2013-01-31 19:34:36 +00:00
|
|
|
import re
|
2017-01-07 11:11:46 +00:00
|
|
|
from io import StringIO
|
2017-01-19 17:16:04 +00:00
|
|
|
from unittest import mock, skipUnless
|
2013-01-31 19:34:36 +00:00
|
|
|
|
2011-01-24 14:58:05 +00:00
|
|
|
from django.core.management import call_command
|
2012-10-27 01:51:14 +00:00
|
|
|
from django.db import connection
|
2018-01-09 16:04:56 +00:00
|
|
|
from django.db.backends.base.introspection import TableInfo
|
|
|
|
from django.test import TestCase, TransactionTestCase, skipUnlessDBFeature
|
2011-01-24 14:58:05 +00:00
|
|
|
|
2016-12-13 11:38:09 +00:00
|
|
|
from .models import PeopleMoreData
|
|
|
|
|
2013-11-03 04:36:09 +00:00
|
|
|
|
2018-03-12 14:02:10 +00:00
|
|
|
def inspectdb_tables_only(table_name):
|
|
|
|
"""
|
|
|
|
Limit introspection to tables created for models of this app.
|
|
|
|
Some databases such as Oracle are extremely slow at introspection.
|
|
|
|
"""
|
|
|
|
return table_name.startswith('inspectdb_')
|
|
|
|
|
|
|
|
|
|
|
|
def special_table_only(table_name):
|
|
|
|
return table_name.startswith('inspectdb_special')
|
|
|
|
|
|
|
|
|
2011-01-24 14:58:05 +00:00
|
|
|
class InspectDBTestCase(TestCase):
|
2016-12-13 11:38:09 +00:00
|
|
|
unique_re = re.compile(r'.*unique_together = \((.+),\).*')
|
2011-02-01 14:42:52 +00:00
|
|
|
|
2012-06-01 23:58:53 +00:00
|
|
|
def test_stealth_table_name_filter_option(self):
|
|
|
|
out = StringIO()
|
2018-03-12 14:02:10 +00:00
|
|
|
call_command('inspectdb', table_name_filter=inspectdb_tables_only, stdout=out)
|
2012-06-01 23:58:53 +00:00
|
|
|
error_message = "inspectdb has examined a table that should have been filtered out."
|
|
|
|
# contrib.contenttypes is one of the apps always installed when running
|
|
|
|
# the Django test suite, check that one of its tables hasn't been
|
|
|
|
# inspected
|
|
|
|
self.assertNotIn("class DjangoContentType(models.Model):", out.getvalue(), msg=error_message)
|
|
|
|
|
2015-11-01 23:53:43 +00:00
|
|
|
def test_table_option(self):
|
|
|
|
"""
|
|
|
|
inspectdb can inspect a subset of tables by passing the table names as
|
|
|
|
arguments.
|
|
|
|
"""
|
|
|
|
out = StringIO()
|
|
|
|
call_command('inspectdb', 'inspectdb_people', stdout=out)
|
|
|
|
output = out.getvalue()
|
|
|
|
self.assertIn('class InspectdbPeople(models.Model):', output)
|
|
|
|
self.assertNotIn("InspectdbPeopledata", output)
|
|
|
|
|
2014-01-29 17:18:32 +00:00
|
|
|
def make_field_type_asserter(self):
|
|
|
|
"""Call inspectdb and return a function to validate a field type in its output"""
|
2013-01-31 19:34:36 +00:00
|
|
|
out = StringIO()
|
2017-01-07 20:41:42 +00:00
|
|
|
call_command('inspectdb', 'inspectdb_columntypes', stdout=out)
|
2013-01-31 19:34:36 +00:00
|
|
|
output = out.getvalue()
|
2013-10-22 10:21:07 +00:00
|
|
|
|
2013-01-31 19:34:36 +00:00
|
|
|
def assertFieldType(name, definition):
|
|
|
|
out_def = re.search(r'^\s*%s = (models.*)$' % name, output, re.MULTILINE).groups()[0]
|
|
|
|
self.assertEqual(definition, out_def)
|
|
|
|
|
2014-01-29 17:18:32 +00:00
|
|
|
return assertFieldType
|
|
|
|
|
|
|
|
def test_field_types(self):
|
|
|
|
"""Test introspection of various Django field types"""
|
|
|
|
assertFieldType = self.make_field_type_asserter()
|
|
|
|
|
2014-05-07 20:14:39 +00:00
|
|
|
# Inspecting Oracle DB doesn't produce correct results (#19884):
|
|
|
|
# - it reports fields as blank=True when they aren't.
|
2016-12-19 21:16:11 +00:00
|
|
|
if not connection.features.interprets_empty_strings_as_nulls:
|
2014-05-07 20:14:39 +00:00
|
|
|
assertFieldType('char_field', "models.CharField(max_length=10)")
|
2014-10-20 18:05:43 +00:00
|
|
|
assertFieldType('null_char_field', "models.CharField(max_length=10, blank=True, null=True)")
|
2014-06-30 18:34:45 +00:00
|
|
|
assertFieldType('email_field', "models.CharField(max_length=254)")
|
2014-05-07 20:14:39 +00:00
|
|
|
assertFieldType('file_field', "models.CharField(max_length=100)")
|
|
|
|
assertFieldType('file_path_field', "models.CharField(max_length=100)")
|
2016-12-19 21:16:11 +00:00
|
|
|
assertFieldType('slug_field', "models.CharField(max_length=50)")
|
|
|
|
assertFieldType('text_field', "models.TextField()")
|
|
|
|
assertFieldType('url_field', "models.CharField(max_length=200)")
|
|
|
|
assertFieldType('date_field', "models.DateField()")
|
|
|
|
assertFieldType('date_time_field', "models.DateTimeField()")
|
2014-05-07 20:14:39 +00:00
|
|
|
if connection.features.can_introspect_ip_address_field:
|
2017-01-19 10:00:41 +00:00
|
|
|
assertFieldType('gen_ip_address_field', "models.GenericIPAddressField()")
|
2016-12-19 21:16:11 +00:00
|
|
|
elif not connection.features.interprets_empty_strings_as_nulls:
|
2017-01-19 10:00:41 +00:00
|
|
|
assertFieldType('gen_ip_address_field', "models.CharField(max_length=39)")
|
2014-05-07 20:14:39 +00:00
|
|
|
if connection.features.can_introspect_time_field:
|
|
|
|
assertFieldType('time_field', "models.TimeField()")
|
2016-07-20 07:01:57 +00:00
|
|
|
if connection.features.has_native_uuid_field:
|
|
|
|
assertFieldType('uuid_field', "models.UUIDField()")
|
2016-12-19 21:16:11 +00:00
|
|
|
elif not connection.features.interprets_empty_strings_as_nulls:
|
2016-07-20 07:01:57 +00:00
|
|
|
assertFieldType('uuid_field', "models.CharField(max_length=32)")
|
2014-01-29 17:18:32 +00:00
|
|
|
|
|
|
|
def test_number_field_types(self):
|
|
|
|
"""Test introspection of various Django field types"""
|
|
|
|
assertFieldType = self.make_field_type_asserter()
|
|
|
|
|
2013-09-12 14:03:29 +00:00
|
|
|
if not connection.features.can_introspect_autofield:
|
2014-01-15 23:01:30 +00:00
|
|
|
assertFieldType('id', "models.IntegerField(primary_key=True) # AutoField?")
|
2014-05-07 20:14:39 +00:00
|
|
|
|
|
|
|
if connection.features.can_introspect_big_integer_field:
|
|
|
|
assertFieldType('big_int_field', "models.BigIntegerField()")
|
2013-01-31 19:34:36 +00:00
|
|
|
else:
|
2014-05-07 20:14:39 +00:00
|
|
|
assertFieldType('big_int_field', "models.IntegerField()")
|
|
|
|
|
2018-03-16 14:52:04 +00:00
|
|
|
bool_field_type = connection.features.introspected_boolean_field_type
|
2014-09-26 21:18:22 +00:00
|
|
|
assertFieldType('bool_field', "models.{}()".format(bool_field_type))
|
2018-03-16 14:52:04 +00:00
|
|
|
assertFieldType('null_bool_field', 'models.{}(blank=True, null=True)'.format(bool_field_type))
|
2014-05-07 20:14:39 +00:00
|
|
|
|
2014-06-05 22:29:24 +00:00
|
|
|
if connection.features.can_introspect_decimal_field:
|
|
|
|
assertFieldType('decimal_field', "models.DecimalField(max_digits=6, decimal_places=1)")
|
|
|
|
else: # Guessed arguments on SQLite, see #5014
|
2014-01-15 23:01:30 +00:00
|
|
|
assertFieldType('decimal_field', "models.DecimalField(max_digits=10, decimal_places=5) "
|
2014-01-29 17:18:32 +00:00
|
|
|
"# max_digits and decimal_places have been guessed, "
|
|
|
|
"as this database handles decimal fields as float")
|
2014-05-07 20:14:39 +00:00
|
|
|
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('float_field', "models.FloatField()")
|
2014-05-07 20:14:39 +00:00
|
|
|
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('int_field', "models.IntegerField()")
|
2014-05-07 20:14:39 +00:00
|
|
|
|
|
|
|
if connection.features.can_introspect_positive_integer_field:
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('pos_int_field', "models.PositiveIntegerField()")
|
2013-01-31 19:34:36 +00:00
|
|
|
else:
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('pos_int_field', "models.IntegerField()")
|
2014-05-07 20:14:39 +00:00
|
|
|
|
|
|
|
if connection.features.can_introspect_positive_integer_field:
|
|
|
|
if connection.features.can_introspect_small_integer_field:
|
|
|
|
assertFieldType('pos_small_int_field', "models.PositiveSmallIntegerField()")
|
|
|
|
else:
|
|
|
|
assertFieldType('pos_small_int_field', "models.PositiveIntegerField()")
|
|
|
|
else:
|
|
|
|
if connection.features.can_introspect_small_integer_field:
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('pos_small_int_field', "models.SmallIntegerField()")
|
2013-01-31 19:34:36 +00:00
|
|
|
else:
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('pos_small_int_field', "models.IntegerField()")
|
2014-05-07 20:14:39 +00:00
|
|
|
|
|
|
|
if connection.features.can_introspect_small_integer_field:
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('small_int_field', "models.SmallIntegerField()")
|
2013-01-31 19:34:36 +00:00
|
|
|
else:
|
2013-02-01 01:00:25 +00:00
|
|
|
assertFieldType('small_int_field', "models.IntegerField()")
|
2013-01-31 19:34:36 +00:00
|
|
|
|
2011-02-01 14:42:52 +00:00
|
|
|
@skipUnlessDBFeature('can_introspect_foreign_keys')
|
2011-01-24 14:58:05 +00:00
|
|
|
def test_attribute_name_not_python_keyword(self):
|
|
|
|
out = StringIO()
|
2018-03-12 14:02:10 +00:00
|
|
|
call_command('inspectdb', table_name_filter=inspectdb_tables_only, stdout=out)
|
2012-08-23 19:07:56 +00:00
|
|
|
output = out.getvalue()
|
2011-01-24 14:58:05 +00:00
|
|
|
error_message = "inspectdb generated an attribute name which is a python keyword"
|
2013-01-28 09:21:07 +00:00
|
|
|
# Recursive foreign keys should be set to 'self'
|
2015-07-22 14:43:21 +00:00
|
|
|
self.assertIn("parent = models.ForeignKey('self', models.DO_NOTHING)", output)
|
|
|
|
self.assertNotIn(
|
|
|
|
"from = models.ForeignKey(InspectdbPeople, models.DO_NOTHING)",
|
|
|
|
output,
|
|
|
|
msg=error_message,
|
|
|
|
)
|
2012-04-27 06:56:31 +00:00
|
|
|
# As InspectdbPeople model is defined after InspectdbMessage, it should be quoted
|
2015-07-22 14:43:21 +00:00
|
|
|
self.assertIn(
|
|
|
|
"from_field = models.ForeignKey('InspectdbPeople', models.DO_NOTHING, db_column='from_id')",
|
|
|
|
output,
|
|
|
|
)
|
|
|
|
self.assertIn(
|
|
|
|
"people_pk = models.ForeignKey(InspectdbPeople, models.DO_NOTHING, primary_key=True)",
|
|
|
|
output,
|
|
|
|
)
|
|
|
|
self.assertIn(
|
|
|
|
"people_unique = models.ForeignKey(InspectdbPeople, models.DO_NOTHING, unique=True)",
|
|
|
|
output,
|
|
|
|
)
|
2012-02-11 20:53:48 +00:00
|
|
|
|
|
|
|
def test_digits_column_name_introspection(self):
|
|
|
|
"""Introspection of column names consist/start with digits (#16536/#17676)"""
|
|
|
|
out = StringIO()
|
2017-01-07 20:41:42 +00:00
|
|
|
call_command('inspectdb', 'inspectdb_digitsincolumnname', stdout=out)
|
2012-08-23 19:07:56 +00:00
|
|
|
output = out.getvalue()
|
2012-02-11 20:53:48 +00:00
|
|
|
error_message = "inspectdb generated a model field name which is a number"
|
2012-08-23 19:07:56 +00:00
|
|
|
self.assertNotIn(" 123 = models.CharField", output, msg=error_message)
|
|
|
|
self.assertIn("number_123 = models.CharField", output)
|
2012-02-11 20:53:48 +00:00
|
|
|
|
|
|
|
error_message = "inspectdb generated a model field name which starts with a digit"
|
2012-08-23 19:07:56 +00:00
|
|
|
self.assertNotIn(" 4extra = models.CharField", output, msg=error_message)
|
|
|
|
self.assertIn("number_4extra = models.CharField", output)
|
|
|
|
|
|
|
|
self.assertNotIn(" 45extra = models.CharField", output, msg=error_message)
|
|
|
|
self.assertIn("number_45extra = models.CharField", output)
|
2012-02-11 20:53:48 +00:00
|
|
|
|
2012-08-23 20:50:25 +00:00
|
|
|
def test_special_column_name_introspection(self):
|
2012-10-27 01:51:14 +00:00
|
|
|
"""
|
|
|
|
Introspection of column names containing special characters,
|
|
|
|
unsuitable for Python identifiers
|
2012-08-23 20:50:25 +00:00
|
|
|
"""
|
2012-08-23 19:07:56 +00:00
|
|
|
out = StringIO()
|
2018-03-12 14:02:10 +00:00
|
|
|
call_command('inspectdb', table_name_filter=special_table_only, stdout=out)
|
2012-08-23 19:07:56 +00:00
|
|
|
output = out.getvalue()
|
2018-01-03 18:24:02 +00:00
|
|
|
base_name = 'field' if connection.features.uppercases_column_names else 'Field'
|
2012-08-23 19:07:56 +00:00
|
|
|
self.assertIn("field = models.IntegerField()", output)
|
2012-10-27 01:51:14 +00:00
|
|
|
self.assertIn("field_field = models.IntegerField(db_column='%s_')" % base_name, output)
|
|
|
|
self.assertIn("field_field_0 = models.IntegerField(db_column='%s__')" % base_name, output)
|
2012-08-23 19:07:56 +00:00
|
|
|
self.assertIn("field_field_1 = models.IntegerField(db_column='__field')", output)
|
2012-08-23 20:50:25 +00:00
|
|
|
self.assertIn("prc_x = models.IntegerField(db_column='prc(%) x')", output)
|
2016-12-01 10:38:01 +00:00
|
|
|
self.assertIn("tamaño = models.IntegerField()", output)
|
2013-02-03 00:08:45 +00:00
|
|
|
|
2014-07-05 18:48:57 +00:00
|
|
|
def test_table_name_introspection(self):
|
|
|
|
"""
|
|
|
|
Introspection of table names containing special characters,
|
|
|
|
unsuitable for Python identifiers
|
|
|
|
"""
|
|
|
|
out = StringIO()
|
2018-03-12 14:02:10 +00:00
|
|
|
call_command('inspectdb', table_name_filter=special_table_only, stdout=out)
|
2014-07-05 18:48:57 +00:00
|
|
|
output = out.getvalue()
|
|
|
|
self.assertIn("class InspectdbSpecialTableName(models.Model):", output)
|
|
|
|
|
2013-02-03 00:08:45 +00:00
|
|
|
def test_managed_models(self):
|
2016-10-27 07:53:39 +00:00
|
|
|
"""By default the command generates models with `Meta.managed = False` (#14305)"""
|
2013-02-03 00:08:45 +00:00
|
|
|
out = StringIO()
|
2017-01-07 20:41:42 +00:00
|
|
|
call_command('inspectdb', 'inspectdb_columntypes', stdout=out)
|
2013-02-03 00:08:45 +00:00
|
|
|
output = out.getvalue()
|
|
|
|
self.longMessage = False
|
|
|
|
self.assertIn(" managed = False", output, msg='inspectdb should generate unmanaged models.')
|
2013-09-11 15:12:56 +00:00
|
|
|
|
2014-07-14 20:42:05 +00:00
|
|
|
def test_unique_together_meta(self):
|
|
|
|
out = StringIO()
|
2017-01-07 20:41:42 +00:00
|
|
|
call_command('inspectdb', 'inspectdb_uniquetogether', stdout=out)
|
2014-07-14 20:42:05 +00:00
|
|
|
output = out.getvalue()
|
2018-03-21 14:37:56 +00:00
|
|
|
self.assertIn(" unique_together = (('", output)
|
2016-12-13 11:38:09 +00:00
|
|
|
unique_together_match = re.findall(self.unique_re, output)
|
2015-11-06 16:29:23 +00:00
|
|
|
# There should be one unique_together tuple.
|
|
|
|
self.assertEqual(len(unique_together_match), 1)
|
|
|
|
fields = unique_together_match[0]
|
|
|
|
# Fields with db_column = field name.
|
|
|
|
self.assertIn("('field1', 'field2')", fields)
|
|
|
|
# Fields from columns whose names are Python keywords.
|
|
|
|
self.assertIn("('field1', 'field2')", fields)
|
|
|
|
# Fields whose names normalize to the same Python field name and hence
|
|
|
|
# are given an integer suffix.
|
|
|
|
self.assertIn("('non_unique_column', 'non_unique_column_0')", fields)
|
2014-07-14 20:42:05 +00:00
|
|
|
|
2016-12-13 11:38:09 +00:00
|
|
|
@skipUnless(connection.vendor == 'postgresql', 'PostgreSQL specific SQL')
|
|
|
|
def test_unsupported_unique_together(self):
|
|
|
|
"""Unsupported index types (COALESCE here) are skipped."""
|
|
|
|
with connection.cursor() as c:
|
|
|
|
c.execute(
|
|
|
|
'CREATE UNIQUE INDEX Findex ON %s '
|
|
|
|
'(id, people_unique_id, COALESCE(message_id, -1))' % PeopleMoreData._meta.db_table
|
|
|
|
)
|
|
|
|
try:
|
|
|
|
out = StringIO()
|
|
|
|
call_command(
|
|
|
|
'inspectdb',
|
|
|
|
table_name_filter=lambda tn: tn.startswith(PeopleMoreData._meta.db_table),
|
|
|
|
stdout=out,
|
|
|
|
)
|
|
|
|
output = out.getvalue()
|
|
|
|
self.assertIn('# A unique constraint could not be introspected.', output)
|
|
|
|
self.assertEqual(re.findall(self.unique_re, output), ["('id', 'people_unique')"])
|
|
|
|
finally:
|
|
|
|
with connection.cursor() as c:
|
|
|
|
c.execute('DROP INDEX Findex')
|
|
|
|
|
2013-09-11 15:12:56 +00:00
|
|
|
@skipUnless(connection.vendor == 'sqlite',
|
2014-01-29 17:18:32 +00:00
|
|
|
"Only patched sqlite's DatabaseIntrospection.data_types_reverse for this test")
|
2013-09-11 15:12:56 +00:00
|
|
|
def test_custom_fields(self):
|
|
|
|
"""
|
|
|
|
Introspection of columns with a custom field (#21090)
|
|
|
|
"""
|
|
|
|
out = StringIO()
|
|
|
|
orig_data_types_reverse = connection.introspection.data_types_reverse
|
|
|
|
try:
|
|
|
|
connection.introspection.data_types_reverse = {
|
|
|
|
'text': 'myfields.TextField',
|
|
|
|
'bigint': 'BigIntegerField',
|
|
|
|
}
|
2017-01-07 20:41:42 +00:00
|
|
|
call_command('inspectdb', 'inspectdb_columntypes', stdout=out)
|
2013-09-11 15:12:56 +00:00
|
|
|
output = out.getvalue()
|
|
|
|
self.assertIn("text_field = myfields.TextField()", output)
|
|
|
|
self.assertIn("big_int_field = models.BigIntegerField()", output)
|
|
|
|
finally:
|
|
|
|
connection.introspection.data_types_reverse = orig_data_types_reverse
|
2016-02-24 19:16:49 +00:00
|
|
|
|
|
|
|
def test_introspection_errors(self):
|
|
|
|
"""
|
|
|
|
Introspection errors should not crash the command, and the error should
|
|
|
|
be visible in the output.
|
|
|
|
"""
|
|
|
|
out = StringIO()
|
2018-01-09 16:04:56 +00:00
|
|
|
with mock.patch('django.db.connection.introspection.get_table_list',
|
|
|
|
return_value=[TableInfo(name='nonexistent', type='t')]):
|
2016-02-24 19:16:49 +00:00
|
|
|
call_command('inspectdb', stdout=out)
|
2017-01-24 11:22:42 +00:00
|
|
|
output = out.getvalue()
|
2016-02-24 19:16:49 +00:00
|
|
|
self.assertIn("# Unable to inspect table 'nonexistent'", output)
|
|
|
|
# The error message depends on the backend
|
|
|
|
self.assertIn("# The error was:", output)
|
2018-01-09 16:04:56 +00:00
|
|
|
|
|
|
|
|
|
|
|
class InspectDBTransactionalTests(TransactionTestCase):
|
|
|
|
available_apps = None
|
|
|
|
|
|
|
|
def test_include_views(self):
|
|
|
|
"""inspectdb --include-views creates models for database views."""
|
|
|
|
with connection.cursor() as cursor:
|
|
|
|
cursor.execute(
|
|
|
|
'CREATE VIEW inspectdb_people_view AS '
|
|
|
|
'SELECT id, name FROM inspectdb_people'
|
|
|
|
)
|
|
|
|
out = StringIO()
|
|
|
|
view_model = 'class InspectdbPeopleView(models.Model):'
|
|
|
|
view_managed = 'managed = False # Created from a view.'
|
|
|
|
try:
|
2018-03-11 11:52:55 +00:00
|
|
|
call_command('inspectdb', table_name_filter=inspectdb_tables_only, stdout=out)
|
2018-01-09 16:04:56 +00:00
|
|
|
no_views_output = out.getvalue()
|
|
|
|
self.assertNotIn(view_model, no_views_output)
|
|
|
|
self.assertNotIn(view_managed, no_views_output)
|
2018-03-11 11:52:55 +00:00
|
|
|
call_command('inspectdb', table_name_filter=inspectdb_tables_only, include_views=True, stdout=out)
|
2018-01-09 16:04:56 +00:00
|
|
|
with_views_output = out.getvalue()
|
|
|
|
self.assertIn(view_model, with_views_output)
|
|
|
|
self.assertIn(view_managed, with_views_output)
|
|
|
|
finally:
|
|
|
|
with connection.cursor() as cursor:
|
|
|
|
cursor.execute('DROP VIEW inspectdb_people_view')
|