavaScript function do
|
2016-04-08 02:04:45 +00:00
|
|
|
self.assertEqual(
|
|
|
|
self.storage.url(r"~!*()'@#$%^&*abc`+ =.file"),
|
|
|
|
"/test_media_url/~!*()'%40%23%24%25%5E%26*abc%60%2B%20%3D.file"
|
|
|
|
)
|
|
|
|
self.assertEqual(self.storage.url("ab\0c"), "/test_media_url/ab%00c")
|
2011-02-04 14:43:10 +00:00
|
|
|
|
2015-05-20 17:05:41 +00:00
|
|
|
# should translate os path separator(s) to the url path separator
|
2016-04-08 02:04:45 +00:00
|
|
|
self.assertEqual(self.storage.url("""a/b\\c.file"""), "/test_media_url/a/b/c.file")
|
2011-02-04 14:43:10 +00:00
|
|
|
|
2016-04-03 15:21:56 +00:00
|
|
|
# #25905: remove leading slashes from file names to prevent unsafe url output
|
|
|
|
self.assertEqual(self.storage.url("/evil.com"), "/test_media_url/evil.com")
|
|
|
|
self.assertEqual(self.storage.url(r"\evil.com"), "/test_media_url/evil.com")
|
|
|
|
self.assertEqual(self.storage.url("///evil.com"), "/test_media_url/evil.com")
|
|
|
|
self.assertEqual(self.storage.url(r"\\\evil.com"), "/test_media_url/evil.com")
|
|
|
|
|
|
|
|
self.assertEqual(self.storage.url(None), "/test_media_url/")
|
|
|
|
|
|
|
|
def test_base_url(self):
|
|
|
|
"""
|
|
|
|
File storage returns a url even when its base_url is unset or modified.
|
|
|
|
"""
|
2010-09-13 23:15:06 +00:00
|
|
|
self.storage.base_url = None
|
2016-01-17 11:26:39 +00:00
|
|
|
with self.assertRaises(ValueError):
|
|
|
|
self.storage.url('test.file')
|
2010-09-13 23:15:06 +00:00
|
|
|
|
2014-05-28 17:03:26 +00:00
|
|
|
# #22717: missing ending slash in base_url should be auto-corrected
|
2016-04-08 02:04:45 +00:00
|
|
|
storage = self.storage_class(location=self.temp_dir, base_url='/no_ending_slash')
|
2014-05-28 17:03:26 +00:00
|
|
|
self.assertEqual(
|
|
|
|
storage.url('test.file'),
|
|
|
|
'%s%s' % (storage.base_url, 'test.file')
|
|
|
|
)
|
|
|
|
|
2010-09-13 23:15:06 +00:00
|
|
|
def test_listdir(self):
|
|
|
|
"""
|
|
|
|
File storage returns a tuple containing directories and files.
|
|
|
|
"""
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(self.storage.exists('storage_test_1'))
|
|
|
|
self.assertFalse(self.storage.exists('storage_test_2'))
|
|
|
|
self.assertFalse(self.storage.exists('storage_dir_1'))
|
2010-09-13 23:15:06 +00:00
|
|
|
|
2013-10-19 12:31:38 +00:00
|
|
|
self.storage.save('storage_test_1', ContentFile('custom content'))
|
|
|
|
self.storage.save('storage_test_2', ContentFile('custom content'))
|
2010-09-13 23:15:06 +00:00
|
|
|
os.mkdir(os.path.join(self.temp_dir, 'storage_dir_1'))
|
|
|
|
|
|
|
|
dirs, files = self.storage.listdir('')
|
2014-09-26 12:31:50 +00:00
|
|
|
self.assertEqual(set(dirs), {'storage_dir_1'})
|
2016-04-08 02:04:45 +00:00
|
|
|
self.assertEqual(set(files), {'storage_test_1', 'storage_test_2'})
|
2010-09-13 23:15:06 +00:00
|
|
|
|
|
|
|
self.storage.delete('storage_test_1')
|
|
|
|
self.storage.delete('storage_test_2')
|
|
|
|
os.rmdir(os.path.join(self.temp_dir, 'storage_dir_1'))
|
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
def test_file_storage_prevents_directory_traversal(self):
|
|
|
|
"""
|
|
|
|
File storage prevents directory traversal (files can only be accessed if
|
|
|
|
they're below the storage location).
|
|
|
|
"""
|
2016-01-17 11:26:39 +00:00
|
|
|
with self.assertRaises(SuspiciousOperation):
|
|
|
|
self.storage.exists('..')
|
|
|
|
with self.assertRaises(SuspiciousOperation):
|
|
|
|
self.storage.exists('/etc/passwd')
|
2009-05-08 10:56:51 +00:00
|
|
|
|
2011-05-22 23:56:42 +00:00
|
|
|
def test_file_storage_preserves_filename_case(self):
|
|
|
|
"""The storage backend should preserve case of filenames."""
|
|
|
|
# Create a storage backend associated with the mixed case name
|
|
|
|
# directory.
|
2013-10-29 21:22:45 +00:00
|
|
|
other_temp_storage = self.storage_class(location=self.temp_dir2)
|
2011-05-22 23:56:42 +00:00
|
|
|
# Ask that storage backend to store a file with a mixed case filename.
|
|
|
|
mixed_case = 'CaSe_SeNsItIvE'
|
2013-10-29 21:22:45 +00:00
|
|
|
file = other_temp_storage.open(mixed_case, 'w')
|
2011-05-22 23:56:42 +00:00
|
|
|
file.write('storage contents')
|
|
|
|
file.close()
|
2016-04-08 02:04:45 +00:00
|
|
|
self.assertEqual(os.path.join(self.temp_dir2, mixed_case), other_temp_storage.path(mixed_case))
|
2013-10-29 21:22:45 +00:00
|
|
|
other_temp_storage.delete(mixed_case)
|
2011-05-22 23:56:42 +00:00
|
|
|
|
2011-05-26 08:21:35 +00:00
|
|
|
def test_makedirs_race_handling(self):
|
|
|
|
"""
|
|
|
|
File storage should be robust against directory creation race conditions.
|
|
|
|
"""
|
2011-05-28 13:06:08 +00:00
|
|
|
real_makedirs = os.makedirs
|
|
|
|
|
2011-05-26 08:21:35 +00:00
|
|
|
# Monkey-patch os.makedirs, to simulate a normal call, a raced call,
|
|
|
|
# and an error.
|
|
|
|
def fake_makedirs(path):
|
|
|
|
if path == os.path.join(self.temp_dir, 'normal'):
|
2011-05-28 13:06:08 +00:00
|
|
|
real_makedirs(path)
|
2011-05-26 08:21:35 +00:00
|
|
|
elif path == os.path.join(self.temp_dir, 'raced'):
|
2011-05-28 13:06:08 +00:00
|
|
|
real_makedirs(path)
|
2011-05-26 08:21:35 +00:00
|
|
|
raise OSError(errno.EEXIST, 'simulated EEXIST')
|
|
|
|
elif path == os.path.join(self.temp_dir, 'error'):
|
|
|
|
raise OSError(errno.EACCES, 'simulated EACCES')
|
|
|
|
else:
|
|
|
|
self.fail('unexpected argument %r' % path)
|
|
|
|
|
|
|
|
try:
|
|
|
|
os.makedirs = fake_makedirs
|
|
|
|
|
2016-04-08 02:04:45 +00:00
|
|
|
self.storage.save('normal/test.file', ContentFile('saved normally'))
|
2012-08-15 09:04:40 +00:00
|
|
|
with self.storage.open('normal/test.file') as f:
|
|
|
|
self.assertEqual(f.read(), b'saved normally')
|
2011-05-26 08:21:35 +00:00
|
|
|
|
2016-04-08 02:04:45 +00:00
|
|
|
self.storage.save('raced/test.file', ContentFile('saved with race'))
|
2012-08-15 09:04:40 +00:00
|
|
|
with self.storage.open('raced/test.file') as f:
|
|
|
|
self.assertEqual(f.read(), b'saved with race')
|
2011-05-26 08:21:35 +00:00
|
|
|
|
|
|
|
# Check that OSErrors aside from EEXIST are still raised.
|
2016-01-17 11:26:39 +00:00
|
|
|
with self.assertRaises(OSError):
|
|
|
|
self.storage.save('error/test.file', ContentFile('not saved'))
|
2011-05-26 08:21:35 +00:00
|
|
|
finally:
|
|
|
|
os.makedirs = real_makedirs
|
|
|
|
|
2011-05-28 13:06:08 +00:00
|
|
|
def test_remove_race_handling(self):
|
|
|
|
"""
|
|
|
|
File storage should be robust against file removal race conditions.
|
|
|
|
"""
|
|
|
|
real_remove = os.remove
|
|
|
|
|
|
|
|
# Monkey-patch os.remove, to simulate a normal call, a raced call,
|
|
|
|
# and an error.
|
|
|
|
def fake_remove(path):
|
|
|
|
if path == os.path.join(self.temp_dir, 'normal.file'):
|
|
|
|
real_remove(path)
|
|
|
|
elif path == os.path.join(self.temp_dir, 'raced.file'):
|
|
|
|
real_remove(path)
|
|
|
|
raise OSError(errno.ENOENT, 'simulated ENOENT')
|
|
|
|
elif path == os.path.join(self.temp_dir, 'error.file'):
|
|
|
|
raise OSError(errno.EACCES, 'simulated EACCES')
|
|
|
|
else:
|
|
|
|
self.fail('unexpected argument %r' % path)
|
|
|
|
|
|
|
|
try:
|
|
|
|
os.remove = fake_remove
|
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
self.storage.save('normal.file', ContentFile('delete normally'))
|
2011-05-28 13:06:08 +00:00
|
|
|
self.storage.delete('normal.file')
|
|
|
|
self.assertFalse(self.storage.exists('normal.file'))
|
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
self.storage.save('raced.file', ContentFile('delete with race'))
|
2011-05-28 13:06:08 +00:00
|
|
|
self.storage.delete('raced.file')
|
|
|
|
self.assertFalse(self.storage.exists('normal.file'))
|
|
|
|
|
|
|
|
# Check that OSErrors aside from ENOENT are still raised.
|
2012-08-29 08:00:29 +00:00
|
|
|
self.storage.save('error.file', ContentFile('delete with error'))
|
2016-01-17 11:26:39 +00:00
|
|
|
with self.assertRaises(OSError):
|
|
|
|
self.storage.delete('error.file')
|
2011-05-28 13:06:08 +00:00
|
|
|
finally:
|
|
|
|
os.remove = real_remove
|
|
|
|
|
2012-08-29 13:13:20 +00:00
|
|
|
def test_file_chunks_error(self):
|
|
|
|
"""
|
2014-03-02 14:25:53 +00:00
|
|
|
Test behavior when file.chunks() is raising an error
|
2012-08-29 13:13:20 +00:00
|
|
|
"""
|
|
|
|
f1 = ContentFile('chunks fails')
|
2013-10-22 10:21:07 +00:00
|
|
|
|
2012-08-29 13:13:20 +00:00
|
|
|
def failing_chunks():
|
|
|
|
raise IOError
|
|
|
|
f1.chunks = failing_chunks
|
|
|
|
with self.assertRaises(IOError):
|
|
|
|
self.storage.save('error.file', f1)
|
|
|
|
|
2013-06-27 08:59:30 +00:00
|
|
|
def test_delete_no_name(self):
|
|
|
|
"""
|
|
|
|
Calling delete with an empty name should not try to remove the base
|
|
|
|
storage directory, but fail loudly (#20660).
|
|
|
|
"""
|
|
|
|
with self.assertRaises(AssertionError):
|
|
|
|
self.storage.delete('')
|
|
|
|
|
2016-01-07 04:34:55 +00:00
|
|
|
@override_settings(
|
|
|
|
MEDIA_ROOT='media_root',
|
|
|
|
MEDIA_URL='media_url/',
|
|
|
|
FILE_UPLOAD_PERMISSIONS=0o777,
|
|
|
|
FILE_UPLOAD_DIRECTORY_PERMISSIONS=0o777,
|
|
|
|
)
|
|
|
|
def test_setting_changed(self):
|
|
|
|
"""
|
|
|
|
Properties using settings values as defaults should be updated on
|
|
|
|
referenced settings change while specified values should be unchanged.
|
|
|
|
"""
|
|
|
|
storage = self.storage_class(
|
|
|
|
location='explicit_location',
|
|
|
|
base_url='explicit_base_url/',
|
|
|
|
file_permissions_mode=0o666,
|
|
|
|
directory_permissions_mode=0o666,
|
|
|
|
)
|
|
|
|
defaults_storage = self.storage_class()
|
|
|
|
settings = {
|
|
|
|
'MEDIA_ROOT': 'overriden_media_root',
|
|
|
|
'MEDIA_URL': 'overriden_media_url/',
|
|
|
|
'FILE_UPLOAD_PERMISSIONS': 0o333,
|
|
|
|
'FILE_UPLOAD_DIRECTORY_PERMISSIONS': 0o333,
|
|
|
|
}
|
|
|
|
with self.settings(**settings):
|
|
|
|
self.assertEqual(storage.base_location, 'explicit_location')
|
|
|
|
self.assertIn('explicit_location', storage.location)
|
|
|
|
self.assertEqual(storage.base_url, 'explicit_base_url/')
|
|
|
|
self.assertEqual(storage.file_permissions_mode, 0o666)
|
|
|
|
self.assertEqual(storage.directory_permissions_mode, 0o666)
|
|
|
|
self.assertEqual(defaults_storage.base_location, settings['MEDIA_ROOT'])
|
|
|
|
self.assertIn(settings['MEDIA_ROOT'], defaults_storage.location)
|
|
|
|
self.assertEqual(defaults_storage.base_url, settings['MEDIA_URL'])
|
|
|
|
self.assertEqual(defaults_storage.file_permissions_mode, settings['FILE_UPLOAD_PERMISSIONS'])
|
|
|
|
self.assertEqual(
|
|
|
|
defaults_storage.directory_permissions_mode, settings['FILE_UPLOAD_DIRECTORY_PERMISSIONS']
|
|
|
|
)
|
|
|
|
|
2011-05-28 13:06:08 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
class CustomStorage(FileSystemStorage):
|
2014-10-15 07:42:06 +00:00
|
|
|
def get_available_name(self, name, max_length=None):
|
2009-05-08 10:56:51 +00:00
|
|
|
"""
|
|
|
|
Append numbers to duplicate files rather than underscores, like Trac.
|
|
|
|
"""
|
|
|
|
parts = name.split('.')
|
|
|
|
basename, ext = parts[0], parts[1:]
|
|
|
|
number = 2
|
|
|
|
while self.exists(name):
|
|
|
|
name = '.'.join([basename, str(number)] + ext)
|
|
|
|
number += 1
|
|
|
|
|
|
|
|
return name
|
|
|
|
|
2013-11-03 04:36:09 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
class CustomStorageTests(FileStorageTests):
|
|
|
|
storage_class = CustomStorage
|
2010-10-08 15:11:59 +00:00
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
def test_custom_get_available_name(self):
|
2012-08-29 08:00:29 +00:00
|
|
|
first = self.storage.save('custom_storage', ContentFile('custom contents'))
|
2009-05-08 10:56:51 +00:00
|
|
|
self.assertEqual(first, 'custom_storage')
|
2012-08-29 08:00:29 +00:00
|
|
|
second = self.storage.save('custom_storage', ContentFile('more contents'))
|
2009-05-08 10:56:51 +00:00
|
|
|
self.assertEqual(second, 'custom_storage.2')
|
|
|
|
self.storage.delete(first)
|
|
|
|
self.storage.delete(second)
|
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
|
2016-02-09 15:00:14 +00:00
|
|
|
class CustomStorageLegacyDatetimeHandling(FileSystemStorage):
|
|
|
|
# Use the legacy accessed_time() et al from FileSystemStorage and the
|
|
|
|
# shim get_accessed_time() et al from the Storage baseclass. Both of those
|
|
|
|
# raise warnings, so the testcase class ignores them all.
|
|
|
|
|
|
|
|
def get_accessed_time(self, name):
|
|
|
|
return super(FileSystemStorage, self).get_accessed_time(name)
|
|
|
|
|
|
|
|
def get_created_time(self, name):
|
|
|
|
return super(FileSystemStorage, self).get_created_time(name)
|
|
|
|
|
|
|
|
def get_modified_time(self, name):
|
|
|
|
return super(FileSystemStorage, self).get_modified_time(name)
|
|
|
|
|
|
|
|
|
|
|
|
@ignore_warnings(category=RemovedInDjango20Warning)
|
|
|
|
class CustomStorageLegacyDatetimeHandlingTests(FileStorageTests):
|
|
|
|
storage_class = CustomStorageLegacyDatetimeHandling
|
|
|
|
|
|
|
|
|
2015-04-13 15:56:58 +00:00
|
|
|
class FileFieldStorageTests(TestCase):
|
2013-10-27 20:26:51 +00:00
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(temp_storage_location)
|
|
|
|
|
2015-05-22 17:43:08 +00:00
|
|
|
def _storage_max_filename_length(self, storage):
|
|
|
|
"""
|
|
|
|
Query filesystem for maximum filename length (e.g. AUFS has 242).
|
|
|
|
"""
|
|
|
|
dir_to_test = storage.location
|
|
|
|
while not os.path.exists(dir_to_test):
|
|
|
|
dir_to_test = os.path.dirname(dir_to_test)
|
|
|
|
try:
|
|
|
|
return os.pathconf(dir_to_test, 'PC_NAME_MAX')
|
|
|
|
except Exception:
|
|
|
|
return 255 # Should be safe on most backends
|
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
def test_files(self):
|
2015-10-01 17:00:44 +00:00
|
|
|
self.assertIsInstance(Storage.normal, FileDescriptor)
|
2013-10-27 20:26:51 +00:00
|
|
|
|
|
|
|
# An object without a file has limited functionality.
|
|
|
|
obj1 = Storage()
|
|
|
|
self.assertEqual(obj1.normal.name, "")
|
2016-01-17 11:26:39 +00:00
|
|
|
with self.assertRaises(ValueError):
|
|
|
|
obj1.normal.size
|
2013-10-27 20:26:51 +00:00
|
|
|
|
|
|
|
# Saving a file enables full functionality.
|
|
|
|
obj1.normal.save("django_test.txt", ContentFile("content"))
|
|
|
|
self.assertEqual(obj1.normal.name, "tests/django_test.txt")
|
|
|
|
self.assertEqual(obj1.normal.size, 7)
|
|
|
|
self.assertEqual(obj1.normal.read(), b"content")
|
|
|
|
obj1.normal.close()
|
|
|
|
|
|
|
|
# File objects can be assigned to FileField attributes, but shouldn't
|
|
|
|
# get committed until the model it's attached to is saved.
|
|
|
|
obj1.normal = SimpleUploadedFile("assignment.txt", b"content")
|
|
|
|
dirs, files = temp_storage.listdir("tests")
|
|
|
|
self.assertEqual(dirs, [])
|
2014-10-28 10:02:56 +00:00
|
|
|
self.assertNotIn("assignment.txt", files)
|
2013-10-27 20:26:51 +00:00
|
|
|
|
|
|
|
obj1.save()
|
|
|
|
dirs, files = temp_storage.listdir("tests")
|
|
|
|
self.assertEqual(sorted(files), ["assignment.txt", "django_test.txt"])
|
|
|
|
|
|
|
|
# Save another file with the same name.
|
|
|
|
obj2 = Storage()
|
|
|
|
obj2.normal.save("django_test.txt", ContentFile("more content"))
|
2014-08-08 14:20:08 +00:00
|
|
|
obj2_name = obj2.normal.name
|
|
|
|
six.assertRegex(self, obj2_name, "tests/django_test_%s.txt" % FILE_SUFFIX_REGEX)
|
2013-10-27 20:26:51 +00:00
|
|
|
self.assertEqual(obj2.normal.size, 12)
|
|
|
|
obj2.normal.close()
|
|
|
|
|
|
|
|
# Deleting an object does not delete the file it uses.
|
|
|
|
obj2.delete()
|
|
|
|
obj2.normal.save("django_test.txt", ContentFile("more content"))
|
2014-08-08 14:20:08 +00:00
|
|
|
self.assertNotEqual(obj2_name, obj2.normal.name)
|
|
|
|
six.assertRegex(self, obj2.normal.name, "tests/django_test_%s.txt" % FILE_SUFFIX_REGEX)
|
2013-10-27 20:26:51 +00:00
|
|
|
obj2.normal.close()
|
|
|
|
|
|
|
|
def test_filefield_read(self):
|
|
|
|
# Files can be read in a little at a time, if necessary.
|
|
|
|
obj = Storage.objects.create(
|
|
|
|
normal=SimpleUploadedFile("assignment.txt", b"content"))
|
|
|
|
obj.normal.open()
|
|
|
|
self.assertEqual(obj.normal.read(3), b"con")
|
|
|
|
self.assertEqual(obj.normal.read(), b"tent")
|
|
|
|
self.assertEqual(list(obj.normal.chunks(chunk_size=2)), [b"co", b"nt", b"en", b"t"])
|
|
|
|
obj.normal.close()
|
|
|
|
|
2016-03-22 22:33:35 +00:00
|
|
|
def test_filefield_write(self):
|
|
|
|
# Files can be written to.
|
|
|
|
obj = Storage.objects.create(normal=SimpleUploadedFile('rewritten.txt', b'content'))
|
|
|
|
with obj.normal as normal:
|
|
|
|
normal.open('wb')
|
|
|
|
normal.write(b'updated')
|
|
|
|
obj.refresh_from_db()
|
|
|
|
self.assertEqual(obj.normal.read(), b'updated')
|
|
|
|
obj.normal.close()
|
|
|
|
|
2014-08-08 14:20:08 +00:00
|
|
|
def test_duplicate_filename(self):
|
|
|
|
# Multiple files with the same name get _(7 random chars) appended to them.
|
|
|
|
objs = [Storage() for i in range(2)]
|
2013-10-27 20:26:51 +00:00
|
|
|
for o in objs:
|
|
|
|
o.normal.save("multiple_files.txt", ContentFile("Same Content"))
|
2014-08-08 14:20:08 +00:00
|
|
|
try:
|
|
|
|
names = [o.normal.name for o in objs]
|
|
|
|
self.assertEqual(names[0], "tests/multiple_files.txt")
|
|
|
|
six.assertRegex(self, names[1], "tests/multiple_files_%s.txt" % FILE_SUFFIX_REGEX)
|
|
|
|
finally:
|
|
|
|
for o in objs:
|
|
|
|
o.delete()
|
2013-10-27 20:26:51 +00:00
|
|
|
|
2014-10-15 07:42:06 +00:00
|
|
|
def test_file_truncation(self):
|
|
|
|
# Given the max_length is limited, when multiple files get uploaded
|
|
|
|
# under the same name, then the filename get truncated in order to fit
|
|
|
|
# in _(7 random chars). When most of the max_length is taken by
|
|
|
|
# dirname + extension and there are not enough characters in the
|
|
|
|
# filename to truncate, an exception should be raised.
|
|
|
|
objs = [Storage() for i in range(2)]
|
|
|
|
filename = 'filename.ext'
|
|
|
|
|
|
|
|
for o in objs:
|
|
|
|
o.limited_length.save(filename, ContentFile('Same Content'))
|
|
|
|
try:
|
|
|
|
# Testing truncation.
|
|
|
|
names = [o.limited_length.name for o in objs]
|
|
|
|
self.assertEqual(names[0], 'tests/%s' % filename)
|
|
|
|
six.assertRegex(self, names[1], 'tests/fi_%s.ext' % FILE_SUFFIX_REGEX)
|
|
|
|
|
|
|
|
# Testing exception is raised when filename is too short to truncate.
|
|
|
|
filename = 'short.longext'
|
|
|
|
objs[0].limited_length.save(filename, ContentFile('Same Content'))
|
2016-01-04 08:50:08 +00:00
|
|
|
with self.assertRaisesMessage(SuspiciousFileOperation, 'Storage can not find an available filename'):
|
|
|
|
objs[1].limited_length.save(*(filename, ContentFile('Same Content')))
|
2014-10-15 07:42:06 +00:00
|
|
|
finally:
|
|
|
|
for o in objs:
|
|
|
|
o.delete()
|
|
|
|
|
2015-01-14 20:00:27 +00:00
|
|
|
@unittest.skipIf(
|
|
|
|
sys.platform.startswith('win'),
|
|
|
|
"Windows supports at most 260 characters in a path.",
|
|
|
|
)
|
2014-10-15 07:42:06 +00:00
|
|
|
def test_extended_length_storage(self):
|
|
|
|
# Testing FileField with max_length > 255. Most systems have filename
|
|
|
|
# length limitation of 255. Path takes extra chars.
|
2015-05-22 17:43:08 +00:00
|
|
|
filename = (self._storage_max_filename_length(temp_storage) - 4) * 'a' # 4 chars for extension.
|
2014-10-15 07:42:06 +00:00
|
|
|
obj = Storage()
|
|
|
|
obj.extended_length.save('%s.txt' % filename, ContentFile('Same Content'))
|
|
|
|
self.assertEqual(obj.extended_length.name, 'tests/%s.txt' % filename)
|
|
|
|
self.assertEqual(obj.extended_length.read(), b'Same Content')
|
|
|
|
obj.extended_length.close()
|
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
def test_filefield_default(self):
|
|
|
|
# Default values allow an object to access a single file.
|
|
|
|
temp_storage.save('tests/default.txt', ContentFile('default content'))
|
|
|
|
obj = Storage.objects.create()
|
|
|
|
self.assertEqual(obj.default.name, "tests/default.txt")
|
|
|
|
self.assertEqual(obj.default.read(), b"default content")
|
|
|
|
obj.default.close()
|
|
|
|
|
|
|
|
# But it shouldn't be deleted, even if there are no more objects using
|
|
|
|
# it.
|
|
|
|
obj.delete()
|
|
|
|
obj = Storage()
|
|
|
|
self.assertEqual(obj.default.read(), b"default content")
|
|
|
|
obj.default.close()
|
|
|
|
|
|
|
|
def test_empty_upload_to(self):
|
|
|
|
# upload_to can be empty, meaning it does not use subdirectory.
|
|
|
|
obj = Storage()
|
|
|
|
obj.empty.save('django_test.txt', ContentFile('more content'))
|
|
|
|
self.assertEqual(obj.empty.name, "./django_test.txt")
|
|
|
|
self.assertEqual(obj.empty.read(), b"more content")
|
|
|
|
obj.empty.close()
|
|
|
|
|
|
|
|
def test_random_upload_to(self):
|
|
|
|
# Verify the fix for #5655, making sure the directory is only
|
|
|
|
# determined once.
|
|
|
|
obj = Storage()
|
|
|
|
obj.random.save("random_file", ContentFile("random content"))
|
|
|
|
self.assertTrue(obj.random.name.endswith("/random_file"))
|
|
|
|
obj.random.close()
|
|
|
|
|
2015-05-03 04:10:24 +00:00
|
|
|
def test_custom_valid_name_callable_upload_to(self):
|
|
|
|
"""
|
|
|
|
Storage.get_valid_name() should be called when upload_to is a callable.
|
|
|
|
"""
|
|
|
|
obj = Storage()
|
|
|
|
obj.custom_valid_name.save("random_file", ContentFile("random content"))
|
|
|
|
# CustomValidNameStorage.get_valid_name() appends '_valid' to the name
|
|
|
|
self.assertTrue(obj.custom_valid_name.name.endswith("/random_file_valid"))
|
|
|
|
obj.custom_valid_name.close()
|
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
def test_filefield_pickling(self):
|
|
|
|
# Push an object into the cache to make sure it pickles properly
|
|
|
|
obj = Storage()
|
|
|
|
obj.normal.save("django_test.txt", ContentFile("more content"))
|
|
|
|
obj.normal.close()
|
|
|
|
cache.set("obj", obj)
|
|
|
|
self.assertEqual(cache.get("obj").normal.name, "tests/django_test.txt")
|
|
|
|
|
|
|
|
def test_file_object(self):
|
|
|
|
# Create sample file
|
|
|
|
temp_storage.save('tests/example.txt', ContentFile('some content'))
|
|
|
|
|
|
|
|
# Load it as python file object
|
|
|
|
with open(temp_storage.path('tests/example.txt')) as file_obj:
|
|
|
|
# Save it using storage and read its content
|
|
|
|
temp_storage.save('tests/file_obj', file_obj)
|
|
|
|
self.assertTrue(temp_storage.exists('tests/file_obj'))
|
|
|
|
with temp_storage.open('tests/file_obj') as f:
|
|
|
|
self.assertEqual(f.read(), b'some content')
|
|
|
|
|
|
|
|
def test_stringio(self):
|
|
|
|
# Test passing StringIO instance as content argument to save
|
|
|
|
output = six.StringIO()
|
|
|
|
output.write('content')
|
|
|
|
output.seek(0)
|
|
|
|
|
|
|
|
# Save it and read written file
|
|
|
|
temp_storage.save('tests/stringio', output)
|
|
|
|
self.assertTrue(temp_storage.exists('tests/stringio'))
|
|
|
|
with temp_storage.open('tests/stringio') as f:
|
|
|
|
self.assertEqual(f.read(), b'content')
|
|
|
|
|
2009-05-08 10:56:51 +00:00
|
|
|
|
|
|
|
# Tests for a race condition on file saving (#4948).
|
|
|
|
# This is written in such a way that it'll always pass on platforms
|
|
|
|
# without threading.
|
|
|
|
|
2008-08-11 16:51:18 +00:00
|
|
|
class SlowFile(ContentFile):
|
|
|
|
def chunks(self):
|
|
|
|
time.sleep(1)
|
|
|
|
return super(ContentFile, self).chunks()
|
|
|
|
|
2013-11-03 04:36:09 +00:00
|
|
|
|
2010-10-11 12:55:17 +00:00
|
|
|
class FileSaveRaceConditionTest(unittest.TestCase):
|
2008-08-11 16:51:18 +00:00
|
|
|
def setUp(self):
|
2008-10-10 22:13:16 +00:00
|
|
|
self.storage_dir = tempfile.mkdtemp()
|
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
2008-08-11 16:51:18 +00:00
|
|
|
self.thread = threading.Thread(target=self.save_file, args=['conflict'])
|
2009-05-08 05:50:31 +00:00
|
|
|
|
2008-10-10 22:13:16 +00:00
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(self.storage_dir)
|
2009-05-08 05:50:31 +00:00
|
|
|
|
2008-08-11 16:51:18 +00:00
|
|
|
def save_file(self, name):
|
2012-05-19 15:43:34 +00:00
|
|
|
name = self.storage.save(name, SlowFile(b"Data"))
|
2009-05-08 05:50:31 +00:00
|
|
|
|
2008-08-11 16:51:18 +00:00
|
|
|
def test_race_condition(self):
|
|
|
|
self.thread.start()
|
2013-10-19 12:31:38 +00:00
|
|
|
self.save_file('conflict')
|
2008-08-11 16:51:18 +00:00
|
|
|
self.thread.join()
|
2014-08-08 14:20:08 +00:00
|
|
|
files = sorted(os.listdir(self.storage_dir))
|
|
|
|
self.assertEqual(files[0], 'conflict')
|
|
|
|
six.assertRegex(self, files[1], 'conflict_%s' % FILE_SUFFIX_REGEX)
|
2008-08-11 16:51:18 +00:00
|
|
|
|
2013-11-03 04:36:09 +00:00
|
|
|
|
2012-09-05 15:05:28 +00:00
|
|
|
@unittest.skipIf(sys.platform.startswith('win'), "Windows only partially supports umasks and chmod.")
|
2010-10-11 12:55:17 +00:00
|
|
|
class FileStoragePermissions(unittest.TestCase):
|
2008-08-27 22:21:14 +00:00
|
|
|
def setUp(self):
|
2012-09-05 15:05:28 +00:00
|
|
|
self.umask = 0o027
|
|
|
|
self.old_umask = os.umask(self.umask)
|
2008-10-10 22:13:16 +00:00
|
|
|
self.storage_dir = tempfile.mkdtemp()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(self.storage_dir)
|
2012-09-05 15:05:28 +00:00
|
|
|
os.umask(self.old_umask)
|
2008-10-10 22:13:16 +00:00
|
|
|
|
2012-09-05 15:05:28 +00:00
|
|
|
@override_settings(FILE_UPLOAD_PERMISSIONS=0o654)
|
2008-08-27 22:21:14 +00:00
|
|
|
def test_file_upload_permissions(self):
|
2013-10-19 12:40:12 +00:00
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
2012-08-29 08:00:29 +00:00
|
|
|
name = self.storage.save("the_file", ContentFile("data"))
|
2012-07-20 11:28:36 +00:00
|
|
|
actual_mode = os.stat(self.storage.path(name))[0] & 0o777
|
2012-09-05 15:05:28 +00:00
|
|
|
self.assertEqual(actual_mode, 0o654)
|
2008-10-10 22:13:16 +00:00
|
|
|
|
2012-09-05 15:05:28 +00:00
|
|
|
@override_settings(FILE_UPLOAD_PERMISSIONS=None)
|
|
|
|
def test_file_upload_default_permissions(self):
|
2013-10-19 12:40:12 +00:00
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
2012-09-05 15:05:28 +00:00
|
|
|
fname = self.storage.save("some_file", ContentFile("data"))
|
|
|
|
mode = os.stat(self.storage.path(fname))[0] & 0o777
|
|
|
|
self.assertEqual(mode, 0o666 & ~self.umask)
|
2009-05-08 05:50:31 +00:00
|
|
|
|
2013-05-13 11:38:53 +00:00
|
|
|
@override_settings(FILE_UPLOAD_DIRECTORY_PERMISSIONS=0o765)
|
|
|
|
def test_file_upload_directory_permissions(self):
|
2013-10-19 12:40:12 +00:00
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
2013-05-13 11:38:53 +00:00
|
|
|
name = self.storage.save("the_directory/the_file", ContentFile("data"))
|
|
|
|
dir_mode = os.stat(os.path.dirname(self.storage.path(name)))[0] & 0o777
|
|
|
|
self.assertEqual(dir_mode, 0o765)
|
|
|
|
|
|
|
|
@override_settings(FILE_UPLOAD_DIRECTORY_PERMISSIONS=None)
|
|
|
|
def test_file_upload_directory_default_permissions(self):
|
2013-10-19 12:40:12 +00:00
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
2013-05-13 11:38:53 +00:00
|
|
|
name = self.storage.save("the_directory/the_file", ContentFile("data"))
|
|
|
|
dir_mode = os.stat(os.path.dirname(self.storage.path(name)))[0] & 0o777
|
|
|
|
self.assertEqual(dir_mode, 0o777 & ~self.umask)
|
|
|
|
|
2013-11-03 04:36:09 +00:00
|
|
|
|
2010-10-11 12:55:17 +00:00
|
|
|
class FileStoragePathParsing(unittest.TestCase):
|
2009-05-08 05:50:31 +00:00
|
|
|
def setUp(self):
|
|
|
|
self.storage_dir = tempfile.mkdtemp()
|
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(self.storage_dir)
|
|
|
|
|
|
|
|
def test_directory_with_dot(self):
|
|
|
|
"""Regression test for #9610.
|
|
|
|
|
|
|
|
If the directory name contains a dot and the file name doesn't, make
|
|
|
|
sure we still mangle the file name instead of the directory name.
|
|
|
|
"""
|
|
|
|
|
2012-08-29 08:00:29 +00:00
|
|
|
self.storage.save('dotted.path/test', ContentFile("1"))
|
|
|
|
self.storage.save('dotted.path/test', ContentFile("2"))
|
2009-05-08 05:50:31 +00:00
|
|
|
|
2014-08-08 14:20:08 +00:00
|
|
|
files = sorted(os.listdir(os.path.join(self.storage_dir, 'dotted.path')))
|
2010-12-04 07:28:12 +00:00
|
|
|
self.assertFalse(os.path.exists(os.path.join(self.storage_dir, 'dotted_.path')))
|
2014-08-08 14:20:08 +00:00
|
|
|
self.assertEqual(files[0], 'test')
|
|
|
|
six.assertRegex(self, files[1], 'test_%s' % FILE_SUFFIX_REGEX)
|
2009-05-08 05:50:31 +00:00
|
|
|
|
|
|
|
def test_first_character_dot(self):
|
|
|
|
"""
|
|
|
|
File names with a dot as their first character don't have an extension,
|
|
|
|
and the underscore should get added to the end.
|
|
|
|
"""
|
2012-08-29 08:00:29 +00:00
|
|
|
self.storage.save('dotted.path/.test', ContentFile("1"))
|
|
|
|
self.storage.save('dotted.path/.test', ContentFile("2"))
|
2009-05-08 05:50:31 +00:00
|
|
|
|
2014-08-08 14:20:08 +00:00
|
|
|
files = sorted(os.listdir(os.path.join(self.storage_dir, 'dotted.path')))
|
|
|
|
self.assertFalse(os.path.exists(os.path.join(self.storage_dir, 'dotted_.path')))
|
|
|
|
self.assertEqual(files[0], '.test')
|
|
|
|
six.assertRegex(self, files[1], '.test_%s' % FILE_SUFFIX_REGEX)
|
2009-05-08 10:56:51 +00:00
|
|
|
|
2013-10-22 10:21:07 +00:00
|
|
|
|
2013-10-27 20:26:51 +00:00
|
|
|
class ContentFileStorageTestCase(unittest.TestCase):
|
2012-08-29 07:45:02 +00:00
|
|
|
|
2012-12-06 16:14:44 +00:00
|
|
|
def setUp(self):
|
|
|
|
self.storage_dir = tempfile.mkdtemp()
|
|
|
|
self.storage = FileSystemStorage(self.storage_dir)
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(self.storage_dir)
|
|
|
|
|
|
|
|
def test_content_saving(self):
|
|
|
|
"""
|
|
|
|
Test that ContentFile can be saved correctly with the filesystem storage,
|
|
|
|
both if it was initialized with string or unicode content"""
|
|
|
|
self.storage.save('bytes.txt', ContentFile(b"content"))
|
|
|
|
self.storage.save('unicode.txt', ContentFile("español"))
|
|
|
|
|
2012-08-29 07:45:02 +00:00
|
|
|
|
2014-04-05 06:04:46 +00:00
|
|
|
@override_settings(ROOT_URLCONF='file_storage.urls')
|
2013-06-04 05:55:20 +00:00
|
|
|
class FileLikeObjectTestCase(LiveServerTestCase):
|
2012-04-05 15:44:04 +00:00
|
|
|
"""
|
|
|
|
Test file-like objects (#15644).
|
|
|
|
"""
|
2013-06-04 06:09:29 +00:00
|
|
|
|
|
|
|
available_apps = []
|
2013-06-04 05:55:20 +00:00
|
|
|
|
2012-04-05 15:44:04 +00:00
|
|
|
def setUp(self):
|
|
|
|
self.temp_dir = tempfile.mkdtemp()
|
|
|
|
self.storage = FileSystemStorage(location=self.temp_dir)
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
shutil.rmtree(self.temp_dir)
|
|
|
|
|
|
|
|
def test_urllib2_urlopen(self):
|
|
|
|
"""
|
|
|
|
Test the File storage API with a file like object coming from urllib2.urlopen()
|
|
|
|
"""
|
2013-06-04 05:55:20 +00:00
|
|
|
file_like_object = urlopen(self.live_server_url + '/')
|
2012-04-05 15:44:04 +00:00
|
|
|
f = File(file_like_object)
|
|
|
|
stored_filename = self.storage.save("remote_file.html", f)
|
|
|
|
|
2013-06-04 05:55:20 +00:00
|
|
|
remote_file = urlopen(self.live_server_url + '/')
|
2013-02-24 12:10:42 +00:00
|
|
|
with self.storage.open(stored_filename) as stored_file:
|
|
|
|
self.assertEqual(stored_file.read(), remote_file.read())
|