diff --git a/.github/workflows/docs.yml b/.github/workflows/docs.yml index f61692ef79..46c2cf8707 100644 --- a/.github/workflows/docs.yml +++ b/.github/workflows/docs.yml @@ -21,8 +21,7 @@ permissions: jobs: docs: - # OS must be the same as on djangoproject.com. - runs-on: ubuntu-20.04 + runs-on: ubuntu-24.04 name: docs steps: - name: Checkout diff --git a/.github/workflows/python_matrix.yml b/.github/workflows/python_matrix.yml index ab48c2be83..5901e584aa 100644 --- a/.github/workflows/python_matrix.yml +++ b/.github/workflows/python_matrix.yml @@ -49,4 +49,4 @@ jobs: run: python -m pip install --upgrade pip setuptools wheel - run: python -m pip install -r tests/requirements/py3.txt -e . - name: Run tests - run: python tests/runtests.py -v2 + run: python -Wall tests/runtests.py -v2 diff --git a/.github/workflows/schedule_tests.yml b/.github/workflows/schedule_tests.yml index f99ef218aa..5e6038fb31 100644 --- a/.github/workflows/schedule_tests.yml +++ b/.github/workflows/schedule_tests.yml @@ -20,6 +20,7 @@ jobs: - '3.11' - '3.12' - '3.13' + - '3.14-dev' name: Windows, SQLite, Python ${{ matrix.python-version }} continue-on-error: true steps: @@ -35,7 +36,7 @@ jobs: run: python -m pip install --upgrade pip setuptools wheel - run: python -m pip install -r tests/requirements/py3.txt -e . - name: Run tests - run: python tests/runtests.py -v2 + run: python -Wall tests/runtests.py -v2 pyc-only: runs-on: ubuntu-latest @@ -61,7 +62,7 @@ jobs: find $DJANGO_PACKAGE_ROOT -name '*.py' -print -delete - run: python -m pip install -r tests/requirements/py3.txt - name: Run tests - run: python tests/runtests.py --verbosity=2 + run: python -Wall tests/runtests.py --verbosity=2 pypy-sqlite: runs-on: ubuntu-latest diff --git a/.github/workflows/tests.yml b/.github/workflows/tests.yml index 5de554721d..3373f82e0a 100644 --- a/.github/workflows/tests.yml +++ b/.github/workflows/tests.yml @@ -38,7 +38,7 @@ jobs: run: python -m pip install --upgrade pip setuptools wheel - run: python -m pip install -r tests/requirements/py3.txt -e . - name: Run tests - run: python tests/runtests.py -v2 + run: python -Wall tests/runtests.py -v2 javascript-tests: runs-on: ubuntu-latest diff --git a/.readthedocs.yml b/.readthedocs.yml index bde8b64da0..915d51de46 100644 --- a/.readthedocs.yml +++ b/.readthedocs.yml @@ -4,12 +4,13 @@ version: 2 build: - os: ubuntu-20.04 + os: ubuntu-24.04 tools: - python: "3.8" + python: "3.12" sphinx: configuration: docs/conf.py + fail_on_warning: true python: install: diff --git a/AUTHORS b/AUTHORS index 573a030ea1..1fe38b5666 100644 --- a/AUTHORS +++ b/AUTHORS @@ -282,6 +282,7 @@ answer newbie questions, and generally made Django that much better: David Sanders David Schein David Tulig + David Winiecki David Winterbottom David Wobrock Davide Ceretti diff --git a/django/contrib/admin/helpers.py b/django/contrib/admin/helpers.py index d28a382814..51450d1d9e 100644 --- a/django/contrib/admin/helpers.py +++ b/django/contrib/admin/helpers.py @@ -121,7 +121,7 @@ class Fieldset: @cached_property def is_collapsible(self): - if any([field in self.fields for field in self.form.errors]): + if any(field in self.fields for field in self.form.errors): return False return "collapse" in self.classes diff --git a/django/contrib/admin/options.py b/django/contrib/admin/options.py index 6d5c0708a3..69b0cc0373 100644 --- a/django/contrib/admin/options.py +++ b/django/contrib/admin/options.py @@ -41,6 +41,7 @@ from django.core.exceptions import ( from django.core.paginator import Paginator from django.db import models, router, transaction from django.db.models.constants import LOOKUP_SEP +from django.db.models.functions import Cast from django.forms.formsets import DELETION_FIELD_NAME, all_valid from django.forms.models import ( BaseInlineFormSet, @@ -1177,17 +1178,17 @@ class ModelAdmin(BaseModelAdmin): # Apply keyword searches. def construct_search(field_name): if field_name.startswith("^"): - return "%s__istartswith" % field_name.removeprefix("^") + return "%s__istartswith" % field_name.removeprefix("^"), None elif field_name.startswith("="): - return "%s__iexact" % field_name.removeprefix("=") + return "%s__iexact" % field_name.removeprefix("="), None elif field_name.startswith("@"): - return "%s__search" % field_name.removeprefix("@") + return "%s__search" % field_name.removeprefix("@"), None # Use field_name if it includes a lookup. opts = queryset.model._meta lookup_fields = field_name.split(LOOKUP_SEP) # Go through the fields, following all relations. prev_field = None - for path_part in lookup_fields: + for i, path_part in enumerate(lookup_fields): if path_part == "pk": path_part = opts.pk.name try: @@ -1195,21 +1196,40 @@ class ModelAdmin(BaseModelAdmin): except FieldDoesNotExist: # Use valid query lookups. if prev_field and prev_field.get_lookup(path_part): - return field_name + if path_part == "exact" and not isinstance( + prev_field, (models.CharField, models.TextField) + ): + field_name_without_exact = "__".join(lookup_fields[:i]) + alias = Cast( + field_name_without_exact, + output_field=models.CharField(), + ) + alias_name = "_".join(lookup_fields[:i]) + return f"{alias_name}_str", alias + else: + return field_name, None else: prev_field = field if hasattr(field, "path_infos"): # Update opts to follow the relation. opts = field.path_infos[-1].to_opts # Otherwise, use the field with icontains. - return "%s__icontains" % field_name + return "%s__icontains" % field_name, None may_have_duplicates = False search_fields = self.get_search_fields(request) if search_fields and search_term: - orm_lookups = [ - construct_search(str(search_field)) for search_field in search_fields - ] + str_aliases = {} + orm_lookups = [] + for field in search_fields: + lookup, str_alias = construct_search(str(field)) + orm_lookups.append(lookup) + if str_alias: + str_aliases[lookup] = str_alias + + if str_aliases: + queryset = queryset.alias(**str_aliases) + term_queries = [] for bit in smart_split(search_term): if bit.startswith(('"', "'")) and bit[0] == bit[-1]: diff --git a/django/contrib/admin/sites.py b/django/contrib/admin/sites.py index dc67262afc..3399bd87b8 100644 --- a/django/contrib/admin/sites.py +++ b/django/contrib/admin/sites.py @@ -282,7 +282,7 @@ class AdminSite: path("autocomplete/", wrap(self.autocomplete_view), name="autocomplete"), path("jsi18n/", wrap(self.i18n_javascript, cacheable=True), name="jsi18n"), path( - "r///", + "r///", wrap(contenttype_views.shortcut), name="view_on_site", ), diff --git a/django/contrib/admin/static/admin/css/responsive.css b/django/contrib/admin/static/admin/css/responsive.css index 932e824c1c..7d296b150f 100644 --- a/django/contrib/admin/static/admin/css/responsive.css +++ b/django/contrib/admin/static/admin/css/responsive.css @@ -299,7 +299,7 @@ input[type="submit"], button { background-position: 0 -80px; } - a.selector-chooseall, a.selector-clearall { + .selector-chooseall, .selector-clearall { align-self: center; } @@ -649,6 +649,7 @@ input[type="submit"], button { .related-widget-wrapper .selector { order: 1; + flex: 1 0 auto; } .related-widget-wrapper > a { diff --git a/django/contrib/admin/static/admin/css/rtl.css b/django/contrib/admin/static/admin/css/rtl.css index b8f60e0a34..5b55b63013 100644 --- a/django/contrib/admin/static/admin/css/rtl.css +++ b/django/contrib/admin/static/admin/css/rtl.css @@ -235,19 +235,19 @@ fieldset .fieldBox { background-position: 0 -112px; } -a.selector-chooseall { +.selector-chooseall { background: url(../img/selector-icons.svg) right -128px no-repeat; } -a.active.selector-chooseall:focus, a.active.selector-chooseall:hover { +.active.selector-chooseall:focus, .active.selector-chooseall:hover { background-position: 100% -144px; } -a.selector-clearall { +.selector-clearall { background: url(../img/selector-icons.svg) 0 -160px no-repeat; } -a.active.selector-clearall:focus, a.active.selector-clearall:hover { +.active.selector-clearall:focus, .active.selector-clearall:hover { background-position: 0 -176px; } diff --git a/django/contrib/admin/static/admin/css/widgets.css b/django/contrib/admin/static/admin/css/widgets.css index cc64811a2b..c8bf90b3b2 100644 --- a/django/contrib/admin/static/admin/css/widgets.css +++ b/django/contrib/admin/static/admin/css/widgets.css @@ -2,7 +2,7 @@ .selector { display: flex; - flex-grow: 1; + flex: 1; gap: 0 10px; } @@ -14,17 +14,20 @@ } .selector-available, .selector-chosen { - text-align: center; display: flex; flex-direction: column; flex: 1 1; } -.selector-available h2, .selector-chosen h2 { +.selector-available-title, .selector-chosen-title { border: 1px solid var(--border-color); border-radius: 4px 4px 0 0; } +.selector .helptext { + font-size: 0.6875rem; +} + .selector-chosen .list-footer-display { border: 1px solid var(--border-color); border-top: none; @@ -40,14 +43,20 @@ color: var(--breadcrumbs-fg); } -.selector-chosen h2 { +.selector-chosen-title { background: var(--secondary); color: var(--header-link-color); + padding: 8px; +} + +.selector-chosen-title label { + color: var(--header-link-color); } -.selector .selector-available h2 { +.selector-available-title { background: var(--darkened-bg); color: var(--body-quiet-color); + padding: 8px; } .selector .selector-filter { @@ -121,6 +130,7 @@ overflow: hidden; cursor: default; opacity: 0.55; + border: none; } .active.selector-add, .active.selector-remove { @@ -147,7 +157,7 @@ background-position: 0 -80px; } -a.selector-chooseall, a.selector-clearall { +.selector-chooseall, .selector-clearall { display: inline-block; height: 16px; text-align: left; @@ -158,38 +168,39 @@ a.selector-chooseall, a.selector-clearall { color: var(--body-quiet-color); text-decoration: none; opacity: 0.55; + border: none; } -a.active.selector-chooseall:focus, a.active.selector-clearall:focus, -a.active.selector-chooseall:hover, a.active.selector-clearall:hover { +.active.selector-chooseall:focus, .active.selector-clearall:focus, +.active.selector-chooseall:hover, .active.selector-clearall:hover { color: var(--link-fg); } -a.active.selector-chooseall, a.active.selector-clearall { +.active.selector-chooseall, .active.selector-clearall { opacity: 1; } -a.active.selector-chooseall:hover, a.active.selector-clearall:hover { +.active.selector-chooseall:hover, .active.selector-clearall:hover { cursor: pointer; } -a.selector-chooseall { +.selector-chooseall { padding: 0 18px 0 0; background: url(../img/selector-icons.svg) right -160px no-repeat; cursor: default; } -a.active.selector-chooseall:focus, a.active.selector-chooseall:hover { +.active.selector-chooseall:focus, .active.selector-chooseall:hover { background-position: 100% -176px; } -a.selector-clearall { +.selector-clearall { padding: 0 0 0 18px; background: url(../img/selector-icons.svg) 0 -128px no-repeat; cursor: default; } -a.active.selector-clearall:focus, a.active.selector-clearall:hover { +.active.selector-clearall:focus, .active.selector-clearall:hover { background-position: 0 -144px; } diff --git a/django/contrib/admin/static/admin/js/SelectFilter2.js b/django/contrib/admin/static/admin/js/SelectFilter2.js index 133d809d52..7f0cfef8c9 100644 --- a/django/contrib/admin/static/admin/js/SelectFilter2.js +++ b/django/contrib/admin/static/admin/js/SelectFilter2.js @@ -15,6 +15,7 @@ Requires core.js and SelectBox.js. const from_box = document.getElementById(field_id); from_box.id += '_from'; // change its ID from_box.className = 'filtered'; + from_box.setAttribute('aria-labelledby', field_id + '_from_title'); for (const p of from_box.parentNode.getElementsByTagName('p')) { if (p.classList.contains("info")) { @@ -38,18 +39,15 @@ Requires core.js and SelectBox.js. //
const selector_available = quickElement('div', selector_div); selector_available.className = 'selector-available'; - const title_available = quickElement('h2', selector_available, interpolate(gettext('Available %s') + ' ', [field_name])); + const selector_available_title = quickElement('div', selector_available); + selector_available_title.id = field_id + '_from_title'; + selector_available_title.className = 'selector-available-title'; + quickElement('label', selector_available_title, interpolate(gettext('Available %s') + ' ', [field_name]), 'for', field_id + '_from'); quickElement( - 'span', title_available, '', - 'class', 'help help-tooltip help-icon', - 'title', interpolate( - gettext( - 'This is the list of available %s. You may choose some by ' + - 'selecting them in the box below and then clicking the ' + - '"Choose" arrow between the two boxes.' - ), - [field_name] - ) + 'p', + selector_available_title, + interpolate(gettext('Choose %s by selecting them and then select the "Choose" arrow button.'), [field_name]), + 'class', 'helptext' ); const filter_p = quickElement('p', selector_available, '', 'id', field_id + '_filter'); @@ -60,7 +58,7 @@ Requires core.js and SelectBox.js. quickElement( 'span', search_filter_label, '', 'class', 'help-tooltip search-label-icon', - 'title', interpolate(gettext("Type into this box to filter down the list of available %s."), [field_name]) + 'aria-label', interpolate(gettext("Type into this box to filter down the list of available %s."), [field_name]) ); filter_p.appendChild(document.createTextNode(' ')); @@ -69,32 +67,44 @@ Requires core.js and SelectBox.js. filter_input.id = field_id + '_input'; selector_available.appendChild(from_box); - const choose_all = quickElement('a', selector_available, gettext('Choose all'), 'title', interpolate(gettext('Click to choose all %s at once.'), [field_name]), 'href', '#', 'id', field_id + '_add_all_link'); - choose_all.className = 'selector-chooseall'; + const choose_all = quickElement( + 'button', + selector_available, + interpolate(gettext('Choose all %s'), [field_name]), + 'id', field_id + '_add_all', + 'class', 'selector-chooseall' + ); //
    const selector_chooser = quickElement('ul', selector_div); selector_chooser.className = 'selector-chooser'; - const add_link = quickElement('a', quickElement('li', selector_chooser), gettext('Choose'), 'title', gettext('Choose'), 'href', '#', 'id', field_id + '_add_link'); - add_link.className = 'selector-add'; - const remove_link = quickElement('a', quickElement('li', selector_chooser), gettext('Remove'), 'title', gettext('Remove'), 'href', '#', 'id', field_id + '_remove_link'); - remove_link.className = 'selector-remove'; + const add_button = quickElement( + 'button', + quickElement('li', selector_chooser), + interpolate(gettext('Choose selected %s'), [field_name]), + 'id', field_id + '_add', + 'class', 'selector-add' + ); + const remove_button = quickElement( + 'button', + quickElement('li', selector_chooser), + interpolate(gettext('Remove selected chosen %s'), [field_name]), + 'id', field_id + '_remove', + 'class', 'selector-remove' + ); //
    const selector_chosen = quickElement('div', selector_div, '', 'id', field_id + '_selector_chosen'); selector_chosen.className = 'selector-chosen'; - const title_chosen = quickElement('h2', selector_chosen, interpolate(gettext('Chosen %s') + ' ', [field_name])); + const selector_chosen_title = quickElement('div', selector_chosen); + selector_chosen_title.className = 'selector-chosen-title'; + selector_chosen_title.id = field_id + '_to_title'; + quickElement('label', selector_chosen_title, interpolate(gettext('Chosen %s') + ' ', [field_name]), 'for', field_id + '_to'); quickElement( - 'span', title_chosen, '', - 'class', 'help help-tooltip help-icon', - 'title', interpolate( - gettext( - 'This is the list of chosen %s. You may remove some by ' + - 'selecting them in the box below and then clicking the ' + - '"Remove" arrow between the two boxes.' - ), - [field_name] - ) + 'p', + selector_chosen_title, + interpolate(gettext('Remove %s by selecting them and then select the "Remove" arrow button.'), [field_name]), + 'class', 'helptext' ); const filter_selected_p = quickElement('p', selector_chosen, '', 'id', field_id + '_filter_selected'); @@ -105,7 +115,7 @@ Requires core.js and SelectBox.js. quickElement( 'span', search_filter_selected_label, '', 'class', 'help-tooltip search-label-icon', - 'title', interpolate(gettext("Type into this box to filter down the list of selected %s."), [field_name]) + 'aria-label', interpolate(gettext("Type into this box to filter down the list of selected %s."), [field_name]) ); filter_selected_p.appendChild(document.createTextNode(' ')); @@ -113,15 +123,27 @@ Requires core.js and SelectBox.js. const filter_selected_input = quickElement('input', filter_selected_p, '', 'type', 'text', 'placeholder', gettext("Filter")); filter_selected_input.id = field_id + '_selected_input'; - const to_box = quickElement('select', selector_chosen, '', 'id', field_id + '_to', 'multiple', '', 'size', from_box.size, 'name', from_box.name); - to_box.className = 'filtered'; - + quickElement( + 'select', + selector_chosen, + '', + 'id', field_id + '_to', + 'multiple', '', + 'size', from_box.size, + 'name', from_box.name, + 'aria-labelledby', field_id + '_to_title', + 'class', 'filtered' + ); const warning_footer = quickElement('div', selector_chosen, '', 'class', 'list-footer-display'); quickElement('span', warning_footer, '', 'id', field_id + '_list-footer-display-text'); quickElement('span', warning_footer, ' ' + gettext('(click to clear)'), 'class', 'list-footer-display__clear'); - - const clear_all = quickElement('a', selector_chosen, gettext('Remove all'), 'title', interpolate(gettext('Click to remove all chosen %s at once.'), [field_name]), 'href', '#', 'id', field_id + '_remove_all_link'); - clear_all.className = 'selector-clearall'; + const clear_all = quickElement( + 'button', + selector_chosen, + interpolate(gettext('Remove all %s'), [field_name]), + 'id', field_id + '_remove_all', + 'class', 'selector-clearall' + ); from_box.name = from_box.name + '_old'; @@ -138,10 +160,10 @@ Requires core.js and SelectBox.js. choose_all.addEventListener('click', function(e) { move_selection(e, this, SelectBox.move_all, field_id + '_from', field_id + '_to'); }); - add_link.addEventListener('click', function(e) { + add_button.addEventListener('click', function(e) { move_selection(e, this, SelectBox.move, field_id + '_from', field_id + '_to'); }); - remove_link.addEventListener('click', function(e) { + remove_button.addEventListener('click', function(e) { move_selection(e, this, SelectBox.move, field_id + '_to', field_id + '_from'); }); clear_all.addEventListener('click', function(e) { @@ -227,11 +249,11 @@ Requires core.js and SelectBox.js. const from = document.getElementById(field_id + '_from'); const to = document.getElementById(field_id + '_to'); // Active if at least one item is selected - document.getElementById(field_id + '_add_link').classList.toggle('active', SelectFilter.any_selected(from)); - document.getElementById(field_id + '_remove_link').classList.toggle('active', SelectFilter.any_selected(to)); + document.getElementById(field_id + '_add').classList.toggle('active', SelectFilter.any_selected(from)); + document.getElementById(field_id + '_remove').classList.toggle('active', SelectFilter.any_selected(to)); // Active if the corresponding box isn't empty - document.getElementById(field_id + '_add_all_link').classList.toggle('active', from.querySelector('option')); - document.getElementById(field_id + '_remove_all_link').classList.toggle('active', to.querySelector('option')); + document.getElementById(field_id + '_add_all').classList.toggle('active', from.querySelector('option')); + document.getElementById(field_id + '_remove_all').classList.toggle('active', to.querySelector('option')); SelectFilter.refresh_filtered_warning(field_id); }, filter_key_press: function(event, field_id, source, target) { diff --git a/django/contrib/admin/static/admin/js/inlines.js b/django/contrib/admin/static/admin/js/inlines.js index a4246d6e12..cd3726cf30 100644 --- a/django/contrib/admin/static/admin/js/inlines.js +++ b/django/contrib/admin/static/admin/js/inlines.js @@ -50,11 +50,11 @@ // If forms are laid out as table rows, insert the // "add" button in a new table row: const numCols = $this.eq(-1).children().length; - $parent.append('' + options.addText + ""); + $parent.append('' + options.addText + ""); addButton = $parent.find("tr:last a"); } else { // Otherwise, insert it immediately after the last form: - $this.filter(":last").after('"); + $this.filter(":last").after('"); addButton = $this.filter(":last").next().find("a"); } } @@ -104,15 +104,15 @@ if (row.is("tr")) { // If the forms are laid out in table rows, insert // the remove button into the last table cell: - row.children(":last").append('"); + row.children(":last").append('"); } else if (row.is("ul") || row.is("ol")) { // If they're laid out as an ordered/unordered list, // insert an
  • after the last list item: - row.append('
  • ' + options.deleteText + "
  • "); + row.append('
  • ' + options.deleteText + "
  • "); } else { // Otherwise, just insert the remove button as the // last child element of the form's container: - row.children(":first").append('' + options.deleteText + ""); + row.children(":first").append('' + options.deleteText + ""); } // Add delete handler for each row. row.find("a." + options.deleteCssClass).on('click', inlineDeleteHandler.bind(this)); diff --git a/django/contrib/admin/templates/admin/actions.html b/django/contrib/admin/templates/admin/actions.html index ca1327c6d5..f506c92334 100644 --- a/django/contrib/admin/templates/admin/actions.html +++ b/django/contrib/admin/templates/admin/actions.html @@ -13,9 +13,9 @@ {% if cl.result_count != cl.result_list|length %} - + {% endif %} {% endif %} {% endblock %} diff --git a/django/contrib/admin/templates/admin/auth/user/add_form.html b/django/contrib/admin/templates/admin/auth/user/add_form.html index a13e75e89a..7c7ca1d1ad 100644 --- a/django/contrib/admin/templates/admin/auth/user/add_form.html +++ b/django/contrib/admin/templates/admin/auth/user/add_form.html @@ -3,7 +3,7 @@ {% block form_top %} {% if not is_popup %} -

    {% translate "After you've created a user, you’ll be able to edit more user options." %}

    +

    {% translate "After you’ve created a user, you’ll be able to edit more user options." %}

    {% endif %} {% endblock %} {% block extrahead %} diff --git a/django/contrib/admin/templates/admin/includes/fieldset.html b/django/contrib/admin/templates/admin/includes/fieldset.html index 8c1830da62..9c9b31965a 100644 --- a/django/contrib/admin/templates/admin/includes/fieldset.html +++ b/django/contrib/admin/templates/admin/includes/fieldset.html @@ -1,8 +1,7 @@ -{% with name=fieldset.name|default:""|slugify %} -
    - {% if name %} +
    + {% if fieldset.name %} {% if fieldset.is_collapsible %}
    {% endif %} - {{ fieldset.name }} + {{ fieldset.name }} {% if fieldset.is_collapsible %}{% endif %} {% endif %} {% if fieldset.description %} @@ -36,6 +35,5 @@ {% if not line.fields|length == 1 %}
    {% endif %}
{% endfor %} - {% if name and fieldset.is_collapsible %}{% endif %} + {% if fieldset.name and fieldset.is_collapsible %}{% endif %} -{% endwith %} diff --git a/django/contrib/admindocs/templates/admin_doc/view_detail.html b/django/contrib/admindocs/templates/admin_doc/view_detail.html index d1aa3ab98f..5a5b47247e 100644 --- a/django/contrib/admindocs/templates/admin_doc/view_detail.html +++ b/django/contrib/admindocs/templates/admin_doc/view_detail.html @@ -15,7 +15,7 @@

{{ name }}

-

{{ summary|striptags }}

+

{{ summary }}

{{ body }} diff --git a/django/contrib/admindocs/utils.py b/django/contrib/admindocs/utils.py index 3708a32813..5b28a8d2c6 100644 --- a/django/contrib/admindocs/utils.py +++ b/django/contrib/admindocs/utils.py @@ -99,6 +99,21 @@ ROLES = { "tag": "%s/tags/#%s", } +explicit_title_re = re.compile(r"^(.+?)\s*(?$", re.DOTALL) + + +def split_explicit_title(text): + """ + Split role content into title and target, if given. + + From sphinx.util.nodes.split_explicit_title + See https://github.com/sphinx-doc/sphinx/blob/230ccf2/sphinx/util/nodes.py#L389 + """ + match = explicit_title_re.match(text) + if match: + return True, match.group(1), match.group(2) + return False, text, text + def create_reference_role(rolename, urlbase): # Views and template names are case-sensitive. @@ -107,14 +122,15 @@ def create_reference_role(rolename, urlbase): def _role(name, rawtext, text, lineno, inliner, options=None, content=None): if options is None: options = {} + _, title, target = split_explicit_title(text) node = docutils.nodes.reference( rawtext, - text, + title, refuri=( urlbase % ( inliner.document.settings.link_base, - text if is_case_sensitive else text.lower(), + target if is_case_sensitive else target.lower(), ) ), **options, @@ -242,3 +258,7 @@ def remove_non_capturing_groups(pattern): final_pattern += pattern[prev_end:start] prev_end = end return final_pattern + pattern[prev_end:] + + +def strip_p_tags(value): + return mark_safe(value.replace("

", "").replace("

", "")) diff --git a/django/contrib/admindocs/views.py b/django/contrib/admindocs/views.py index 38a2bb9286..0c4ece29fe 100644 --- a/django/contrib/admindocs/views.py +++ b/django/contrib/admindocs/views.py @@ -13,7 +13,12 @@ from django.contrib.admindocs.utils import ( replace_named_groups, replace_unnamed_groups, ) -from django.core.exceptions import ImproperlyConfigured, ViewDoesNotExist +from django.contrib.auth import get_permission_codename +from django.core.exceptions import ( + ImproperlyConfigured, + PermissionDenied, + ViewDoesNotExist, +) from django.db import models from django.http import Http404 from django.template.engine import Engine @@ -30,7 +35,7 @@ from django.utils.inspect import ( from django.utils.translation import gettext as _ from django.views.generic import TemplateView -from .utils import get_view_name +from .utils import get_view_name, strip_p_tags # Exclude methods starting with these strings from documentation MODEL_METHODS_EXCLUDE = ("_", "add_", "delete", "save", "set_") @@ -195,18 +200,31 @@ class ViewDetailView(BaseAdminDocsView): **{ **kwargs, "name": view, - "summary": title, + "summary": strip_p_tags(title), "body": body, "meta": metadata, } ) +def user_has_model_view_permission(user, opts): + """Based off ModelAdmin.has_view_permission.""" + codename_view = get_permission_codename("view", opts) + codename_change = get_permission_codename("change", opts) + return user.has_perm("%s.%s" % (opts.app_label, codename_view)) or user.has_perm( + "%s.%s" % (opts.app_label, codename_change) + ) + + class ModelIndexView(BaseAdminDocsView): template_name = "admin_doc/model_index.html" def get_context_data(self, **kwargs): - m_list = [m._meta for m in apps.get_models()] + m_list = [ + m._meta + for m in apps.get_models() + if user_has_model_view_permission(self.request.user, m._meta) + ] return super().get_context_data(**{**kwargs, "models": m_list}) @@ -228,6 +246,8 @@ class ModelDetailView(BaseAdminDocsView): ) opts = model._meta + if not user_has_model_view_permission(self.request.user, opts): + raise PermissionDenied title, body, metadata = utils.parse_docstring(model.__doc__) title = title and utils.parse_rst(title, "model", _("model:") + model_name) @@ -384,7 +404,7 @@ class ModelDetailView(BaseAdminDocsView): **{ **kwargs, "name": opts.label, - "summary": title, + "summary": strip_p_tags(title), "description": body, "fields": fields, "methods": methods, diff --git a/django/contrib/auth/__init__.py b/django/contrib/auth/__init__.py index 689567ca6c..8e359ec7ff 100644 --- a/django/contrib/auth/__init__.py +++ b/django/contrib/auth/__init__.py @@ -1,11 +1,13 @@ import inspect import re +import warnings from django.apps import apps as django_apps from django.conf import settings from django.core.exceptions import ImproperlyConfigured, PermissionDenied from django.middleware.csrf import rotate_token from django.utils.crypto import constant_time_compare +from django.utils.deprecation import RemovedInDjango61Warning from django.utils.module_loading import import_string from django.views.decorators.debug import sensitive_variables @@ -154,9 +156,19 @@ def login(request, user, backend=None): have to reauthenticate on every request. Note that data set during the anonymous session is retained when the user logs in. """ + # RemovedInDjango61Warning: When the deprecation ends, replace with: + # session_auth_hash = user.get_session_auth_hash() session_auth_hash = "" + # RemovedInDjango61Warning. if user is None: user = request.user + warnings.warn( + "Fallback to request.user when user is None will be removed.", + RemovedInDjango61Warning, + stacklevel=2, + ) + + # RemovedInDjango61Warning. if hasattr(user, "get_session_auth_hash"): session_auth_hash = user.get_session_auth_hash() @@ -187,9 +199,18 @@ def login(request, user, backend=None): async def alogin(request, user, backend=None): """See login().""" + # RemovedInDjango61Warning: When the deprecation ends, replace with: + # session_auth_hash = user.get_session_auth_hash() session_auth_hash = "" + # RemovedInDjango61Warning. if user is None: + warnings.warn( + "Fallback to request.user when user is None will be removed.", + RemovedInDjango61Warning, + stacklevel=2, + ) user = await request.auser() + # RemovedInDjango61Warning. if hasattr(user, "get_session_auth_hash"): session_auth_hash = user.get_session_auth_hash() diff --git a/django/contrib/auth/decorators.py b/django/contrib/auth/decorators.py index 77fbc79855..4d62aec93a 100644 --- a/django/contrib/auth/decorators.py +++ b/django/contrib/auth/decorators.py @@ -1,8 +1,7 @@ -import asyncio from functools import wraps from urllib.parse import urlsplit -from asgiref.sync import async_to_sync, sync_to_async +from asgiref.sync import async_to_sync, iscoroutinefunction, sync_to_async from django.conf import settings from django.contrib.auth import REDIRECT_FIELD_NAME @@ -35,11 +34,11 @@ def user_passes_test( return redirect_to_login(path, resolved_login_url, redirect_field_name) - if asyncio.iscoroutinefunction(view_func): + if iscoroutinefunction(view_func): async def _view_wrapper(request, *args, **kwargs): auser = await request.auser() - if asyncio.iscoroutinefunction(test_func): + if iscoroutinefunction(test_func): test_pass = await test_func(auser) else: test_pass = await sync_to_async(test_func)(auser) @@ -51,7 +50,7 @@ def user_passes_test( else: def _view_wrapper(request, *args, **kwargs): - if asyncio.iscoroutinefunction(test_func): + if iscoroutinefunction(test_func): test_pass = async_to_sync(test_func)(request.user) else: test_pass = test_func(request.user) @@ -107,7 +106,7 @@ def permission_required(perm, login_url=None, raise_exception=False): perms = perm def decorator(view_func): - if asyncio.iscoroutinefunction(view_func): + if iscoroutinefunction(view_func): async def check_perms(user): # First check if the user has the permission (even anon users). diff --git a/django/contrib/auth/forms.py b/django/contrib/auth/forms.py index edf672a6e5..093f525245 100644 --- a/django/contrib/auth/forms.py +++ b/django/contrib/auth/forms.py @@ -15,6 +15,7 @@ from django.utils.http import urlsafe_base64_encode from django.utils.text import capfirst from django.utils.translation import gettext from django.utils.translation import gettext_lazy as _ +from django.views.decorators.debug import sensitive_variables UserModel = get_user_model() logger = logging.getLogger("django.contrib.auth") @@ -122,6 +123,7 @@ class SetPasswordMixin: ) return password1, password2 + @sensitive_variables("password1", "password2") def validate_passwords( self, password1_field_name="password1", @@ -151,6 +153,7 @@ class SetPasswordMixin: ) self.add_error(password2_field_name, error) + @sensitive_variables("password") def validate_password_for_user(self, user, password_field_name="password2"): password = self.cleaned_data.get(password_field_name) if password: @@ -348,6 +351,7 @@ class AuthenticationForm(forms.Form): if self.fields["username"].label is None: self.fields["username"].label = capfirst(self.username_field.verbose_name) + @sensitive_variables() def clean(self): username = self.cleaned_data.get("username") password = self.cleaned_data.get("password") @@ -539,6 +543,7 @@ class PasswordChangeForm(SetPasswordForm): field_order = ["old_password", "new_password1", "new_password2"] + @sensitive_variables("old_password") def clean_old_password(self): """ Validate that the old_password field is correct. diff --git a/django/contrib/auth/management/__init__.py b/django/contrib/auth/management/__init__.py index c40f2aa69d..a8639cb258 100644 --- a/django/contrib/auth/management/__init__.py +++ b/django/contrib/auth/management/__init__.py @@ -115,10 +115,12 @@ def get_system_username(): """ try: result = getpass.getuser() - except (ImportError, KeyError): - # KeyError will be raised by os.getpwuid() (called by getuser()) - # if there is no corresponding entry in the /etc/passwd file - # (a very restricted chroot environment, for example). + except (ImportError, KeyError, OSError): + # TODO: Drop ImportError and KeyError when dropping support for PY312. + # KeyError (Python <3.13) or OSError (Python 3.13+) will be raised by + # os.getpwuid() (called by getuser()) if there is no corresponding + # entry in the /etc/passwd file (for example, in a very restricted + # chroot environment). return "" return result diff --git a/django/contrib/auth/models.py b/django/contrib/auth/models.py index d4a8dd902b..623b169801 100644 --- a/django/contrib/auth/models.py +++ b/django/contrib/auth/models.py @@ -174,11 +174,15 @@ class UserManager(BaseUserManager): extra_fields.setdefault("is_superuser", False) return self._create_user(username, email, password, **extra_fields) + create_user.alters_data = True + async def acreate_user(self, username, email=None, password=None, **extra_fields): extra_fields.setdefault("is_staff", False) extra_fields.setdefault("is_superuser", False) return await self._acreate_user(username, email, password, **extra_fields) + acreate_user.alters_data = True + def create_superuser(self, username, email=None, password=None, **extra_fields): extra_fields.setdefault("is_staff", True) extra_fields.setdefault("is_superuser", True) @@ -190,6 +194,8 @@ class UserManager(BaseUserManager): return self._create_user(username, email, password, **extra_fields) + create_superuser.alters_data = True + async def acreate_superuser( self, username, email=None, password=None, **extra_fields ): @@ -203,6 +209,8 @@ class UserManager(BaseUserManager): return await self._acreate_user(username, email, password, **extra_fields) + acreate_superuser.alters_data = True + def with_perm( self, perm, is_active=True, include_superusers=True, backend=None, obj=None ): diff --git a/django/contrib/auth/password_validation.py b/django/contrib/auth/password_validation.py index 06f8fcc4e8..d24e69e0ce 100644 --- a/django/contrib/auth/password_validation.py +++ b/django/contrib/auth/password_validation.py @@ -106,17 +106,16 @@ class MinimumLengthValidator: def validate(self, password, user=None): if len(password) < self.min_length: - raise ValidationError( - ngettext( - "This password is too short. It must contain at least " - "%(min_length)d character.", - "This password is too short. It must contain at least " - "%(min_length)d characters.", - self.min_length, - ), - code="password_too_short", - params={"min_length": self.min_length}, - ) + raise ValidationError(self.get_error_message(), code="password_too_short") + + def get_error_message(self): + return ngettext( + "This password is too short. It must contain at least %d character." + % self.min_length, + "This password is too short. It must contain at least %d characters." + % self.min_length, + self.min_length, + ) def get_help_text(self): return ngettext( @@ -203,11 +202,14 @@ class UserAttributeSimilarityValidator: except FieldDoesNotExist: verbose_name = attribute_name raise ValidationError( - _("The password is too similar to the %(verbose_name)s."), + self.get_error_message(), code="password_too_similar", params={"verbose_name": verbose_name}, ) + def get_error_message(self): + return _("The password is too similar to the %(verbose_name)s.") + def get_help_text(self): return _( "Your password can’t be too similar to your other personal information." @@ -242,10 +244,13 @@ class CommonPasswordValidator: def validate(self, password, user=None): if password.lower().strip() in self.passwords: raise ValidationError( - _("This password is too common."), + self.get_error_message(), code="password_too_common", ) + def get_error_message(self): + return _("This password is too common.") + def get_help_text(self): return _("Your password can’t be a commonly used password.") @@ -258,9 +263,12 @@ class NumericPasswordValidator: def validate(self, password, user=None): if password.isdigit(): raise ValidationError( - _("This password is entirely numeric."), + self.get_error_message(), code="password_entirely_numeric", ) + def get_error_message(self): + return _("This password is entirely numeric.") + def get_help_text(self): return _("Your password can’t be entirely numeric.") diff --git a/django/contrib/gis/db/backends/mysql/operations.py b/django/contrib/gis/db/backends/mysql/operations.py index 1004cfb564..5c02d5e5a7 100644 --- a/django/contrib/gis/db/backends/mysql/operations.py +++ b/django/contrib/gis/db/backends/mysql/operations.py @@ -45,6 +45,7 @@ class MySQLOperations(BaseSpatialOperations, DatabaseOperations): "bboverlaps": SpatialOperator(func="MBROverlaps"), # ... "contained": SpatialOperator(func="MBRWithin"), # ... "contains": SpatialOperator(func="ST_Contains"), + "coveredby": SpatialOperator(func="MBRCoveredBy"), "crosses": SpatialOperator(func="ST_Crosses"), "disjoint": SpatialOperator(func="ST_Disjoint"), "equals": SpatialOperator(func="ST_Equals"), @@ -57,6 +58,10 @@ class MySQLOperations(BaseSpatialOperations, DatabaseOperations): } if self.connection.mysql_is_mariadb: operators["relate"] = SpatialOperator(func="ST_Relate") + if self.connection.mysql_version < (11, 7): + del operators["coveredby"] + else: + operators["covers"] = SpatialOperator(func="MBRCovers") return operators @cached_property @@ -68,7 +73,10 @@ class MySQLOperations(BaseSpatialOperations, DatabaseOperations): models.Union, ] is_mariadb = self.connection.mysql_is_mariadb - if is_mariadb or self.connection.mysql_version < (8, 0, 24): + if is_mariadb: + if self.connection.mysql_version < (11, 7): + disallowed_aggregates.insert(0, models.Collect) + elif self.connection.mysql_version < (8, 0, 24): disallowed_aggregates.insert(0, models.Collect) return tuple(disallowed_aggregates) @@ -102,7 +110,8 @@ class MySQLOperations(BaseSpatialOperations, DatabaseOperations): } if self.connection.mysql_is_mariadb: unsupported.remove("PointOnSurface") - unsupported.update({"GeoHash", "IsValid"}) + if self.connection.mysql_version < (11, 7): + unsupported.update({"GeoHash", "IsValid"}) return unsupported def geo_db_type(self, f): diff --git a/django/contrib/gis/gdal/geometries.py b/django/contrib/gis/gdal/geometries.py index 44e1026e3f..9e712037c0 100644 --- a/django/contrib/gis/gdal/geometries.py +++ b/django/contrib/gis/gdal/geometries.py @@ -64,6 +64,7 @@ class OGRGeometry(GDALBase): """Encapsulate an OGR geometry.""" destructor = capi.destroy_geom + geos_support = True def __init__(self, geom_input, srs=None): """Initialize Geometry on either WKT or an OGR pointer as input.""" @@ -304,6 +305,19 @@ class OGRGeometry(GDALBase): f"Input to 'set_measured' must be a boolean, got '{value!r}'." ) + @property + def has_curve(self): + """Return True if the geometry is or has curve geometry.""" + return capi.has_curve_geom(self.ptr, 0) + + def get_linear_geometry(self): + """Return a linear version of this geometry.""" + return OGRGeometry(capi.get_linear_geom(self.ptr, 0, None)) + + def get_curve_geometry(self): + """Return a curve version of this geometry.""" + return OGRGeometry(capi.get_curve_geom(self.ptr, None)) + # #### SpatialReference-related Properties #### # The SRS property @@ -360,9 +374,14 @@ class OGRGeometry(GDALBase): @property def geos(self): "Return a GEOSGeometry object from this OGRGeometry." - from django.contrib.gis.geos import GEOSGeometry + if self.geos_support: + from django.contrib.gis.geos import GEOSGeometry - return GEOSGeometry(self._geos_ptr(), self.srid) + return GEOSGeometry(self._geos_ptr(), self.srid) + else: + from django.contrib.gis.geos import GEOSException + + raise GEOSException(f"GEOS does not support {self.__class__.__qualname__}.") @property def gml(self): @@ -727,6 +746,18 @@ class Polygon(OGRGeometry): return sum(self[i].point_count for i in range(self.geom_count)) +class CircularString(LineString): + geos_support = False + + +class CurvePolygon(Polygon): + geos_support = False + + +class CompoundCurve(OGRGeometry): + geos_support = False + + # Geometry Collection base class. class GeometryCollection(OGRGeometry): "The Geometry Collection class." @@ -788,6 +819,14 @@ class MultiPolygon(GeometryCollection): pass +class MultiSurface(GeometryCollection): + geos_support = False + + +class MultiCurve(GeometryCollection): + geos_support = False + + # Class mapping dictionary (using the OGRwkbGeometryType as the key) GEO_CLASSES = { 1: Point, @@ -797,7 +836,17 @@ GEO_CLASSES = { 5: MultiLineString, 6: MultiPolygon, 7: GeometryCollection, + 8: CircularString, + 9: CompoundCurve, + 10: CurvePolygon, + 11: MultiCurve, + 12: MultiSurface, 101: LinearRing, + 1008: CircularString, # CIRCULARSTRING Z + 1009: CompoundCurve, # COMPOUNDCURVE Z + 1010: CurvePolygon, # CURVEPOLYGON Z + 1011: MultiCurve, # MULTICURVE Z + 1012: MultiSurface, # MULTICURVE Z 2001: Point, # POINT M 2002: LineString, # LINESTRING M 2003: Polygon, # POLYGON M @@ -805,6 +854,11 @@ GEO_CLASSES = { 2005: MultiLineString, # MULTILINESTRING M 2006: MultiPolygon, # MULTIPOLYGON M 2007: GeometryCollection, # GEOMETRYCOLLECTION M + 2008: CircularString, # CIRCULARSTRING M + 2009: CompoundCurve, # COMPOUNDCURVE M + 2010: CurvePolygon, # CURVEPOLYGON M + 2011: MultiCurve, # MULTICURVE M + 2012: MultiSurface, # MULTICURVE M 3001: Point, # POINT ZM 3002: LineString, # LINESTRING ZM 3003: Polygon, # POLYGON ZM @@ -812,6 +866,11 @@ GEO_CLASSES = { 3005: MultiLineString, # MULTILINESTRING ZM 3006: MultiPolygon, # MULTIPOLYGON ZM 3007: GeometryCollection, # GEOMETRYCOLLECTION ZM + 3008: CircularString, # CIRCULARSTRING ZM + 3009: CompoundCurve, # COMPOUNDCURVE ZM + 3010: CurvePolygon, # CURVEPOLYGON ZM + 3011: MultiCurve, # MULTICURVE ZM + 3012: MultiSurface, # MULTISURFACE ZM 1 + OGRGeomType.wkb25bit: Point, # POINT Z 2 + OGRGeomType.wkb25bit: LineString, # LINESTRING Z 3 + OGRGeomType.wkb25bit: Polygon, # POLYGON Z diff --git a/django/contrib/gis/gdal/libgdal.py b/django/contrib/gis/gdal/libgdal.py index 9f88bbedc8..c9757a546f 100644 --- a/django/contrib/gis/gdal/libgdal.py +++ b/django/contrib/gis/gdal/libgdal.py @@ -22,6 +22,7 @@ if lib_path: elif os.name == "nt": # Windows NT shared libraries lib_names = [ + "gdal309", "gdal308", "gdal307", "gdal306", @@ -36,6 +37,7 @@ elif os.name == "posix": lib_names = [ "gdal", "GDAL", + "gdal3.9.0", "gdal3.8.0", "gdal3.7.0", "gdal3.6.0", diff --git a/django/contrib/gis/gdal/prototypes/geom.py b/django/contrib/gis/gdal/prototypes/geom.py index 25af48570b..9066dbd423 100644 --- a/django/contrib/gis/gdal/prototypes/geom.py +++ b/django/contrib/gis/gdal/prototypes/geom.py @@ -85,6 +85,13 @@ is_3d = bool_output(lgdal.OGR_G_Is3D, [c_void_p]) set_3d = void_output(lgdal.OGR_G_Set3D, [c_void_p, c_int], errcheck=False) is_measured = bool_output(lgdal.OGR_G_IsMeasured, [c_void_p]) set_measured = void_output(lgdal.OGR_G_SetMeasured, [c_void_p, c_int], errcheck=False) +has_curve_geom = bool_output(lgdal.OGR_G_HasCurveGeometry, [c_void_p, c_int]) +get_linear_geom = geom_output( + lgdal.OGR_G_GetLinearGeometry, [c_void_p, c_double, POINTER(c_char_p)] +) +get_curve_geom = geom_output( + lgdal.OGR_G_GetCurveGeometry, [c_void_p, POINTER(c_char_p)] +) # Geometry modification routines. add_geom = void_output(lgdal.OGR_G_AddGeometry, [c_void_p, c_void_p]) diff --git a/django/contrib/gis/geoip2.py b/django/contrib/gis/geoip2.py index f5058c1c05..a5fe429b89 100644 --- a/django/contrib/gis/geoip2.py +++ b/django/contrib/gis/geoip2.py @@ -34,6 +34,18 @@ else: __all__ += ["GeoIP2", "GeoIP2Exception"] +# These are the values stored in the `database_type` field of the metadata. +# See https://maxmind.github.io/MaxMind-DB/#database_type for details. +SUPPORTED_DATABASE_TYPES = { + "DBIP-City-Lite", + "DBIP-Country-Lite", + "GeoIP2-City", + "GeoIP2-Country", + "GeoLite2-City", + "GeoLite2-Country", +} + + class GeoIP2Exception(Exception): pass @@ -106,7 +118,7 @@ class GeoIP2: ) database_type = self._metadata.database_type - if not database_type.endswith(("City", "Country")): + if database_type not in SUPPORTED_DATABASE_TYPES: raise GeoIP2Exception(f"Unable to handle database edition: {database_type}") def __del__(self): @@ -123,6 +135,14 @@ class GeoIP2: def _metadata(self): return self._reader.metadata() + @cached_property + def is_city(self): + return "City" in self._metadata.database_type + + @cached_property + def is_country(self): + return "Country" in self._metadata.database_type + def _query(self, query, *, require_city=False): if not isinstance(query, (str, ipaddress.IPv4Address, ipaddress.IPv6Address)): raise TypeError( @@ -130,9 +150,7 @@ class GeoIP2: "IPv6Address, not type %s" % type(query).__name__, ) - is_city = self._metadata.database_type.endswith("City") - - if require_city and not is_city: + if require_city and not self.is_city: raise GeoIP2Exception(f"Invalid GeoIP city data file: {self._path}") try: @@ -141,7 +159,7 @@ class GeoIP2: # GeoIP2 only takes IP addresses, so try to resolve a hostname. query = socket.gethostbyname(query) - function = self._reader.city if is_city else self._reader.country + function = self._reader.city if self.is_city else self._reader.country return function(query) def city(self, query): diff --git a/django/contrib/staticfiles/management/commands/collectstatic.py b/django/contrib/staticfiles/management/commands/collectstatic.py index c346038df8..d5cd3f56ca 100644 --- a/django/contrib/staticfiles/management/commands/collectstatic.py +++ b/django/contrib/staticfiles/management/commands/collectstatic.py @@ -279,14 +279,14 @@ class Command(BaseCommand): try: # When was the target file modified last time? target_last_modified = self.storage.get_modified_time(prefixed_path) - except (OSError, NotImplementedError, AttributeError): + except (OSError, NotImplementedError): # The storage doesn't support get_modified_time() or failed pass else: try: # When was the source file modified last time? source_last_modified = source_storage.get_modified_time(path) - except (OSError, NotImplementedError, AttributeError): + except (OSError, NotImplementedError): pass else: # The full path of the target file diff --git a/django/core/cache/backends/filebased.py b/django/core/cache/backends/filebased.py index 29d49c0ede..cbf47e4e16 100644 --- a/django/core/cache/backends/filebased.py +++ b/django/core/cache/backends/filebased.py @@ -166,5 +166,5 @@ class FileBasedCache(BaseCache): """ return [ os.path.join(self._dir, fname) - for fname in glob.glob1(self._dir, "*%s" % self.cache_suffix) + for fname in glob.glob(f"*{self.cache_suffix}", root_dir=self._dir) ] diff --git a/django/core/checks/__init__.py b/django/core/checks/__init__.py index 998ab9dee2..2502450cdf 100644 --- a/django/core/checks/__init__.py +++ b/django/core/checks/__init__.py @@ -16,6 +16,7 @@ from .registry import Tags, register, run_checks, tag_exists # Import these to force registration of checks import django.core.checks.async_checks # NOQA isort:skip import django.core.checks.caches # NOQA isort:skip +import django.core.checks.commands # NOQA isort:skip import django.core.checks.compatibility.django_4_0 # NOQA isort:skip import django.core.checks.database # NOQA isort:skip import django.core.checks.files # NOQA isort:skip diff --git a/django/core/checks/commands.py b/django/core/checks/commands.py new file mode 100644 index 0000000000..eee1e937e8 --- /dev/null +++ b/django/core/checks/commands.py @@ -0,0 +1,28 @@ +from django.core.checks import Error, Tags, register + + +@register(Tags.commands) +def migrate_and_makemigrations_autodetector(**kwargs): + from django.core.management import get_commands, load_command_class + + commands = get_commands() + + make_migrations = load_command_class(commands["makemigrations"], "makemigrations") + migrate = load_command_class(commands["migrate"], "migrate") + + if make_migrations.autodetector is not migrate.autodetector: + return [ + Error( + "The migrate and makemigrations commands must have the same " + "autodetector.", + hint=( + f"makemigrations.Command.autodetector is " + f"{make_migrations.autodetector.__name__}, but " + f"migrate.Command.autodetector is " + f"{migrate.autodetector.__name__}." + ), + id="commands.E001", + ) + ] + + return [] diff --git a/django/core/checks/registry.py b/django/core/checks/registry.py index 146b28f65e..3139fc3ef4 100644 --- a/django/core/checks/registry.py +++ b/django/core/checks/registry.py @@ -12,6 +12,7 @@ class Tags: admin = "admin" async_support = "async_support" caches = "caches" + commands = "commands" compatibility = "compatibility" database = "database" files = "files" diff --git a/django/core/management/commands/makemigrations.py b/django/core/management/commands/makemigrations.py index a4e4d520e6..d5d3466201 100644 --- a/django/core/management/commands/makemigrations.py +++ b/django/core/management/commands/makemigrations.py @@ -24,6 +24,7 @@ from django.db.migrations.writer import MigrationWriter class Command(BaseCommand): + autodetector = MigrationAutodetector help = "Creates new migration(s) for apps." def add_arguments(self, parser): @@ -209,7 +210,7 @@ class Command(BaseCommand): log=self.log, ) # Set up autodetector - autodetector = MigrationAutodetector( + autodetector = self.autodetector( loader.project_state(), ProjectState.from_apps(apps), questioner, @@ -461,7 +462,7 @@ class Command(BaseCommand): # If they still want to merge it, then write out an empty # file depending on the migrations needing merging. numbers = [ - MigrationAutodetector.parse_number(migration.name) + self.autodetector.parse_number(migration.name) for migration in merge_migrations ] try: diff --git a/django/core/management/commands/migrate.py b/django/core/management/commands/migrate.py index 5e6b19c095..fa420ee6e3 100644 --- a/django/core/management/commands/migrate.py +++ b/django/core/management/commands/migrate.py @@ -15,6 +15,7 @@ from django.utils.text import Truncator class Command(BaseCommand): + autodetector = MigrationAutodetector help = ( "Updates database schema. Manages both apps with migrations and those without." ) @@ -329,7 +330,7 @@ class Command(BaseCommand): self.stdout.write(" No migrations to apply.") # If there's changes that aren't in migrations yet, tell them # how to fix it. - autodetector = MigrationAutodetector( + autodetector = self.autodetector( executor.loader.project_state(), ProjectState.from_apps(apps), ) diff --git a/django/core/serializers/pyyaml.py b/django/core/serializers/pyyaml.py index ed6e4b3895..c72d1fa03b 100644 --- a/django/core/serializers/pyyaml.py +++ b/django/core/serializers/pyyaml.py @@ -5,6 +5,7 @@ Requires PyYaml (https://pyyaml.org/), but that's checked for in __init__. """ import collections +import datetime import decimal import yaml @@ -12,7 +13,6 @@ import yaml from django.core.serializers.base import DeserializationError from django.core.serializers.python import Deserializer as PythonDeserializer from django.core.serializers.python import Serializer as PythonSerializer -from django.db import models # Use the C (faster) implementation if possible try: @@ -44,17 +44,17 @@ class Serializer(PythonSerializer): internal_use_only = False - def handle_field(self, obj, field): + def _value_from_field(self, obj, field): # A nasty special case: base YAML doesn't support serialization of time # types (as opposed to dates or datetimes, which it does support). Since # we want to use the "safe" serializer for better interoperability, we # need to do something with those pesky times. Converting 'em to strings # isn't perfect, but it's better than a "!!python/time" type which would # halt deserialization under any other language. - if isinstance(field, models.TimeField) and getattr(obj, field.name) is not None: - self._current[field.name] = str(getattr(obj, field.name)) - else: - super().handle_field(obj, field) + value = super()._value_from_field(obj, field) + if isinstance(value, datetime.time): + value = str(value) + return value def end_serialization(self): self.options.setdefault("allow_unicode", True) diff --git a/django/core/validators.py b/django/core/validators.py index b1c5c053b8..8732ddf7ad 100644 --- a/django/core/validators.py +++ b/django/core/validators.py @@ -101,13 +101,16 @@ class DomainNameValidator(RegexValidator): if self.accept_idna: self.regex = _lazy_re_compile( - self.hostname_re + self.domain_re + self.tld_re, re.IGNORECASE + r"^" + self.hostname_re + self.domain_re + self.tld_re + r"$", + re.IGNORECASE, ) else: self.regex = _lazy_re_compile( - self.ascii_only_hostname_re + r"^" + + self.ascii_only_hostname_re + self.ascii_only_domain_re - + self.ascii_only_tld_re, + + self.ascii_only_tld_re + + r"$", re.IGNORECASE, ) super().__init__(**kwargs) diff --git a/django/db/backends/mysql/base.py b/django/db/backends/mysql/base.py index b8d2d09c94..eb0e361d8d 100644 --- a/django/db/backends/mysql/base.py +++ b/django/db/backends/mysql/base.py @@ -215,7 +215,7 @@ class DatabaseWrapper(BaseDatabaseWrapper): def get_connection_params(self): kwargs = { "conv": django_conversions, - "charset": "utf8", + "charset": "utf8mb4", } settings_dict = self.settings_dict if settings_dict["USER"]: diff --git a/django/db/backends/mysql/features.py b/django/db/backends/mysql/features.py index 21088544ac..414f552d94 100644 --- a/django/db/backends/mysql/features.py +++ b/django/db/backends/mysql/features.py @@ -71,21 +71,11 @@ class DatabaseFeatures(BaseDatabaseFeatures): @cached_property def test_collations(self): - charset = "utf8" - if ( - self.connection.mysql_is_mariadb - and self.connection.mysql_version >= (10, 6) - ) or ( - not self.connection.mysql_is_mariadb - and self.connection.mysql_version >= (8, 0, 30) - ): - # utf8 is an alias for utf8mb3 in MariaDB 10.6+ and MySQL 8.0.30+. - charset = "utf8mb3" return { - "ci": f"{charset}_general_ci", - "non_default": f"{charset}_esperanto_ci", - "swedish_ci": f"{charset}_swedish_ci", - "virtual": f"{charset}_esperanto_ci", + "ci": "utf8mb4_general_ci", + "non_default": "utf8mb4_esperanto_ci", + "swedish_ci": "utf8mb4_swedish_ci", + "virtual": "utf8mb4_esperanto_ci", } test_now_utc_template = "UTC_TIMESTAMP(6)" @@ -99,10 +89,6 @@ class DatabaseFeatures(BaseDatabaseFeatures): "db_functions.comparison.test_least.LeastTests." "test_coalesce_workaround", }, - "Running on MySQL requires utf8mb4 encoding (#18392).": { - "model_fields.test_textfield.TextFieldTests.test_emoji", - "model_fields.test_charfield.TestCharField.test_emoji", - }, "MySQL doesn't support functional indexes on a function that " "returns JSON": { "schema.tests.SchemaTests.test_func_index_json_key_transform", diff --git a/django/db/backends/postgresql/features.py b/django/db/backends/postgresql/features.py index 6170b5501a..16653a0519 100644 --- a/django/db/backends/postgresql/features.py +++ b/django/db/backends/postgresql/features.py @@ -160,6 +160,10 @@ class DatabaseFeatures(BaseDatabaseFeatures): def is_postgresql_16(self): return self.connection.pg_version >= 160000 + @cached_property + def is_postgresql_17(self): + return self.connection.pg_version >= 170000 + supports_unlimited_charfield = True supports_nulls_distinct_unique_constraints = property( operator.attrgetter("is_postgresql_15") diff --git a/django/db/backends/postgresql/operations.py b/django/db/backends/postgresql/operations.py index 4b179ca83f..d89f81bf7e 100644 --- a/django/db/backends/postgresql/operations.py +++ b/django/db/backends/postgresql/operations.py @@ -32,7 +32,9 @@ class DatabaseOperations(BaseDatabaseOperations): "BUFFERS", "COSTS", "GENERIC_PLAN", + "MEMORY", "SETTINGS", + "SERIALIZE", "SUMMARY", "TIMING", "VERBOSE", @@ -365,6 +367,9 @@ class DatabaseOperations(BaseDatabaseOperations): def explain_query_prefix(self, format=None, **options): extra = {} + if serialize := options.pop("serialize", None): + if serialize.upper() in {"TEXT", "BINARY"}: + extra["SERIALIZE"] = serialize.upper() # Normalize options. if options: options = { diff --git a/django/db/backends/postgresql/schema.py b/django/db/backends/postgresql/schema.py index 0c8548a5d6..75bf331472 100644 --- a/django/db/backends/postgresql/schema.py +++ b/django/db/backends/postgresql/schema.py @@ -140,6 +140,13 @@ class DatabaseSchemaEditor(BaseDatabaseSchemaEditor): return sequence["name"] return None + def _is_changing_type_of_indexed_text_column(self, old_field, old_type, new_type): + return (old_field.db_index or old_field.unique) and ( + (old_type.startswith("varchar") and not new_type.startswith("varchar")) + or (old_type.startswith("text") and not new_type.startswith("text")) + or (old_type.startswith("citext") and not new_type.startswith("citext")) + ) + def _alter_column_type_sql( self, model, old_field, new_field, new_type, old_collation, new_collation ): @@ -147,11 +154,7 @@ class DatabaseSchemaEditor(BaseDatabaseSchemaEditor): # different type. old_db_params = old_field.db_parameters(connection=self.connection) old_type = old_db_params["type"] - if (old_field.db_index or old_field.unique) and ( - (old_type.startswith("varchar") and not new_type.startswith("varchar")) - or (old_type.startswith("text") and not new_type.startswith("text")) - or (old_type.startswith("citext") and not new_type.startswith("citext")) - ): + if self._is_changing_type_of_indexed_text_column(old_field, old_type, new_type): index_name = self._create_index_name( model._meta.db_table, [old_field.column], suffix="_like" ) @@ -277,8 +280,14 @@ class DatabaseSchemaEditor(BaseDatabaseSchemaEditor): strict, ) # Added an index? Create any PostgreSQL-specific indexes. - if (not (old_field.db_index or old_field.unique) and new_field.db_index) or ( - not old_field.unique and new_field.unique + if ( + (not (old_field.db_index or old_field.unique) and new_field.db_index) + or (not old_field.unique and new_field.unique) + or ( + self._is_changing_type_of_indexed_text_column( + old_field, old_type, new_type + ) + ) ): like_index_statement = self._create_like_index_sql(model, new_field) if like_index_statement is not None: diff --git a/django/db/backends/sqlite3/features.py b/django/db/backends/sqlite3/features.py index 669e875b59..2c1aa32506 100644 --- a/django/db/backends/sqlite3/features.py +++ b/django/db/backends/sqlite3/features.py @@ -101,7 +101,7 @@ class DatabaseFeatures(BaseDatabaseFeatures): "servers.tests.LiveServerTestCloseConnectionTest." "test_closes_connections", }, - "For SQLite in-memory tests, closing the connection destroys" + "For SQLite in-memory tests, closing the connection destroys " "the database.": { "test_utils.tests.AssertNumQueriesUponConnectionTests." "test_ignores_connection_configuration_queries", diff --git a/django/db/migrations/autodetector.py b/django/db/migrations/autodetector.py index 353b992258..1dc6377494 100644 --- a/django/db/migrations/autodetector.py +++ b/django/db/migrations/autodetector.py @@ -219,6 +219,7 @@ class MigrationAutodetector: self.generate_altered_unique_together() self.generate_added_indexes() self.generate_added_constraints() + self.generate_altered_constraints() self.generate_altered_db_table() self._sort_migrations() @@ -1450,6 +1451,19 @@ class MigrationAutodetector: ), ) + def _constraint_should_be_dropped_and_recreated( + self, old_constraint, new_constraint + ): + old_path, old_args, old_kwargs = old_constraint.deconstruct() + new_path, new_args, new_kwargs = new_constraint.deconstruct() + + for attr in old_constraint.non_db_attrs: + old_kwargs.pop(attr, None) + for attr in new_constraint.non_db_attrs: + new_kwargs.pop(attr, None) + + return (old_path, old_args, old_kwargs) != (new_path, new_args, new_kwargs) + def create_altered_constraints(self): option_name = operations.AddConstraint.option_name for app_label, model_name in sorted(self.kept_model_keys): @@ -1461,14 +1475,41 @@ class MigrationAutodetector: old_constraints = old_model_state.options[option_name] new_constraints = new_model_state.options[option_name] - add_constraints = [c for c in new_constraints if c not in old_constraints] - rem_constraints = [c for c in old_constraints if c not in new_constraints] + + alt_constraints = [] + alt_constraints_name = [] + + for old_c in old_constraints: + for new_c in new_constraints: + old_c_dec = old_c.deconstruct() + new_c_dec = new_c.deconstruct() + if ( + old_c_dec != new_c_dec + and old_c.name == new_c.name + and not self._constraint_should_be_dropped_and_recreated( + old_c, new_c + ) + ): + alt_constraints.append(new_c) + alt_constraints_name.append(new_c.name) + + add_constraints = [ + c + for c in new_constraints + if c not in old_constraints and c.name not in alt_constraints_name + ] + rem_constraints = [ + c + for c in old_constraints + if c not in new_constraints and c.name not in alt_constraints_name + ] self.altered_constraints.update( { (app_label, model_name): { "added_constraints": add_constraints, "removed_constraints": rem_constraints, + "altered_constraints": alt_constraints, } } ) @@ -1503,6 +1544,23 @@ class MigrationAutodetector: ), ) + def generate_altered_constraints(self): + for ( + app_label, + model_name, + ), alt_constraints in self.altered_constraints.items(): + dependencies = self._get_dependencies_for_model(app_label, model_name) + for constraint in alt_constraints["altered_constraints"]: + self.add_operation( + app_label, + operations.AlterConstraint( + model_name=model_name, + name=constraint.name, + constraint=constraint, + ), + dependencies=dependencies, + ) + @staticmethod def _get_dependencies_for_foreign_key(app_label, model_name, field, project_state): remote_field_model = None diff --git a/django/db/migrations/operations/__init__.py b/django/db/migrations/operations/__init__.py index 90dbdf8256..012f2027d4 100644 --- a/django/db/migrations/operations/__init__.py +++ b/django/db/migrations/operations/__init__.py @@ -2,6 +2,7 @@ from .fields import AddField, AlterField, RemoveField, RenameField from .models import ( AddConstraint, AddIndex, + AlterConstraint, AlterIndexTogether, AlterModelManagers, AlterModelOptions, @@ -36,6 +37,7 @@ __all__ = [ "RenameField", "AddConstraint", "RemoveConstraint", + "AlterConstraint", "SeparateDatabaseAndState", "RunSQL", "RunPython", diff --git a/django/db/migrations/operations/models.py b/django/db/migrations/operations/models.py index 2469d01efb..40526b94c3 100644 --- a/django/db/migrations/operations/models.py +++ b/django/db/migrations/operations/models.py @@ -1230,6 +1230,12 @@ class AddConstraint(IndexOperation): and self.constraint.name == operation.name ): return [] + if ( + isinstance(operation, AlterConstraint) + and self.model_name_lower == operation.model_name_lower + and self.constraint.name == operation.name + ): + return [AddConstraint(self.model_name, operation.constraint)] return super().reduce(operation, app_label) @@ -1274,3 +1280,51 @@ class RemoveConstraint(IndexOperation): @property def migration_name_fragment(self): return "remove_%s_%s" % (self.model_name_lower, self.name.lower()) + + +class AlterConstraint(IndexOperation): + category = OperationCategory.ALTERATION + option_name = "constraints" + + def __init__(self, model_name, name, constraint): + self.model_name = model_name + self.name = name + self.constraint = constraint + + def state_forwards(self, app_label, state): + state.alter_constraint( + app_label, self.model_name_lower, self.name, self.constraint + ) + + def database_forwards(self, app_label, schema_editor, from_state, to_state): + pass + + def database_backwards(self, app_label, schema_editor, from_state, to_state): + pass + + def deconstruct(self): + return ( + self.__class__.__name__, + [], + { + "model_name": self.model_name, + "name": self.name, + "constraint": self.constraint, + }, + ) + + def describe(self): + return f"Alter constraint {self.name} on {self.model_name}" + + @property + def migration_name_fragment(self): + return "alter_%s_%s" % (self.model_name_lower, self.constraint.name.lower()) + + def reduce(self, operation, app_label): + if ( + isinstance(operation, (AlterConstraint, RemoveConstraint)) + and self.model_name_lower == operation.model_name_lower + and self.name == operation.name + ): + return [operation] + return super().reduce(operation, app_label) diff --git a/django/db/migrations/questioner.py b/django/db/migrations/questioner.py index e1081ab70a..2e61195581 100644 --- a/django/db/migrations/questioner.py +++ b/django/db/migrations/questioner.py @@ -160,8 +160,8 @@ class InteractiveMigrationQuestioner(MigrationQuestioner): else: try: return eval(code, {}, {"datetime": datetime, "timezone": timezone}) - except (SyntaxError, NameError) as e: - self.prompt_output.write("Invalid input: %s" % e) + except Exception as e: + self.prompt_output.write(f"{e.__class__.__name__}: {e}") def ask_not_null_addition(self, field_name, model_name): """Adding a NOT NULL field to a model.""" diff --git a/django/db/migrations/state.py b/django/db/migrations/state.py index e13de5ba6f..f3b70196db 100644 --- a/django/db/migrations/state.py +++ b/django/db/migrations/state.py @@ -211,6 +211,14 @@ class ProjectState: model_state.options[option_name] = [obj for obj in objs if obj.name != obj_name] self.reload_model(app_label, model_name, delay=True) + def _alter_option(self, app_label, model_name, option_name, obj_name, alt_obj): + model_state = self.models[app_label, model_name] + objs = model_state.options[option_name] + model_state.options[option_name] = [ + obj if obj.name != obj_name else alt_obj for obj in objs + ] + self.reload_model(app_label, model_name, delay=True) + def add_index(self, app_label, model_name, index): self._append_option(app_label, model_name, "indexes", index) @@ -237,6 +245,11 @@ class ProjectState: def remove_constraint(self, app_label, model_name, constraint_name): self._remove_option(app_label, model_name, "constraints", constraint_name) + def alter_constraint(self, app_label, model_name, constraint_name, constraint): + self._alter_option( + app_label, model_name, "constraints", constraint_name, constraint + ) + def add_field(self, app_label, model_name, name, field, preserve_default): # If preserve default is off, don't use the default for future state. if not preserve_default: diff --git a/django/db/models/constraints.py b/django/db/models/constraints.py index 788e2b635b..00829aee28 100644 --- a/django/db/models/constraints.py +++ b/django/db/models/constraints.py @@ -23,6 +23,8 @@ class BaseConstraint: violation_error_code = None violation_error_message = None + non_db_attrs = ("violation_error_code", "violation_error_message") + # RemovedInDjango60Warning: When the deprecation ends, replace with: # def __init__( # self, *, name, violation_error_code=None, violation_error_message=None diff --git a/django/db/models/fields/__init__.py b/django/db/models/fields/__init__.py index d1f31f0211..f9cafdb4bb 100644 --- a/django/db/models/fields/__init__.py +++ b/django/db/models/fields/__init__.py @@ -392,7 +392,10 @@ class Field(RegisterLookupMixin): if ( self.db_default is NOT_PROVIDED - or isinstance(self.db_default, Value) + or ( + isinstance(self.db_default, Value) + or not hasattr(self.db_default, "resolve_expression") + ) or databases is None ): return [] diff --git a/django/db/models/fields/tuple_lookups.py b/django/db/models/fields/tuple_lookups.py index eb2d80b20f..6342937cd6 100644 --- a/django/db/models/fields/tuple_lookups.py +++ b/django/db/models/fields/tuple_lookups.py @@ -2,7 +2,7 @@ import itertools from django.core.exceptions import EmptyResultSet from django.db.models import Field -from django.db.models.expressions import Func, Value +from django.db.models.expressions import ColPairs, Func, Value from django.db.models.lookups import ( Exact, GreaterThan, @@ -12,6 +12,7 @@ from django.db.models.lookups import ( LessThan, LessThanOrEqual, ) +from django.db.models.sql import Query from django.db.models.sql.where import AND, OR, WhereNode @@ -28,17 +29,32 @@ class Tuple(Func): class TupleLookupMixin: def get_prep_lookup(self): + self.check_rhs_is_tuple_or_list() self.check_rhs_length_equals_lhs_length() return self.rhs + def check_rhs_is_tuple_or_list(self): + if not isinstance(self.rhs, (tuple, list)): + lhs_str = self.get_lhs_str() + raise ValueError( + f"{self.lookup_name!r} lookup of {lhs_str} must be a tuple or a list" + ) + def check_rhs_length_equals_lhs_length(self): len_lhs = len(self.lhs) if len_lhs != len(self.rhs): + lhs_str = self.get_lhs_str() raise ValueError( - f"'{self.lookup_name}' lookup of '{self.lhs.field.name}' field " - f"must have {len_lhs} elements" + f"{self.lookup_name!r} lookup of {lhs_str} must have {len_lhs} elements" ) + def get_lhs_str(self): + if isinstance(self.lhs, ColPairs): + return repr(self.lhs.field.name) + else: + names = ", ".join(repr(f.name) for f in self.lhs) + return f"({names})" + def get_prep_lhs(self): if isinstance(self.lhs, (tuple, list)): return Tuple(*self.lhs) @@ -196,17 +212,52 @@ class TupleLessThanOrEqual(TupleLookupMixin, LessThanOrEqual): class TupleIn(TupleLookupMixin, In): def get_prep_lookup(self): - self.check_rhs_elements_length_equals_lhs_length() - return super(TupleLookupMixin, self).get_prep_lookup() + if self.rhs_is_direct_value(): + self.check_rhs_is_tuple_or_list() + self.check_rhs_is_collection_of_tuples_or_lists() + self.check_rhs_elements_length_equals_lhs_length() + else: + self.check_rhs_is_query() + self.check_rhs_select_length_equals_lhs_length() + + return self.rhs # skip checks from mixin + + def check_rhs_is_collection_of_tuples_or_lists(self): + if not all(isinstance(vals, (tuple, list)) for vals in self.rhs): + lhs_str = self.get_lhs_str() + raise ValueError( + f"{self.lookup_name!r} lookup of {lhs_str} " + "must be a collection of tuples or lists" + ) def check_rhs_elements_length_equals_lhs_length(self): len_lhs = len(self.lhs) if not all(len_lhs == len(vals) for vals in self.rhs): + lhs_str = self.get_lhs_str() raise ValueError( - f"'{self.lookup_name}' lookup of '{self.lhs.field.name}' field " + f"{self.lookup_name!r} lookup of {lhs_str} " f"must have {len_lhs} elements each" ) + def check_rhs_is_query(self): + if not isinstance(self.rhs, Query): + lhs_str = self.get_lhs_str() + rhs_cls = self.rhs.__class__.__name__ + raise ValueError( + f"{self.lookup_name!r} subquery lookup of {lhs_str} " + f"must be a Query object (received {rhs_cls!r})" + ) + + def check_rhs_select_length_equals_lhs_length(self): + len_rhs = len(self.rhs.select) + len_lhs = len(self.lhs) + if len_rhs != len_lhs: + lhs_str = self.get_lhs_str() + raise ValueError( + f"{self.lookup_name!r} subquery lookup of {lhs_str} " + f"must have {len_lhs} fields (received {len_rhs})" + ) + def process_rhs(self, compiler, connection): rhs = self.rhs if not rhs: @@ -229,10 +280,17 @@ class TupleIn(TupleLookupMixin, In): return Tuple(*result).as_sql(compiler, connection) + def as_sql(self, compiler, connection): + if not self.rhs_is_direct_value(): + return self.as_subquery(compiler, connection) + return super().as_sql(compiler, connection) + def as_sqlite(self, compiler, connection): rhs = self.rhs if not rhs: raise EmptyResultSet + if not self.rhs_is_direct_value(): + return self.as_subquery(compiler, connection) # e.g.: (a, b, c) in [(x1, y1, z1), (x2, y2, z2)] as SQL: # WHERE (a = x1 AND b = y1 AND c = z1) OR (a = x2 AND b = y2 AND c = z2) @@ -245,6 +303,9 @@ class TupleIn(TupleLookupMixin, In): return root.as_sql(compiler, connection) + def as_subquery(self, compiler, connection): + return compiler.compile(In(self.lhs, self.rhs)) + tuple_lookups = { "exact": TupleExact, diff --git a/django/db/models/functions/comparison.py b/django/db/models/functions/comparison.py index d06f0a25a4..76ef5d219b 100644 --- a/django/db/models/functions/comparison.py +++ b/django/db/models/functions/comparison.py @@ -160,39 +160,43 @@ class JSONObject(Func): ) return super().as_sql(compiler, connection, **extra_context) - def as_native(self, compiler, connection, *, returning, **extra_context): - class ArgJoiner: - def join(self, args): - pairs = zip(args[::2], args[1::2], strict=True) - return ", ".join([" VALUE ".join(pair) for pair in pairs]) + def join(self, args): + pairs = zip(args[::2], args[1::2], strict=True) + # Wrap 'key' in parentheses in case of postgres cast :: syntax. + return ", ".join([f"({key}) VALUE {value}" for key, value in pairs]) + def as_native(self, compiler, connection, *, returning, **extra_context): return self.as_sql( compiler, connection, - arg_joiner=ArgJoiner(), + arg_joiner=self, template=f"%(function)s(%(expressions)s RETURNING {returning})", **extra_context, ) def as_postgresql(self, compiler, connection, **extra_context): - if ( - not connection.features.is_postgresql_16 - or connection.features.uses_server_side_binding - ): - copy = self.copy() - copy.set_source_expressions( - [ - Cast(expression, TextField()) if index % 2 == 0 else expression - for index, expression in enumerate(copy.get_source_expressions()) - ] + # Casting keys to text is only required when using JSONB_BUILD_OBJECT + # or when using JSON_OBJECT on PostgreSQL 16+ with server-side bindings. + # This is done in all cases for consistency. + copy = self.copy() + copy.set_source_expressions( + [ + Cast(expression, TextField()) if index % 2 == 0 else expression + for index, expression in enumerate(copy.get_source_expressions()) + ] + ) + + if connection.features.is_postgresql_16: + return copy.as_native( + compiler, connection, returning="JSONB", **extra_context ) - return super(JSONObject, copy).as_sql( - compiler, - connection, - function="JSONB_BUILD_OBJECT", - **extra_context, - ) - return self.as_native(compiler, connection, returning="JSONB", **extra_context) + + return super(JSONObject, copy).as_sql( + compiler, + connection, + function="JSONB_BUILD_OBJECT", + **extra_context, + ) def as_oracle(self, compiler, connection, **extra_context): return self.as_native(compiler, connection, returning="CLOB", **extra_context) diff --git a/django/db/models/query.py b/django/db/models/query.py index a4277d05fc..21d5534cc9 100644 --- a/django/db/models/query.py +++ b/django/db/models/query.py @@ -660,9 +660,13 @@ class QuerySet(AltersData): obj.save(force_insert=True, using=self.db) return obj + create.alters_data = True + async def acreate(self, **kwargs): return await sync_to_async(self.create)(**kwargs) + acreate.alters_data = True + def _prepare_for_bulk_create(self, objs): from django.db.models.expressions import DatabaseDefault @@ -835,6 +839,8 @@ class QuerySet(AltersData): return objs + bulk_create.alters_data = True + async def abulk_create( self, objs, @@ -853,6 +859,8 @@ class QuerySet(AltersData): unique_fields=unique_fields, ) + abulk_create.alters_data = True + def bulk_update(self, objs, fields, batch_size=None): """ Update the given fields in each of the given objects in the database. @@ -941,12 +949,16 @@ class QuerySet(AltersData): pass raise + get_or_create.alters_data = True + async def aget_or_create(self, defaults=None, **kwargs): return await sync_to_async(self.get_or_create)( defaults=defaults, **kwargs, ) + aget_or_create.alters_data = True + def update_or_create(self, defaults=None, create_defaults=None, **kwargs): """ Look up an object with the given kwargs, updating one with defaults @@ -992,6 +1004,8 @@ class QuerySet(AltersData): obj.save(using=self.db) return obj, False + update_or_create.alters_data = True + async def aupdate_or_create(self, defaults=None, create_defaults=None, **kwargs): return await sync_to_async(self.update_or_create)( defaults=defaults, @@ -999,6 +1013,8 @@ class QuerySet(AltersData): **kwargs, ) + aupdate_or_create.alters_data = True + def _extract_model_params(self, defaults, **kwargs): """ Prepare `params` for creating a model instance based on the given diff --git a/django/db/models/sql/query.py b/django/db/models/sql/query.py index aef3f48f10..b7b93c235a 100644 --- a/django/db/models/sql/query.py +++ b/django/db/models/sql/query.py @@ -1021,11 +1021,21 @@ class Query(BaseExpression): if alias == old_alias: table_aliases[pos] = new_alias break + + # 3. Rename the direct external aliases and the ones of combined + # queries (union, intersection, difference). self.external_aliases = { # Table is aliased or it's being changed and thus is aliased. change_map.get(alias, alias): (aliased or alias in change_map) for alias, aliased in self.external_aliases.items() } + for combined_query in self.combined_queries: + external_change_map = { + alias: aliased + for alias, aliased in change_map.items() + if alias in combined_query.external_aliases + } + combined_query.change_aliases(external_change_map) def bump_prefix(self, other_query, exclude=None): """ diff --git a/django/forms/formsets.py b/django/forms/formsets.py index c8e5893f19..c2663154d4 100644 --- a/django/forms/formsets.py +++ b/django/forms/formsets.py @@ -570,7 +570,12 @@ def formset_factory( "validate_max": validate_max, "renderer": renderer, } - return type(form.__name__ + "FormSet", (formset,), attrs) + form_name = form.__name__ + if form_name.endswith("Form"): + formset_name = form_name + "Set" + else: + formset_name = form_name + "FormSet" + return type(formset_name, (formset,), attrs) def all_valid(formsets): diff --git a/django/http/response.py b/django/http/response.py index abe71718f2..4a0ea67013 100644 --- a/django/http/response.py +++ b/django/http/response.py @@ -21,6 +21,7 @@ from django.http.cookie import SimpleCookie from django.utils import timezone from django.utils.datastructures import CaseInsensitiveMapping from django.utils.encoding import iri_to_uri +from django.utils.functional import cached_property from django.utils.http import content_disposition_header, http_date from django.utils.regex_helper import _lazy_re_compile @@ -408,6 +409,11 @@ class HttpResponse(HttpResponseBase): content = self.make_bytes(value) # Create a list of properly encoded bytestrings to support write(). self._container = [content] + self.__dict__.pop("text", None) + + @cached_property + def text(self): + return self.content.decode(self.charset or "utf-8") def __iter__(self): return iter(self._container) @@ -460,6 +466,12 @@ class StreamingHttpResponse(HttpResponseBase): "`streaming_content` instead." % self.__class__.__name__ ) + @property + def text(self): + raise AttributeError( + "This %s instance has no `text` attribute." % self.__class__.__name__ + ) + @property def streaming_content(self): if self.is_async: @@ -615,10 +627,12 @@ class FileResponse(StreamingHttpResponse): class HttpResponseRedirectBase(HttpResponse): allowed_schemes = ["http", "https", "ftp"] - def __init__(self, redirect_to, *args, **kwargs): + def __init__(self, redirect_to, preserve_request=False, *args, **kwargs): super().__init__(*args, **kwargs) self["Location"] = iri_to_uri(redirect_to) parsed = urlsplit(str(redirect_to)) + if preserve_request: + self.status_code = self.status_code_preserve_request if parsed.scheme and parsed.scheme not in self.allowed_schemes: raise DisallowedRedirect( "Unsafe redirect to URL with protocol '%s'" % parsed.scheme @@ -640,10 +654,12 @@ class HttpResponseRedirectBase(HttpResponse): class HttpResponseRedirect(HttpResponseRedirectBase): status_code = 302 + status_code_preserve_request = 307 class HttpResponsePermanentRedirect(HttpResponseRedirectBase): status_code = 301 + status_code_preserve_request = 308 class HttpResponseNotModified(HttpResponse): diff --git a/django/shortcuts.py b/django/shortcuts.py index b8b5be1f5f..6274631dba 100644 --- a/django/shortcuts.py +++ b/django/shortcuts.py @@ -26,7 +26,7 @@ def render( return HttpResponse(content, content_type, status) -def redirect(to, *args, permanent=False, **kwargs): +def redirect(to, *args, permanent=False, preserve_request=False, **kwargs): """ Return an HttpResponseRedirect to the appropriate URL for the arguments passed. @@ -40,13 +40,17 @@ def redirect(to, *args, permanent=False, **kwargs): * A URL, which will be used as-is for the redirect location. - Issues a temporary redirect by default; pass permanent=True to issue a - permanent redirect. + Issues a temporary redirect by default. Set permanent=True to issue a + permanent redirect. Set preserve_request=True to instruct the user agent + to preserve the original HTTP method and body when following the redirect. """ redirect_class = ( HttpResponsePermanentRedirect if permanent else HttpResponseRedirect ) - return redirect_class(resolve_url(to, *args, **kwargs)) + return redirect_class( + resolve_url(to, *args, **kwargs), + preserve_request=preserve_request, + ) def _get_queryset(klass): diff --git a/django/template/base.py b/django/template/base.py index b974495c9c..eaca428b10 100644 --- a/django/template/base.py +++ b/django/template/base.py @@ -57,7 +57,7 @@ from enum import Enum from django.template.context import BaseContext from django.utils.formats import localize -from django.utils.html import conditional_escape, escape +from django.utils.html import conditional_escape from django.utils.regex_helper import _lazy_re_compile from django.utils.safestring import SafeData, SafeString, mark_safe from django.utils.text import get_text_list, smart_split, unescape_string_literal @@ -247,10 +247,10 @@ class Template: for num, next in enumerate(linebreak_iter(self.source)): if start >= upto and end <= next: line = num - before = escape(self.source[upto:start]) - during = escape(self.source[start:end]) - after = escape(self.source[end:next]) - source_lines.append((num, escape(self.source[upto:next]))) + before = self.source[upto:start] + during = self.source[start:end] + after = self.source[end:next] + source_lines.append((num, self.source[upto:next])) upto = next total = len(source_lines) diff --git a/django/template/context.py b/django/template/context.py index 0c28b479cd..90825fcdb5 100644 --- a/django/template/context.py +++ b/django/template/context.py @@ -37,7 +37,9 @@ class BaseContext: self.dicts.append(value) def __copy__(self): - duplicate = copy(super()) + duplicate = BaseContext() + duplicate.__class__ = self.__class__ + duplicate.__dict__ = copy(self.__dict__) duplicate.dicts = self.dicts[:] return duplicate diff --git a/django/template/library.py b/django/template/library.py index 4ee96cea89..d181caa832 100644 --- a/django/template/library.py +++ b/django/template/library.py @@ -153,6 +153,90 @@ class Library: else: raise ValueError("Invalid arguments provided to simple_tag") + def simple_block_tag(self, func=None, takes_context=None, name=None, end_name=None): + """ + Register a callable as a compiled block template tag. Example: + + @register.simple_block_tag + def hello(content): + return 'world' + """ + + def dec(func): + nonlocal end_name + + ( + params, + varargs, + varkw, + defaults, + kwonly, + kwonly_defaults, + _, + ) = getfullargspec(unwrap(func)) + function_name = name or func.__name__ + + if end_name is None: + end_name = f"end{function_name}" + + @wraps(func) + def compile_func(parser, token): + tag_params = params.copy() + + if takes_context: + if len(tag_params) >= 2 and tag_params[1] == "content": + del tag_params[1] + else: + raise TemplateSyntaxError( + f"{function_name!r} is decorated with takes_context=True so" + " it must have a first argument of 'context' and a second " + "argument of 'content'" + ) + elif tag_params and tag_params[0] == "content": + del tag_params[0] + else: + raise TemplateSyntaxError( + f"'{function_name}' must have a first argument of 'content'" + ) + + bits = token.split_contents()[1:] + target_var = None + if len(bits) >= 2 and bits[-2] == "as": + target_var = bits[-1] + bits = bits[:-2] + + nodelist = parser.parse((end_name,)) + parser.delete_first_token() + + args, kwargs = parse_bits( + parser, + bits, + tag_params, + varargs, + varkw, + defaults, + kwonly, + kwonly_defaults, + takes_context, + function_name, + ) + + return SimpleBlockNode( + nodelist, func, takes_context, args, kwargs, target_var + ) + + self.tag(function_name, compile_func) + return func + + if func is None: + # @register.simple_block_tag(...) + return dec + elif callable(func): + # @register.simple_block_tag + return dec(func) + else: + raise ValueError("Invalid arguments provided to simple_block_tag") + def inclusion_tag(self, filename, func=None, takes_context=None, name=None): """ Register a callable as an inclusion tag: @@ -243,6 +327,23 @@ class SimpleNode(TagHelperNode): return output +class SimpleBlockNode(SimpleNode): + def __init__(self, nodelist, *args, **kwargs): + super().__init__(*args, **kwargs) + self.nodelist = nodelist + + def get_resolved_arguments(self, context): + resolved_args, resolved_kwargs = super().get_resolved_arguments(context) + + # Restore the "content" argument. + # It will move depending on whether takes_context was passed. + resolved_args.insert( + 1 if self.takes_context else 0, self.nodelist.render(context) + ) + + return resolved_args, resolved_kwargs + + class InclusionNode(TagHelperNode): def __init__(self, func, takes_context, args, kwargs, filename): super().__init__(func, takes_context, args, kwargs) diff --git a/django/test/client.py b/django/test/client.py index a755aae05c..85d91b0c44 100644 --- a/django/test/client.py +++ b/django/test/client.py @@ -947,9 +947,7 @@ class ClientMixin: 'Content-Type header is "%s", not "application/json"' % response.get("Content-Type") ) - response._json = json.loads( - response.content.decode(response.charset), **extra - ) + response._json = json.loads(response.text, **extra) return response._json def _follow_redirect( diff --git a/django/test/runner.py b/django/test/runner.py index 27eb9613e9..a52c52fe21 100644 --- a/django/test/runner.py +++ b/django/test/runner.py @@ -12,6 +12,7 @@ import random import sys import textwrap import unittest +import unittest.suite from collections import defaultdict from contextlib import contextmanager from importlib import import_module @@ -292,7 +293,15 @@ failure and get a correct traceback. def addError(self, test, err): self.check_picklable(test, err) - self.events.append(("addError", self.test_index, err)) + + event_occurred_before_first_test = self.test_index == -1 + if event_occurred_before_first_test and isinstance( + test, unittest.suite._ErrorHolder + ): + self.events.append(("addError", self.test_index, test.id(), err)) + else: + self.events.append(("addError", self.test_index, err)) + super().addError(test, err) def addFailure(self, test, err): @@ -547,18 +556,32 @@ class ParallelTestSuite(unittest.TestSuite): tests = list(self.subsuites[subsuite_index]) for event in events: - event_name = event[0] - handler = getattr(result, event_name, None) - if handler is None: - continue - test = tests[event[1]] - args = event[2:] - handler(test, *args) + self.handle_event(result, tests, event) pool.join() return result + def handle_event(self, result, tests, event): + event_name = event[0] + handler = getattr(result, event_name, None) + if handler is None: + return + test_index = event[1] + event_occurred_before_first_test = test_index == -1 + if ( + event_name == "addError" + and event_occurred_before_first_test + and len(event) >= 4 + ): + test_id = event[2] + test = unittest.suite._ErrorHolder(test_id) + args = event[3:] + else: + test = tests[test_index] + args = event[2:] + handler(test, *args) + def __iter__(self): return iter(self.subsuites) diff --git a/django/utils/version.py b/django/utils/version.py index 55509f4c85..4ef8cfbcfe 100644 --- a/django/utils/version.py +++ b/django/utils/version.py @@ -19,6 +19,7 @@ PY310 = sys.version_info >= (3, 10) PY311 = sys.version_info >= (3, 11) PY312 = sys.version_info >= (3, 12) PY313 = sys.version_info >= (3, 13) +PY314 = sys.version_info >= (3, 14) def get_version(version=None): diff --git a/django/views/generic/dates.py b/django/views/generic/dates.py index d2b776c122..12ec4104cd 100644 --- a/django/views/generic/dates.py +++ b/django/views/generic/dates.py @@ -300,7 +300,11 @@ class DateMixin: class BaseDateListView(MultipleObjectMixin, DateMixin, View): - """Abstract base class for date-based views displaying a list of objects.""" + """ + Base class for date-based views displaying a list of objects. + + This requires subclassing to provide a response mixin. + """ allow_empty = False date_list_period = "year" @@ -388,7 +392,9 @@ class BaseDateListView(MultipleObjectMixin, DateMixin, View): class BaseArchiveIndexView(BaseDateListView): """ - Base class for archives of date-based items. Requires a response mixin. + Base view for archives of date-based items. + + This requires subclassing to provide a response mixin. """ context_object_name = "latest" @@ -411,7 +417,11 @@ class ArchiveIndexView(MultipleObjectTemplateResponseMixin, BaseArchiveIndexView class BaseYearArchiveView(YearMixin, BaseDateListView): - """List of objects published in a given year.""" + """ + Base view for a list of objects published in a given year. + + This requires subclassing to provide a response mixin. + """ date_list_period = "month" make_object_list = False @@ -463,7 +473,11 @@ class YearArchiveView(MultipleObjectTemplateResponseMixin, BaseYearArchiveView): class BaseMonthArchiveView(YearMixin, MonthMixin, BaseDateListView): - """List of objects published in a given month.""" + """ + Base view for a list of objects published in a given month. + + This requires subclassing to provide a response mixin. + """ date_list_period = "day" @@ -505,7 +519,11 @@ class MonthArchiveView(MultipleObjectTemplateResponseMixin, BaseMonthArchiveView class BaseWeekArchiveView(YearMixin, WeekMixin, BaseDateListView): - """List of objects published in a given week.""" + """ + Base view for a list of objects published in a given week. + + This requires subclassing to provide a response mixin. + """ def get_dated_items(self): """Return (date_list, items, extra_context) for this request.""" @@ -563,7 +581,11 @@ class WeekArchiveView(MultipleObjectTemplateResponseMixin, BaseWeekArchiveView): class BaseDayArchiveView(YearMixin, MonthMixin, DayMixin, BaseDateListView): - """List of objects published on a given day.""" + """ + Base view for a list of objects published on a given day. + + This requires subclassing to provide a response mixin. + """ def get_dated_items(self): """Return (date_list, items, extra_context) for this request.""" @@ -610,7 +632,11 @@ class DayArchiveView(MultipleObjectTemplateResponseMixin, BaseDayArchiveView): class BaseTodayArchiveView(BaseDayArchiveView): - """List of objects published today.""" + """ + Base view for a list of objects published today. + + This requires subclassing to provide a response mixin. + """ def get_dated_items(self): """Return (date_list, items, extra_context) for this request.""" @@ -625,8 +651,10 @@ class TodayArchiveView(MultipleObjectTemplateResponseMixin, BaseTodayArchiveView class BaseDateDetailView(YearMixin, MonthMixin, DayMixin, DateMixin, BaseDetailView): """ - Detail view of a single object on a single date; this differs from the + Base detail view for a single object on a single date; this differs from the standard DetailView by accepting a year/month/day in the URL. + + This requires subclassing to provide a response mixin. """ def get_object(self, queryset=None): diff --git a/django/views/generic/detail.py b/django/views/generic/detail.py index e4428c8036..a5f604bf1a 100644 --- a/django/views/generic/detail.py +++ b/django/views/generic/detail.py @@ -102,7 +102,11 @@ class SingleObjectMixin(ContextMixin): class BaseDetailView(SingleObjectMixin, View): - """A base view for displaying a single object.""" + """ + Base view for displaying a single object. + + This requires subclassing to provide a response mixin. + """ def get(self, request, *args, **kwargs): self.object = self.get_object() diff --git a/django/views/generic/edit.py b/django/views/generic/edit.py index 97934f58cb..ebd071cf00 100644 --- a/django/views/generic/edit.py +++ b/django/views/generic/edit.py @@ -170,7 +170,7 @@ class BaseCreateView(ModelFormMixin, ProcessFormView): """ Base view for creating a new object instance. - Using this base class requires subclassing to provide a response mixin. + This requires subclassing to provide a response mixin. """ def get(self, request, *args, **kwargs): @@ -194,7 +194,7 @@ class BaseUpdateView(ModelFormMixin, ProcessFormView): """ Base view for updating an existing object. - Using this base class requires subclassing to provide a response mixin. + This requires subclassing to provide a response mixin. """ def get(self, request, *args, **kwargs): @@ -242,7 +242,7 @@ class BaseDeleteView(DeletionMixin, FormMixin, BaseDetailView): """ Base view for deleting an object. - Using this base class requires subclassing to provide a response mixin. + This requires subclassing to provide a response mixin. """ form_class = Form diff --git a/django/views/generic/list.py b/django/views/generic/list.py index 830a8df630..8ed92920c4 100644 --- a/django/views/generic/list.py +++ b/django/views/generic/list.py @@ -148,7 +148,11 @@ class MultipleObjectMixin(ContextMixin): class BaseListView(MultipleObjectMixin, View): - """A base view for displaying a list of objects.""" + """ + Base view for displaying a list of objects. + + This requires subclassing to provide a response mixin. + """ def get(self, request, *args, **kwargs): self.object_list = self.get_queryset() diff --git a/django/views/templates/technical_500.html b/django/views/templates/technical_500.html index 31f0dfe1b9..a2fc8415f5 100644 --- a/django/views/templates/technical_500.html +++ b/django/views/templates/technical_500.html @@ -212,7 +212,7 @@ {% endif %} {% if frames %}
-

Traceback{% if not is_email %} +

Traceback{% if not is_email %} Switch to copy-and-paste view{% endif %}

diff --git a/docs/Makefile b/docs/Makefile index d97a7ff07c..15383bdd38 100644 --- a/docs/Makefile +++ b/docs/Makefile @@ -8,6 +8,7 @@ SPHINXBUILD ?= sphinx-build PAPER ?= BUILDDIR ?= _build LANGUAGE ?= +JOBS ?= auto # Set the default language. ifndef LANGUAGE @@ -21,7 +22,7 @@ LANGUAGEOPT = $(firstword $(subst _, ,$(LANGUAGE))) # Internal variables. PAPEROPT_a4 = -D latex_paper_size=a4 PAPEROPT_letter = -D latex_paper_size=letter -ALLSPHINXOPTS = -n -d $(BUILDDIR)/doctrees -D language=$(LANGUAGEOPT) $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) . +ALLSPHINXOPTS = -n -d $(BUILDDIR)/doctrees -D language=$(LANGUAGEOPT) --jobs $(JOBS) $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) . # the i18n builder cannot share the environment and doctrees with the others I18NSPHINXOPTS = $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) . @@ -61,7 +62,7 @@ html: @echo "Build finished. The HTML pages are in $(BUILDDIR)/html." htmlview: html - $(PYTHON) -c "import webbrowser; webbrowser.open('_build/html/index.html')" + $(PYTHON) -m webbrowser "$(BUILDDIR)/html/index.html" dirhtml: $(SPHINXBUILD) -b dirhtml $(ALLSPHINXOPTS) $(BUILDDIR)/dirhtml diff --git a/docs/conf.py b/docs/conf.py index b72b1afcf5..9289e821fa 100644 --- a/docs/conf.py +++ b/docs/conf.py @@ -13,6 +13,8 @@ import functools import sys from os.path import abspath, dirname, join +from sphinx import version_info as sphinx_version + # Workaround for sphinx-build recursion limit overflow: # pickle.dump(doctree, f, pickle.HIGHEST_PROTOCOL) # RuntimeError: maximum recursion depth exceeded while pickling an object @@ -138,13 +140,15 @@ django_next_version = "5.2" extlinks = { "bpo": ("https://bugs.python.org/issue?@action=redirect&bpo=%s", "bpo-%s"), "commit": ("https://github.com/django/django/commit/%s", "%s"), - "cve": ("https://nvd.nist.gov/vuln/detail/CVE-%s", "CVE-%s"), "pypi": ("https://pypi.org/project/%s/", "%s"), # A file or directory. GitHub redirects from blob to tree if needed. "source": ("https://github.com/django/django/blob/main/%s", "%s"), "ticket": ("https://code.djangoproject.com/ticket/%s", "#%s"), } +if sphinx_version < (8, 1): + extlinks["cve"] = ("https://www.cve.org/CVERecord?id=CVE-%s", "CVE-%s") + # The language for content autogenerated by Sphinx. Refer to documentation # for a list of supported languages. # language = None diff --git a/docs/faq/contributing.txt b/docs/faq/contributing.txt index 71a6a7a476..d281ce8b75 100644 --- a/docs/faq/contributing.txt +++ b/docs/faq/contributing.txt @@ -53,8 +53,8 @@ To determine the right time, you need to keep an eye on the schedule. If you post your message right before a release deadline, you're not likely to get the sort of attention you require. -Gentle IRC reminders can also work -- again, strategically timed if possible. -During a bug sprint would be a very good time, for example. +Gentle reminders in the ``#contributing-getting-started`` channel in the +`Django Discord server`_ can work. Another way to get traction is to pull several related tickets together. When someone sits down to review a bug in an area they haven't touched for @@ -68,6 +68,8 @@ issue over and over again. This sort of behavior will not gain you any additional attention -- certainly not the attention that you need in order to get your issue addressed. +.. _`Django Discord server`: https://discord.gg/xcRH6mN4fa + But I've reminded you several times and you keep ignoring my contribution! ========================================================================== diff --git a/docs/howto/auth-remote-user.txt b/docs/howto/auth-remote-user.txt index 19b25432fe..f8492e367a 100644 --- a/docs/howto/auth-remote-user.txt +++ b/docs/howto/auth-remote-user.txt @@ -6,12 +6,11 @@ This document describes how to make use of external authentication sources (where the web server sets the ``REMOTE_USER`` environment variable) in your Django applications. This type of authentication solution is typically seen on intranet sites, with single sign-on solutions such as IIS and Integrated -Windows Authentication or Apache and `mod_authnz_ldap`_, `CAS`_, `Cosign`_, -`WebAuth`_, `mod_auth_sspi`_, etc. +Windows Authentication or Apache and `mod_authnz_ldap`_, `CAS`_, `WebAuth`_, +`mod_auth_sspi`_, etc. -.. _mod_authnz_ldap: https://httpd.apache.org/docs/2.2/mod/mod_authnz_ldap.html +.. _mod_authnz_ldap: https://httpd.apache.org/docs/current/mod/mod_authnz_ldap.html .. _CAS: https://www.apereo.org/projects/cas -.. _Cosign: http://weblogin.org .. _WebAuth: https://uit.stanford.edu/service/authentication .. _mod_auth_sspi: https://sourceforge.net/projects/mod-auth-sspi diff --git a/docs/howto/custom-template-tags.txt b/docs/howto/custom-template-tags.txt index 15bef9b5fb..b5577eef7b 100644 --- a/docs/howto/custom-template-tags.txt +++ b/docs/howto/custom-template-tags.txt @@ -498,6 +498,195 @@ you see fit: {% current_time "%Y-%m-%d %I:%M %p" as the_time %}

The time is {{ the_time }}.

+.. _howto-custom-template-tags-simple-block-tags: + +Simple block tags +----------------- + +.. versionadded:: 5.2 + +.. method:: django.template.Library.simple_block_tag() + +When a section of rendered template needs to be passed into a custom tag, +Django provides the ``simple_block_tag`` helper function to accomplish this. +Similar to :meth:`~django.template.Library.simple_tag()`, this function accepts +a custom tag function, but with the additional ``content`` argument, which +contains the rendered content as defined inside the tag. This allows dynamic +template sections to be easily incorporated into custom tags. + +For example, a custom block tag which creates a chart could look like this:: + + from django import template + from myapp.charts import render_chart + + register = template.Library() + + + @register.simple_block_tag + def chart(content): + return render_chart(source=content) + +The ``content`` argument contains everything in between the ``{% chart %}`` +and ``{% endchart %}`` tags: + +.. code-block:: html+django + + {% chart %} + digraph G { + label = "Chart for {{ request.user }}" + A -> {B C} + } + {% endchart %} + +If there are other template tags or variables inside the ``content`` block, +they will be rendered before being passed to the tag function. In the example +above, ``request.user`` will be resolved by the time ``render_chart`` is +called. + +Block tags are closed with ``end{name}`` (for example, ``endchart``). This can +be customized with the ``end_name`` parameter:: + + @register.simple_block_tag(end_name="endofchart") + def chart(content): + return render_chart(source=content) + +Which would require a template definition like this: + +.. code-block:: html+django + + {% chart %} + digraph G { + label = "Chart for {{ request.user }}" + A -> {B C} + } + {% endofchart %} + +A few things to note about ``simple_block_tag``: + +* The first argument must be called ``content``, and it will contain the + contents of the template tag as a rendered string. +* Variables passed to the tag are not included in the rendering context of the + content, as would be when using the ``{% with %}`` tag. + +Just like :ref:`simple_tag`, +``simple_block_tag``: + +* Validates the quantity and quality of the arguments. +* Strips quotes from arguments if necessary. +* Escapes the output accordingly. +* Supports passing ``takes_context=True`` at registration time to access + context. Note that in this case, the first argument to the custom function + *must* be called ``context``, and ``content`` must follow. +* Supports renaming the tag by passing the ``name`` argument when registering. +* Supports accepting any number of positional or keyword arguments. +* Supports storing the result in a template variable using the ``as`` variant. + +.. admonition:: Content Escaping + + ``simple_block_tag`` behaves similarly to ``simple_tag`` regarding + auto-escaping. For details on escaping and safety, refer to ``simple_tag``. + Because the ``content`` argument has already been rendered by Django, it is + already escaped. + +A complete example +~~~~~~~~~~~~~~~~~~ + +Consider a custom template tag that generates a message box that supports +multiple message levels and content beyond a simple phrase. This could be +implemented using a ``simple_block_tag`` as follows: + +.. code-block:: python + :caption: ``testapp/templatetags/testapptags.py`` + + from django import template + from django.utils.html import format_html + + + register = template.Library() + + + @register.simple_block_tag(takes_context=True) + def msgbox(context, content, level): + format_kwargs = { + "level": level.lower(), + "level_title": level.capitalize(), + "content": content, + "open": " open" if level.lower() == "error" else "", + "site": context.get("site", "My Site"), + } + result = """ +
+ + + {level_title}: Please read for {site} + +

+ {content} +

+ +
+ """ + return format_html(result, **format_kwargs) + +When combined with a minimal view and corresponding template, as shown here: + +.. code-block:: python + :caption: ``testapp/views.py`` + + from django.shortcuts import render + + + def simpleblocktag_view(request): + return render(request, "test.html", context={"site": "Important Site"}) + + +.. code-block:: html+django + :caption: ``testapp/templates/test.html`` + + {% extends "base.html" %} + + {% load testapptags %} + + {% block content %} + + {% msgbox level="error" %} + Please fix all errors. Further documentation can be found at + Docs. + {% endmsgbox %} + + {% msgbox level="info" %} + More information at: Other Site/ + {% endmsgbox %} + + {% endblock %} + +The following HTML is produced as the rendered output: + +.. code-block:: html + +
+
+ + Error: Please read for Important Site + +

+ Please fix all errors. Further documentation can be found at + Docs. +

+
+
+ +
+
+ + Info: Please read for Important Site + +

+ More information at: Other Site +

+
+
+ .. _howto-custom-template-tags-inclusion-tags: Inclusion tags diff --git a/docs/howto/deployment/asgi/hypercorn.txt b/docs/howto/deployment/asgi/hypercorn.txt index ea5ce3cc72..3abd2d54ef 100644 --- a/docs/howto/deployment/asgi/hypercorn.txt +++ b/docs/howto/deployment/asgi/hypercorn.txt @@ -17,7 +17,7 @@ You can install Hypercorn with ``pip``: Running Django in Hypercorn =========================== -When Hypercorn is installed, a ``hypercorn`` command is available +When :pypi:`Hypercorn` is installed, a ``hypercorn`` command is available which runs ASGI applications. Hypercorn needs to be called with the location of a module containing an ASGI application object, followed by what the application is called (separated by a colon). @@ -35,4 +35,4 @@ this command from the same directory as your ``manage.py`` file. For more advanced usage, please read the `Hypercorn documentation `_. -.. _Hypercorn: https://pgjones.gitlab.io/hypercorn/ +.. _Hypercorn: https://hypercorn.readthedocs.io/ diff --git a/docs/howto/index.txt b/docs/howto/index.txt index 0034032ce2..d799ca7906 100644 --- a/docs/howto/index.txt +++ b/docs/howto/index.txt @@ -1,11 +1,57 @@ -=============== -"How-to" guides -=============== +============= +How-to guides +============= -Here you'll find short answers to "How do I....?" types of questions. These -how-to guides don't cover topics in depth -- you'll find that material in the -:doc:`/topics/index` and the :doc:`/ref/index`. However, these guides will help -you quickly accomplish common tasks. +Practical guides covering common tasks and problems. + +Models, data and databases +========================== + +.. toctree:: + :maxdepth: 1 + + initial-data + legacy-databases + custom-model-fields + writing-migrations + custom-lookups + +Templates and output +==================== + +.. toctree:: + :maxdepth: 1 + + outputting-csv + outputting-pdf + overriding-templates + custom-template-backend + custom-template-tags + +Project configuration and management +==================================== + +.. toctree:: + :maxdepth: 1 + + static-files/index + logging + error-reporting + delete-app + +Installing, deploying and upgrading +=================================== + +.. toctree:: + :maxdepth: 1 + + upgrade-version + windows + deployment/index + static-files/deployment + +Other guides +============ .. toctree:: :maxdepth: 1 @@ -13,25 +59,7 @@ you quickly accomplish common tasks. auth-remote-user csrf custom-management-commands - custom-model-fields - custom-lookups - custom-template-backend - custom-template-tags custom-file-storage - deployment/index - upgrade-version - error-reporting - initial-data - legacy-databases - logging - outputting-csv - outputting-pdf - overriding-templates - static-files/index - static-files/deployment - windows - writing-migrations - delete-app .. seealso:: diff --git a/docs/howto/overriding-templates.txt b/docs/howto/overriding-templates.txt index f636948a20..f99a1203a8 100644 --- a/docs/howto/overriding-templates.txt +++ b/docs/howto/overriding-templates.txt @@ -111,15 +111,15 @@ reimplement the entire template. For example, you can use this technique to add a custom logo to the ``admin/base_site.html`` template: - .. code-block:: html+django - :caption: ``templates/admin/base_site.html`` +.. code-block:: html+django + :caption: ``templates/admin/base_site.html`` - {% extends "admin/base_site.html" %} + {% extends "admin/base_site.html" %} - {% block branding %} - logo - {{ block.super }} - {% endblock %} + {% block branding %} + logo + {{ block.super }} + {% endblock %} Key points to note: diff --git a/docs/howto/static-files/deployment.txt b/docs/howto/static-files/deployment.txt index d6d1158249..19b7c9df82 100644 --- a/docs/howto/static-files/deployment.txt +++ b/docs/howto/static-files/deployment.txt @@ -15,7 +15,7 @@ Serving static files in production The basic outline of putting static files into production consists of two steps: run the :djadmin:`collectstatic` command when static files change, then arrange for the collected static files directory (:setting:`STATIC_ROOT`) to be -moved to the static file server and served. Depending the ``staticfiles`` +moved to the static file server and served. Depending on the ``staticfiles`` :setting:`STORAGES` alias, files may need to be moved to a new location manually or the :func:`post_process ` method of diff --git a/docs/internals/_images/triage_process.svg b/docs/internals/_images/triage_process.svg index 2b5e0d3ced..6fbf1cbcc7 100644 --- a/docs/internals/_images/triage_process.svg +++ b/docs/internals/_images/triage_process.svg @@ -232,47 +232,47 @@ - - - The ticket was already reported, was - already rejected, isn't a bug, doesn't contain - enough information, or can't be reproduced. + + + The ticket was already reported, was + already rejected, isn't a bug, doesn't contain + enough information, or can't be reproduced. - + - + - - - The ticket is a - bug and should - be fixed. + + + The ticket is a + bug and should + be fixed. - + - + - - - The ticket has a patch which applies cleanly and includes all - needed tests and docs. A merger can commit it as is. + + + The ticket has a patch which applies cleanly and includes all + needed tests and docs. A merger can commit it as is. - + - + diff --git a/docs/internals/contributing/index.txt b/docs/internals/contributing/index.txt index 6e3fd948ee..b547e468b7 100644 --- a/docs/internals/contributing/index.txt +++ b/docs/internals/contributing/index.txt @@ -46,7 +46,6 @@ a great ecosystem to work in: .. _posting guidelines: https://code.djangoproject.com/wiki/UsingTheMailingList .. _#django IRC channel: https://web.libera.chat/#django -.. _#django-dev IRC channel: https://web.libera.chat/#django-dev .. _community page: https://www.djangoproject.com/community/ .. _Django Discord server: https://discord.gg/xcRH6mN4fa .. _Django forum: https://forum.djangoproject.com/ diff --git a/docs/internals/contributing/new-contributors.txt b/docs/internals/contributing/new-contributors.txt index 8e81031b32..201fe4afc2 100644 --- a/docs/internals/contributing/new-contributors.txt +++ b/docs/internals/contributing/new-contributors.txt @@ -21,53 +21,55 @@ First steps Start with these steps to discover Django's development process. -* **Triage tickets** +Triage tickets +-------------- - If an `unreviewed ticket`_ reports a bug, try and reproduce it. If you - can reproduce it and it seems valid, make a note that you confirmed the bug - and accept the ticket. Make sure the ticket is filed under the correct - component area. Consider writing a patch that adds a test for the bug's - behavior, even if you don't fix the bug itself. See more at - :ref:`how-can-i-help-with-triaging` +If an `unreviewed ticket`_ reports a bug, try and reproduce it. If you can +reproduce it and it seems valid, make a note that you confirmed the bug and +accept the ticket. Make sure the ticket is filed under the correct component +area. Consider writing a patch that adds a test for the bug's behavior, even if +you don't fix the bug itself. See more at :ref:`how-can-i-help-with-triaging` -* **Look for tickets that are accepted and review patches to build familiarity - with the codebase and the process** +Review patches of accepted tickets +---------------------------------- - Mark the appropriate flags if a patch needs docs or tests. Look through the - changes a patch makes, and keep an eye out for syntax that is incompatible - with older but still supported versions of Python. :doc:`Run the tests - ` and make sure they pass. - Where possible and relevant, try them out on a database other than SQLite. - Leave comments and feedback! +This will help you build familiarity with the codebase and processes. Mark the +appropriate flags if a patch needs docs or tests. Look through the changes a +patch makes, and keep an eye out for syntax that is incompatible with older but +still supported versions of Python. :doc:`Run the tests +` and make sure they pass. +Where possible and relevant, try them out on a database other than SQLite. +Leave comments and feedback! -* **Keep old patches up to date** +Keep old patches up-to-date +--------------------------- - Oftentimes the codebase will change between a patch being submitted and the - time it gets reviewed. Make sure it still applies cleanly and functions as - expected. Updating a patch is both useful and important! See more on - :doc:`writing-code/submitting-patches`. +Oftentimes the codebase will change between a patch being submitted and the +time it gets reviewed. Make sure it still applies cleanly and functions as +expected. Updating a patch is both useful and important! See more on +:doc:`writing-code/submitting-patches`. -* **Write some documentation** +Write some documentation +------------------------ - Django's documentation is great but it can always be improved. Did you find - a typo? Do you think that something should be clarified? Go ahead and - suggest a documentation patch! See also the guide on - :doc:`writing-documentation`. +Django's documentation is great but it can always be improved. Did you find a +typo? Do you think that something should be clarified? Go ahead and suggest a +documentation patch! See also the guide on :doc:`writing-documentation`. - .. note:: +.. note:: - The `reports page`_ contains links to many useful Trac queries, including - several that are useful for triaging tickets and reviewing patches as - suggested above. + The `reports page`_ contains links to many useful Trac queries, including + several that are useful for triaging tickets and reviewing patches as + suggested above. - .. _reports page: https://code.djangoproject.com/wiki/Reports + .. _reports page: https://code.djangoproject.com/wiki/Reports -* **Sign the Contributor License Agreement** +Sign the Contributor License Agreement +-------------------------------------- - The code that you write belongs to you or your employer. If your - contribution is more than one or two lines of code, you need to sign the - `CLA`_. See the `Contributor License Agreement FAQ`_ for a more thorough - explanation. +The code that you write belongs to you or your employer. If your contribution +is more than one or two lines of code, you need to sign the `CLA`_. See the +`Contributor License Agreement FAQ`_ for a more thorough explanation. .. _CLA: https://www.djangoproject.com/foundation/cla/ .. _Contributor License Agreement FAQ: https://www.djangoproject.com/foundation/cla/faq/ @@ -80,78 +82,89 @@ Guidelines As a newcomer on a large project, it's easy to experience frustration. Here's some advice to make your work on Django more useful and rewarding. -* **Pick a subject area that you care about, that you are familiar with, or - that you want to learn about** +Pick a subject area +------------------- - You don't already have to be an expert on the area you want to work on; you - become an expert through your ongoing contributions to the code. +This should be something that you care about, that you are familiar with or +that you want to learn about. You don't already have to be an expert on the +area you want to work on; you become an expert through your ongoing +contributions to the code. -* **Analyze tickets' context and history** +Analyze tickets' context and history +------------------------------------ - Trac isn't an absolute; the context is just as important as the words. - When reading Trac, you need to take into account who says things, and when - they were said. Support for an idea two years ago doesn't necessarily mean - that the idea will still have support. You also need to pay attention to who - *hasn't* spoken -- for example, if an experienced contributor hasn't been - recently involved in a discussion, then a ticket may not have the support - required to get into Django. +Trac isn't an absolute; the context is just as important as the words. When +reading Trac, you need to take into account who says things, and when they were +said. Support for an idea two years ago doesn't necessarily mean that the idea +will still have support. You also need to pay attention to who *hasn't* spoken +-- for example, if an experienced contributor hasn't been recently involved in +a discussion, then a ticket may not have the support required to get into +Django. -* **Start small** +Start small +----------- - It's easier to get feedback on a little issue than on a big one. See the - `easy pickings`_. +It's easier to get feedback on a little issue than on a big one. See the +`easy pickings`_. -* **If you're going to engage in a big task, make sure that your idea has - support first** +Confirm support before engaging in a big task +--------------------------------------------- - This means getting someone else to confirm that a bug is real before you fix - the issue, and ensuring that there's consensus on a proposed feature before - you go implementing it. +This means getting someone else to confirm that a bug is real before you fix +the issue, and ensuring that there's consensus on a proposed feature before you +go implementing it. -* **Be bold! Leave feedback!** +Be bold! Leave feedback! +------------------------ - Sometimes it can be scary to put your opinion out to the world and say "this - ticket is correct" or "this patch needs work", but it's the only way the - project moves forward. The contributions of the broad Django community - ultimately have a much greater impact than that of any one person. We can't - do it without **you**! +Sometimes it can be scary to put your opinion out to the world and say "this +ticket is correct" or "this patch needs work", but it's the only way the +project moves forward. The contributions of the broad Django community +ultimately have a much greater impact than that of any one person. We can't do +it without **you**! -* **Err on the side of caution when marking things Ready For Check-in** +Be cautious when marking things "Ready For Check-in" +---------------------------------------------------- - If you're really not certain if a ticket is ready, don't mark it as - such. Leave a comment instead, letting others know your thoughts. If you're - mostly certain, but not completely certain, you might also try asking on IRC - to see if someone else can confirm your suspicions. +If you're really not certain if a ticket is ready, don't mark it as such. Leave +a comment instead, letting others know your thoughts. If you're mostly certain, +but not completely certain, you might also try asking on the +``#contributing-getting-started`` channel in the `Django Discord server`_ to +see if someone else can confirm your suspicions. -* **Wait for feedback, and respond to feedback that you receive** +.. _`Django Discord server`: https://discord.gg/xcRH6mN4fa - Focus on one or two tickets, see them through from start to finish, and - repeat. The shotgun approach of taking on lots of tickets and letting some - fall by the wayside ends up doing more harm than good. +Wait for feedback, and respond to feedback that you receive +----------------------------------------------------------- -* **Be rigorous** +Focus on one or two tickets, see them through from start to finish, and repeat. +The shotgun approach of taking on lots of tickets and letting some fall by the +wayside ends up doing more harm than good. - When we say ":pep:`8`, and must have docs and tests", we mean it. If a patch - doesn't have docs and tests, there had better be a good reason. Arguments - like "I couldn't find any existing tests of this feature" don't carry much - weight--while it may be true, that means you have the extra-important job of - writing the very first tests for that feature, not that you get a pass from - writing tests altogether. +Be rigorous +----------- -* **Be patient** +When we say ":pep:`8`, and must have docs and tests", we mean it. If a patch +doesn't have docs and tests, there had better be a good reason. Arguments like +"I couldn't find any existing tests of this feature" don't carry much weight. +While it may be true, that means you have the extra-important job of writing +the very first tests for that feature, not that you get a pass from writing +tests altogether. - It's not always easy for your ticket or your patch to be reviewed quickly. - This isn't personal. There are a lot of tickets and pull requests to get - through. +Be patient +---------- - Keeping your patch up to date is important. Review the ticket on Trac to - ensure that the *Needs tests*, *Needs documentation*, and *Patch needs - improvement* flags are unchecked once you've addressed all review comments. +It's not always easy for your ticket or your patch to be reviewed quickly. This +isn't personal. There are a lot of tickets and pull requests to get through. - Remember that Django has an eight-month release cycle, so there's plenty of - time for your patch to be reviewed. +Keeping your patch up to date is important. Review the ticket on Trac to ensure +that the *Needs tests*, *Needs documentation*, and *Patch needs improvement* +flags are unchecked once you've addressed all review comments. - Finally, a well-timed reminder can help. See :ref:`contributing code FAQ - ` for ideas here. +Remember that Django has an eight-month release cycle, so there's plenty of +time for your patch to be reviewed. + +Finally, a well-timed reminder can help. See :ref:`contributing code FAQ +` for ideas here. .. _easy pickings: https://code.djangoproject.com/query?status=!closed&easy=1 diff --git a/docs/internals/contributing/triaging-tickets.txt b/docs/internals/contributing/triaging-tickets.txt index 852219c96c..7987d63e9a 100644 --- a/docs/internals/contributing/triaging-tickets.txt +++ b/docs/internals/contributing/triaging-tickets.txt @@ -49,8 +49,8 @@ attribute easily tells us what and who each ticket is waiting on. Since a picture is worth a thousand words, let's start there: .. image:: /internals/_images/triage_process.* - :height: 501 - :width: 400 + :height: 750 + :width: 600 :alt: Django's ticket triage workflow We've got two roles in this diagram: diff --git a/docs/internals/contributing/writing-code/coding-style.txt b/docs/internals/contributing/writing-code/coding-style.txt index c1838b77a3..20605aef56 100644 --- a/docs/internals/contributing/writing-code/coding-style.txt +++ b/docs/internals/contributing/writing-code/coding-style.txt @@ -417,7 +417,7 @@ Model style * All database fields * Custom manager attributes * ``class Meta`` - * ``def __str__()`` + * ``def __str__()`` and other Python magic methods * ``def save()`` * ``def get_absolute_url()`` * Any custom methods diff --git a/docs/internals/contributing/writing-code/submitting-patches.txt b/docs/internals/contributing/writing-code/submitting-patches.txt index cac6848d04..c3d0e1745f 100644 --- a/docs/internals/contributing/writing-code/submitting-patches.txt +++ b/docs/internals/contributing/writing-code/submitting-patches.txt @@ -47,10 +47,14 @@ and time availability), claim it by following these steps: any activity, it's probably safe to reassign it to yourself. * Log into your account, if you haven't already, by clicking "GitHub Login" - or "DjangoProject Login" in the upper left of the ticket page. + or "DjangoProject Login" in the upper left of the ticket page. Once logged + in, you can then click the "Modify Ticket" button near the bottom of the + page. -* Claim the ticket by clicking the "assign to myself" radio button under - "Action" near the bottom of the page, then click "Submit changes." +* Claim the ticket by clicking the "assign to" radio button in the "Action" + section. Your username will be filled in the text box by default. + +* Finally click the "Submit changes" button at the bottom to save. .. note:: The Django software foundation requests that anyone contributing more than @@ -114,7 +118,7 @@ requirements: feature, the change should also contain documentation. When you think your work is ready to be reviewed, send :doc:`a GitHub pull -request `. +request `. If you can't send a pull request for some reason, you can also use patches in Trac. When using this style, follow these guidelines. @@ -140,20 +144,63 @@ Regardless of the way you submit your work, follow these steps. .. _ticket tracker: https://code.djangoproject.com/ .. _Development dashboard: https://dashboard.djangoproject.com/ -Non-trivial contributions -========================= +Contributions which require community feedback +============================================== -A "non-trivial" contribution is one that is more than a small bug fix. It's a -change that introduces new Django functionality and makes some sort of design -decision. +A wider community discussion is required when a patch introduces new Django +functionality and makes some sort of design decision. This is especially +important if the approach involves a :ref:`deprecation ` +or introduces breaking changes. -If you provide a non-trivial change, include evidence that alternatives have -been discussed on the `Django Forum`_ or |django-developers| list. +The following are different approaches for gaining feedback from the community. -If you're not sure whether your contribution should be considered non-trivial, -ask on the ticket for opinions. +The Django Forum or django-developers mailing list +-------------------------------------------------- + +You can propose a change on the `Django Forum`_ or |django-developers| mailing +list. You should explain the need for the change, go into details of the +approach and discuss alternatives. + +Please include a link to such discussions in your contributions. + +Third party package +------------------- + +Django does not accept experimental features. All features must follow our +:ref:`deprecation policy `. Hence, it can +take months or years for Django to iterate on an API design. + +If you need user feedback on a public interface, it is better to create a +third-party package first. You can iterate on the public API much faster, while +also validating the need for the feature. + +Once this package becomes stable and there are clear benefits of incorporating +aspects into Django core, starting a discussion on the `Django Forum`_ or +|django-developers| mailing list would be the next step. + +Django Enhancement Proposal (DEP) +--------------------------------- + +Similar to Python’s PEPs, Django has `Django Enhancement Proposals`_ or DEPs. A +DEP is a design document which provides information to the Django community, or +describes a new feature or process for Django. They provide concise technical +specifications of features, along with rationales. DEPs are also the primary +mechanism for proposing and collecting community input on major new features. + +Before considering writing a DEP, it is recommended to first open a discussion +on the `Django Forum`_ or |django-developers| mailing list. This allows the +community to provide feedback and helps refine the proposal. Once the DEP is +ready the :ref:`Steering Council ` votes on whether to accept +it. + +Some examples of DEPs that have been approved and fully implemented: + +* `DEP 181: ORM Expressions `_ +* `DEP 182: Multiple Template Engines `_ +* `DEP 201: Simplified routing syntax `_ .. _Django Forum: https://forum.djangoproject.com/ +.. _Django Enhancement Proposals: https://github.com/django/deps .. _deprecating-a-feature: diff --git a/docs/internals/contributing/writing-code/unit-tests.txt b/docs/internals/contributing/writing-code/unit-tests.txt index 3641bfb8cc..76f4a9e754 100644 --- a/docs/internals/contributing/writing-code/unit-tests.txt +++ b/docs/internals/contributing/writing-code/unit-tests.txt @@ -322,7 +322,6 @@ dependencies: * :pypi:`numpy` * :pypi:`Pillow` 6.2.1+ * :pypi:`PyYAML` -* :pypi:`pytz` (required) * :pypi:`pywatchman` * :pypi:`redis` 3.4+ * :pypi:`setuptools` diff --git a/docs/internals/contributing/writing-documentation.txt b/docs/internals/contributing/writing-documentation.txt index 763039e61a..10b7edbca8 100644 --- a/docs/internals/contributing/writing-documentation.txt +++ b/docs/internals/contributing/writing-documentation.txt @@ -159,9 +159,14 @@ Spelling check Before you commit your docs, it's a good idea to run the spelling checker. You'll need to install :pypi:`sphinxcontrib-spelling` first. Then from the -``docs`` directory, run ``make spelling``. Wrong words (if any) along with the -file and line number where they occur will be saved to -``_build/spelling/output.txt``. +``docs`` directory, run: + +.. console:: + + $ make spelling + +Wrong words (if any) along with the file and line number where they occur will +be saved to ``_build/spelling/output.txt``. If you encounter false-positives (error output that actually is correct), do one of the following: @@ -179,10 +184,21 @@ Link check Links in documentation can become broken or changed such that they are no longer the canonical link. Sphinx provides a builder that can check whether the -links in the documentation are working. From the ``docs`` directory, run ``make -linkcheck``. Output is printed to the terminal, but can also be found in +links in the documentation are working. From the ``docs`` directory, run: + +.. console:: + + $ make linkcheck + +Output is printed to the terminal, but can also be found in ``_build/linkcheck/output.txt`` and ``_build/linkcheck/output.json``. +.. warning:: + + The execution of the command requires an internet connection and takes + several minutes to complete, because the command tests all the links + that are found in the documentation. + Entries that have a status of "working" are fine, those that are "unchecked" or "ignored" have been skipped because they either cannot be checked or have matched ignore rules in the configuration. @@ -290,7 +306,8 @@ documentation: display a link with the title "auth". * All Python code blocks should be formatted using the :pypi:`blacken-docs` - auto-formatter. This will be run by ``pre-commit`` if that is configured. + auto-formatter. This will be run by :ref:`pre-commit + ` if that is configured. * Use :mod:`~sphinx.ext.intersphinx` to reference Python's and Sphinx' documentation. @@ -324,8 +341,9 @@ documentation: Five ^^^^ -* Use :rst:role:`:rfc:` to reference RFC and try to link to the relevant - section if possible. For example, use ``:rfc:`2324#section-2.3.2``` or +* Use :rst:role:`:rfc:` to reference a Request for Comments (RFC) and + try to link to the relevant section if possible. For example, use + ``:rfc:`2324#section-2.3.2``` or ``:rfc:`Custom link text <2324#section-2.3.2>```. * Use :rst:role:`:pep:` to reference a Python Enhancement Proposal (PEP) @@ -339,6 +357,9 @@ documentation: also need to define a reference to the documentation for that environment variable using :rst:dir:`.. envvar:: `. +* Use :rst:role:`:cve:` to reference a Common Vulnerabilities and + Exposures (CVE) identifier. For example, use ``:cve:`2019-14232```. + Django-specific markup ====================== @@ -518,7 +539,7 @@ Minimizing images Optimize image compression where possible. For PNG files, use OptiPNG and AdvanceCOMP's ``advpng``: -.. code-block:: console +.. console:: $ cd docs $ optipng -o7 -zm1-9 -i0 -strip all `find . -type f -not -path "./_build/*" -name "*.png"` @@ -619,6 +640,10 @@ included in the Django repository and the releases as ``docs/man/django-admin.1``. There isn't a need to update this file when updating the documentation, as it's updated once as part of the release process. -To generate an updated version of the man page, run ``make man`` in the -``docs`` directory. The new man page will be written in -``docs/_build/man/django-admin.1``. +To generate an updated version of the man page, in the ``docs`` directory, run: + +.. console:: + + $ make man + +The new man page will be written in ``docs/_build/man/django-admin.1``. diff --git a/docs/internals/deprecation.txt b/docs/internals/deprecation.txt index 85ad0d400f..171d9ecbe3 100644 --- a/docs/internals/deprecation.txt +++ b/docs/internals/deprecation.txt @@ -18,6 +18,10 @@ details on these changes. * The ``all`` keyword argument of ``django.contrib.staticfiles.finders.find()`` will be removed. +* The fallback to ``request.user`` when ``user`` is ``None`` in + ``django.contrib.auth.login()`` and ``django.contrib.auth.alogin()`` will be + removed. + .. _deprecation-removed-in-6.0: 6.0 diff --git a/docs/internals/howto-release-django.txt b/docs/internals/howto-release-django.txt index c0a8ab8ab1..131c60fec8 100644 --- a/docs/internals/howto-release-django.txt +++ b/docs/internals/howto-release-django.txt @@ -624,9 +624,9 @@ need to be done by the releaser. message, add a "refs #XXXX" to the original ticket where the deprecation began if possible. -#. Remove ``.. versionadded::``, ``.. versionadded::``, and ``.. deprecated::`` - annotations in the documentation from two releases ago. For example, in - Django 4.2, notes for 4.0 will be removed. +#. Remove ``.. versionadded::``, ``.. versionchanged::``, and + ``.. deprecated::`` annotations in the documentation from two releases ago. + For example, in Django 4.2, notes for 4.0 will be removed. #. Add the new branch to `Read the Docs `_. Since the automatically diff --git a/docs/internals/security.txt b/docs/internals/security.txt index 55300b01e1..6aac9a6b66 100644 --- a/docs/internals/security.txt +++ b/docs/internals/security.txt @@ -38,6 +38,41 @@ action to be taken, you may receive further followup emails. .. _our public Trac instance: https://code.djangoproject.com/query +.. _security-report-evaluation: + +How does Django evaluate a report +================================= + +These are criteria used by the security team when evaluating whether a report +requires a security release: + +* The vulnerability is within a :ref:`supported version ` of + Django. + +* The vulnerability applies to a production-grade Django application. This means + the following do not require a security release: + + * Exploits that only affect local development, for example when using + :djadmin:`runserver`. + * Exploits which fail to follow security best practices, such as failure to + sanitize user input. For other examples, see our :ref:`security + documentation `. + * Exploits in AI generated code that do not adhere to security best practices. + +The security team may conclude that the source of the vulnerability is within +the Python standard library, in which case the reporter will be asked to report +the vulnerability to the Python core team. For further details see the `Python +security guidelines `_. + +On occasion, a security release may be issued to help resolve a security +vulnerability within a popular third-party package. These reports should come +from the package maintainers. + +If you are unsure whether your finding meets these criteria, please still report +it :ref:`privately by emailing security@djangoproject.com +`. The security team will review your report and +recommend the correct course of action. + .. _security-support: Supported versions diff --git a/docs/intro/contributing.txt b/docs/intro/contributing.txt index 7d590e76a2..0900fdae37 100644 --- a/docs/intro/contributing.txt +++ b/docs/intro/contributing.txt @@ -217,8 +217,7 @@ a dependency for one or more of the Python packages. Consult the failing package's documentation or search the web with the error message that you encounter. -Now we are ready to run the test suite. If you're using GNU/Linux, macOS, or -some other flavor of Unix, run: +Now we are ready to run the test suite: .. console:: diff --git a/docs/intro/overview.txt b/docs/intro/overview.txt index 0c41446d01..af87a01bb4 100644 --- a/docs/intro/overview.txt +++ b/docs/intro/overview.txt @@ -309,7 +309,7 @@ Here's what the "base.html" template, including the use of :doc:`static files :caption: ``templates/base.html`` {% load static %} - + {% block title %}{% endblock %} diff --git a/docs/intro/reusable-apps.txt b/docs/intro/reusable-apps.txt index a9c0768e3b..5acf8c2b18 100644 --- a/docs/intro/reusable-apps.txt +++ b/docs/intro/reusable-apps.txt @@ -6,7 +6,7 @@ This advanced tutorial begins where :doc:`Tutorial 8 ` left off. We'll be turning our web-poll into a standalone Python package you can reuse in new projects and share with other people. -If you haven't recently completed Tutorials 1–7, we encourage you to review +If you haven't recently completed Tutorials 1–8, we encourage you to review these so that your example project matches the one described below. Reusability matters diff --git a/docs/intro/tutorial08.txt b/docs/intro/tutorial08.txt index 463db3221e..98bf70d330 100644 --- a/docs/intro/tutorial08.txt +++ b/docs/intro/tutorial08.txt @@ -22,10 +22,11 @@ Installing Django Debug Toolbar =============================== Django Debug Toolbar is a useful tool for debugging Django web applications. -It's a third-party package maintained by the `Jazzband -`_ organization. The toolbar helps you understand how your -application functions and to identify problems. It does so by providing panels -that provide debug information about the current request and response. +It's a third-party package that is maintained by the community organization +`Django Commons `_. The toolbar helps you +understand how your application functions and to identify problems. It does so +by providing panels that provide debug information about the current request +and response. To install a third-party application like the toolbar, you need to install the package by running the below command within an activated virtual @@ -67,7 +68,7 @@ resolve the issue yourself, there are options available to you. `_ that outlines troubleshooting options. #. Search for similar issues on the package's issue tracker. Django Debug - Toolbar’s is `on GitHub `_. + Toolbar’s is `on GitHub `_. #. Consult the `Django Forum `_. #. Join the `Django Discord server `_. #. Join the #Django IRC channel on `Libera.chat `_. diff --git a/docs/ref/checks.txt b/docs/ref/checks.txt index d78a6f76b2..2308a854c7 100644 --- a/docs/ref/checks.txt +++ b/docs/ref/checks.txt @@ -77,6 +77,7 @@ Django's system checks are organized using the following tags: * ``async_support``: Checks asynchronous-related configuration. * ``caches``: Checks cache related configuration. * ``compatibility``: Flags potential problems with version upgrades. +* ``commands``: Checks custom management commands related configuration. * ``database``: Checks database-related configuration issues. Database checks are not run by default because they do more than static code analysis as regular checks do. They are only run by the :djadmin:`migrate` command or if @@ -428,6 +429,14 @@ Models * **models.W047**: ```` does not support unique constraints with nulls distinct. +Management Commands +------------------- + +The following checks verify custom management commands are correctly configured: + +* **commands.E001**: The ``migrate`` and ``makemigrations`` commands must have + the same ``autodetector``. + Security -------- diff --git a/docs/ref/contrib/admin/admindocs.txt b/docs/ref/contrib/admin/admindocs.txt index edc29b4a5c..5a605748ad 100644 --- a/docs/ref/contrib/admin/admindocs.txt +++ b/docs/ref/contrib/admin/admindocs.txt @@ -31,6 +31,8 @@ Once those steps are complete, you can start browsing the documentation by going to your admin interface and clicking the "Documentation" link in the upper right of the page. +.. _admindocs-helpers: + Documentation helpers ===================== @@ -47,13 +49,23 @@ Template filters ``:filter:`filtername``` Templates ``:template:`path/to/template.html``` ================= ======================= +Each of these support custom link text with the format +``:role:`link text ```. For example, ``:tag:`block ```. + +.. versionchanged:: 5.2 + + Support for custom link text was added. + +.. _admindocs-model-reference: + Model reference =============== -The **models** section of the ``admindocs`` page describes each model in the -system along with all the fields, properties, and methods available on it. -Relationships to other models appear as hyperlinks. Descriptions are pulled -from ``help_text`` attributes on fields or from docstrings on model methods. +The **models** section of the ``admindocs`` page describes each model that the +user has access to along with all the fields, properties, and methods available +on it. Relationships to other models appear as hyperlinks. Descriptions are +pulled from ``help_text`` attributes on fields or from docstrings on model +methods. A model with useful documentation might look like this:: @@ -77,6 +89,11 @@ A model with useful documentation might look like this:: """Makes the blog entry live on the site.""" ... +.. versionchanged:: 5.2 + + Access was restricted to only allow users with model view or change + permissions. + View reference ============== diff --git a/docs/ref/contrib/admin/index.txt b/docs/ref/contrib/admin/index.txt index 407dd88e71..1b02b7d403 100644 --- a/docs/ref/contrib/admin/index.txt +++ b/docs/ref/contrib/admin/index.txt @@ -337,7 +337,8 @@ subclass:: If neither ``fields`` nor :attr:`~ModelAdmin.fieldsets` options are present, Django will default to displaying each field that isn't an ``AutoField`` and has ``editable=True``, in a single fieldset, in the same order as the fields - are defined in the model. + are defined in the model, followed by any fields defined in + :attr:`~ModelAdmin.readonly_fields`. .. attribute:: ModelAdmin.fieldsets @@ -1465,6 +1466,27 @@ templates used by the :class:`ModelAdmin` views: See also :ref:`saving-objects-in-the-formset`. +.. warning:: + + All hooks that return a ``ModelAdmin`` property return the property itself + rather than a copy of its value. Dynamically modifying the value can lead + to surprising results. + + Let's take :meth:`ModelAdmin.get_readonly_fields` as an example:: + + class PersonAdmin(admin.ModelAdmin): + readonly_fields = ["name"] + + def get_readonly_fields(self, request, obj=None): + readonly = super().get_readonly_fields(request, obj) + if not request.user.is_superuser: + readonly.append("age") # Edits the class attribute. + return readonly + + This results in ``readonly_fields`` becoming + ``["name", "age", "age", ...]``, even for a superuser, as ``"age"`` is added + each time non-superuser visits the page. + .. method:: ModelAdmin.get_ordering(request) The ``get_ordering`` method takes a ``request`` as parameter and @@ -2229,6 +2251,7 @@ information. inlines to a model by specifying them in a ``ModelAdmin.inlines``:: from django.contrib import admin + from myapp.models import Author, Book class BookInline(admin.TabularInline): @@ -2240,6 +2263,9 @@ information. BookInline, ] + + admin.site.register(Author, AuthorAdmin) + Django provides two subclasses of ``InlineModelAdmin`` and they are: * :class:`~django.contrib.admin.TabularInline` @@ -2472,6 +2498,10 @@ Take this model for instance:: from django.db import models + class Person(models.Model): + name = models.CharField(max_length=128) + + class Friendship(models.Model): to_person = models.ForeignKey( Person, on_delete=models.CASCADE, related_name="friends" @@ -2485,7 +2515,7 @@ you need to explicitly define the foreign key since it is unable to do so automatically:: from django.contrib import admin - from myapp.models import Friendship + from myapp.models import Friendship, Person class FriendshipInline(admin.TabularInline): @@ -2498,6 +2528,9 @@ automatically:: FriendshipInline, ] + + admin.site.register(Person, PersonAdmin) + Working with many-to-many models -------------------------------- @@ -2526,24 +2559,22 @@ If you want to display many-to-many relations using an inline, you can do so by defining an ``InlineModelAdmin`` object for the relationship:: from django.contrib import admin + from myapp.models import Group class MembershipInline(admin.TabularInline): model = Group.members.through - class PersonAdmin(admin.ModelAdmin): - inlines = [ - MembershipInline, - ] - - class GroupAdmin(admin.ModelAdmin): inlines = [ MembershipInline, ] exclude = ["members"] + + admin.site.register(Group, GroupAdmin) + There are two features worth noting in this example. Firstly - the ``MembershipInline`` class references ``Group.members.through``. diff --git a/docs/ref/contrib/auth.txt b/docs/ref/contrib/auth.txt index c8699a2913..7b0de1173f 100644 --- a/docs/ref/contrib/auth.txt +++ b/docs/ref/contrib/auth.txt @@ -30,10 +30,7 @@ Fields The ``max_length`` should be sufficient for many use cases. If you need a longer length, please use a :ref:`custom user model - `. If you use MySQL with the ``utf8mb4`` - encoding (recommended for proper Unicode support), specify at most - ``max_length=191`` because MySQL can only create unique indexes with - 191 characters in that case by default. + `. .. attribute:: first_name @@ -54,7 +51,8 @@ Fields Required. A hash of, and metadata about, the password. (Django doesn't store the raw password.) Raw passwords can be arbitrarily long and can - contain any character. See the :doc:`password documentation + contain any character. The metadata in this field may mark the password + as unusable. See the :doc:`password documentation `. .. attribute:: groups @@ -175,8 +173,9 @@ Methods .. method:: set_unusable_password() - Marks the user as having no password set. This isn't the same as - having a blank string for a password. + Marks the user as having no password set by updating the metadata in + the :attr:`~django.contrib.auth.models.User.password` field. This isn't + the same as having a blank string for a password. :meth:`~django.contrib.auth.models.User.check_password()` for this user will never return ``True``. Doesn't save the :class:`~django.contrib.auth.models.User` object. @@ -420,8 +419,8 @@ fields: .. attribute:: content_type - Required. A reference to the ``django_content_type`` database table, - which contains a record for each installed model. + Required. A foreign key to the + :class:`~django.contrib.contenttypes.models.ContentType` model. .. attribute:: codename @@ -680,7 +679,7 @@ The following backends are available in :mod:`django.contrib.auth.backends`: user permissions and group permissions. Returns an empty set if :attr:`~django.contrib.auth.models.AbstractBaseUser.is_anonymous` or :attr:`~django.contrib.auth.models.CustomUser.is_active` is ``False``. - + .. versionchanged:: 5.2 ``aget_all_permissions()`` function was added. diff --git a/docs/ref/contrib/flatpages.txt b/docs/ref/contrib/flatpages.txt index c82fb5de85..01e5553ff3 100644 --- a/docs/ref/contrib/flatpages.txt +++ b/docs/ref/contrib/flatpages.txt @@ -256,7 +256,7 @@ Here's a sample :file:`flatpages/default.html` template: .. code-block:: html+django - + {{ flatpage.title }} diff --git a/docs/ref/contrib/gis/db-api.txt b/docs/ref/contrib/gis/db-api.txt index bce6f2efcc..e33d9a514f 100644 --- a/docs/ref/contrib/gis/db-api.txt +++ b/docs/ref/contrib/gis/db-api.txt @@ -339,42 +339,42 @@ divided into the three categories described in the :ref:`raster lookup details `: native support ``N``, bilateral native support ``B``, and geometry conversion support ``C``. -================================= ========= ======== ========= ============ ========== ======== -Lookup Type PostGIS Oracle MariaDB MySQL [#]_ SpatiaLite PGRaster -================================= ========= ======== ========= ============ ========== ======== -:lookup:`bbcontains` X X X X N -:lookup:`bboverlaps` X X X X N -:lookup:`contained` X X X X N -:lookup:`contains ` X X X X X B -:lookup:`contains_properly` X B -:lookup:`coveredby` X X X B -:lookup:`covers` X X X B -:lookup:`crosses` X X X X C -:lookup:`disjoint` X X X X X B -:lookup:`distance_gt` X X X X X N -:lookup:`distance_gte` X X X X X N -:lookup:`distance_lt` X X X X X N -:lookup:`distance_lte` X X X X X N -:lookup:`dwithin` X X X B -:lookup:`equals` X X X X X C -:lookup:`exact ` X X X X X B -:lookup:`intersects` X X X X X B +================================= ========= ======== ========== ============ ========== ======== +Lookup Type PostGIS Oracle MariaDB MySQL [#]_ SpatiaLite PGRaster +================================= ========= ======== ========== ============ ========== ======== +:lookup:`bbcontains` X X X X N +:lookup:`bboverlaps` X X X X N +:lookup:`contained` X X X X N +:lookup:`contains ` X X X X X B +:lookup:`contains_properly` X B +:lookup:`coveredby` X X X (≥ 11.7) X X B +:lookup:`covers` X X X X B +:lookup:`crosses` X X X X C +:lookup:`disjoint` X X X X X B +:lookup:`distance_gt` X X X X X N +:lookup:`distance_gte` X X X X X N +:lookup:`distance_lt` X X X X X N +:lookup:`distance_lte` X X X X X N +:lookup:`dwithin` X X X B +:lookup:`equals` X X X X X C +:lookup:`exact ` X X X X X B +:lookup:`intersects` X X X X X B :lookup:`isempty` X -:lookup:`isvalid` X X X X -:lookup:`overlaps` X X X X X B -:lookup:`relate` X X X X C -:lookup:`same_as` X X X X X B -:lookup:`touches` X X X X X B -:lookup:`within` X X X X X B -:lookup:`left` X C -:lookup:`right` X C -:lookup:`overlaps_left` X B -:lookup:`overlaps_right` X B -:lookup:`overlaps_above` X C -:lookup:`overlaps_below` X C -:lookup:`strictly_above` X C -:lookup:`strictly_below` X C -================================= ========= ======== ========= ============ ========== ======== +:lookup:`isvalid` X X X (≥ 11.7) X X +:lookup:`overlaps` X X X X X B +:lookup:`relate` X X X X C +:lookup:`same_as` X X X X X B +:lookup:`touches` X X X X X B +:lookup:`within` X X X X X B +:lookup:`left` X C +:lookup:`right` X C +:lookup:`overlaps_left` X B +:lookup:`overlaps_right` X B +:lookup:`overlaps_above` X C +:lookup:`overlaps_below` X C +:lookup:`strictly_above` X C +:lookup:`strictly_below` X C +================================= ========= ======== ========== ============ ========== ======== .. _database-functions-compatibility: @@ -406,10 +406,10 @@ Function PostGIS Oracle MariaDB MySQL :class:`ForcePolygonCW` X X :class:`FromWKB` X X X X X :class:`FromWKT` X X X X X -:class:`GeoHash` X X X (LWGEOM/RTTOPO) +:class:`GeoHash` X X (≥ 11.7) X X (LWGEOM/RTTOPO) :class:`Intersection` X X X X X :class:`IsEmpty` X -:class:`IsValid` X X X X +:class:`IsValid` X X X (≥ 11.7) X X :class:`Length` X X X X X :class:`LineLocatePoint` X X :class:`MakeValid` X X (LWGEOM/RTTOPO) @@ -431,20 +431,19 @@ Aggregate Functions ------------------- The following table provides a summary of what GIS-specific aggregate functions -are available on each spatial backend. Please note that MariaDB does not -support any of these aggregates, and is thus excluded from the table. +are available on each spatial backend. .. currentmodule:: django.contrib.gis.db.models -======================= ======= ====== ============ ========== -Aggregate PostGIS Oracle MySQL SpatiaLite -======================= ======= ====== ============ ========== -:class:`Collect` X X (≥ 8.0.24) X -:class:`Extent` X X X +======================= ======= ====== ========== ============ ========== +Aggregate PostGIS Oracle MariaDB MySQL SpatiaLite +======================= ======= ====== ========== ============ ========== +:class:`Collect` X X (≥ 11.7) X (≥ 8.0.24) X +:class:`Extent` X X X :class:`Extent3D` X -:class:`MakeLine` X X -:class:`Union` X X X -======================= ======= ====== ============ ========== +:class:`MakeLine` X X +:class:`Union` X X X +======================= ======= ====== ========== ============ ========== .. rubric:: Footnotes .. [#fnwkt] *See* Open Geospatial Consortium, Inc., `OpenGIS Simple Feature Specification For SQL `_, Document 99-049 (May 5, 1999), at Ch. 3.2.5, p. 3-11 (SQL Textual Representation of Geometry). diff --git a/docs/ref/contrib/gis/functions.txt b/docs/ref/contrib/gis/functions.txt index ff05d0ec96..ff62c17580 100644 --- a/docs/ref/contrib/gis/functions.txt +++ b/docs/ref/contrib/gis/functions.txt @@ -393,7 +393,7 @@ Creates geometry from `Well-known text (WKT)`_ representation. The optional .. class:: GeoHash(expression, precision=None, **extra) -*Availability*: `MySQL +*Availability*: MariaDB, `MySQL `__, `PostGIS `__, SpatiaLite (LWGEOM/RTTOPO) @@ -406,6 +406,10 @@ result. __ https://en.wikipedia.org/wiki/Geohash +.. versionchanged:: 5.2 + + MariaDB 11.7+ support was added. + ``GeometryDistance`` ==================== @@ -444,13 +448,17 @@ geometry. Returns ``True`` if its value is empty and ``False`` otherwise. .. class:: IsValid(expr) -*Availability*: `MySQL +*Availability*: MariaDB, `MySQL `__, `PostGIS `__, Oracle, SpatiaLite Accepts a geographic field or expression and tests if the value is well formed. Returns ``True`` if its value is a valid geometry and ``False`` otherwise. +.. versionchanged:: 5.2 + + MariaDB 11.7+ support was added. + ``Length`` ========== diff --git a/docs/ref/contrib/gis/gdal.txt b/docs/ref/contrib/gis/gdal.txt index c2a333f895..726cd83756 100644 --- a/docs/ref/contrib/gis/gdal.txt +++ b/docs/ref/contrib/gis/gdal.txt @@ -611,6 +611,26 @@ coordinate transformation: >>> polygon.geom_count 1 + .. attribute:: has_curve + + .. versionadded:: 5.2 + + A boolean indicating if this geometry is or contains a curve geometry. + + .. method:: get_linear_geometry + + .. versionadded:: 5.2 + + Returns a linear version of the geometry. If no conversion can be made, the + original geometry is returned. + + .. method:: get_curve_geometry + + .. versionadded:: 5.2 + + Returns a curved version of the geometry. If no conversion can be made, the + original geometry is returned. + .. attribute:: point_count Returns the number of points used to describe this geometry: diff --git a/docs/ref/contrib/gis/geoquerysets.txt b/docs/ref/contrib/gis/geoquerysets.txt index b639c5271e..19411b7304 100644 --- a/docs/ref/contrib/gis/geoquerysets.txt +++ b/docs/ref/contrib/gis/geoquerysets.txt @@ -183,7 +183,7 @@ PostGIS ``ST_ContainsProperly(poly, geom)`` ------------- *Availability*: `PostGIS `__, -Oracle, PGRaster (Bilateral), SpatiaLite +Oracle, MariaDB 11.7+, MySQL, PGRaster (Bilateral), SpatiaLite Tests if no point in the geometry field is outside the lookup geometry. [#fncovers]_ @@ -197,16 +197,22 @@ Backend SQL Equivalent ========== ============================= PostGIS ``ST_CoveredBy(poly, geom)`` Oracle ``SDO_COVEREDBY(poly, geom)`` +MariaDB ``MBRCoveredBy(poly, geom)`` +MySQL ``MBRCoveredBy(poly, geom)`` SpatiaLite ``CoveredBy(poly, geom)`` ========== ============================= +.. versionchanged:: 5.2 + + MySQL and MariaDB 11.7+ support was added. + .. fieldlookup:: covers ``covers`` ---------- *Availability*: `PostGIS `__, -Oracle, PGRaster (Bilateral), SpatiaLite +Oracle, MySQL, PGRaster (Bilateral), SpatiaLite Tests if no point in the lookup geometry is outside the geometry field. [#fncovers]_ @@ -220,9 +226,14 @@ Backend SQL Equivalent ========== ========================== PostGIS ``ST_Covers(poly, geom)`` Oracle ``SDO_COVERS(poly, geom)`` +MySQL ``MBRCovers(poly, geom)`` SpatiaLite ``Covers(poly, geom)`` ========== ========================== +.. versionchanged:: 5.2 + + MySQL support was added. + .. fieldlookup:: crosses ``crosses`` @@ -364,8 +375,8 @@ Example:: ``isvalid`` ----------- -*Availability*: MySQL, `PostGIS `__, -Oracle, SpatiaLite +*Availability*: MariaDB, MySQL, +`PostGIS `__, Oracle, SpatiaLite Tests if the geometry is valid. @@ -373,12 +384,16 @@ Example:: Zipcode.objects.filter(poly__isvalid=True) -========================== ================================================================ -Backend SQL Equivalent -========================== ================================================================ -MySQL, PostGIS, SpatiaLite ``ST_IsValid(poly)`` -Oracle ``SDO_GEOM.VALIDATE_GEOMETRY_WITH_CONTEXT(poly, 0.05) = 'TRUE'`` -========================== ================================================================ +=================================== ================================================================ +Backend SQL Equivalent +=================================== ================================================================ +MariaDB, MySQL, PostGIS, SpatiaLite ``ST_IsValid(poly)`` +Oracle ``SDO_GEOM.VALIDATE_GEOMETRY_WITH_CONTEXT(poly, 0.05) = 'TRUE'`` +=================================== ================================================================ + +.. versionchanged:: 5.2 + + MariaDB 11.7+ support was added. .. fieldlookup:: overlaps @@ -870,8 +885,8 @@ Example: .. class:: Collect(geo_field, filter=None) -*Availability*: `PostGIS `__, MySQL, -SpatiaLite +*Availability*: `PostGIS `__, +MariaDB, MySQL, SpatiaLite Returns a ``GEOMETRYCOLLECTION`` or a ``MULTI`` geometry object from the geometry column. This is analogous to a simplified version of the :class:`Union` @@ -883,6 +898,10 @@ caring about dissolving boundaries. MySQL 8.0.24+ support was added. +.. versionchanged:: 5.2 + + MariaDB 11.7+ support was added. + ``Extent`` ~~~~~~~~~~ diff --git a/docs/ref/contrib/gis/geos.txt b/docs/ref/contrib/gis/geos.txt index 8b1ae62c2f..b3825e09c4 100644 --- a/docs/ref/contrib/gis/geos.txt +++ b/docs/ref/contrib/gis/geos.txt @@ -34,8 +34,7 @@ features include: may be used outside of a Django project/application. In other words, no need to have :envvar:`DJANGO_SETTINGS_MODULE` set or use a database, etc. * Mutability: :class:`GEOSGeometry` objects may be modified. -* Cross-platform and tested; compatible with Windows, Linux, Solaris, and - macOS platforms. +* Cross-platform tested. .. _geos-tutorial: diff --git a/docs/ref/contrib/gis/install/geolibs.txt b/docs/ref/contrib/gis/install/geolibs.txt index d988cd33f6..54c9789720 100644 --- a/docs/ref/contrib/gis/install/geolibs.txt +++ b/docs/ref/contrib/gis/install/geolibs.txt @@ -5,16 +5,16 @@ Installing Geospatial libraries GeoDjango uses and/or provides interfaces for the following open source geospatial libraries: -======================== ==================================== ================================ ====================================== +======================== ==================================== ================================ =========================================== Program Description Required Supported Versions -======================== ==================================== ================================ ====================================== -:doc:`GEOS <../geos>` Geometry Engine Open Source Yes 3.12, 3.11, 3.10, 3.9, 3.8 +======================== ==================================== ================================ =========================================== +:doc:`GEOS <../geos>` Geometry Engine Open Source Yes 3.13, 3.12, 3.11, 3.10, 3.9, 3.8 `PROJ`_ Cartographic Projections library Yes (PostgreSQL and SQLite only) 9.x, 8.x, 7.x, 6.x -:doc:`GDAL <../gdal>` Geospatial Data Abstraction Library Yes 3.8, 3.7, 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 +:doc:`GDAL <../gdal>` Geospatial Data Abstraction Library Yes 3.9, 3.8, 3.7, 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 :doc:`GeoIP <../geoip2>` IP-based geolocation library No 2 `PostGIS`__ Spatial extensions for PostgreSQL Yes (PostgreSQL only) 3.4, 3.3, 3.2, 3.1 `SpatiaLite`__ Spatial extensions for SQLite Yes (SQLite only) 5.1, 5.0, 4.3 -======================== ==================================== ================================ ====================================== +======================== ==================================== ================================ =========================================== Note that older or more recent versions of these libraries *may* also work totally fine with GeoDjango. Your mileage may vary. @@ -26,6 +26,7 @@ totally fine with GeoDjango. Your mileage may vary. GEOS 3.10.0 2021-10-20 GEOS 3.11.0 2022-07-01 GEOS 3.12.0 2023-06-27 + GEOS 3.13.0 2024-09-06 GDAL 3.1.0 2020-05-07 GDAL 3.2.0 2020-11-02 GDAL 3.3.0 2021-05-03 @@ -34,6 +35,7 @@ totally fine with GeoDjango. Your mileage may vary. GDAL 3.6.0 2022-11-03 GDAL 3.7.0 2023-05-10 GDAL 3.8.0 2023-11-13 + GDAL 3.9.0 2024-05-10 PostGIS 3.1.0 2020-12-18 PostGIS 3.2.0 2021-12-18 PostGIS 3.3.0 2022-08-27 diff --git a/docs/ref/contrib/postgres/indexes.txt b/docs/ref/contrib/postgres/indexes.txt index 73ef195309..107d9c278d 100644 --- a/docs/ref/contrib/postgres/indexes.txt +++ b/docs/ref/contrib/postgres/indexes.txt @@ -34,14 +34,14 @@ available from the ``django.contrib.postgres.indexes`` module. .. class:: BrinIndex(*expressions, autosummarize=None, pages_per_range=None, **options) Creates a `BRIN index - `_. + `_. Set the ``autosummarize`` parameter to ``True`` to enable `automatic summarization`_ to be performed by autovacuum. The ``pages_per_range`` argument takes a positive integer. - .. _automatic summarization: https://www.postgresql.org/docs/current/brin-intro.html#BRIN-OPERATION + .. _automatic summarization: https://www.postgresql.org/docs/current/brin.html#BRIN-OPERATION ``BTreeIndex`` ============== diff --git a/docs/ref/databases.txt b/docs/ref/databases.txt index 73a67475fe..57e94140c2 100644 --- a/docs/ref/databases.txt +++ b/docs/ref/databases.txt @@ -517,7 +517,7 @@ You can `create your database`_ using the command-line tools and this SQL: .. code-block:: sql - CREATE DATABASE CHARACTER SET utf8; + CREATE DATABASE CHARACTER SET utf8mb4; This ensures all tables and columns will use UTF-8 by default. @@ -542,21 +542,21 @@ Django doesn't provide an API to change them. .. _documented thoroughly: https://dev.mysql.com/doc/refman/en/charset.html By default, with a UTF-8 database, MySQL will use the -``utf8_general_ci`` collation. This results in all string equality +``utf8mb4_0900_ai_ci`` collation. This results in all string equality comparisons being done in a *case-insensitive* manner. That is, ``"Fred"`` and ``"freD"`` are considered equal at the database level. If you have a unique constraint on a field, it would be illegal to try to insert both ``"aa"`` and ``"AA"`` into the same column, since they compare as equal (and, hence, non-unique) with the default collation. If you want case-sensitive comparisons on a particular column or table, change the column or table to use the -``utf8_bin`` collation. +``utf8mb4_0900_as_cs`` collation. Please note that according to `MySQL Unicode Character Sets`_, comparisons for -the ``utf8_general_ci`` collation are faster, but slightly less correct, than -comparisons for ``utf8_unicode_ci``. If this is acceptable for your application, -you should use ``utf8_general_ci`` because it is faster. If this is not acceptable -(for example, if you require German dictionary order), use ``utf8_unicode_ci`` -because it is more accurate. +the ``utf8mb4_general_ci`` collation are faster, but slightly less correct, +than comparisons for ``utf8mb4_unicode_ci``. If this is acceptable for your +application, you should use ``utf8mb4_general_ci`` because it is faster. If +this is not acceptable (for example, if you require German dictionary order), +use ``utf8mb4_unicode_ci`` because it is more accurate. .. _MySQL Unicode Character Sets: https://dev.mysql.com/doc/refman/en/charset-unicode-sets.html @@ -602,7 +602,7 @@ Here's a sample configuration which uses a MySQL option file:: database = NAME user = USER password = PASSWORD - default-character-set = utf8 + default-character-set = utf8mb4 Several other `MySQLdb connection options`_ may be useful, such as ``ssl``, ``init_command``, and ``sql_mode``. diff --git a/docs/ref/files/storage.txt b/docs/ref/files/storage.txt index f7c290a150..52c8f90427 100644 --- a/docs/ref/files/storage.txt +++ b/docs/ref/files/storage.txt @@ -11,7 +11,25 @@ Django provides convenient ways to access the default storage class: .. data:: storages - Storage instances as defined by :setting:`STORAGES`. + A dictionary-like object that allows retrieving a storage instance using + its alias as defined by :setting:`STORAGES`. + + ``storages`` has an attribute ``backends``, which defaults to the raw value + provided in :setting:`STORAGES`. + + Additionally, ``storages`` provides a ``create_storage()`` method that + accepts the dictionary used in :setting:`STORAGES` for a backend, and + returns a storage instance based on that backend definition. This may be + useful for third-party packages needing to instantiate storages in tests: + + .. code-block:: pycon + + >>> from django.core.files.storage import storages + >>> storages.backends + {'default': {'BACKEND': 'django.core.files.storage.FileSystemStorage'}, + 'staticfiles': {'BACKEND': 'django.contrib.staticfiles.storage.StaticFilesStorage'}, + 'custom': {'BACKEND': 'package.storage.CustomStorage'}} + >>> storage_instance = storages.create_storage({"BACKEND": "package.storage.CustomStorage"}) .. class:: DefaultStorage diff --git a/docs/ref/forms/api.txt b/docs/ref/forms/api.txt index 33d0806859..c6c83dcdfb 100644 --- a/docs/ref/forms/api.txt +++ b/docs/ref/forms/api.txt @@ -406,8 +406,8 @@ process: .. code-block:: pycon >>> f.base_fields["subject"].label_suffix = "?" - >>> another_f = CommentForm(auto_id=False) - >>> f.as_div().split("
")[0] + >>> another_f = ContactForm(auto_id=False) + >>> another_f.as_div().split("

")[0] '
' Accessing "clean" data @@ -511,7 +511,7 @@ empty string, because ``nick_name`` is ``CharField``, and ``CharField``\s treat empty values as an empty string. Each field type knows what its "blank" value is -- e.g., for ``DateField``, it's ``None`` instead of the empty string. For full details on each field's behavior in this case, see the "Empty value" note -for each field in the "Built-in ``Field`` classes" section below. +for each field in the :ref:`built-in-fields` section below. You can write code to perform validation for particular form fields (based on their name) or for the form as a whole (considering combinations of various @@ -770,7 +770,7 @@ The template used by ``as_table()``. Default: ``'django/forms/table.html'``. >>> f = ContactForm() >>> f.as_table() '\n\n\n' - >>> print(f) + >>> print(f.as_table()) @@ -1416,7 +1416,7 @@ Methods of ``BoundField`` .. method:: BoundField.render(template_name=None, context=None, renderer=None) - The render method is called by ``as_field_group``. All arguments are + The render method is called by ``as_field_group``. All arguments are optional and default to: * ``template_name``: :attr:`.BoundField.template_name` diff --git a/docs/ref/forms/fields.txt b/docs/ref/forms/fields.txt index ac1df1bd86..2b4b344844 100644 --- a/docs/ref/forms/fields.txt +++ b/docs/ref/forms/fields.txt @@ -65,8 +65,6 @@ an empty value -- either ``None`` or the empty string (``""``) -- then Traceback (most recent call last): ... ValidationError: ['This field is required.'] - >>> f.clean(" ") - ' ' >>> f.clean(0) '0' >>> f.clean(True) @@ -112,7 +110,7 @@ validation may not be correct when adding and deleting formsets. The ``label`` argument lets you specify the "human-friendly" label for this field. This is used when the ``Field`` is displayed in a ``Form``. -As explained in "Outputting forms as HTML" above, the default label for a +As explained in :ref:`ref-forms-api-outputting-html`, the default label for a ``Field`` is generated from the field name by converting all underscores to spaces and upper-casing the first letter. Specify ``label`` if that default behavior doesn't result in an adequate label. @@ -226,7 +224,7 @@ validation if a particular field's value is not given. ``initial`` values are >>> f = CommentForm(data) >>> f.is_valid() False - # The form does *not* fall back to using the initial values. + # The form does *not* fallback to using the initial values. >>> f.errors {'url': ['This field is required.'], 'name': ['This field is required.']} @@ -375,7 +373,7 @@ See the :doc:`validators documentation ` for more information. The ``localize`` argument enables the localization of form data input, as well as the rendered output. -See the :doc:`format localization ` documentation for +See the :doc:`format localization documentation ` for more information. ``disabled`` @@ -394,7 +392,7 @@ be ignored in favor of the value from the form's initial data. .. attribute:: Field.template_name The ``template_name`` argument allows a custom template to be used when the -field is rendered with :meth:`~django.forms.BoundField.as_field_group`. By +field is rendered with :meth:`~django.forms.BoundField.as_field_group`. By default this value is set to ``"django/forms/field.html"``. Can be changed per field by overriding this attribute or more generally by overriding the default template, see also :ref:`overriding-built-in-field-templates`. diff --git a/docs/ref/forms/validation.txt b/docs/ref/forms/validation.txt index 7a037eaf75..614b345b5a 100644 --- a/docs/ref/forms/validation.txt +++ b/docs/ref/forms/validation.txt @@ -254,7 +254,7 @@ Common cases such as validating against an email or a regular expression can be handled using existing validator classes available in Django. For example, ``validators.validate_slug`` is an instance of a :class:`~django.core.validators.RegexValidator` constructed with the first -argument being the pattern: ``^[-a-zA-Z0-9_]+$``. See the section on +argument being the pattern: ``^[-a-zA-Z0-9_]+\Z``. See the section on :doc:`writing validators ` to see a list of what is already available and for an example of how to write a validator. diff --git a/docs/ref/forms/widgets.txt b/docs/ref/forms/widgets.txt index dd2ba0ac4c..38647aa1c2 100644 --- a/docs/ref/forms/widgets.txt +++ b/docs/ref/forms/widgets.txt @@ -142,9 +142,9 @@ For example, take the following form:: url = forms.URLField() comment = forms.CharField() -This form will include three default :class:`TextInput` widgets, with default -rendering -- no CSS class, no extra attributes. This means that the input boxes -provided for each widget will be rendered exactly the same: +This form will include :class:`TextInput` widgets for the name and comment +fields, and a :class:`URLInput` widget for the url field. Each has default +rendering - no CSS class, no extra attributes: .. code-block:: pycon @@ -154,11 +154,11 @@ provided for each widget will be rendered exactly the same:
Url:
Comment:
-On a real web page, you probably don't want every widget to look the same. You -might want a larger input element for the comment, and you might want the -'name' widget to have some special CSS class. It is also possible to specify -the 'type' attribute to take advantage of the new HTML5 input types. To do -this, you use the :attr:`Widget.attrs` argument when creating the widget:: +On a real web page, you probably want to customize this. You might want a +larger input element for the comment, and you might want the 'name' widget to +have some special CSS class. It is also possible to specify the 'type' +attribute to use a different HTML5 input type. To do this, you use the +:attr:`Widget.attrs` argument when creating the widget:: class CommentForm(forms.Form): name = forms.CharField(widget=forms.TextInput(attrs={"class": "special"})) diff --git a/docs/ref/migration-operations.txt b/docs/ref/migration-operations.txt index 9e90b78623..b969b3dbfd 100644 --- a/docs/ref/migration-operations.txt +++ b/docs/ref/migration-operations.txt @@ -278,6 +278,16 @@ the model with ``model_name``. Removes the constraint named ``name`` from the model with ``model_name``. +``AlterConstraint`` +------------------- + +.. versionadded:: 5.2 + +.. class:: AlterConstraint(model_name, name, constraint) + +Alters the constraint named ``name`` of the model with ``model_name`` with the +new ``constraint`` without affecting the database. + Special Operations ================== diff --git a/docs/ref/models/fields.txt b/docs/ref/models/fields.txt index 899947c17f..07e86785d9 100644 --- a/docs/ref/models/fields.txt +++ b/docs/ref/models/fields.txt @@ -22,9 +22,9 @@ This document contains all the API references of :class:`Field` including the .. note:: - Technically, these models are defined in :mod:`django.db.models.fields`, but - for convenience they're imported into :mod:`django.db.models`; the standard - convention is to use ``from django.db import models`` and refer to fields as + Fields are defined in :mod:`django.db.models.fields`, but for convenience + they're imported into :mod:`django.db.models`. The standard convention is + to use ``from django.db import models`` and refer to fields as ``models.Field``. .. _common-model-field-options: @@ -426,6 +426,11 @@ precedence when creating instances in Python code. ``db_default`` will still be set at the database level and will be used when inserting rows outside of the ORM or when adding a new field in a migration. +If a field has a ``db_default`` without a ``default`` set and no value is +assigned to the field, a ``DatabaseDefault`` object is returned as the field +value on unsaved model instances. The actual value for the field is determined +by the database when the model instance is saved. + ``db_index`` ------------ @@ -1628,80 +1633,25 @@ Django also defines a set of fields that represent relations. .. class:: ForeignKey(to, on_delete, **options) A many-to-one relationship. Requires two positional arguments: the class to -which the model is related and the :attr:`~ForeignKey.on_delete` option. - -.. _recursive-relationships: - -To create a recursive relationship -- an object that has a many-to-one -relationship with itself -- use ``models.ForeignKey('self', -on_delete=models.CASCADE)``. - -.. _lazy-relationships: - -If you need to create a relationship on a model that has not yet been defined, -you can use the name of the model, rather than the model object itself:: +which the model is related and the :attr:`~ForeignKey.on_delete` option:: from django.db import models - class Car(models.Model): - manufacturer = models.ForeignKey( - "Manufacturer", - on_delete=models.CASCADE, - ) - # ... - - class Manufacturer(models.Model): - # ... - pass + name = models.TextField() -Relationships defined this way on :ref:`abstract models -` are resolved when the model is subclassed as a -concrete model and are not relative to the abstract model's ``app_label``: - -.. code-block:: python - :caption: ``products/models.py`` - - from django.db import models - - - class AbstractCar(models.Model): - manufacturer = models.ForeignKey("Manufacturer", on_delete=models.CASCADE) - - class Meta: - abstract = True - -.. code-block:: python - :caption: ``production/models.py`` - - from django.db import models - from products.models import AbstractCar - - - class Manufacturer(models.Model): - pass - - - class Car(AbstractCar): - pass - - - # Car.manufacturer will point to `production.Manufacturer` here. - -To refer to models defined in another application, you can explicitly specify -a model with the full application label. For example, if the ``Manufacturer`` -model above is defined in another application called ``production``, you'd -need to use:: class Car(models.Model): - manufacturer = models.ForeignKey( - "production.Manufacturer", - on_delete=models.CASCADE, - ) + manufacturer = models.ForeignKey(Manufacturer, on_delete=models.CASCADE) -This sort of reference, called a lazy relationship, can be useful when -resolving circular import dependencies between two applications. +The first positional argument can be either a concrete model class or a +:ref:`lazy reference ` to a model class. +:ref:`Recursive relationships `, where a model has a +relationship with itself, are also supported. + +See :attr:`ForeignKey.on_delete` for details on the second positional +argument. A database index is automatically created on the ``ForeignKey``. You can disable this by setting :attr:`~Field.db_index` to ``False``. You may want to @@ -1714,9 +1664,9 @@ Database Representation Behind the scenes, Django appends ``"_id"`` to the field name to create its database column name. In the above example, the database table for the ``Car`` -model will have a ``manufacturer_id`` column. (You can change this explicitly by -specifying :attr:`~Field.db_column`) However, your code should never have to -deal with the database column name, unless you write custom SQL. You'll always +model will have a ``manufacturer_id`` column. You can change this explicitly by +specifying :attr:`~Field.db_column`, however, your code should never have to +deal with the database column name (unless you write custom SQL). You'll always deal with the field names of your model object. .. _foreign-key-arguments: @@ -2266,6 +2216,120 @@ accepted by :class:`ForeignKey`, plus one extra argument: See :doc:`One-to-one relationships ` for usage examples of ``OneToOneField``. +.. _lazy-relationships: + +Lazy relationships +------------------ + +Lazy relationships allow referencing models by their names (as strings) or +creating recursive relationships. Strings can be used as the first argument in +any relationship field to reference models lazily. A lazy reference can be +either :ref:`recursive `, +:ref:`relative ` or +:ref:`absolute `. + +.. _recursive-relationships: + +Recursive +~~~~~~~~~ + +To define a relationship where a model references itself, use ``"self"`` as the +first argument of the relationship field:: + + from django.db import models + + + class Manufacturer(models.Model): + name = models.TextField() + suppliers = models.ManyToManyField("self", symmetrical=False) + + +When used in an :ref:`abstract model `, the recursive +relationship resolves such that each concrete subclass references itself. + +.. _relative-relationships: + +Relative +~~~~~~~~ + +When a relationship needs to be created with a model that has not been defined +yet, it can be referenced by its name rather than the model object itself:: + + from django.db import models + + + class Car(models.Model): + manufacturer = models.ForeignKey( + "Manufacturer", + on_delete=models.CASCADE, + ) + + + class Manufacturer(models.Model): + name = models.TextField() + suppliers = models.ManyToManyField("self", symmetrical=False) + +Relationships defined this way on :ref:`abstract models +` are resolved when the model is subclassed as a +concrete model and are not relative to the abstract model's ``app_label``: + +.. code-block:: python + :caption: ``products/models.py`` + + from django.db import models + + + class AbstractCar(models.Model): + manufacturer = models.ForeignKey("Manufacturer", on_delete=models.CASCADE) + + class Meta: + abstract = True + +.. code-block:: python + :caption: ``production/models.py`` + + from django.db import models + from products.models import AbstractCar + + + class Manufacturer(models.Model): + name = models.TextField() + + + class Car(AbstractCar): + pass + +In this example, the ``Car.manufacturer`` relationship will resolve to +``production.Manufacturer``, as it points to the concrete model defined +within the ``production/models.py`` file. + +.. admonition:: Reusable models with relative references + + Relative references allow the creation of reusable abstract models with + relationships that can resolve to different implementations of the + referenced models in various subclasses across different applications. + +.. _absolute-relationships: + +Absolute +~~~~~~~~ + +Absolute references specify a model using its ``app_label`` and class name, +allowing for model references across different applications. This type of lazy +relationship can also help resolve circular imports. + +For example, if the ``Manufacturer`` model is defined in another application +called ``thirdpartyapp``, it can be referenced as:: + + class Car(models.Model): + manufacturer = models.ForeignKey( + "thirdpartyapp.Manufacturer", + on_delete=models.CASCADE, + ) + +Absolute references always point to the same model, even when used in an +:ref:`abstract model `. + Field API reference =================== diff --git a/docs/ref/models/querysets.txt b/docs/ref/models/querysets.txt index c6af3dd7f0..ec27936cdb 100644 --- a/docs/ref/models/querysets.txt +++ b/docs/ref/models/querysets.txt @@ -3110,6 +3110,11 @@ there are triggers or if a function is called, even for a ``SELECT`` query. Support for the ``generic_plan`` option on PostgreSQL 16+ was added. +.. versionchanged:: 5.2 + + Support for the ``memory`` and ``serialize`` options on PostgreSQL 17+ was + added. + .. _field-lookups: ``Field`` lookups diff --git a/docs/ref/request-response.txt b/docs/ref/request-response.txt index 31111a435a..26fcb5fa08 100644 --- a/docs/ref/request-response.txt +++ b/docs/ref/request-response.txt @@ -833,6 +833,13 @@ Attributes A bytestring representing the content, encoded from a string if necessary. +.. attribute:: HttpResponse.text + + .. versionadded:: 5.2 + + A string representation of :attr:`HttpResponse.content`, decoded using the + response's :attr:`HttpResponse.charset` (defaulting to ``UTF-8`` if empty). + .. attribute:: HttpResponse.cookies A :py:obj:`http.cookies.SimpleCookie` object holding the cookies included @@ -1063,18 +1070,32 @@ types of HTTP responses. Like ``HttpResponse``, these subclasses live in (e.g. ``'https://www.yahoo.com/search/'``), an absolute path with no domain (e.g. ``'/search/'``), or even a relative path (e.g. ``'search/'``). In that last case, the client browser will reconstruct the full URL itself - according to the current path. See :class:`HttpResponse` for other optional - constructor arguments. Note that this returns an HTTP status code 302. + according to the current path. + + The constructor accepts an optional ``preserve_request`` keyword argument + that defaults to ``False``, producing a response with a 302 status code. If + ``preserve_request`` is ``True``, the status code will be 307 instead. + + See :class:`HttpResponse` for other optional constructor arguments. .. attribute:: HttpResponseRedirect.url This read-only attribute represents the URL the response will redirect to (equivalent to the ``Location`` response header). + .. versionchanged:: 5.2 + + The ``preserve_request`` argument was added. + .. class:: HttpResponsePermanentRedirect Like :class:`HttpResponseRedirect`, but it returns a permanent redirect (HTTP status code 301) instead of a "found" redirect (status code 302). + When ``preserve_request=True``, the response's status code is 308. + + .. versionchanged:: 5.2 + + The ``preserve_request`` argument was added. .. class:: HttpResponseNotModified @@ -1272,6 +1293,9 @@ with the following notable differences: :attr:`~StreamingHttpResponse.streaming_content` attribute. This can be used in middleware to wrap the response iterable, but should not be consumed. +* It has no ``text`` attribute, as it would require iterating the response + object. + * You cannot use the file-like object ``tell()`` or ``write()`` methods. Doing so will raise an exception. diff --git a/docs/ref/templates/builtins.txt b/docs/ref/templates/builtins.txt index d34742f210..8673727861 100644 --- a/docs/ref/templates/builtins.txt +++ b/docs/ref/templates/builtins.txt @@ -3100,7 +3100,7 @@ slightly different call: {% load static %} {% static "images/hi.jpg" as myphoto %} - + Hi! .. admonition:: Using Jinja2 templates? diff --git a/docs/ref/urlresolvers.txt b/docs/ref/urlresolvers.txt index b335d1fc39..eca00cf106 100644 --- a/docs/ref/urlresolvers.txt +++ b/docs/ref/urlresolvers.txt @@ -7,13 +7,14 @@ ``reverse()`` ============= -If you need to use something similar to the :ttag:`url` template tag in -your code, Django provides the following function: +The ``reverse()`` function can be used to return an absolute path reference +for a given view and optional parameters, similar to the :ttag:`url` tag: .. function:: reverse(viewname, urlconf=None, args=None, kwargs=None, current_app=None) ``viewname`` can be a :ref:`URL pattern name ` or the -callable view object. For example, given the following ``url``:: +callable view object used in the URLconf. For example, given the following +``url``:: from news import views @@ -79,6 +80,26 @@ use for reversing. By default, the root URLconf for the current thread is used. Applying further encoding (such as :func:`urllib.parse.quote`) to the output of ``reverse()`` may produce undesirable results. +.. admonition:: Reversing class-based views by view object + + The view object can also be the result of calling + :meth:`~django.views.generic.base.View.as_view` if the same view object is + used in the URLConf. Following the original example, the view object could + be defined as: + + .. code-block:: python + :caption: ``news/views.py`` + + from django.views import View + + + class ArchiveView(View): ... + + + archive = ArchiveView.as_view() + + However, remember that namespaced views cannot be reversed by view object. + ``reverse_lazy()`` ================== diff --git a/docs/releases/3.1.6.txt b/docs/releases/3.1.6.txt index 027d2f3b16..9805e32579 100644 --- a/docs/releases/3.1.6.txt +++ b/docs/releases/3.1.6.txt @@ -17,5 +17,5 @@ dot segments. Bugfixes ======== -* Fixed an admin layout issue in Django 3.1 where changelist filter controls +* Fixed an admin layout issue in Django 3.1 where changelist filter controls would become squashed (:ticket:`32391`). diff --git a/docs/releases/4.2.17.txt b/docs/releases/4.2.17.txt new file mode 100644 index 0000000000..5139d7034d --- /dev/null +++ b/docs/releases/4.2.17.txt @@ -0,0 +1,8 @@ +=========================== +Django 4.2.17 release notes +=========================== + +*December 4, 2024* + +Django 4.2.17 fixes one security issue with severity "high" and one security +issue with severity "moderate" in 4.2.16. diff --git a/docs/releases/5.0.10.txt b/docs/releases/5.0.10.txt new file mode 100644 index 0000000000..b06c376038 --- /dev/null +++ b/docs/releases/5.0.10.txt @@ -0,0 +1,8 @@ +=========================== +Django 5.0.10 release notes +=========================== + +*December 4, 2024* + +Django 5.0.10 fixes one security issue with severity "high" and one security +issue with severity "moderate" in 5.0.9. diff --git a/docs/releases/5.1.3.txt b/docs/releases/5.1.3.txt index 5541a8824a..9e251f221f 100644 --- a/docs/releases/5.1.3.txt +++ b/docs/releases/5.1.3.txt @@ -2,7 +2,7 @@ Django 5.1.3 release notes ========================== -*Expected November 5, 2024* +*November 5, 2024* Django 5.1.3 fixes several bugs in 5.1.2 and adds compatibility with Python 3.13. @@ -10,4 +10,13 @@ Django 5.1.3 fixes several bugs in 5.1.2 and adds compatibility with Python Bugfixes ======== -* ... +* Fixed a bug in Django 5.1 where + :class:`~django.core.validators.DomainNameValidator` accepted any input value + that contained a valid domain name, rather than only input values that were a + valid domain name (:ticket:`35845`). + +* Fixed a regression in Django 5.1 that prevented the use of DB-IP databases + with :class:`~django.contrib.gis.geoip2.GeoIP2` (:ticket:`35841`). + +* Fixed a regression in Django 5.1 where non-ASCII fieldset names were not + displayed when rendering admin fieldsets (:ticket:`35876`). diff --git a/docs/releases/5.1.4.txt b/docs/releases/5.1.4.txt new file mode 100644 index 0000000000..0c21d99566 --- /dev/null +++ b/docs/releases/5.1.4.txt @@ -0,0 +1,14 @@ +========================== +Django 5.1.4 release notes +========================== + +*December 4, 2024* + +Django 5.1.4 fixes one security issue with severity "high", one security issue +with severity "moderate", and several bugs in 5.1.3. + +Bugfixes +======== + +* Fixed a crash in ``createsuperuser`` on Python 3.13+ caused by an unhandled + ``OSError`` when the username could not be determined (:ticket:`35942`). diff --git a/docs/releases/5.1.txt b/docs/releases/5.1.txt index 037c76fd54..799f3ee819 100644 --- a/docs/releases/5.1.txt +++ b/docs/releases/5.1.txt @@ -116,8 +116,8 @@ Minor features * The default iteration count for the PBKDF2 password hasher is increased from 720,000 to 870,000. -* The default ``parallelism`` of the ``ScryptPasswordHasher`` is - increased from 1 to 5, to follow OWASP recommendations. +* The default ``parallelism`` of the ``ScryptPasswordHasher`` is increased from + 1 to 5, to follow OWASP recommendations. * The new :class:`~django.contrib.auth.forms.AdminUserCreationForm` and the existing :class:`~django.contrib.auth.forms.AdminPasswordChangeForm` now diff --git a/docs/releases/5.2.txt b/docs/releases/5.2.txt index eabc27c277..7af0b955f6 100644 --- a/docs/releases/5.2.txt +++ b/docs/releases/5.2.txt @@ -44,7 +44,12 @@ Minor features :mod:`django.contrib.admindocs` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -* ... +* Links to components in docstrings now supports custom link text, using the + format ``:role:`link text ```. See :ref:`documentation helpers + ` for more details. + +* The :ref:`model pages ` are now restricted to + users with the corresponding view or change permissions. :mod:`django.contrib.auth` ~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -78,10 +83,14 @@ Minor features * Auth backends can now provide async implementations which are used when calling async auth functions (e.g. - :func:`~.django.contrib.auth.aauthenticate`) to reduce context-switching which - improves performance. See :ref:`adding an async interface + :func:`~.django.contrib.auth.aauthenticate`) to reduce context-switching + which improves performance. See :ref:`adding an async interface ` for more details. +* The :ref:`password validator classes ` + now have a new method ``get_error_message()``, which can be overridden in + subclasses to customize the error messages. + :mod:`django.contrib.contenttypes` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -90,7 +99,19 @@ Minor features :mod:`django.contrib.gis` ~~~~~~~~~~~~~~~~~~~~~~~~~ -* ... +* GDAL now supports curved geometries ``CurvePolygon``, ``CompoundCurve``, + ``CircularString``, ``MultiSurface``, and ``MultiCurve`` via the new + :attr:`.OGRGeometry.has_curve` property, and the + :meth:`.OGRGeometry.get_linear_geometry` and + :meth:`.OGRGeometry.get_curve_geometry` methods. + +* :lookup:`coveredby` and :lookup:`covers` lookup are now supported on MySQL. + +* :lookup:`coveredby` and :lookup:`isvalid` lookups, + :class:`~django.contrib.gis.db.models.Collect` aggregation, and + :class:`~django.contrib.gis.db.models.functions.GeoHash` and + :class:`~django.contrib.gis.db.models.functions.IsValid` database functions + are now supported on MariaDB 11.7+. :mod:`django.contrib.messages` ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ @@ -153,7 +174,9 @@ CSRF Database backends ~~~~~~~~~~~~~~~~~ -* ... +* MySQL connections now default to using the ``utf8mb4`` character set, + instead of ``utf8``, which is an alias for the deprecated character set + ``utf8mb3``. Decorators ~~~~~~~~~~ @@ -225,26 +248,28 @@ Logging Management Commands ~~~~~~~~~~~~~~~~~~~ -* A new warning is printed to the console when running :djadmin:`runserver` that - ``runserver`` is unsuitable for production. This warning can be hidden by - setting the :envvar:`HIDE_PRODUCTION_WARNING` environment variable to - ``"true"``. +* A new warning is displayed when running :djadmin:`runserver`, indicating that + it is unsuitable for production. This warning can be suppressed by setting + the :envvar:`HIDE_PRODUCTION_WARNING` environment variable to ``"true"``. + +* The :djadmin:`makemigrations` and :djadmin:`migrate` commands have a new + ``Command.autodetector`` attribute for subclasses to override in order to use + a custom autodetector class. Migrations ~~~~~~~~~~ -* ... +* The new operation :class:`.AlterConstraint` is a no-op operation that alters + constraints without dropping and recreating constraints in the database. Models ~~~~~~ -* The ``SELECT`` clause generated when using - :meth:`QuerySet.values()` and - :meth:`~django.db.models.query.QuerySet.values_list` now matches the - specified order of the referenced expressions. Previously the order was based - of a set of counterintuitive rules which made query combination through - methods such as - :meth:`QuerySet.union()` unpredictable. +* The ``SELECT`` clause generated when using :meth:`.QuerySet.values` and + :meth:`.QuerySet.values_list` now matches the specified order of the + referenced expressions. Previously, the order was based of a set of + counterintuitive rules which made query combination through methods such as + :meth:`.QuerySet.union` unpredictable. * Added support for validation of model constraints which use a :class:`~django.db.models.GeneratedField`. @@ -257,12 +282,28 @@ Models longer required to be set on SQLite, which supports unlimited ``VARCHAR`` columns. +* :meth:`.QuerySet.explain` now supports the ``memory`` and ``serialize`` + options on PostgreSQL 17+. + Requests and Responses ~~~~~~~~~~~~~~~~~~~~~~ +* The new :attr:`.HttpResponse.text` property provides the string + representation of :attr:`.HttpResponse.content`. + * The new :meth:`.HttpRequest.get_preferred_type` method can be used to query the preferred media type the client accepts. +* The new ``preserve_request`` argument for + :class:`~django.http.HttpResponseRedirect` and + :class:`~django.http.HttpResponsePermanentRedirect` + determines whether the HTTP status codes 302/307 or 301/308 are used, + respectively. + +* The new ``preserve_request`` argument for + :func:`~django.shortcuts.redirect` allows to instruct the user agent to reuse + the HTTP method and body during redirection using specific status codes. + Security ~~~~~~~~ @@ -283,7 +324,9 @@ Signals Templates ~~~~~~~~~ -* ... +* The new :meth:`~django.template.Library.simple_block_tag` decorator enables + the creation of simple block tags, which can accept and use a section of the + template. Tests ~~~~~ @@ -347,6 +390,14 @@ Dropped support for PostgreSQL 13 Upstream support for PostgreSQL 13 ends in November 2025. Django 5.2 supports PostgreSQL 14 and higher. +Changed MySQL connection character set default +---------------------------------------------- + +MySQL connections now default to using the ``utf8mb4`` character set, instead +of ``utf8``, which is an alias for the deprecated character set ``utf8mb3``. +``utf8mb3`` can be specified in the ``OPTIONS`` part of the ``DATABASES`` +setting, if needed for legacy databases. + Miscellaneous ------------- @@ -355,17 +406,33 @@ Miscellaneous * The minimum supported version of ``gettext`` is increased from 0.15 to 0.19. -* ``HttpRequest.accepted_types`` is now sorted by the client's preference, based - on the request's ``Accept`` header. +* ``HttpRequest.accepted_types`` is now sorted by the client's preference, + based on the request's ``Accept`` header. -* :attr:`.UniqueConstraint.violation_error_code` and +* The attributes :attr:`.UniqueConstraint.violation_error_code` and :attr:`.UniqueConstraint.violation_error_message` are now always used when - provided. Previously, these were ignored when :attr:`.UniqueConstraint.fields` - were set without a :attr:`.UniqueConstraint.condition`. + provided. Previously, they were ignored if :attr:`.UniqueConstraint.fields` + was set without a :attr:`.UniqueConstraint.condition`. * The :func:`~django.template.context_processors.debug` context processor is no longer included in the default project template. +* The following methods now have ``alters_data=True`` set to prevent side + effects when :ref:`rendering a template context `: + + * :meth:`.UserManager.create_user` + * :meth:`.UserManager.acreate_user` + * :meth:`.UserManager.create_superuser` + * :meth:`.UserManager.acreate_superuser` + * :meth:`.QuerySet.create` + * :meth:`.QuerySet.acreate` + * :meth:`.QuerySet.bulk_create` + * :meth:`.QuerySet.abulk_create` + * :meth:`.QuerySet.get_or_create` + * :meth:`.QuerySet.aget_or_create` + * :meth:`.QuerySet.update_or_create` + * :meth:`.QuerySet.aupdate_or_create` + .. _deprecated-features-5.2: Features deprecated in 5.2 @@ -376,3 +443,7 @@ Miscellaneous * The ``all`` argument for the ``django.contrib.staticfiles.finders.find()`` function is deprecated in favor of the ``find_all`` argument. + +* The fallback to ``request.user`` when ``user`` is ``None`` in + ``django.contrib.auth.login()`` and ``django.contrib.auth.alogin()`` will be + removed. diff --git a/docs/releases/index.txt b/docs/releases/index.txt index a38053c2a9..536e5917ab 100644 --- a/docs/releases/index.txt +++ b/docs/releases/index.txt @@ -32,6 +32,7 @@ versions of the documentation contain the release notes for any later releases. .. toctree:: :maxdepth: 1 + 5.1.4 5.1.3 5.1.2 5.1.1 @@ -42,6 +43,7 @@ versions of the documentation contain the release notes for any later releases. .. toctree:: :maxdepth: 1 + 5.0.10 5.0.9 5.0.8 5.0.7 @@ -59,6 +61,7 @@ versions of the documentation contain the release notes for any later releases. .. toctree:: :maxdepth: 1 + 4.2.17 4.2.16 4.2.15 4.2.14 diff --git a/docs/spelling_wordlist b/docs/spelling_wordlist index d30f2ce440..747a712a62 100644 --- a/docs/spelling_wordlist +++ b/docs/spelling_wordlist @@ -123,6 +123,7 @@ deduplicates deduplication deepcopy deferrable +DEP deprecations deserialization deserialize diff --git a/docs/topics/auth/customizing.txt b/docs/topics/auth/customizing.txt index 6fdcd136c0..4874f199f6 100644 --- a/docs/topics/auth/customizing.txt +++ b/docs/topics/auth/customizing.txt @@ -127,15 +127,19 @@ wasn't provided to :func:`~django.contrib.auth.authenticate` (which passes it on to the backend). The Django admin is tightly coupled to the Django :ref:`User object -`. The best way to deal with this is to create a Django ``User`` -object for each user that exists for your backend (e.g., in your LDAP -directory, your external SQL database, etc.) You can either write a script to -do this in advance, or your ``authenticate`` method can do it the first time a -user logs in. +`. For example, for a user to access the admin, +:attr:`.User.is_staff` and :attr:`.User.is_active` must be ``True`` (see +:meth:`.AdminSite.has_permission` for details). + +The best way to deal with this is to create a Django ``User`` object for each +user that exists for your backend (e.g., in your LDAP directory, your external +SQL database, etc.). You can either write a script to do this in advance, or +your ``authenticate`` method can do it the first time a user logs in. Here's an example backend that authenticates against a username and password variable defined in your ``settings.py`` file and creates a Django ``User`` -object the first time a user authenticates:: +object the first time a user authenticates. In this example, the created Django +``User`` object is a superuser who will have full access to the admin:: from django.conf import settings from django.contrib.auth.backends import BaseBackend @@ -162,7 +166,7 @@ object the first time a user authenticates:: except User.DoesNotExist: # Create a new user. There's no need to set a password # because only the password from settings.py is checked. - user = User(username=username) + user = User(username=username) # is_active defaults to True. user.is_staff = True user.is_superuser = True user.save() diff --git a/docs/topics/auth/passwords.txt b/docs/topics/auth/passwords.txt index 68f5453d54..8efd2bdebf 100644 --- a/docs/topics/auth/passwords.txt +++ b/docs/topics/auth/passwords.txt @@ -590,6 +590,8 @@ has no settings. The help texts and any errors from password validators are always returned in the order they are listed in :setting:`AUTH_PASSWORD_VALIDATORS`. +.. _included-password-validators: + Included validators ------------------- @@ -600,6 +602,19 @@ Django includes four validators: Validates that the password is of a minimum length. The minimum length can be customized with the ``min_length`` parameter. + .. method:: get_error_message() + + .. versionadded:: 5.2 + + A hook for customizing the ``ValidationError`` error message. Defaults + to ``"This password is too short. It must contain at least + characters."``. + + .. method:: get_help_text() + + A hook for customizing the validator's help text. Defaults to ``"Your + password must contain at least characters."``. + .. class:: UserAttributeSimilarityValidator(user_attributes=DEFAULT_USER_ATTRIBUTES, max_similarity=0.7) Validates that the password is sufficiently different from certain @@ -617,6 +632,18 @@ Django includes four validators: ``user_attributes``, whereas a value of 1.0 rejects only passwords that are identical to an attribute's value. + .. method:: get_error_message() + + .. versionadded:: 5.2 + + A hook for customizing the ``ValidationError`` error message. Defaults + to ``"The password is too similar to the ."``. + + .. method:: get_help_text() + + A hook for customizing the validator's help text. Defaults to ``"Your + password can’t be too similar to your other personal information."``. + .. class:: CommonPasswordValidator(password_list_path=DEFAULT_PASSWORD_LIST_PATH) Validates that the password is not a common password. This converts the @@ -628,10 +655,34 @@ Django includes four validators: common passwords. This file should contain one lowercase password per line and may be plain text or gzipped. + .. method:: get_error_message() + + .. versionadded:: 5.2 + + A hook for customizing the ``ValidationError`` error message. Defaults + to ``"This password is too common."``. + + .. method:: get_help_text() + + A hook for customizing the validator's help text. Defaults to ``"Your + password can’t be a commonly used password."``. + .. class:: NumericPasswordValidator() Validate that the password is not entirely numeric. + .. method:: get_error_message() + + .. versionadded:: 5.2 + + A hook for customizing the ``ValidationError`` error message. Defaults + to ``"This password is entirely numeric."``. + + .. method:: get_help_text() + + A hook for customizing the validator's help text. Defaults to ``"Your + password can’t be entirely numeric."``. + Integrating validation ---------------------- diff --git a/docs/topics/class-based-views/generic-editing.txt b/docs/topics/class-based-views/generic-editing.txt index 4310ae9dcc..73d1e2eb8d 100644 --- a/docs/topics/class-based-views/generic-editing.txt +++ b/docs/topics/class-based-views/generic-editing.txt @@ -278,7 +278,7 @@ The above example assumes that if the client supports ``text/html``, that they would prefer it. However, this may not always be true. When requesting a ``.css`` file, many browsers will send the header ``Accept: text/css,*/*;q=0.1``, indicating that they would prefer CSS, but -anything else is fine. This means ``request.accepts("text/html") will be +anything else is fine. This means ``request.accepts("text/html")`` will be ``True``. To determine the correct format, taking into consideration the client's diff --git a/docs/topics/db/models.txt b/docs/topics/db/models.txt index e7bc1681fb..f7f575eb3f 100644 --- a/docs/topics/db/models.txt +++ b/docs/topics/db/models.txt @@ -224,6 +224,15 @@ ones: object. If callable it will be called every time a new object is created. +:attr:`~Field.db_default` + The database-computed default value for the field. This can be a literal + value or a database function. + + If both ``db_default`` and :attr:`Field.default` are set, ``default`` will + take precedence when creating instances in Python code. ``db_default`` will + still be set at the database level and will be used when inserting rows + outside of the ORM or when adding a new field in a migration. + :attr:`~Field.help_text` Extra "help" text to be displayed with the form widget. It's useful for documentation even if your field isn't used on a form. diff --git a/docs/topics/db/multi-db.txt b/docs/topics/db/multi-db.txt index be7e9953fa..11be913f4c 100644 --- a/docs/topics/db/multi-db.txt +++ b/docs/topics/db/multi-db.txt @@ -683,6 +683,10 @@ Once you've written your model admin definitions, they can be registered with any ``Admin`` instance:: from django.contrib import admin + from myapp.models import Author, Book, Publisher + + # Import our custom ModelAdmin and TabularInline from where they're defined. + from myproject.admin import MultiDBModelAdmin, MultiDBTabularInline # Specialize the multi-db admin objects for use with specific models. diff --git a/docs/topics/email.txt b/docs/topics/email.txt index 150e25958e..74468063b8 100644 --- a/docs/topics/email.txt +++ b/docs/topics/email.txt @@ -311,9 +311,11 @@ All parameters are optional and can be set at any time prior to calling the * ``bcc``: A list or tuple of addresses used in the "Bcc" header when sending the email. -* ``connection``: An email backend instance. Use this parameter if - you want to use the same connection for multiple messages. If omitted, a - new connection is created when ``send()`` is called. +* ``connection``: An :ref:`email backend ` instance. Use + this parameter if you are sending the ``EmailMessage`` via ``send()`` and you + want to use the same connection for multiple messages. If omitted, a new + connection is created when ``send()`` is called. This parameter is ignored + when using :ref:`send_messages() `. * ``attachments``: A list of attachments to put on the message. These can be instances of :class:`~email.mime.base.MIMEBase` or @@ -728,9 +730,10 @@ destroying a connection every time you want to send an email. There are two ways you tell an email backend to reuse a connection. -Firstly, you can use the ``send_messages()`` method. ``send_messages()`` takes -a list of :class:`~django.core.mail.EmailMessage` instances (or subclasses), -and sends them all using a single connection. +Firstly, you can use the ``send_messages()`` method on a connection. This takes +a list of :class:`EmailMessage` (or subclass) instances, and sends them all +using that single connection. As a consequence, any :class:`connection +` set on an individual message is ignored. For example, if you have a function called ``get_notification_email()`` that returns a list of :class:`~django.core.mail.EmailMessage` objects representing diff --git a/docs/topics/forms/formsets.txt b/docs/topics/forms/formsets.txt index 1f49044e6e..14d4962eb6 100644 --- a/docs/topics/forms/formsets.txt +++ b/docs/topics/forms/formsets.txt @@ -48,13 +48,10 @@ following example will create a formset class to display two blank forms: >>> ArticleFormSet = formset_factory(ArticleForm, extra=2) -Iterating over a formset will render the forms in the order they were -created. You can change this order by providing an alternate implementation for -the ``__iter__()`` method. - -Formsets can also be indexed into, which returns the corresponding form. If you -override ``__iter__``, you will need to also override ``__getitem__`` to have -matching behavior. +Formsets can be iterated and indexed, accessing forms in the order they were +created. You can reorder the forms by overriding the default +:py:meth:`iteration ` and +:py:meth:`indexing ` behavior if needed. .. _formsets-initial-data: @@ -1008,10 +1005,11 @@ deal with the management form: The above ends up calling the :meth:`BaseFormSet.render` method on the formset class. This renders the formset using the template specified by the :attr:`~BaseFormSet.template_name` attribute. Similar to forms, by default the -formset will be rendered ``as_table``, with other helper methods of ``as_p`` -and ``as_ul`` being available. The rendering of the formset can be customized -by specifying the ``template_name`` attribute, or more generally by -:ref:`overriding the default template `. +formset will be rendered ``as_div``, with other helper methods of ``as_p``, +``as_ul``, and ``as_table`` being available. The rendering of the formset can +be customized by specifying the ``template_name`` attribute, or more generally +by :ref:`overriding the default template +`. .. _manually-rendered-can-delete-and-can-order: diff --git a/docs/topics/http/shortcuts.txt b/docs/topics/http/shortcuts.txt index 171cfc3c93..308eae0855 100644 --- a/docs/topics/http/shortcuts.txt +++ b/docs/topics/http/shortcuts.txt @@ -91,7 +91,7 @@ This example is equivalent to:: ``redirect()`` ============== -.. function:: redirect(to, *args, permanent=False, **kwargs) +.. function:: redirect(to, *args, permanent=False, preserve_request=False, **kwargs) Returns an :class:`~django.http.HttpResponseRedirect` to the appropriate URL for the arguments passed. @@ -107,8 +107,27 @@ This example is equivalent to:: * An absolute or relative URL, which will be used as-is for the redirect location. - By default issues a temporary redirect; pass ``permanent=True`` to issue a - permanent redirect. + By default, a temporary redirect is issued with a 302 status code. If + ``permanent=True``, a permanent redirect is issued with a 301 status code. + + If ``preserve_request=True``, the response instructs the user agent to + preserve the method and body of the original request when issuing the + redirect. In this case, temporary redirects use a 307 status code, and + permanent redirects use a 308 status code. This is better illustrated in the + following table: + + ========= ================ ================ + permanent preserve_request HTTP status code + ========= ================ ================ + ``True`` ``False`` 301 + ``False`` ``False`` 302 + ``False`` ``True`` 307 + ``True`` ``True`` 308 + ========= ================ ================ + + .. versionchanged:: 5.2 + + The argument ``preserve_request`` was added. Examples -------- @@ -158,6 +177,17 @@ will be returned:: obj = MyModel.objects.get(...) return redirect(obj, permanent=True) +Additionally, the ``preserve_request`` argument can be used to preserve the +original HTTP method:: + + def my_view(request): + # ... + obj = MyModel.objects.get(...) + if request.method in ("POST", "PUT"): + # Redirection preserves the original request method. + return redirect(obj, preserve_request=True) + # ... + ``get_object_or_404()`` ======================= diff --git a/docs/topics/http/views.txt b/docs/topics/http/views.txt index 2985bfb72b..feb4eaa4ec 100644 --- a/docs/topics/http/views.txt +++ b/docs/topics/http/views.txt @@ -23,7 +23,7 @@ Here's a view that returns the current date and time, as an HTML document:: def current_datetime(request): now = datetime.datetime.now() - html = "It is now %s." % now + html = 'It is now %s.' % now return HttpResponse(html) Let's step through this code one line at a time: @@ -225,7 +225,7 @@ Here's an example of an async view:: async def current_datetime(request): now = datetime.datetime.now() - html = "It is now %s." % now + html = 'It is now %s.' % now return HttpResponse(html) You can read more about Django's async support, and how to best use async diff --git a/docs/topics/performance.txt b/docs/topics/performance.txt index cedd824e30..4e23d1b6bc 100644 --- a/docs/topics/performance.txt +++ b/docs/topics/performance.txt @@ -137,7 +137,7 @@ one that it is comfortable to code for. Firstly, in a real-life case you need to consider what is happening before and after your count to work out what's an optimal way of doing it *in that - particular context*. The database optimization documents describes :ref:`a + particular context*. The database optimization document describes :ref:`a case where counting in the template would be better `. diff --git a/js_tests/admin/SelectFilter2.test.js b/js_tests/admin/SelectFilter2.test.js index 0b1317cff5..af227c0c1e 100644 --- a/js_tests/admin/SelectFilter2.test.js +++ b/js_tests/admin/SelectFilter2.test.js @@ -12,13 +12,25 @@ QUnit.test('init', function(assert) { SelectFilter.init('id', 'things', 0); assert.equal($('#test').children().first().prop("tagName"), "DIV"); assert.equal($('#test').children().first().attr("class"), "selector"); - assert.equal($('.selector-available h2').text().trim(), "Available things"); - assert.equal($('.selector-chosen h2').text().trim(), "Chosen things"); + assert.equal($('.selector-available label').text().trim(), "Available things"); + assert.equal($('.selector-chosen label').text().trim(), "Chosen things"); assert.equal($('.selector-chosen select')[0].getAttribute('multiple'), ''); - assert.equal($('.selector-chooseall').text(), "Choose all"); - assert.equal($('.selector-add').text(), "Choose"); - assert.equal($('.selector-remove').text(), "Remove"); - assert.equal($('.selector-clearall').text(), "Remove all"); + assert.equal($('.selector-chooseall').text(), "Choose all things"); + assert.equal($('.selector-chooseall').prop("tagName"), "BUTTON"); + assert.equal($('.selector-add').text(), "Choose selected things"); + assert.equal($('.selector-add').prop("tagName"), "BUTTON"); + assert.equal($('.selector-remove').text(), "Remove selected chosen things"); + assert.equal($('.selector-remove').prop("tagName"), "BUTTON"); + assert.equal($('.selector-clearall').text(), "Remove all things"); + assert.equal($('.selector-clearall').prop("tagName"), "BUTTON"); + assert.equal($('.selector-available .filtered').attr("aria-labelledby"), "id_from_title"); + assert.equal($('.selector-available .selector-available-title label').text(), "Available things "); + assert.equal($('.selector-available .selector-available-title .helptext').text(), 'Choose things by selecting them and then select the "Choose" arrow button.'); + assert.equal($('.selector-chosen .filtered').attr("aria-labelledby"), "id_to_title"); + assert.equal($('.selector-chosen .selector-chosen-title label').text(), "Chosen things "); + assert.equal($('.selector-chosen .selector-chosen-title .helptext').text(), 'Remove things by selecting them and then select the "Remove" arrow button.'); + assert.equal($('.selector-filter label .help-tooltip')[0].getAttribute("aria-label"), "Type into this box to filter down the list of available things."); + assert.equal($('.selector-filter label .help-tooltip')[1].getAttribute("aria-label"), "Type into this box to filter down the list of selected things."); }); QUnit.test('filtering available options', function(assert) { diff --git a/tests/admin_changelist/admin.py b/tests/admin_changelist/admin.py index 349ef7d465..937beea48f 100644 --- a/tests/admin_changelist/admin.py +++ b/tests/admin_changelist/admin.py @@ -48,6 +48,7 @@ class ChildAdmin(admin.ModelAdmin): list_display = ["name", "parent"] list_per_page = 10 list_filter = ["parent", "age"] + search_fields = ["age__exact", "name__exact"] def get_queryset(self, request): return super().get_queryset(request).select_related("parent") @@ -55,6 +56,7 @@ class ChildAdmin(admin.ModelAdmin): class GrandChildAdmin(admin.ModelAdmin): list_display = ["name", "parent__name", "parent__parent__name"] + search_fields = ["parent__name__exact", "parent__age__exact"] site.register(GrandChild, GrandChildAdmin) diff --git a/tests/admin_changelist/tests.py b/tests/admin_changelist/tests.py index d8055a809b..0be6a54ed4 100644 --- a/tests/admin_changelist/tests.py +++ b/tests/admin_changelist/tests.py @@ -860,6 +860,47 @@ class ChangeListTests(TestCase): cl = m.get_changelist_instance(request) self.assertCountEqual(cl.queryset, [abcd]) + def test_search_with_exact_lookup_for_non_string_field(self): + child = Child.objects.create(name="Asher", age=11) + model_admin = ChildAdmin(Child, custom_site) + + for search_term, expected_result in [ + ("11", [child]), + ("Asher", [child]), + ("1", []), + ("A", []), + ("random", []), + ]: + request = self.factory.get("/", data={SEARCH_VAR: search_term}) + request.user = self.superuser + with self.subTest(search_term=search_term): + # 1 query for filtered result, 1 for filtered count, 1 for total count. + with self.assertNumQueries(3): + cl = model_admin.get_changelist_instance(request) + self.assertCountEqual(cl.queryset, expected_result) + + def test_search_with_exact_lookup_relationship_field(self): + child = Child.objects.create(name="I am a child", age=11) + grandchild = GrandChild.objects.create(name="I am a grandchild", parent=child) + model_admin = GrandChildAdmin(GrandChild, custom_site) + + request = self.factory.get("/", data={SEARCH_VAR: "'I am a child'"}) + request.user = self.superuser + cl = model_admin.get_changelist_instance(request) + self.assertCountEqual(cl.queryset, [grandchild]) + for search_term, expected_result in [ + ("11", [grandchild]), + ("'I am a child'", [grandchild]), + ("1", []), + ("A", []), + ("random", []), + ]: + request = self.factory.get("/", data={SEARCH_VAR: search_term}) + request.user = self.superuser + with self.subTest(search_term=search_term): + cl = model_admin.get_changelist_instance(request) + self.assertCountEqual(cl.queryset, expected_result) + def test_no_distinct_for_m2m_in_list_filter_without_params(self): """ If a ManyToManyField is in list_filter but isn't in any lookup params, diff --git a/tests/admin_docs/models.py b/tests/admin_docs/models.py index b4ef84caba..4b52b4a4ea 100644 --- a/tests/admin_docs/models.py +++ b/tests/admin_docs/models.py @@ -15,6 +15,16 @@ class Group(models.Model): class Family(models.Model): + """ + Links with different link text. + + This is a line with tag :tag:`extends ` + This is a line with model :model:`Family ` + This is a line with view :view:`Index ` + This is a line with template :template:`index template ` + This is a line with filter :filter:`example filter ` + """ + last_name = models.CharField(max_length=200) diff --git a/tests/admin_docs/test_views.py b/tests/admin_docs/test_views.py index 064ce27fb0..11b70d6cd9 100644 --- a/tests/admin_docs/test_views.py +++ b/tests/admin_docs/test_views.py @@ -5,6 +5,8 @@ from django.conf import settings from django.contrib import admin from django.contrib.admindocs import utils, views from django.contrib.admindocs.views import get_return_data_type, simplify_regex +from django.contrib.auth.models import Permission, User +from django.contrib.contenttypes.models import ContentType from django.contrib.sites.models import Site from django.db import models from django.db.models import fields @@ -89,6 +91,18 @@ class AdminDocViewTests(TestDataMixin, AdminDocsTestCase): # View docstring self.assertContains(response, "Base view for admindocs views.") + def testview_docstring_links(self): + summary = ( + '

This is a view for ' + '' + "myapp.Company

" + ) + url = reverse( + "django-admindocs-views-detail", args=["admin_docs.views.CompanyView"] + ) + response = self.client.get(url) + self.assertContains(response, summary, html=True) + @override_settings(ROOT_URLCONF="admin_docs.namespace_urls") def test_namespaced_view_detail(self): url = reverse( @@ -408,9 +422,9 @@ class TestModelDetailView(TestDataMixin, AdminDocsTestCase): def test_model_docstring_renders_correctly(self): summary = ( - '

Stores information about a person, related to ' + '

Stores information about a person, related to ' '' - "myapp.Company.

" + "myapp.Company." ) subheading = "

Notes

" body = ( @@ -429,6 +443,25 @@ class TestModelDetailView(TestDataMixin, AdminDocsTestCase): self.assertContains(self.response, body, html=True) self.assertContains(self.response, model_body, html=True) + def test_model_docstring_built_in_tag_links(self): + summary = "Links with different link text." + body = ( + '

This is a line with tag extends\n' + 'This is a line with model Family\n' + 'This is a line with view Index\n' + 'This is a line with template index template\n' + 'This is a line with filter example filter

' + ) + url = reverse("django-admindocs-models-detail", args=["admin_docs", "family"]) + response = self.client.get(url) + self.assertContains(response, summary, html=True) + self.assertContains(response, body, html=True) + def test_model_detail_title(self): self.assertContains(self.response, "

admin_docs.Person

", html=True) @@ -451,6 +484,110 @@ class TestModelDetailView(TestDataMixin, AdminDocsTestCase): ) self.assertEqual(response.status_code, 404) + def test_model_permission_denied(self): + person_url = reverse( + "django-admindocs-models-detail", args=["admin_docs", "person"] + ) + company_url = reverse( + "django-admindocs-models-detail", args=["admin_docs", "company"] + ) + staff_user = User.objects.create_user( + username="staff", password="secret", is_staff=True + ) + self.client.force_login(staff_user) + response_for_person = self.client.get(person_url) + response_for_company = self.client.get(company_url) + # No access without permissions. + self.assertEqual(response_for_person.status_code, 403) + self.assertEqual(response_for_company.status_code, 403) + company_content_type = ContentType.objects.get_for_model(Company) + person_content_type = ContentType.objects.get_for_model(Person) + view_company = Permission.objects.get( + codename="view_company", content_type=company_content_type + ) + change_person = Permission.objects.get( + codename="change_person", content_type=person_content_type + ) + staff_user.user_permissions.add(view_company, change_person) + response_for_person = self.client.get(person_url) + response_for_company = self.client.get(company_url) + # View or change permission grants access. + self.assertEqual(response_for_person.status_code, 200) + self.assertEqual(response_for_company.status_code, 200) + + +@unittest.skipUnless(utils.docutils_is_available, "no docutils installed.") +class TestModelIndexView(TestDataMixin, AdminDocsTestCase): + def test_model_index_superuser(self): + self.client.force_login(self.superuser) + index_url = reverse("django-admindocs-models-index") + response = self.client.get(index_url) + self.assertContains( + response, + 'Family', + html=True, + ) + self.assertContains( + response, + 'Person', + html=True, + ) + self.assertContains( + response, + 'Company', + html=True, + ) + + def test_model_index_with_model_permission(self): + staff_user = User.objects.create_user( + username="staff", password="secret", is_staff=True + ) + self.client.force_login(staff_user) + index_url = reverse("django-admindocs-models-index") + response = self.client.get(index_url) + # Models are not listed without permissions. + self.assertNotContains( + response, + 'Family', + html=True, + ) + self.assertNotContains( + response, + 'Person', + html=True, + ) + self.assertNotContains( + response, + 'Company', + html=True, + ) + company_content_type = ContentType.objects.get_for_model(Company) + person_content_type = ContentType.objects.get_for_model(Person) + view_company = Permission.objects.get( + codename="view_company", content_type=company_content_type + ) + change_person = Permission.objects.get( + codename="change_person", content_type=person_content_type + ) + staff_user.user_permissions.add(view_company, change_person) + response = self.client.get(index_url) + # View or change permission grants access. + self.assertNotContains( + response, + 'Family', + html=True, + ) + self.assertContains( + response, + 'Person', + html=True, + ) + self.assertContains( + response, + 'Company', + html=True, + ) + class CustomField(models.Field): description = "A custom field type" diff --git a/tests/admin_docs/urls.py b/tests/admin_docs/urls.py index de23d9baf5..779d5f9f5f 100644 --- a/tests/admin_docs/urls.py +++ b/tests/admin_docs/urls.py @@ -14,6 +14,7 @@ urlpatterns = [ path("admin/", admin.site.urls), path("admindocs/", include("django.contrib.admindocs.urls")), path("", include(ns_patterns, namespace="test")), + path("company/", views.CompanyView.as_view()), path("xview/func/", views.xview_dec(views.xview)), path("xview/class/", views.xview_dec(views.XViewClass.as_view())), path("xview/callable_object/", views.xview_dec(views.XViewCallableObject())), diff --git a/tests/admin_docs/views.py b/tests/admin_docs/views.py index 21fe382bba..5bccaf29a0 100644 --- a/tests/admin_docs/views.py +++ b/tests/admin_docs/views.py @@ -18,3 +18,12 @@ class XViewClass(View): class XViewCallableObject(View): def __call__(self, request): return HttpResponse() + + +class CompanyView(View): + """ + This is a view for :model:`myapp.Company` + """ + + def get(self, request): + return HttpResponse() diff --git a/tests/admin_inlines/tests.py b/tests/admin_inlines/tests.py index 8e69edb841..b08ab3a52a 100644 --- a/tests/admin_inlines/tests.py +++ b/tests/admin_inlines/tests.py @@ -1801,7 +1801,7 @@ class TestInlineWithFieldsets(TestDataMixin, TestCase): # The second and third have the same "Advanced options" name, but the # second one has the "collapse" class. for x, classes in ((1, ""), (2, "collapse")): - heading_id = f"fieldset-0-advanced-options-{x}-heading" + heading_id = f"fieldset-0-{x}-heading" with self.subTest(heading_id=heading_id): self.assertContains( response, @@ -1846,7 +1846,7 @@ class TestInlineWithFieldsets(TestDataMixin, TestCase): # Every fieldset defined for an inline's form. for z, fieldset in enumerate(inline_admin_form): if fieldset.name: - heading_id = f"{prefix}-{y}-details-{z}-heading" + heading_id = f"{prefix}-{y}-{z}-heading" self.assertContains( response, f'
' ) + self.assertContains( + response, + '

Some fields

', + ) + self.assertContains( + response, + '

' + "Some other fields

", + ) + self.assertContains( + response, + '

이름

', + ) post = self.client.post( reverse("admin:admin_views_article_add"), add_dict, follow=False ) @@ -3603,7 +3614,7 @@ class AdminViewDeletedObjectsTest(TestCase): response = self.client.get( reverse("admin:admin_views_villain_delete", args=(self.v1.pk,)) ) - self.assertRegex(response.content.decode(), pattern) + self.assertRegex(response.text, pattern) def test_cyclic(self): """ @@ -6214,9 +6225,7 @@ class SeleniumTests(AdminSeleniumTestCase): self.take_screenshot("selectbox-available-perms-some-selected") # Move permissions to the "Chosen" list, but none is selected yet. - self.selenium.find_element( - By.CSS_SELECTOR, "#id_user_permissions_add_link" - ).click() + self.selenium.find_element(By.CSS_SELECTOR, "#id_user_permissions_add").click() self.take_screenshot("selectbox-chosen-perms-none-selected") # Select some permissions from the "Chosen" list. @@ -8266,7 +8275,7 @@ class AdminKeepChangeListFiltersTests(TestCase): # Check the `change_view` link has the correct querystring. detail_link = re.search( '{}'.format(self.joepublicuser.username), - response.content.decode(), + response.text, ) self.assertURLEqual(detail_link[1], self.get_change_url()) @@ -8278,7 +8287,7 @@ class AdminKeepChangeListFiltersTests(TestCase): # Check the form action. form_action = re.search( '
', - response.content.decode(), + response.text, ) self.assertURLEqual( form_action[1], "?%s" % self.get_preserved_filters_querystring() @@ -8286,13 +8295,13 @@ class AdminKeepChangeListFiltersTests(TestCase): # Check the history link. history_link = re.search( - 'History', response.content.decode() + 'History', response.text ) self.assertURLEqual(history_link[1], self.get_history_url()) # Check the delete link. delete_link = re.search( - 'Delete', response.content.decode() + 'Delete', response.text ) self.assertURLEqual(delete_link[1], self.get_delete_url()) @@ -8332,7 +8341,7 @@ class AdminKeepChangeListFiltersTests(TestCase): self.client.force_login(viewuser) response = self.client.get(self.get_change_url()) close_link = re.search( - 'Close', response.content.decode() + 'Close', response.text ) close_link = close_link[1].replace("&", "&") self.assertURLEqual(close_link, self.get_changelist_url()) @@ -8350,7 +8359,7 @@ class AdminKeepChangeListFiltersTests(TestCase): # Check the form action. form_action = re.search( '', - response.content.decode(), + response.text, ) self.assertURLEqual( form_action[1], "?%s" % self.get_preserved_filters_querystring() @@ -8653,6 +8662,19 @@ class AdminViewOnSiteTests(TestCase): ), ) + def test_view_on_site_url_non_integer_ids(self): + """The view_on_site URL accepts non-integer ids.""" + self.assertEqual( + reverse( + "admin:view_on_site", + kwargs={ + "content_type_id": "37156b6a-8a82", + "object_id": "37156b6a-8a83", + }, + ), + "/test_admin/admin/r/37156b6a-8a82/37156b6a-8a83/", + ) + @override_settings(ROOT_URLCONF="admin_views.urls") class InlineAdminViewOnSiteTest(TestCase): diff --git a/tests/admin_widgets/tests.py b/tests/admin_widgets/tests.py index 5da4adf8c9..a81f5802d1 100644 --- a/tests/admin_widgets/tests.py +++ b/tests/admin_widgets/tests.py @@ -1257,15 +1257,19 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): def assertActiveButtons( self, mode, field_name, choose, remove, choose_all=None, remove_all=None ): - choose_link = "#id_%s_add_link" % field_name - choose_all_link = "#id_%s_add_all_link" % field_name - remove_link = "#id_%s_remove_link" % field_name - remove_all_link = "#id_%s_remove_all_link" % field_name - self.assertEqual(self.has_css_class(choose_link, "active"), choose) - self.assertEqual(self.has_css_class(remove_link, "active"), remove) + choose_button = "#id_%s_add" % field_name + choose_all_button = "#id_%s_add_all" % field_name + remove_button = "#id_%s_remove" % field_name + remove_all_button = "#id_%s_remove_all" % field_name + self.assertEqual(self.has_css_class(choose_button, "active"), choose) + self.assertEqual(self.has_css_class(remove_button, "active"), remove) if mode == "horizontal": - self.assertEqual(self.has_css_class(choose_all_link, "active"), choose_all) - self.assertEqual(self.has_css_class(remove_all_link, "active"), remove_all) + self.assertEqual( + self.has_css_class(choose_all_button, "active"), choose_all + ) + self.assertEqual( + self.has_css_class(remove_all_button, "active"), remove_all + ) def execute_basic_operations(self, mode, field_name): from selenium.webdriver.common.by import By @@ -1274,10 +1278,10 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): from_box = "#id_%s_from" % field_name to_box = "#id_%s_to" % field_name - choose_link = "id_%s_add_link" % field_name - choose_all_link = "id_%s_add_all_link" % field_name - remove_link = "id_%s_remove_link" % field_name - remove_all_link = "id_%s_remove_all_link" % field_name + choose_button = "id_%s_add" % field_name + choose_all_button = "id_%s_add_all" % field_name + remove_button = "id_%s_remove" % field_name + remove_all_button = "id_%s_remove_all" % field_name # Initial positions --------------------------------------------------- self.assertSelectOptions( @@ -1296,7 +1300,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): # Click 'Choose all' -------------------------------------------------- if mode == "horizontal": - self.selenium.find_element(By.ID, choose_all_link).click() + self.selenium.find_element(By.ID, choose_all_button).click() elif mode == "vertical": # There 's no 'Choose all' button in vertical mode, so individually # select all options and click 'Choose'. @@ -1304,7 +1308,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): By.CSS_SELECTOR, from_box + " > option" ): option.click() - self.selenium.find_element(By.ID, choose_link).click() + self.selenium.find_element(By.ID, choose_button).click() self.assertSelectOptions(from_box, []) self.assertSelectOptions( to_box, @@ -1323,7 +1327,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): # Click 'Remove all' -------------------------------------------------- if mode == "horizontal": - self.selenium.find_element(By.ID, remove_all_link).click() + self.selenium.find_element(By.ID, remove_all_button).click() elif mode == "vertical": # There 's no 'Remove all' button in vertical mode, so individually # select all options and click 'Remove'. @@ -1331,7 +1335,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): By.CSS_SELECTOR, to_box + " > option" ): option.click() - self.selenium.find_element(By.ID, remove_link).click() + self.selenium.find_element(By.ID, remove_button).click() self.assertSelectOptions( from_box, [ @@ -1364,7 +1368,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): self.select_option(from_box, str(self.bob.id)) self.select_option(from_box, str(self.john.id)) self.assertActiveButtons(mode, field_name, True, False, True, False) - self.selenium.find_element(By.ID, choose_link).click() + self.selenium.find_element(By.ID, choose_button).click() self.assertActiveButtons(mode, field_name, False, False, True, True) self.assertSelectOptions( @@ -1399,7 +1403,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): self.select_option(to_box, str(self.lisa.id)) self.select_option(to_box, str(self.bob.id)) self.assertActiveButtons(mode, field_name, False, True, True, True) - self.selenium.find_element(By.ID, remove_link).click() + self.selenium.find_element(By.ID, remove_button).click() self.assertActiveButtons(mode, field_name, False, False, True, True) self.assertSelectOptions( @@ -1418,7 +1422,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): # Choose some more options -------------------------------------------- self.select_option(from_box, str(self.arthur.id)) self.select_option(from_box, str(self.cliff.id)) - self.selenium.find_element(By.ID, choose_link).click() + self.selenium.find_element(By.ID, choose_button).click() self.assertSelectOptions( from_box, @@ -1445,7 +1449,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): # Confirm they're selected after clicking inactive buttons: ticket #26575 self.assertSelectedOptions(from_box, [str(self.peter.id), str(self.lisa.id)]) - self.selenium.find_element(By.ID, remove_link).click() + self.selenium.find_element(By.ID, remove_button).click() self.assertSelectedOptions(from_box, [str(self.peter.id), str(self.lisa.id)]) # Unselect the options ------------------------------------------------ @@ -1458,7 +1462,7 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): # Confirm they're selected after clicking inactive buttons: ticket #26575 self.assertSelectedOptions(to_box, [str(self.jason.id), str(self.john.id)]) - self.selenium.find_element(By.ID, choose_link).click() + self.selenium.find_element(By.ID, choose_button).click() self.assertSelectedOptions(to_box, [str(self.jason.id), str(self.john.id)]) # Unselect the options ------------------------------------------------ @@ -1520,8 +1524,8 @@ class HorizontalVerticalFilterSeleniumTests(AdminWidgetSeleniumTestCase): for field_name in ["students", "alumni"]: from_box = "#id_%s_from" % field_name to_box = "#id_%s_to" % field_name - choose_link = "id_%s_add_link" % field_name - remove_link = "id_%s_remove_link" % field_name + choose_link = "id_%s_add" % field_name + remove_link = "id_%s_remove" % field_name input = self.selenium.find_element(By.ID, "id_%s_input" % field_name) # Initial values. self.assertSelectOptions( diff --git a/tests/asgi/tests.py b/tests/asgi/tests.py index 658e9d853e..66ec4369d9 100644 --- a/tests/asgi/tests.py +++ b/tests/asgi/tests.py @@ -21,6 +21,7 @@ from django.test import ( modify_settings, override_settings, ) +from django.test.utils import captured_stderr from django.urls import path from django.utils.http import http_date from django.views.decorators.csrf import csrf_exempt @@ -95,7 +96,8 @@ class ASGITest(SimpleTestCase): with open(test_filename, "rb") as test_file: test_file_contents = test_file.read() # Read the response. - response_start = await communicator.receive_output() + with captured_stderr(): + response_start = await communicator.receive_output() self.assertEqual(response_start["type"], "http.response.start") self.assertEqual(response_start["status"], 200) headers = response_start["headers"] diff --git a/tests/async/test_async_auth.py b/tests/async/test_async_auth.py index 37884d13a6..3d5a6b678d 100644 --- a/tests/async/test_async_auth.py +++ b/tests/async/test_async_auth.py @@ -8,6 +8,7 @@ from django.contrib.auth import ( from django.contrib.auth.models import AnonymousUser, User from django.http import HttpRequest from django.test import TestCase, override_settings +from django.utils.deprecation import RemovedInDjango61Warning class AsyncAuthTest(TestCase): @@ -60,7 +61,52 @@ class AsyncAuthTest(TestCase): self.assertIsInstance(user, User) self.assertEqual(user.username, second_user.username) - async def test_alogin_without_user(self): + # RemovedInDjango61Warning: When the deprecation ends, replace with: + # async def test_alogin_without_user(self): + async def test_alogin_without_user_no_request_user(self): + request = HttpRequest() + request.session = await self.client.asession() + # RemovedInDjango61Warning: When the deprecation ends, replace with: + # with self.assertRaisesMessage( + # AttributeError, + # "'NoneType' object has no attribute 'get_session_auth_hash'", + # ): + # await alogin(request, None) + with ( + self.assertRaisesMessage( + AttributeError, + "'HttpRequest' object has no attribute 'auser'", + ), + self.assertWarnsMessage( + RemovedInDjango61Warning, + "Fallback to request.user when user is None will be removed.", + ), + ): + await alogin(request, None) + + # RemovedInDjango61Warning: When the deprecation ends, remove completely. + async def test_alogin_without_user_anonymous_request(self): + async def auser(): + return AnonymousUser() + + request = HttpRequest() + request.user = AnonymousUser() + request.auser = auser + request.session = await self.client.asession() + with ( + self.assertRaisesMessage( + AttributeError, + "'AnonymousUser' object has no attribute '_meta'", + ), + self.assertWarnsMessage( + RemovedInDjango61Warning, + "Fallback to request.user when user is None will be removed.", + ), + ): + await alogin(request, None) + + # RemovedInDjango61Warning: When the deprecation ends, remove completely. + async def test_alogin_without_user_authenticated_request(self): async def auser(): return self.test_user @@ -68,7 +114,11 @@ class AsyncAuthTest(TestCase): request.user = self.test_user request.auser = auser request.session = await self.client.asession() - await alogin(request, None) + with self.assertWarnsMessage( + RemovedInDjango61Warning, + "Fallback to request.user when user is None will be removed.", + ): + await alogin(request, None) user = await aget_user(request) self.assertIsInstance(user, User) self.assertEqual(user.username, self.test_user.username) diff --git a/tests/auth_tests/test_auth_backends.py b/tests/auth_tests/test_auth_backends.py index b612d27ab0..32fb092cf4 100644 --- a/tests/auth_tests/test_auth_backends.py +++ b/tests/auth_tests/test_auth_backends.py @@ -1,6 +1,7 @@ import sys from datetime import date from unittest import mock +from unittest.mock import patch from asgiref.sync import sync_to_async @@ -14,19 +15,22 @@ from django.contrib.auth import ( signals, ) from django.contrib.auth.backends import BaseBackend, ModelBackend +from django.contrib.auth.forms import PasswordChangeForm, SetPasswordForm from django.contrib.auth.hashers import MD5PasswordHasher from django.contrib.auth.models import AnonymousUser, Group, Permission, User from django.contrib.contenttypes.models import ContentType from django.core.exceptions import ImproperlyConfigured, PermissionDenied from django.http import HttpRequest from django.test import ( + Client, RequestFactory, SimpleTestCase, TestCase, modify_settings, override_settings, ) -from django.views.debug import technical_500_response +from django.urls import reverse +from django.views.debug import ExceptionReporter, technical_500_response from django.views.decorators.debug import sensitive_variables from .models import ( @@ -38,6 +42,16 @@ from .models import ( ) +class FilteredExceptionReporter(ExceptionReporter): + def get_traceback_frames(self): + frames = super().get_traceback_frames() + return [ + frame + for frame in frames + if not isinstance(dict(frame["vars"]).get("self"), Client) + ] + + class SimpleBackend(BaseBackend): def get_user_permissions(self, user_obj, obj=None): return ["user_perm"] @@ -1040,6 +1054,15 @@ class TypeErrorBackend: raise TypeError +class TypeErrorValidator: + """ + Always raises a TypeError. + """ + + def validate(self, password=None, user=None): + raise TypeError + + class SkippedBackend: def authenticate(self): # Doesn't accept any credentials so is skipped by authenticate(). @@ -1127,6 +1150,113 @@ class AuthenticateTests(TestCase): status_code=500, ) + @override_settings( + ROOT_URLCONF="django.contrib.auth.urls", + AUTHENTICATION_BACKENDS=["auth_tests.test_auth_backends.TypeErrorBackend"], + ) + def test_login_process_sensitive_variables(self): + try: + self.client.post( + reverse("login"), + dict(username="testusername", password=self.sensitive_password), + ) + except TypeError: + exc_info = sys.exc_info() + + rf = RequestFactory() + with patch("django.views.debug.ExceptionReporter", FilteredExceptionReporter): + response = technical_500_response(rf.get("/"), *exc_info) + + self.assertNotContains(response, self.sensitive_password, status_code=500) + self.assertContains(response, "TypeErrorBackend", status_code=500) + + # AuthenticationForm.clean(). + self.assertContains( + response, + 'password' + "
'********************'
", + html=True, + status_code=500, + ) + + def test_setpasswordform_validate_passwords_sensitive_variables(self): + password_form = SetPasswordForm(AnonymousUser()) + password_form.cleaned_data = { + "password1": self.sensitive_password, + "password2": self.sensitive_password + "2", + } + try: + password_form.validate_passwords() + except ValueError: + exc_info = sys.exc_info() + + rf = RequestFactory() + response = technical_500_response(rf.get("/"), *exc_info) + self.assertNotContains(response, self.sensitive_password, status_code=500) + self.assertNotContains(response, self.sensitive_password + "2", status_code=500) + + self.assertContains( + response, + 'password1' + "
'********************'
", + html=True, + status_code=500, + ) + + self.assertContains( + response, + 'password2' + "
'********************'
", + html=True, + status_code=500, + ) + + @override_settings( + AUTH_PASSWORD_VALIDATORS=[ + {"NAME": __name__ + ".TypeErrorValidator"}, + ] + ) + def test_setpasswordform_validate_password_for_user_sensitive_variables(self): + password_form = SetPasswordForm(AnonymousUser()) + password_form.cleaned_data = {"password2": self.sensitive_password} + try: + password_form.validate_password_for_user(AnonymousUser()) + except TypeError: + exc_info = sys.exc_info() + + rf = RequestFactory() + response = technical_500_response(rf.get("/"), *exc_info) + self.assertNotContains(response, self.sensitive_password, status_code=500) + + self.assertContains( + response, + 'password' + "
'********************'
", + html=True, + status_code=500, + ) + + def test_passwordchangeform_clean_old_password_sensitive_variables(self): + password_form = PasswordChangeForm(User()) + password_form.cleaned_data = {"old_password": self.sensitive_password} + password_form.error_messages = None + try: + password_form.clean_old_password() + except TypeError: + exc_info = sys.exc_info() + + rf = RequestFactory() + response = technical_500_response(rf.get("/"), *exc_info) + self.assertNotContains(response, self.sensitive_password, status_code=500) + + self.assertContains( + response, + 'old_password' + "
'********************'
", + html=True, + status_code=500, + ) + @override_settings( AUTHENTICATION_BACKENDS=( "auth_tests.test_auth_backends.SkippedBackend", diff --git a/tests/auth_tests/test_decorators.py b/tests/auth_tests/test_decorators.py index fa2672beb4..2c3f93d2ab 100644 --- a/tests/auth_tests/test_decorators.py +++ b/tests/auth_tests/test_decorators.py @@ -1,4 +1,4 @@ -from asyncio import iscoroutinefunction +from asgiref.sync import iscoroutinefunction from django.conf import settings from django.contrib.auth import models diff --git a/tests/auth_tests/test_login.py b/tests/auth_tests/test_login.py new file mode 100644 index 0000000000..2c0c1c5796 --- /dev/null +++ b/tests/auth_tests/test_login.py @@ -0,0 +1,72 @@ +from django.contrib import auth +from django.contrib.auth.models import AnonymousUser, User +from django.http import HttpRequest +from django.test import TestCase +from django.utils.deprecation import RemovedInDjango61Warning + + +class TestLogin(TestCase): + @classmethod + def setUpTestData(cls): + cls.user = User.objects.create_user(username="testuser", password="password") + + def setUp(self): + self.request = HttpRequest() + self.request.session = self.client.session + + def test_user_login(self): + auth.login(self.request, self.user) + self.assertEqual(self.request.session[auth.SESSION_KEY], str(self.user.pk)) + + def test_inactive_user(self): + self.user.is_active = False + self.user.save(update_fields=["is_active"]) + + auth.login(self.request, self.user) + self.assertEqual(self.request.session[auth.SESSION_KEY], str(self.user.pk)) + + # RemovedInDjango61Warning: When the deprecation ends, replace with: + # def test_without_user(self): + def test_without_user_no_request_user(self): + # RemovedInDjango61Warning: When the deprecation ends, replace with: + # with self.assertRaisesMessage( + # AttributeError, + # "'NoneType' object has no attribute 'get_session_auth_hash'", + # ): + # auth.login(self.request, None) + with ( + self.assertRaisesMessage( + AttributeError, + "'HttpRequest' object has no attribute 'user'", + ), + self.assertWarnsMessage( + RemovedInDjango61Warning, + "Fallback to request.user when user is None will be removed.", + ), + ): + auth.login(self.request, None) + + # RemovedInDjango61Warning: When the deprecation ends, remove completely. + def test_without_user_anonymous_request(self): + self.request.user = AnonymousUser() + with ( + self.assertRaisesMessage( + AttributeError, + "'AnonymousUser' object has no attribute '_meta'", + ), + self.assertWarnsMessage( + RemovedInDjango61Warning, + "Fallback to request.user when user is None will be removed.", + ), + ): + auth.login(self.request, None) + + # RemovedInDjango61Warning: When the deprecation ends, remove completely. + def test_without_user_authenticated_request(self): + self.request.user = self.user + self.assertNotIn(auth.SESSION_KEY, self.request.session) + + msg = "Fallback to request.user when user is None will be removed." + with self.assertWarnsMessage(RemovedInDjango61Warning, msg): + auth.login(self.request, None) + self.assertEqual(self.request.session[auth.SESSION_KEY], str(self.user.pk)) diff --git a/tests/auth_tests/test_management.py b/tests/auth_tests/test_management.py index 8dd91cf6ed..9f12e631cc 100644 --- a/tests/auth_tests/test_management.py +++ b/tests/auth_tests/test_management.py @@ -126,6 +126,13 @@ class GetDefaultUsernameTestCase(TestCase): def test_actual_implementation(self): self.assertIsInstance(management.get_system_username(), str) + def test_getuser_raises_exception(self): + # TODO: Drop ImportError and KeyError when dropping support for PY312. + for exc in (ImportError, KeyError, OSError): + with self.subTest(exc=str(exc)): + with mock.patch("getpass.getuser", side_effect=exc): + self.assertEqual(management.get_system_username(), "") + def test_simple(self): management.get_system_username = lambda: "joe" self.assertEqual(management.get_default_username(), "joe") diff --git a/tests/auth_tests/test_validators.py b/tests/auth_tests/test_validators.py index 506c85c0ae..d7e4968951 100644 --- a/tests/auth_tests/test_validators.py +++ b/tests/auth_tests/test_validators.py @@ -144,6 +144,20 @@ class MinimumLengthValidatorTest(SimpleTestCase): "Your password must contain at least 8 characters.", ) + def test_custom_error(self): + class CustomMinimumLengthValidator(MinimumLengthValidator): + def get_error_message(self): + return "Your password must be %d characters long" % self.min_length + + expected_error = "Your password must be %d characters long" + + with self.assertRaisesMessage(ValidationError, expected_error % 8) as cm: + CustomMinimumLengthValidator().validate("1234567") + self.assertEqual(cm.exception.error_list[0].code, "password_too_short") + + with self.assertRaisesMessage(ValidationError, expected_error % 3) as cm: + CustomMinimumLengthValidator(min_length=3).validate("12") + class UserAttributeSimilarityValidatorTest(TestCase): def test_validate(self): @@ -213,6 +227,42 @@ class UserAttributeSimilarityValidatorTest(TestCase): "Your password can’t be too similar to your other personal information.", ) + def test_custom_error(self): + class CustomUserAttributeSimilarityValidator(UserAttributeSimilarityValidator): + def get_error_message(self): + return "The password is too close to the %(verbose_name)s." + + user = User.objects.create_user( + username="testclient", + password="password", + email="testclient@example.com", + first_name="Test", + last_name="Client", + ) + + expected_error = "The password is too close to the %s." + + with self.assertRaisesMessage(ValidationError, expected_error % "username"): + CustomUserAttributeSimilarityValidator().validate("testclient", user=user) + + def test_custom_error_verbose_name_not_used(self): + class CustomUserAttributeSimilarityValidator(UserAttributeSimilarityValidator): + def get_error_message(self): + return "The password is too close to a user attribute." + + user = User.objects.create_user( + username="testclient", + password="password", + email="testclient@example.com", + first_name="Test", + last_name="Client", + ) + + expected_error = "The password is too close to a user attribute." + + with self.assertRaisesMessage(ValidationError, expected_error): + CustomUserAttributeSimilarityValidator().validate("testclient", user=user) + class CommonPasswordValidatorTest(SimpleTestCase): def test_validate(self): @@ -247,6 +297,16 @@ class CommonPasswordValidatorTest(SimpleTestCase): "Your password can’t be a commonly used password.", ) + def test_custom_error(self): + class CustomCommonPasswordValidator(CommonPasswordValidator): + def get_error_message(self): + return "This password has been used too much." + + expected_error = "This password has been used too much." + + with self.assertRaisesMessage(ValidationError, expected_error): + CustomCommonPasswordValidator().validate("godzilla") + class NumericPasswordValidatorTest(SimpleTestCase): def test_validate(self): @@ -264,6 +324,16 @@ class NumericPasswordValidatorTest(SimpleTestCase): "Your password can’t be entirely numeric.", ) + def test_custom_error(self): + class CustomNumericPasswordValidator(NumericPasswordValidator): + def get_error_message(self): + return "This password is all digits." + + expected_error = "This password is all digits." + + with self.assertRaisesMessage(ValidationError, expected_error): + CustomNumericPasswordValidator().validate("42424242") + class UsernameValidatorsTests(SimpleTestCase): def test_unicode_validator(self): diff --git a/tests/auth_tests/test_views.py b/tests/auth_tests/test_views.py index 97d0448ab1..98fdfe79b7 100644 --- a/tests/auth_tests/test_views.py +++ b/tests/auth_tests/test_views.py @@ -1521,7 +1521,7 @@ class ChangelistTests(MessagesTestMixin, AuthViewsTestCase): # Test the link inside password field help_text. rel_link = re.search( r'Reset password', - response.content.decode(), + response.text, )[1] self.assertEqual(urljoin(user_change_url, rel_link), password_change_url) @@ -1617,7 +1617,7 @@ class ChangelistTests(MessagesTestMixin, AuthViewsTestCase): # Test the link inside password field help_text. rel_link = re.search( r'Set password', - response.content.decode(), + response.text, )[1] self.assertEqual(urljoin(user_change_url, rel_link), password_change_url) diff --git a/tests/check_framework/custom_commands_app/management/commands/makemigrations.py b/tests/check_framework/custom_commands_app/management/commands/makemigrations.py new file mode 100644 index 0000000000..a6494cba4c --- /dev/null +++ b/tests/check_framework/custom_commands_app/management/commands/makemigrations.py @@ -0,0 +1,7 @@ +from django.core.management.commands.makemigrations import ( + Command as MakeMigrationsCommand, +) + + +class Command(MakeMigrationsCommand): + autodetector = int diff --git a/tests/check_framework/test_commands.py b/tests/check_framework/test_commands.py new file mode 100644 index 0000000000..a51db77402 --- /dev/null +++ b/tests/check_framework/test_commands.py @@ -0,0 +1,25 @@ +from django.core import checks +from django.core.checks import Error +from django.test import SimpleTestCase +from django.test.utils import isolate_apps, override_settings, override_system_checks + + +@isolate_apps("check_framework.custom_commands_app", attr_name="apps") +@override_settings(INSTALLED_APPS=["check_framework.custom_commands_app"]) +@override_system_checks([checks.commands.migrate_and_makemigrations_autodetector]) +class CommandCheckTests(SimpleTestCase): + def test_migrate_and_makemigrations_autodetector_different(self): + expected_error = Error( + "The migrate and makemigrations commands must have the same " + "autodetector.", + hint=( + "makemigrations.Command.autodetector is int, but " + "migrate.Command.autodetector is MigrationAutodetector." + ), + id="commands.E001", + ) + + self.assertEqual( + checks.run_checks(app_configs=self.apps.get_app_configs()), + [expected_error], + ) diff --git a/tests/csrf_tests/tests.py b/tests/csrf_tests/tests.py index b736276534..956cff11d9 100644 --- a/tests/csrf_tests/tests.py +++ b/tests/csrf_tests/tests.py @@ -1481,9 +1481,11 @@ class CsrfInErrorHandlingViewsTests(CsrfFunctionTestMixin, SimpleTestCase): response = self.client.get("/does not exist/") # The error handler returns status code 599. self.assertEqual(response.status_code, 599) - token1 = response.content.decode("ascii") + response.charset = "ascii" + token1 = response.text response = self.client.get("/does not exist/") self.assertEqual(response.status_code, 599) - token2 = response.content.decode("ascii") + response.charset = "ascii" + token2 = response.text secret2 = _unmask_cipher_token(token2) self.assertMaskedSecretCorrect(token1, secret2) diff --git a/tests/dbshell/test_mysql.py b/tests/dbshell/test_mysql.py index 13007ec037..6088a8b61a 100644 --- a/tests/dbshell/test_mysql.py +++ b/tests/dbshell/test_mysql.py @@ -112,7 +112,7 @@ class MySqlDbshellCommandTestCase(SimpleTestCase): "--user=someuser", "--host=somehost", "--port=444", - "--default-character-set=utf8", + "--default-character-set=utf8mb4", "somedbname", ] expected_env = {"MYSQL_PWD": "somepassword"} @@ -124,7 +124,7 @@ class MySqlDbshellCommandTestCase(SimpleTestCase): "PASSWORD": "somepassword", "HOST": "somehost", "PORT": 444, - "OPTIONS": {"charset": "utf8"}, + "OPTIONS": {"charset": "utf8mb4"}, } ), (expected_args, expected_env), diff --git a/tests/foreign_object/test_tuple_lookups.py b/tests/foreign_object/test_tuple_lookups.py index e2561676f3..797fea1c8a 100644 --- a/tests/foreign_object/test_tuple_lookups.py +++ b/tests/foreign_object/test_tuple_lookups.py @@ -1,6 +1,6 @@ -import unittest +import itertools -from django.db import NotSupportedError, connection +from django.db import NotSupportedError from django.db.models import F from django.db.models.fields.tuple_lookups import ( TupleExact, @@ -11,7 +11,8 @@ from django.db.models.fields.tuple_lookups import ( TupleLessThan, TupleLessThanOrEqual, ) -from django.test import TestCase +from django.db.models.lookups import In +from django.test import TestCase, skipUnlessDBFeature from .models import Contact, Customer @@ -118,10 +119,7 @@ class TupleLookupsTests(TestCase): Contact.objects.filter(lookup).order_by("id"), contacts ) - @unittest.skipIf( - connection.vendor == "mysql", - "MySQL doesn't support LIMIT & IN/ALL/ANY/SOME subquery", - ) + @skipUnlessDBFeature("allow_sliced_subqueries_with_in") def test_in_subquery(self): subquery = Customer.objects.filter(id=self.customer_1.id)[:1] self.assertSequenceEqual( @@ -129,6 +127,77 @@ class TupleLookupsTests(TestCase): (self.contact_1, self.contact_2, self.contact_5), ) + def test_tuple_in_subquery_must_be_query(self): + lhs = (F("customer_code"), F("company_code")) + # If rhs is any non-Query object with an as_sql() function. + rhs = In(F("customer_code"), [1, 2, 3]) + with self.assertRaisesMessage( + ValueError, + "'in' subquery lookup of ('customer_code', 'company_code') " + "must be a Query object (received 'In')", + ): + TupleIn(lhs, rhs) + + def test_tuple_in_subquery_must_have_2_fields(self): + lhs = (F("customer_code"), F("company_code")) + rhs = Customer.objects.values_list("customer_id").query + with self.assertRaisesMessage( + ValueError, + "'in' subquery lookup of ('customer_code', 'company_code') " + "must have 2 fields (received 1)", + ): + TupleIn(lhs, rhs) + + def test_tuple_in_subquery(self): + customers = Customer.objects.values_list("customer_id", "company") + test_cases = ( + (self.customer_1, (self.contact_1, self.contact_2, self.contact_5)), + (self.customer_2, (self.contact_3,)), + (self.customer_3, (self.contact_4,)), + (self.customer_4, ()), + (self.customer_5, (self.contact_6,)), + ) + + for customer, contacts in test_cases: + lhs = (F("customer_code"), F("company_code")) + rhs = customers.filter(id=customer.id).query + lookup = TupleIn(lhs, rhs) + qs = Contact.objects.filter(lookup).order_by("id") + + with self.subTest(customer=customer.id, query=str(qs.query)): + self.assertSequenceEqual(qs, contacts) + + def test_tuple_in_rhs_must_be_collection_of_tuples_or_lists(self): + test_cases = ( + (1, 2, 3), + ((1, 2), (3, 4), None), + ) + + for rhs in test_cases: + with self.subTest(rhs=rhs): + with self.assertRaisesMessage( + ValueError, + "'in' lookup of ('customer_code', 'company_code') " + "must be a collection of tuples or lists", + ): + TupleIn((F("customer_code"), F("company_code")), rhs) + + def test_tuple_in_rhs_must_have_2_elements_each(self): + test_cases = ( + ((),), + ((1,),), + ((1, 2, 3),), + ) + + for rhs in test_cases: + with self.subTest(rhs=rhs): + with self.assertRaisesMessage( + ValueError, + "'in' lookup of ('customer_code', 'company_code') " + "must have 2 elements each", + ): + TupleIn((F("customer_code"), F("company_code")), rhs) + def test_lt(self): c1, c2, c3, c4, c5, c6 = ( self.contact_1, @@ -358,8 +427,8 @@ class TupleLookupsTests(TestCase): ) def test_lookup_errors(self): - m_2_elements = "'%s' lookup of 'customer' field must have 2 elements" - m_2_elements_each = "'in' lookup of 'customer' field must have 2 elements each" + m_2_elements = "'%s' lookup of 'customer' must have 2 elements" + m_2_elements_each = "'in' lookup of 'customer' must have 2 elements each" test_cases = ( ({"customer": 1}, m_2_elements % "exact"), ({"customer": (1, 2, 3)}, m_2_elements % "exact"), @@ -381,3 +450,77 @@ class TupleLookupsTests(TestCase): self.assertRaisesMessage(ValueError, message), ): Contact.objects.get(**kwargs) + + def test_tuple_lookup_names(self): + test_cases = ( + (TupleExact, "exact"), + (TupleGreaterThan, "gt"), + (TupleGreaterThanOrEqual, "gte"), + (TupleLessThan, "lt"), + (TupleLessThanOrEqual, "lte"), + (TupleIn, "in"), + (TupleIsNull, "isnull"), + ) + + for lookup_class, lookup_name in test_cases: + with self.subTest(lookup_name): + self.assertEqual(lookup_class.lookup_name, lookup_name) + + def test_tuple_lookup_rhs_must_be_tuple_or_list(self): + test_cases = itertools.product( + ( + TupleExact, + TupleGreaterThan, + TupleGreaterThanOrEqual, + TupleLessThan, + TupleLessThanOrEqual, + TupleIn, + ), + ( + 0, + 1, + None, + True, + False, + {"foo": "bar"}, + ), + ) + + for lookup_cls, rhs in test_cases: + lookup_name = lookup_cls.lookup_name + with self.subTest(lookup_name=lookup_name, rhs=rhs): + with self.assertRaisesMessage( + ValueError, + f"'{lookup_name}' lookup of ('customer_code', 'company_code') " + "must be a tuple or a list", + ): + lookup_cls((F("customer_code"), F("company_code")), rhs) + + def test_tuple_lookup_rhs_must_have_2_elements(self): + test_cases = itertools.product( + ( + TupleExact, + TupleGreaterThan, + TupleGreaterThanOrEqual, + TupleLessThan, + TupleLessThanOrEqual, + ), + ( + [], + [1], + [1, 2, 3], + (), + (1,), + (1, 2, 3), + ), + ) + + for lookup_cls, rhs in test_cases: + lookup_name = lookup_cls.lookup_name + with self.subTest(lookup_name=lookup_name, rhs=rhs): + with self.assertRaisesMessage( + ValueError, + f"'{lookup_name}' lookup of ('customer_code', 'company_code') " + "must have 2 elements", + ): + lookup_cls((F("customer_code"), F("company_code")), rhs) diff --git a/tests/forms_tests/tests/test_formsets.py b/tests/forms_tests/tests/test_formsets.py index f80c1dc09e..9f7012a11f 100644 --- a/tests/forms_tests/tests/test_formsets.py +++ b/tests/forms_tests/tests/test_formsets.py @@ -149,6 +149,12 @@ class FormsFormsetTestCase(SimpleTestCase): self.assertFalse(formset.is_valid()) self.assertFalse(formset.has_changed()) + def test_formset_name(self): + ArticleFormSet = formset_factory(ArticleForm) + ChoiceFormSet = formset_factory(Choice) + self.assertEqual(ArticleFormSet.__name__, "ArticleFormSet") + self.assertEqual(ChoiceFormSet.__name__, "ChoiceFormSet") + def test_form_kwargs_formset(self): """ Custom kwargs set on the formset instance are passed to the diff --git a/tests/gis_tests/data/geoip2/GeoIP2-City-Test.mmdb b/tests/gis_tests/data/geoip2/GeoIP2-City-Test.mmdb index 3197ef122f..bf3cbe7835 100644 Binary files a/tests/gis_tests/data/geoip2/GeoIP2-City-Test.mmdb and b/tests/gis_tests/data/geoip2/GeoIP2-City-Test.mmdb differ diff --git a/tests/gis_tests/data/geoip2/GeoIP2-Country-Test.mmdb b/tests/gis_tests/data/geoip2/GeoIP2-Country-Test.mmdb index d79c9933bb..a5989654eb 100644 Binary files a/tests/gis_tests/data/geoip2/GeoIP2-Country-Test.mmdb and b/tests/gis_tests/data/geoip2/GeoIP2-Country-Test.mmdb differ diff --git a/tests/gis_tests/data/geoip2/GeoLite2-ASN-Test.mmdb b/tests/gis_tests/data/geoip2/GeoLite2-ASN-Test.mmdb index afa7e956e4..fe2123f9e0 100644 Binary files a/tests/gis_tests/data/geoip2/GeoLite2-ASN-Test.mmdb and b/tests/gis_tests/data/geoip2/GeoLite2-ASN-Test.mmdb differ diff --git a/tests/gis_tests/data/geoip2/GeoLite2-City-Test.mmdb b/tests/gis_tests/data/geoip2/GeoLite2-City-Test.mmdb index 028a6984d9..9eea131c76 100644 Binary files a/tests/gis_tests/data/geoip2/GeoLite2-City-Test.mmdb and b/tests/gis_tests/data/geoip2/GeoLite2-City-Test.mmdb differ diff --git a/tests/gis_tests/data/geoip2/GeoLite2-Country-Test.mmdb b/tests/gis_tests/data/geoip2/GeoLite2-Country-Test.mmdb index a2cbb08316..0233bba39b 100644 Binary files a/tests/gis_tests/data/geoip2/GeoLite2-Country-Test.mmdb and b/tests/gis_tests/data/geoip2/GeoLite2-Country-Test.mmdb differ diff --git a/tests/gis_tests/data/geoip2/LICENSE b/tests/gis_tests/data/geoip2/LICENSE deleted file mode 100644 index f86abbd73e..0000000000 --- a/tests/gis_tests/data/geoip2/LICENSE +++ /dev/null @@ -1,4 +0,0 @@ -This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 -Unported License. To view a copy of this license, visit -http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to Creative -Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. diff --git a/tests/gis_tests/data/geoip2/README b/tests/gis_tests/data/geoip2/README deleted file mode 100644 index b6a21720a3..0000000000 --- a/tests/gis_tests/data/geoip2/README +++ /dev/null @@ -1,3 +0,0 @@ -These test databases are taken from the following repository: - -https://github.com/maxmind/MaxMind-DB/ diff --git a/tests/gis_tests/data/geoip2/README.md b/tests/gis_tests/data/geoip2/README.md new file mode 100644 index 0000000000..f2a703b457 --- /dev/null +++ b/tests/gis_tests/data/geoip2/README.md @@ -0,0 +1,28 @@ +# GeoIP2 and GeoLite2 Test Databases + +The following test databases are provided under [this license][0]: + +- `GeoIP2-City-Test.mmdb` +- `GeoIP2-Country-Test.mmdb` +- `GeoLite2-ASN-Test.mmdb` +- `GeoLite2-City-Test.mmdb` +- `GeoLite2-Country-Test.mmdb` + +Updates can be found in [this repository][1]. + +[0]: https://github.com/maxmind/MaxMind-DB/blob/main/LICENSE-MIT +[1]: https://github.com/maxmind/MaxMind-DB/tree/main/test-data + +# DB-IP Lite Test Databases + +The following test databases are provided under [this license][2]: + +- `dbip-city-lite-test.mmdb` +- `dbip-country-lite-test.mmdb` + +They have been modified to strip them down to a minimal dataset for testing. + +Updates can be found at [this download page][3] from DB-IP. + +[2]: https://creativecommons.org/licenses/by/4.0/ +[3]: https://db-ip.com/db/lite.php diff --git a/tests/gis_tests/data/geoip2/dbip-city-lite-test.mmdb b/tests/gis_tests/data/geoip2/dbip-city-lite-test.mmdb new file mode 100644 index 0000000000..5f0d657c84 Binary files /dev/null and b/tests/gis_tests/data/geoip2/dbip-city-lite-test.mmdb differ diff --git a/tests/gis_tests/data/geoip2/dbip-country-lite-test.mmdb b/tests/gis_tests/data/geoip2/dbip-country-lite-test.mmdb new file mode 100644 index 0000000000..8410d1893c Binary files /dev/null and b/tests/gis_tests/data/geoip2/dbip-country-lite-test.mmdb differ diff --git a/tests/gis_tests/data/geometries.json b/tests/gis_tests/data/geometries.json index 7786f26e9b..eb6c64b6d9 100644 --- a/tests/gis_tests/data/geometries.json +++ b/tests/gis_tests/data/geometries.json @@ -137,5 +137,87 @@ "union_geoms": [ {"wkt": "POLYGON ((-5 0,-5 10,5 10,5 5,10 5,10 -5,0 -5,0 0,-5 0))"}, {"wkt": "POLYGON ((2 0, 2 15, 18 15, 18 0, 2 0))"} + ], +"curved_geoms": [ + {"wkt": "CIRCULARSTRING(1 5, 6 2, 7 3)", + "name": "CircularString", + "num": 8 + }, + {"wkt": "COMPOUNDCURVE((5 3, 5 13), CIRCULARSTRING(5 13, 7 15, 9 13), (9 13, 9 3), CIRCULARSTRING(9 3, 7 1, 5 3))", + "name": "CompoundCurve", + "num": 9 + }, + {"wkt": "CURVEPOLYGON(CIRCULARSTRING(0 0, 4 0, 4 4, 0 4, 0 0),(1 1, 3 3, 3 1, 1 1))", + "name": "CurvePolygon", + "num": 10 + }, + {"wkt": "MULTICURVE((0 0, 5 5), CIRCULARSTRING(4 0, 4 4, 8 4))", + "name": "MultiCurve", + "num": 11 + }, + {"wkt": "MULTISURFACE(((0 0, 0 1, 1 1, 1 0, 0 0)), ((1 1, 1 2, 2 2, 2 1, 1 1)))", + "name": "MultiSurface", + "num": 12 + }, + {"wkt": "CIRCULARSTRING Z (1 5 1, 6 2 2, 7 3 3)", + "name": "CircularStringZ", + "num": 1008 + }, + {"wkt": "COMPOUNDCURVE Z ((5 3 0, 5 13 0), CIRCULARSTRING Z (5 13 0, 7 15 0, 9 13 0), (9 13 0 , 9 3 0), CIRCULARSTRING(9 3 0, 7 1 0, 5 3 0))", + "name": "CompoundCurveZ", + "num": 1009 + }, + {"wkt": "CURVEPOLYGON Z(CIRCULARSTRING Z (0 0 0, 4 0 0, 4 4 0, 0 4 0, 0 0 0),(1 1 0, 3 3 0, 3 1 0, 1 1 0))", + "name": "CurvePolygonZ", + "num": 1010 + }, + {"wkt": "MULTICURVE Z ((0 0 1, 5 5 2), CIRCULARSTRING Z (4 0 0, 4 4 0, 8 4 0))", + "name": "MultiCurveZ", + "num": 1011 + }, + {"wkt": "MULTISURFACE Z (((0 0 1, 0 1 2, 1 1 3, 1 0 4, 0 0 5)), ((1 1 0, 1 2 0, 2 2 0, 2 1 0, 1 1 0)))", + "name": "MultiSurfaceZ", + "num": 1012 + }, + {"wkt": "CIRCULARSTRING M (1 5 1, 6 2 2, 7 3 3)", + "name": "CircularStringM", + "num": 2008 + }, + {"wkt": "COMPOUNDCURVE M ((5 3 0, 5 13 0), CIRCULARSTRING M (5 13 0, 7 15 0, 9 13 0), (9 13 0 , 9 3 0), CIRCULARSTRING M (9 3 0, 7 1 0, 5 3 0))", + "name": "CompoundCurveM", + "num": 2009 + }, + {"wkt": "CURVEPOLYGON M (CIRCULARSTRING M (0 0 0, 4 0 0, 4 4 0, 0 4 0, 0 0 0),(1 1 0, 3 3 1, 3 1 1, 1 1 2))", + "name": "CurvePolygonM", + "num": 2010 + }, + {"wkt": "MULTICURVE M ((0 0 1, 5 5 2), CIRCULARSTRING M (4 0 0, 4 4 0, 8 4 0))", + "name": "MultiCurveM", + "num": 2011 + }, + {"wkt": "MULTISURFACE M (((0 0 1, 0 1 2, 1 1 3, 1 0 4, 0 0 5)), ((1 1 0, 1 2 0, 2 2 0, 2 1 0, 1 1 0)))", + "name": "MultiSurfaceM", + "num": 2012 + }, + {"wkt": "CIRCULARSTRING ZM (1 5 0 1, 6 2 0 2, 7 3 0 3)", + "name": "CircularStringZM", + "num": 3008 + }, + {"wkt": "COMPOUNDCURVE ZM ((5 3 0 0, 5 13 0 0), CIRCULARSTRING ZM (5 13 0 0, 7 15 0 0, 9 13 0 0), (9 13 0 0, 9 3 0 0), CIRCULARSTRING ZM (9 3 0 0, 7 1 0 0, 5 3 0 0))", + "name": "CompoundCurveZM", + "num": 3009 + }, + {"wkt": "CURVEPOLYGON ZM (CIRCULARSTRING ZM (0 0 0 0, 4 0 0 0, 4 4 0 0, 0 4 0 0, 0 0 0 0), (1 1 0 0, 3 3 0 0, 3 1 0 0, 1 1 0 0))", + "name": "CurvePolygonZM", + "num": 3010 + }, + {"wkt": "MULTICURVE ZM ((0 0 0 1, 5 5 0 2), CIRCULARSTRING ZM (4 0 0 0, 4 4 0 0, 8 4 0 0))", + "name": "MultiCurveZM", + "num": 3011 + }, + {"wkt": "MULTISURFACE ZM (((0 0 0 1, 0 1 0 2, 1 1 0 3, 1 0 0 4, 0 0 0 5)), ((1 1 0 0, 1 2 0 0, 2 2 0 0, 2 1 0 0, 1 1 0 0)))", + "name": "MultiSurfaceZM", + "num": 3012 + } ] } diff --git a/tests/gis_tests/gdal_tests/test_geom.py b/tests/gis_tests/gdal_tests/test_geom.py index 5c23a6f2cf..6c551d0804 100644 --- a/tests/gis_tests/gdal_tests/test_geom.py +++ b/tests/gis_tests/gdal_tests/test_geom.py @@ -8,6 +8,8 @@ from django.contrib.gis.gdal import ( OGRGeomType, SpatialReference, ) +from django.contrib.gis.gdal.geometries import CircularString, CurvePolygon +from django.contrib.gis.geos import GEOSException from django.template import Context from django.template.engine import Engine from django.test import SimpleTestCase @@ -646,11 +648,11 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin): ("Multilinestring", 5, True), ("MultiPolygon", 6, True), ("GeometryCollection", 7, True), - ("CircularString", 8, False), - ("CompoundCurve", 9, False), - ("CurvePolygon", 10, False), - ("MultiCurve", 11, False), - ("MultiSurface", 12, False), + ("CircularString", 8, True), + ("CompoundCurve", 9, True), + ("CurvePolygon", 10, True), + ("MultiCurve", 11, True), + ("MultiSurface", 12, True), # 13 (Curve) and 14 (Surface) are abstract types. ("PolyhedralSurface", 15, False), ("TIN", 16, False), @@ -664,11 +666,11 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin): ("Multilinestring Z", -2147483643, True), # 1005 ("MultiPolygon Z", -2147483642, True), # 1006 ("GeometryCollection Z", -2147483641, True), # 1007 - ("CircularString Z", 1008, False), - ("CompoundCurve Z", 1009, False), - ("CurvePolygon Z", 1010, False), - ("MultiCurve Z", 1011, False), - ("MultiSurface Z", 1012, False), + ("CircularString Z", 1008, True), + ("CompoundCurve Z", 1009, True), + ("CurvePolygon Z", 1010, True), + ("MultiCurve Z", 1011, True), + ("MultiSurface Z", 1012, True), ("PolyhedralSurface Z", 1015, False), ("TIN Z", 1016, False), ("Triangle Z", 1017, False), @@ -679,11 +681,11 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin): ("MultiLineString M", 2005, True), ("MultiPolygon M", 2006, True), ("GeometryCollection M", 2007, True), - ("CircularString M", 2008, False), - ("CompoundCurve M", 2009, False), - ("CurvePolygon M", 2010, False), - ("MultiCurve M", 2011, False), - ("MultiSurface M", 2012, False), + ("CircularString M", 2008, True), + ("CompoundCurve M", 2009, True), + ("CurvePolygon M", 2010, True), + ("MultiCurve M", 2011, True), + ("MultiSurface M", 2012, True), ("PolyhedralSurface M", 2015, False), ("TIN M", 2016, False), ("Triangle M", 2017, False), @@ -694,11 +696,11 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin): ("MultiLineString ZM", 3005, True), ("MultiPolygon ZM", 3006, True), ("GeometryCollection ZM", 3007, True), - ("CircularString ZM", 3008, False), - ("CompoundCurve ZM", 3009, False), - ("CurvePolygon ZM", 3010, False), - ("MultiCurve ZM", 3011, False), - ("MultiSurface ZM", 3012, False), + ("CircularString ZM", 3008, True), + ("CompoundCurve ZM", 3009, True), + ("CurvePolygon ZM", 3010, True), + ("MultiCurve ZM", 3011, True), + ("MultiSurface ZM", 3012, True), ("PolyhedralSurface ZM", 3015, False), ("TIN ZM", 3016, False), ("Triangle ZM", 3017, False), @@ -967,6 +969,101 @@ class OGRGeomTest(SimpleTestCase, TestDataMixin): geom = OGRGeometry(geom_input) self.assertIs(geom.is_measured, True) + def test_has_curve(self): + for geom in self.geometries.curved_geoms: + with self.subTest(wkt=geom.wkt): + geom = OGRGeometry(geom.wkt) + self.assertIs(geom.has_curve, True) + msg = f"GEOS does not support {geom.__class__.__qualname__}." + with self.assertRaisesMessage(GEOSException, msg): + geom.geos + geom = OGRGeometry("POINT (0 1)") + self.assertIs(geom.has_curve, False) + + def test_get_linear_geometry(self): + geom = OGRGeometry("CIRCULARSTRING (-0.797 0.466,-0.481 0.62,-0.419 0.473)") + linear = geom.get_linear_geometry() + self.assertEqual(linear.geom_name, "LINESTRING") + self.assertIs(linear.has_curve, False) + + def test_get_linear_geometry_no_conversion_possible(self): + wkt = "POINT (0 0)" + geom = OGRGeometry(wkt) + geom2 = geom.get_linear_geometry() + self.assertEqual(geom2.wkt, wkt) + + def test_get_curve_geometry(self): + linear_string = OGRGeometry( + "LINESTRING (-0.797 0.466,-0.797500910583869 0.479079607685707," + "-0.797096828208069 0.49216256476959,-0.795789684575482 0.505186328593822," + "-0.793585728444384 0.518088639471983,-0.79049549575663 0.530807818319715," + "-0.786533759270668 0.543283061509385,-0.781719457941079 0.555454731539925," + "-0.776075606381369 0.567264642132187,-0.769629184843353 0.578656336386302," + "-0.76241101023902 0.589575356672327,-0.754455588821145 0.599969504963013," + "-0.745800951227352 0.609789092364991,-0.736488470675795 0.618987176654798," + "-0.726562665181888 0.627519786684672,-0.716070984741265 0.635346132585369," + "-0.705063584496685 0.642428800760598,-0.693593084972889 0.648733932741749," + "-0.681714320525941 0.654231387047048,-0.669484077209319 0.658894883272069," + "-0.656960821309923 0.662702127722269,-0.644204419852031 0.665634919987354," + "-0.631275854404748 0.667679239947688,-0.618236929561618 0.668825314797118," + "-0.60514997748578 0.669067665761503,-0.592077559933017 0.66840513428977," + "-0.579082169177269 0.666840887592428,-0.566225929268313 0.664382403500809," + "-0.553570299049824 0.661041434719465,-0.541175778357228 0.656833952642756," + "-0.529101618800212 0.651780071004197,-0.5174055405123 0.645903949723276," + "-0.506143456221622 0.639233679409784,-0.495369203961872 0.631801147077652," + "-0.485134289701335 0.623641883709865,-0.475487641120239 0.614794894404014," + "-0.46647537371355 0.605302471909454,-0.458140570337321 0.595209994448282," + "-0.450523075252448 0.58456570878613,-0.443659303650563 0.573420499590156," + "-0.437582067572208 0.561827646176397,-0.432320419050072 0.549842567809747," + "-0.427899511226613 0.537522558773986,-0.424340478110267 0.524926514478182," + "-0.421660333544978 0.512114649909193,-0.419871889876113 0.499148211775737," + "-0.418983696701434 0.486089185720561,-0.419 0.473)" + ) + curve = linear_string.get_curve_geometry() + self.assertEqual(curve.geom_name, "CIRCULARSTRING") + self.assertEqual( + curve.wkt, + "CIRCULARSTRING (-0.797 0.466,-0.618236929561618 " + "0.668825314797118,-0.419 0.473)", + ) + + def test_get_curve_geometry_no_conversion_possible(self): + geom = OGRGeometry("LINESTRING (0 0, 1 0, 2 0)") + geom2 = geom.get_curve_geometry() + self.assertEqual(geom2.wkt, geom.wkt) + + def test_curved_geometries(self): + for geom in self.geometries.curved_geoms: + with self.subTest(wkt=geom.wkt, geom_name=geom.name): + g = OGRGeometry(geom.wkt) + self.assertEqual(geom.name, g.geom_type.name) + self.assertEqual(geom.num, g.geom_type.num) + msg = f"GEOS does not support {g.__class__.__qualname__}." + with self.assertRaisesMessage(GEOSException, msg): + g.geos + + def test_circularstring_has_linestring_features(self): + geom = OGRGeometry("CIRCULARSTRING ZM (1 5 0 1, 6 2 0 2, 7 3 0 3)") + self.assertIsInstance(geom, CircularString) + self.assertEqual(geom.x, [1, 6, 7]) + self.assertEqual(geom.y, [5, 2, 3]) + self.assertEqual(geom.z, [0, 0, 0]) + self.assertEqual(geom.m, [1, 2, 3]) + self.assertEqual( + geom.tuple, + ((1.0, 5.0, 0.0, 1.0), (6.0, 2.0, 0.0, 2.0), (7.0, 3.0, 0.0, 3.0)), + ) + self.assertEqual(geom[0], (1, 5, 0, 1)) + self.assertEqual(len(geom), 3) + + def test_curvepolygon_has_polygon_features(self): + geom = OGRGeometry( + "CURVEPOLYGON ZM (CIRCULARSTRING ZM (0 0 0 0, 4 0 0 0, 4 4 0 0, 0 4 0 0, " + "0 0 0 0), (1 1 0 0, 3 3 0 0, 3 1 0 0, 1 1 0 0))" + ) + self.assertIsInstance(geom, CurvePolygon) + self.assertIsInstance(geom.shell, CircularString) + class DeprecationTests(SimpleTestCase): def test_coord_setter_deprecation(self): diff --git a/tests/gis_tests/gdal_tests/test_srs.py b/tests/gis_tests/gdal_tests/test_srs.py index 5d82a8175a..62ebc63889 100644 --- a/tests/gis_tests/gdal_tests/test_srs.py +++ b/tests/gis_tests/gdal_tests/test_srs.py @@ -1,4 +1,5 @@ from django.contrib.gis.gdal import ( + GDAL_VERSION, AxisOrder, CoordTransform, GDALException, @@ -353,7 +354,8 @@ class SpatialRefTest(SimpleTestCase): self.assertEqual(srs.name, "DHDN / Soldner 39 Langschoß") self.assertEqual(srs.wkt, wkt) self.assertIn("Langschoß", srs.pretty_wkt) - self.assertIn("Langschoß", srs.xml) + if GDAL_VERSION < (3, 9): + self.assertIn("Langschoß", srs.xml) def test_axis_order(self): wgs84_trad = SpatialReference(4326, axis_order=AxisOrder.TRADITIONAL) diff --git a/tests/gis_tests/geoapp/tests.py b/tests/gis_tests/geoapp/tests.py index 7ee47ee9a8..962d4f2217 100644 --- a/tests/gis_tests/geoapp/tests.py +++ b/tests/gis_tests/geoapp/tests.py @@ -496,6 +496,42 @@ class GeoLookupTest(TestCase): with self.assertNoLogs("django.contrib.gis", "ERROR"): State.objects.filter(poly__intersects="LINESTRING(0 0, 1 1, 5 5)") + @skipUnlessGISLookup("coveredby") + def test_coveredby_lookup(self): + poly = Polygon(LinearRing((0, 0), (0, 5), (5, 5), (5, 0), (0, 0))) + state = State.objects.create(name="Test", poly=poly) + + small_poly = Polygon(LinearRing((0, 0), (1, 4), (4, 4), (4, 1), (0, 0))) + qs = State.objects.filter(poly__coveredby=small_poly) + self.assertSequenceEqual(qs, []) + + large_poly = Polygon(LinearRing((0, 0), (-1, 6), (6, 6), (6, -1), (0, 0))) + qs = State.objects.filter(poly__coveredby=large_poly) + self.assertSequenceEqual(qs, [state]) + + if not connection.ops.oracle: + # On Oracle, COVEREDBY doesn't match for EQUAL objects. + qs = State.objects.filter(poly__coveredby=poly) + self.assertSequenceEqual(qs, [state]) + + @skipUnlessGISLookup("covers") + def test_covers_lookup(self): + poly = Polygon(LinearRing((0, 0), (0, 5), (5, 5), (5, 0), (0, 0))) + state = State.objects.create(name="Test", poly=poly) + + small_poly = Polygon(LinearRing((0, 0), (1, 4), (4, 4), (4, 1), (0, 0))) + qs = State.objects.filter(poly__covers=small_poly) + self.assertSequenceEqual(qs, [state]) + + large_poly = Polygon(LinearRing((-1, -1), (-1, 6), (6, 6), (6, -1), (-1, -1))) + qs = State.objects.filter(poly__covers=large_poly) + self.assertSequenceEqual(qs, []) + + if not connection.ops.oracle: + # On Oracle, COVERS doesn't match for EQUAL objects. + qs = State.objects.filter(poly__covers=poly) + self.assertSequenceEqual(qs, [state]) + @skipUnlessDBFeature("supports_relate_lookup") def test_relate_lookup(self): "Testing the 'relate' lookup type." diff --git a/tests/gis_tests/test_geoip2.py b/tests/gis_tests/test_geoip2.py index 11c73bec0c..61b3565d1c 100644 --- a/tests/gis_tests/test_geoip2.py +++ b/tests/gis_tests/test_geoip2.py @@ -32,6 +32,33 @@ class GeoLite2Test(SimpleTestCase): ipv6_addr = ipaddress.ip_address(ipv6_str) query_values = (fqdn, ipv4_str, ipv6_str, ipv4_addr, ipv6_addr) + expected_city = { + "accuracy_radius": 100, + "city": "Boxford", + "continent_code": "EU", + "continent_name": "Europe", + "country_code": "GB", + "country_name": "United Kingdom", + "is_in_european_union": False, + "latitude": 51.75, + "longitude": -1.25, + "metro_code": None, + "postal_code": "OX1", + "region_code": "ENG", + "region_name": "England", + "time_zone": "Europe/London", + # Kept for backward compatibility. + "dma_code": None, + "region": "ENG", + } + expected_country = { + "continent_code": "EU", + "continent_name": "Europe", + "country_code": "GB", + "country_name": "United Kingdom", + "is_in_european_union": False, + } + @classmethod def setUpClass(cls): # Avoid referencing __file__ at module level. @@ -97,88 +124,58 @@ class GeoLite2Test(SimpleTestCase): def test_country(self): g = GeoIP2(city="") - self.assertIs(g._metadata.database_type.endswith("Country"), True) + self.assertIs(g.is_city, False) + self.assertIs(g.is_country, True) for query in self.query_values: with self.subTest(query=query): + self.assertEqual(g.country(query), self.expected_country) self.assertEqual( - g.country(query), - { - "continent_code": "EU", - "continent_name": "Europe", - "country_code": "GB", - "country_name": "United Kingdom", - "is_in_european_union": False, - }, + g.country_code(query), self.expected_country["country_code"] + ) + self.assertEqual( + g.country_name(query), self.expected_country["country_name"] ) - self.assertEqual(g.country_code(query), "GB") - self.assertEqual(g.country_name(query), "United Kingdom") def test_country_using_city_database(self): g = GeoIP2(country="") - self.assertIs(g._metadata.database_type.endswith("City"), True) + self.assertIs(g.is_city, True) + self.assertIs(g.is_country, False) for query in self.query_values: with self.subTest(query=query): + self.assertEqual(g.country(query), self.expected_country) self.assertEqual( - g.country(query), - { - "continent_code": "EU", - "continent_name": "Europe", - "country_code": "GB", - "country_name": "United Kingdom", - "is_in_european_union": False, - }, + g.country_code(query), self.expected_country["country_code"] + ) + self.assertEqual( + g.country_name(query), self.expected_country["country_name"] ) - self.assertEqual(g.country_code(query), "GB") - self.assertEqual(g.country_name(query), "United Kingdom") def test_city(self): g = GeoIP2(country="") - self.assertIs(g._metadata.database_type.endswith("City"), True) + self.assertIs(g.is_city, True) + self.assertIs(g.is_country, False) for query in self.query_values: with self.subTest(query=query): - self.assertEqual( - g.city(query), - { - "accuracy_radius": 100, - "city": "Boxford", - "continent_code": "EU", - "continent_name": "Europe", - "country_code": "GB", - "country_name": "United Kingdom", - "is_in_european_union": False, - "latitude": 51.75, - "longitude": -1.25, - "metro_code": None, - "postal_code": "OX1", - "region_code": "ENG", - "region_name": "England", - "time_zone": "Europe/London", - # Kept for backward compatibility. - "dma_code": None, - "region": "ENG", - }, - ) + self.assertEqual(g.city(query), self.expected_city) geom = g.geos(query) self.assertIsInstance(geom, GEOSGeometry) self.assertEqual(geom.srid, 4326) - self.assertEqual(geom.tuple, (-1.25, 51.75)) - self.assertEqual(g.lat_lon(query), (51.75, -1.25)) - self.assertEqual(g.lon_lat(query), (-1.25, 51.75)) + expected_lat = self.expected_city["latitude"] + expected_lon = self.expected_city["longitude"] + self.assertEqual(geom.tuple, (expected_lon, expected_lat)) + self.assertEqual(g.lat_lon(query), (expected_lat, expected_lon)) + self.assertEqual(g.lon_lat(query), (expected_lon, expected_lat)) + # Country queries should still work. + self.assertEqual(g.country(query), self.expected_country) self.assertEqual( - g.country(query), - { - "continent_code": "EU", - "continent_name": "Europe", - "country_code": "GB", - "country_name": "United Kingdom", - "is_in_european_union": False, - }, + g.country_code(query), self.expected_country["country_code"] + ) + self.assertEqual( + g.country_name(query), self.expected_country["country_name"] ) - self.assertEqual(g.country_code(query), "GB") - self.assertEqual(g.country_name(query), "United Kingdom") def test_not_found(self): g1 = GeoIP2(city="") @@ -230,6 +227,27 @@ class GeoIP2Test(GeoLite2Test): """Non-free GeoIP2 databases are supported.""" +@skipUnless(HAS_GEOIP2, "GeoIP2 is required.") +@override_settings( + GEOIP_CITY="dbip-city-lite-test.mmdb", + GEOIP_COUNTRY="dbip-country-lite-test.mmdb", +) +class DBIPLiteTest(GeoLite2Test): + """DB-IP Lite databases are supported.""" + + expected_city = GeoLite2Test.expected_city | { + "accuracy_radius": None, + "city": "London (Shadwell)", + "latitude": 51.5181, + "longitude": -0.0714189, + "postal_code": None, + "region_code": None, + "time_zone": None, + # Kept for backward compatibility. + "region": None, + } + + @skipUnless(HAS_GEOIP2, "GeoIP2 is required.") class ErrorTest(SimpleTestCase): def test_missing_path(self): diff --git a/tests/httpwrappers/tests.py b/tests/httpwrappers/tests.py index 2197c6f7ea..f85d33e823 100644 --- a/tests/httpwrappers/tests.py +++ b/tests/httpwrappers/tests.py @@ -530,6 +530,22 @@ class HttpResponseTests(SimpleTestCase): headers={"Content-Type": "text/csv"}, ) + def test_text_updates_when_content_updates(self): + response = HttpResponse("Hello, world!") + self.assertEqual(response.text, "Hello, world!") + response.content = "Updated content" + self.assertEqual(response.text, "Updated content") + + def test_text_charset(self): + for content_type, content in [ + (None, b"Ol\xc3\xa1 Mundo"), + ("text/plain; charset=utf-8", b"Ol\xc3\xa1 Mundo"), + ("text/plain; charset=iso-8859-1", b"Ol\xe1 Mundo"), + ]: + with self.subTest(content_type=content_type): + response = HttpResponse(content, content_type=content_type) + self.assertEqual(response.text, "Olá Mundo") + class HttpResponseSubclassesTests(SimpleTestCase): def test_redirect(self): @@ -550,6 +566,27 @@ class HttpResponseSubclassesTests(SimpleTestCase): r = HttpResponseRedirect(lazystr("/redirected/")) self.assertEqual(r.url, "/redirected/") + def test_redirect_modifiers(self): + cases = [ + (HttpResponseRedirect, "Moved temporarily", False, 302), + (HttpResponseRedirect, "Moved temporarily preserve method", True, 307), + (HttpResponsePermanentRedirect, "Moved permanently", False, 301), + ( + HttpResponsePermanentRedirect, + "Moved permanently preserve method", + True, + 308, + ), + ] + for response_class, content, preserve_request, expected_status_code in cases: + with self.subTest(status_code=expected_status_code): + response = response_class( + "/redirected/", content=content, preserve_request=preserve_request + ) + self.assertEqual(response.status_code, expected_status_code) + self.assertEqual(response.content.decode(), content) + self.assertEqual(response.url, response.headers["Location"]) + def test_redirect_repr(self): response = HttpResponseRedirect("/redirected/") expected = ( @@ -614,7 +651,7 @@ class JsonResponseTests(SimpleTestCase): def test_json_response_non_ascii(self): data = {"key": "łóżko"} response = JsonResponse(data) - self.assertEqual(json.loads(response.content.decode()), data) + self.assertEqual(json.loads(response.text), data) def test_json_response_raises_type_error_with_default_setting(self): with self.assertRaisesMessage( @@ -626,16 +663,16 @@ class JsonResponseTests(SimpleTestCase): def test_json_response_text(self): response = JsonResponse("foobar", safe=False) - self.assertEqual(json.loads(response.content.decode()), "foobar") + self.assertEqual(json.loads(response.text), "foobar") def test_json_response_list(self): response = JsonResponse(["foo", "bar"], safe=False) - self.assertEqual(json.loads(response.content.decode()), ["foo", "bar"]) + self.assertEqual(json.loads(response.text), ["foo", "bar"]) def test_json_response_uuid(self): u = uuid.uuid4() response = JsonResponse(u, safe=False) - self.assertEqual(json.loads(response.content.decode()), str(u)) + self.assertEqual(json.loads(response.text), str(u)) def test_json_response_custom_encoder(self): class CustomDjangoJSONEncoder(DjangoJSONEncoder): @@ -643,11 +680,11 @@ class JsonResponseTests(SimpleTestCase): return json.dumps({"foo": "bar"}) response = JsonResponse({}, encoder=CustomDjangoJSONEncoder) - self.assertEqual(json.loads(response.content.decode()), {"foo": "bar"}) + self.assertEqual(json.loads(response.text), {"foo": "bar"}) def test_json_response_passing_arguments_to_json_dumps(self): response = JsonResponse({"foo": "bar"}, json_dumps_params={"indent": 2}) - self.assertEqual(response.content.decode(), '{\n "foo": "bar"\n}') + self.assertEqual(response.text, '{\n "foo": "bar"\n}') class StreamingHttpResponseTests(SimpleTestCase): @@ -756,6 +793,13 @@ class StreamingHttpResponseTests(SimpleTestCase): with self.assertWarnsMessage(Warning, msg): self.assertEqual(b"hello", await anext(aiter(r))) + def test_text_attribute_error(self): + r = StreamingHttpResponse(iter(["hello", "world"])) + msg = "This %s instance has no `text` attribute." % r.__class__.__name__ + + with self.assertRaisesMessage(AttributeError, msg): + r.text + class FileCloseTests(SimpleTestCase): def setUp(self): diff --git a/tests/invalid_models_tests/test_ordinary_fields.py b/tests/invalid_models_tests/test_ordinary_fields.py index e30d411138..1fcf3f708d 100644 --- a/tests/invalid_models_tests/test_ordinary_fields.py +++ b/tests/invalid_models_tests/test_ordinary_fields.py @@ -1207,6 +1207,23 @@ class InvalidDBDefaultTests(TestCase): expected_error = Error(msg=msg, obj=field, id="fields.E012") self.assertEqual(errors, [expected_error]) + def test_literals_not_treated_as_expressions(self): + """ + DatabaseFeatures.supports_expression_defaults = False shouldn't + prevent non-expression literals (integer, float, boolean, etc.) from + being used as database defaults. + """ + + class Model(models.Model): + field = models.FloatField(db_default=1.0) + + field = Model._meta.get_field("field") + with unittest.mock.patch.object( + connection.features, "supports_expression_defaults", False + ): + errors = field.check(databases=self.databases) + self.assertEqual(errors, []) + @isolate_apps("invalid_models_tests") class GeneratedFieldTests(TestCase): diff --git a/tests/mail/tests.py b/tests/mail/tests.py index 6280bfa5c8..302b746245 100644 --- a/tests/mail/tests.py +++ b/tests/mail/tests.py @@ -17,6 +17,7 @@ from unittest import mock, skipUnless from django.core import mail from django.core.mail import ( DNS_NAME, + BadHeaderError, EmailAlternative, EmailAttachment, EmailMessage, @@ -27,7 +28,7 @@ from django.core.mail import ( send_mass_mail, ) from django.core.mail.backends import console, dummy, filebased, locmem, smtp -from django.core.mail.message import BadHeaderError, sanitize_address +from django.core.mail.message import sanitize_address from django.test import SimpleTestCase, override_settings from django.test.utils import requires_tz_support from django.utils.translation import gettext_lazy @@ -45,7 +46,7 @@ class HeadersCheckMixin: """ Asserts that the `message` has all `headers`. - message: can be an instance of an email.Message subclass or a string + message: can be an instance of an email.Message subclass or bytes with the contents of an email message. headers: should be a set of (header-name, header-value) tuples. """ @@ -323,9 +324,9 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): ["Name\nInjection test "], ).message() - def test_space_continuation(self): + def test_folding_white_space(self): """ - Test for space continuation character in long (ASCII) subject headers (#7747) + Test for correct use of "folding white space" in long headers (#7747) """ email = EmailMessage( "Long subject lines that get wrapped should contain a space continuation " @@ -347,24 +348,12 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): default values (#9233) """ headers = {"date": "Fri, 09 Nov 2001 01:08:47 -0000", "Message-ID": "foo"} - email = EmailMessage( - "subject", - "content", - "from@example.com", - ["to@example.com"], - headers=headers, - ) + email = EmailMessage(headers=headers) self.assertMessageHasHeaders( email.message(), { - ("Content-Transfer-Encoding", "7bit"), - ("Content-Type", 'text/plain; charset="utf-8"'), - ("From", "from@example.com"), - ("MIME-Version", "1.0"), ("Message-ID", "foo"), - ("Subject", "subject"), - ("To", "to@example.com"), ("date", "Fri, 09 Nov 2001 01:08:47 -0000"), }, ) @@ -374,10 +363,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): Make sure we can manually set the From header (#9214) """ email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["to@example.com"], + from_email="bounce@example.com", headers={"From": "from@example.com"}, ) message = email.message() @@ -388,10 +374,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): Make sure we can manually set the To header (#17444) """ email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["list-subscriber@example.com", "list-subscriber2@example.com"], + to=["list-subscriber@example.com", "list-subscriber2@example.com"], headers={"To": "mailing-list@example.com"}, ) message = email.message() @@ -403,10 +386,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): # If we don't set the To header manually, it should default to the `to` # argument to the constructor. email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["list-subscriber@example.com", "list-subscriber2@example.com"], + to=["list-subscriber@example.com", "list-subscriber2@example.com"], ) message = email.message() self.assertEqual( @@ -419,9 +399,6 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_to_in_headers_only(self): message = EmailMessage( - "Subject", - "Content", - "bounce@example.com", headers={"To": "to@example.com"}, ).message() self.assertEqual(message.get_all("To"), ["to@example.com"]) @@ -431,10 +408,6 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): Specifying 'Reply-To' in headers should override reply_to. """ email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["to@example.com"], reply_to=["foo@example.com"], headers={"Reply-To": "override@example.com"}, ) @@ -443,10 +416,6 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_reply_to_in_headers_only(self): message = EmailMessage( - "Subject", - "Content", - "from@example.com", - ["to@example.com"], headers={"Reply-To": "reply_to@example.com"}, ).message() self.assertEqual(message.get_all("Reply-To"), ["reply_to@example.com"]) @@ -457,10 +426,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): calling EmailMessage.message() """ email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["to@example.com"], + from_email="bounce@example.com", headers={"From": "from@example.com"}, ) message = email.message() @@ -475,20 +441,15 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): regards to commas) """ email = EmailMessage( - "Subject", - "Content", - "from@example.com", - ['"Firstname Sürname" ', "other@example.com"], + to=['"Firstname Sürname" ', "other@example.com"], ) self.assertEqual( email.message()["To"], "=?utf-8?q?Firstname_S=C3=BCrname?= , other@example.com", ) + email = EmailMessage( - "Subject", - "Content", - "from@example.com", - ['"Sürname, Firstname" ', "other@example.com"], + to=['"Sürname, Firstname" ', "other@example.com"], ) self.assertEqual( email.message()["To"], @@ -497,10 +458,8 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_unicode_headers(self): email = EmailMessage( - "Gżegżółka", - "Content", - "from@example.com", - ["to@example.com"], + subject="Gżegżółka", + to=["to@example.com"], headers={ "Sender": '"Firstname Sürname" ', "Comments": "My Sürname is non-ASCII", @@ -515,13 +474,14 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): message["Comments"], "=?utf-8?q?My_S=C3=BCrname_is_non-ASCII?=" ) - def test_safe_mime_multipart(self): + def test_non_utf8_headers_multipart(self): """ Make sure headers can be set with a different encoding than utf-8 in - SafeMIMEMultipart as well + EmailMultiAlternatives as well. """ headers = {"Date": "Fri, 09 Nov 2001 01:08:47 -0000", "Message-ID": "foo"} - from_email, to = "from@example.com", '"Sürname, Firstname" ' + from_email = "from@example.com" + to = '"Sürname, Firstname" ' text_content = "This is an important message." html_content = "

This is an important message.

" msg = EmailMultiAlternatives( @@ -542,7 +502,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): "=?iso-8859-1?q?Message_from_Firstname_S=FCrname?=", ) - def test_safe_mime_multipart_with_attachments(self): + def test_multipart_with_attachments(self): """ EmailMultiAlternatives includes alternatives if the body is empty and it has attachments. @@ -611,9 +571,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): @mock.patch("socket.getfqdn", return_value="漢字") def test_non_ascii_dns_non_unicode_email(self, mocked_getfqdn): delattr(DNS_NAME, "_fqdn") - email = EmailMessage( - "subject", "content", "from@example.com", ["to@example.com"] - ) + email = EmailMessage() email.encoding = "iso-8859-1" self.assertIn("@xn--p8s937b>", email.message()["Message-ID"]) @@ -622,12 +580,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): Regression for #12791 - Encode body correctly with other encodings than utf-8 """ - email = EmailMessage( - "Subject", - "Firstname Sürname is a great guy.", - "from@example.com", - ["other@example.com"], - ) + email = EmailMessage(body="Firstname Sürname is a great guy.") email.encoding = "iso-8859-1" message = email.message() self.assertMessageHasHeaders( @@ -636,25 +589,27 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): ("MIME-Version", "1.0"), ("Content-Type", 'text/plain; charset="iso-8859-1"'), ("Content-Transfer-Encoding", "quoted-printable"), - ("Subject", "Subject"), - ("From", "from@example.com"), - ("To", "other@example.com"), }, ) self.assertEqual(message.get_payload(), "Firstname S=FCrname is a great guy.") - # MIME attachments works correctly with other encodings than utf-8. + def test_encoding_alternatives(self): + """ + Encode alternatives correctly with other encodings than utf-8. + """ text_content = "Firstname Sürname is a great guy." html_content = "

Firstname Sürname is a great guy.

" - msg = EmailMultiAlternatives( - "Subject", text_content, "from@example.com", ["to@example.com"] - ) - msg.encoding = "iso-8859-1" - msg.attach_alternative(html_content, "text/html") - payload0 = msg.message().get_payload(0) + email = EmailMultiAlternatives(body=text_content) + email.encoding = "iso-8859-1" + email.attach_alternative(html_content, "text/html") + message = email.message() + # Check the text/plain part. + payload0 = message.get_payload(0) self.assertMessageHasHeaders( payload0, { + # (The MIME-Version header is neither required nor meaningful + # in a subpart, and this check for it can be safely removed.) ("MIME-Version", "1.0"), ("Content-Type", 'text/plain; charset="iso-8859-1"'), ("Content-Transfer-Encoding", "quoted-printable"), @@ -663,10 +618,13 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): self.assertTrue( payload0.as_bytes().endswith(b"\n\nFirstname S=FCrname is a great guy.") ) - payload1 = msg.message().get_payload(1) + # Check the text/html alternative. + payload1 = message.get_payload(1) self.assertMessageHasHeaders( payload1, { + # (The MIME-Version header is neither required nor meaningful + # in a subpart, and this check for it can be safely removed.) ("MIME-Version", "1.0"), ("Content-Type", 'text/html; charset="iso-8859-1"'), ("Content-Transfer-Encoding", "quoted-printable"), @@ -739,15 +697,23 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): attachments = self.get_decoded_attachments(msg) self.assertEqual(attachments[0], (file_name, file_content.encode(), mime_type)) - def test_decoded_attachments(self): - """Regression test for #9367""" - headers = {"Date": "Fri, 09 Nov 2001 01:08:47 -0000", "Message-ID": "foo"} - subject, from_email, to = "hello", "from@example.com", "to@example.com" + def test_attachments_constructor_omit_mimetype(self): + """ + The mimetype can be omitted from an attachment tuple. + """ + msg = EmailMessage(attachments=[("filename1", "content1")]) + filename, content, mimetype = self.get_decoded_attachments(msg)[0] + self.assertEqual(filename, "filename1") + self.assertEqual(content, b"content1") + self.assertEqual(mimetype, "application/octet-stream") + + def test_attachments_with_alternative_parts(self): + """ + Message with attachment and alternative has correct structure (#9367). + """ text_content = "This is an important message." html_content = "

This is an important message.

" - msg = EmailMultiAlternatives( - subject, text_content, from_email, [to], headers=headers - ) + msg = EmailMultiAlternatives(body=text_content) msg.attach_alternative(html_content, "text/html") msg.attach("an attachment.pdf", b"%PDF-1.4.%...", mimetype="application/pdf") msg_bytes = msg.message().as_bytes() @@ -759,13 +725,6 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): self.assertEqual(payload[0].get_content_type(), "multipart/alternative") self.assertEqual(payload[1].get_content_type(), "application/pdf") - def test_decoded_attachments_two_tuple(self): - msg = EmailMessage(attachments=[("filename1", "content1")]) - filename, content, mimetype = self.get_decoded_attachments(msg)[0] - self.assertEqual(filename, "filename1") - self.assertEqual(content, b"content1") - self.assertEqual(mimetype, "application/octet-stream") - def test_decoded_attachments_MIMEText(self): txt = MIMEText("content1") msg = EmailMessage(attachments=[txt]) @@ -774,10 +733,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_non_ascii_attachment_filename(self): """Regression test for #14964""" - headers = {"Date": "Fri, 09 Nov 2001 01:08:47 -0000", "Message-ID": "foo"} - subject, from_email, to = "hello", "from@example.com", "to@example.com" - content = "This is the message." - msg = EmailMessage(subject, content, from_email, [to], headers=headers) + msg = EmailMessage(body="Content") # Unicode in file name msg.attach("une pièce jointe.pdf", b"%PDF-1.4.%...", mimetype="application/pdf") msg_bytes = msg.message().as_bytes() @@ -788,8 +744,8 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_attach_file(self): """ Test attaching a file against different mimetypes and make sure that - a file will be attached and sent properly even if an invalid mimetype - is specified. + a file will be attached and sent in some form even if a mismatched + mimetype is specified. """ files = ( # filename, actual mimetype @@ -805,25 +761,38 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): for basename, real_mimetype in files: for mimetype in test_mimetypes: - email = EmailMessage( - "subject", "body", "from@example.com", ["to@example.com"] - ) self.assertEqual(mimetypes.guess_type(basename)[0], real_mimetype) - self.assertEqual(email.attachments, []) - file_path = os.path.join( - os.path.dirname(__file__), "attachments", basename + expected_mimetype = ( + mimetype or real_mimetype or "application/octet-stream" ) + file_path = Path(__file__).parent / "attachments" / basename + expected_content = file_path.read_bytes() + if expected_mimetype.startswith("text/"): + try: + expected_content = expected_content.decode() + except UnicodeDecodeError: + expected_mimetype = "application/octet-stream" + + email = EmailMessage() email.attach_file(file_path, mimetype=mimetype) + + # Check EmailMessage.attachments. self.assertEqual(len(email.attachments), 1) - self.assertIn(basename, email.attachments[0]) - msgs_sent_num = email.send() - self.assertEqual(msgs_sent_num, 1) + self.assertEqual(email.attachments[0].filename, basename) + self.assertEqual(email.attachments[0].mimetype, expected_mimetype) + self.assertEqual(email.attachments[0].content, expected_content) + + # Check attachments in generated message. + # (The actual content is not checked as variations in platform + # line endings and rfc822 refolding complicate the logic.) + actual_attachment = self.get_decoded_attachments(email)[0] + actual_filename, actual_content, actual_mimetype = actual_attachment + self.assertEqual(actual_filename, basename) + self.assertEqual(actual_mimetype, expected_mimetype) def test_attach_text_as_bytes(self): - msg = EmailMessage("subject", "body", "from@example.com", ["to@example.com"]) + msg = EmailMessage() msg.attach("file.txt", b"file content") - sent_num = msg.send() - self.assertEqual(sent_num, 1) filename, content, mimetype = self.get_decoded_attachments(msg)[0] self.assertEqual(filename, "file.txt") self.assertEqual(content, b"file content") @@ -832,9 +801,9 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_attach_utf8_text_as_bytes(self): """ Non-ASCII characters encoded as valid UTF-8 are correctly transported - and decoded. + in a form that can be decoded at the receiving end. """ - msg = EmailMessage("subject", "body", "from@example.com", ["to@example.com"]) + msg = EmailMessage() msg.attach("file.txt", b"\xc3\xa4") # UTF-8 encoded a umlaut. filename, content, mimetype = self.get_decoded_attachments(msg)[0] self.assertEqual(filename, "file.txt") @@ -846,7 +815,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): Binary data that can't be decoded as UTF-8 overrides the MIME type instead of decoding the data. """ - msg = EmailMessage("subject", "body", "from@example.com", ["to@example.com"]) + msg = EmailMessage() msg.attach("file.txt", b"\xff") # Invalid UTF-8. filename, content, mimetype = self.get_decoded_attachments(msg)[0] self.assertEqual(filename, "file.txt") @@ -854,7 +823,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): self.assertEqual(content, b"\xff") self.assertEqual(mimetype, "application/octet-stream") - def test_attach_mimetext_content_mimetype(self): + def test_attach_mimebase_prohibits_other_params(self): email_msg = EmailMessage() txt = MIMEText("content") msg = ( @@ -866,7 +835,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): with self.assertRaisesMessage(ValueError, msg): email_msg.attach(txt, mimetype="text/plain") - def test_attach_content_none(self): + def test_attach_content_is_required(self): email_msg = EmailMessage() msg = "content must be provided." with self.assertRaisesMessage(ValueError, msg): @@ -877,13 +846,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): Make sure that dummy backends returns correct number of sent messages """ connection = dummy.EmailBackend() - email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) + email = EmailMessage(to=["to@example.com"]) self.assertEqual(connection.send_messages([email, email, email]), 3) def test_arbitrary_keyword(self): @@ -898,13 +861,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): """Test custom backend defined in this suite.""" conn = mail.get_connection("mail.custombackend.EmailBackend") self.assertTrue(hasattr(conn, "test_outbox")) - email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) + email = EmailMessage(to=["to@example.com"]) conn.send_messages([email]) self.assertEqual(len(conn.test_outbox), 1) @@ -992,54 +949,31 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): def test_dont_mangle_from_in_body(self): # Regression for #13433 - Make sure that EmailMessage doesn't mangle # 'From ' in message body. - email = EmailMessage( - "Subject", - "From the future", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) + email = EmailMessage(body="From the future") self.assertNotIn(b">From the future", email.message().as_bytes()) - def test_dont_base64_encode(self): - # Ticket #3472 - # Shouldn't use Base64 encoding at all - msg = EmailMessage( - "Subject", - "UTF-8 encoded body", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) - self.assertIn(b"Content-Transfer-Encoding: 7bit", msg.message().as_bytes()) - - # Ticket #11212 - # Shouldn't use quoted printable, should detect it can represent - # content with 7 bit data. - msg = EmailMessage( - "Subject", - "Body with only ASCII characters.", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) + def test_body_content_transfer_encoding(self): + # Shouldn't use base64 or quoted-printable, instead should detect it + # can represent content with 7-bit data (#3472, #11212). + msg = EmailMessage(body="Body with only ASCII characters.") s = msg.message().as_bytes() self.assertIn(b"Content-Transfer-Encoding: 7bit", s) - # Shouldn't use quoted printable, should detect it can represent - # content with 8 bit data. - msg = EmailMessage( - "Subject", - "Body with latin characters: àáä.", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) + # Shouldn't use base64 or quoted-printable, instead should detect + # it can represent content with 8-bit data. + msg = EmailMessage(body="Body with latin characters: àáä.") s = msg.message().as_bytes() self.assertIn(b"Content-Transfer-Encoding: 8bit", s) + # The following test is left over from Python 2 and can be safely removed. + # 8bit CTE within a Unicode str is not meaningful, and Python's modern + # email api won't generate it. (The test still works with the legacy api.) s = msg.message().as_string() self.assertIn("Content-Transfer-Encoding: 8bit", s) + # Long body lines that require folding should use quoted-printable or base64, + # whichever is shorter. However, Python's legacy email API avoids re-folding + # non-ASCII text and just uses CTE 8bit. (The modern API would correctly choose + # base64 here. Any of these is deliverable.) msg = EmailMessage( "Subject", "Body with non latin characters: А Б В Г Д Е Ж Ѕ З И І К Л М Н О П.", @@ -1049,6 +983,7 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): ) s = msg.message().as_bytes() self.assertIn(b"Content-Transfer-Encoding: 8bit", s) + # The following test is left over from Python 2. s = msg.message().as_string() self.assertIn("Content-Transfer-Encoding: 8bit", s) @@ -1145,20 +1080,23 @@ class MailTests(HeadersCheckMixin, SimpleTestCase): ("A name ", "utf-8", "A name "), ('"A name" ', "ascii", "A name "), ('"A name" ', "utf-8", "A name "), - # Unicode addresses (supported per RFC-6532). - ("tó@example.com", "utf-8", "=?utf-8?b?dMOz?=@example.com"), + # Unicode addresses: IDNA encoded domain supported per RFC-5890. ("to@éxample.com", "utf-8", "to@xn--xample-9ua.com"), + # The next three cases should be removed when fixing #35713. + # (An 'encoded-word' localpart is prohibited by RFC-2047, and not + # supported by any known mail service.) + ("tó@example.com", "utf-8", "=?utf-8?b?dMOz?=@example.com"), ( ("Tó Example", "tó@example.com"), "utf-8", "=?utf-8?q?T=C3=B3_Example?= <=?utf-8?b?dMOz?=@example.com>", ), - # Unicode addresses with display names. ( "Tó Example ", "utf-8", "=?utf-8?q?T=C3=B3_Example?= <=?utf-8?b?dMOz?=@example.com>", ), + # IDNA addresses with display names. ( "To Example ", "ascii", @@ -1277,9 +1215,7 @@ class MailTimeZoneTests(SimpleTestCase): """ EMAIL_USE_LOCALTIME=False creates a datetime in UTC. """ - email = EmailMessage( - "Subject", "Body", "bounce@example.com", ["to@example.com"] - ) + email = EmailMessage() self.assertTrue(email.message()["Date"].endswith("-0000")) @override_settings( @@ -1289,9 +1225,7 @@ class MailTimeZoneTests(SimpleTestCase): """ EMAIL_USE_LOCALTIME=True creates a datetime in the local time zone. """ - email = EmailMessage( - "Subject", "Body", "bounce@example.com", ["to@example.com"] - ) + email = EmailMessage() self.assertTrue( email.message()["Date"].endswith("+0100") ) # Africa/Algiers is UTC+1 @@ -1410,12 +1344,8 @@ class BaseEmailBackendTests(HeadersCheckMixin): ) def test_send_many(self): - email1 = EmailMessage( - "Subject", "Content1", "from@example.com", ["to@example.com"] - ) - email2 = EmailMessage( - "Subject", "Content2", "from@example.com", ["to@example.com"] - ) + email1 = EmailMessage(to=["to-1@example.com"]) + email2 = EmailMessage(to=["to-2@example.com"]) # send_messages() may take a list or an iterator. emails_lists = ([email1, email2], iter((email1, email2))) for emails_list in emails_lists: @@ -1423,21 +1353,17 @@ class BaseEmailBackendTests(HeadersCheckMixin): self.assertEqual(num_sent, 2) messages = self.get_mailbox_content() self.assertEqual(len(messages), 2) - self.assertEqual(messages[0].get_payload(), "Content1") - self.assertEqual(messages[1].get_payload(), "Content2") + self.assertEqual(messages[0]["To"], "to-1@example.com") + self.assertEqual(messages[1]["To"], "to-2@example.com") self.flush_mailbox() def test_send_verbose_name(self): email = EmailMessage( - "Subject", - "Content", - '"Firstname Sürname" ', - ["to@example.com"], + from_email='"Firstname Sürname" ', + to=["to@example.com"], ) email.send() message = self.get_the_message() - self.assertEqual(message["subject"], "Subject") - self.assertEqual(message.get_payload(), "Content") self.assertEqual( message["from"], "=?utf-8?q?Firstname_S=C3=BCrname?= " ) @@ -1588,17 +1514,15 @@ class BaseEmailBackendTests(HeadersCheckMixin): """ self.assertTrue(send_mail("Subject", "Content", "from@öäü.com", ["to@öäü.com"])) message = self.get_the_message() - self.assertEqual(message.get("subject"), "Subject") self.assertEqual(message.get("from"), "from@xn--4ca9at.com") self.assertEqual(message.get("to"), "to@xn--4ca9at.com") self.flush_mailbox() m = EmailMessage( - "Subject", "Content", "from@öäü.com", ["to@öäü.com"], cc=["cc@öäü.com"] + from_email="from@öäü.com", to=["to@öäü.com"], cc=["cc@öäü.com"] ) m.send() message = self.get_the_message() - self.assertEqual(message.get("subject"), "Subject") self.assertEqual(message.get("from"), "from@xn--4ca9at.com") self.assertEqual(message.get("to"), "to@xn--4ca9at.com") self.assertEqual(message.get("cc"), "cc@xn--4ca9at.com") @@ -1609,7 +1533,6 @@ class BaseEmailBackendTests(HeadersCheckMixin): """ self.assertTrue(send_mail("Subject", "Content", "tester", ["django"])) message = self.get_the_message() - self.assertEqual(message.get("subject"), "Subject") self.assertEqual(message.get("from"), "tester") self.assertEqual(message.get("to"), "django") @@ -1625,10 +1548,8 @@ class BaseEmailBackendTests(HeadersCheckMixin): self.flush_mailbox() m = EmailMessage( - "Subject", - "Content", - _("tester"), - [_("to1"), _("to2")], + from_email=_("tester"), + to=[_("to1"), _("to2")], cc=[_("cc1"), _("cc2")], bcc=[_("bcc")], reply_to=[_("reply")], @@ -1691,13 +1612,7 @@ class LocmemBackendTests(BaseEmailBackendTests, SimpleTestCase): """ connection = locmem.EmailBackend() connection2 = locmem.EmailBackend() - email = EmailMessage( - "Subject", - "Content", - "bounce@example.com", - ["to@example.com"], - headers={"From": "from@example.com"}, - ) + email = EmailMessage(to=["to@example.com"]) connection.send_messages([email]) connection2.send_messages([email]) self.assertEqual(len(mail.outbox), 2) @@ -1712,8 +1627,6 @@ class LocmemBackendTests(BaseEmailBackendTests, SimpleTestCase): def test_outbox_not_mutated_after_send(self): email = EmailMessage( subject="correct subject", - body="test body", - from_email="from@example.com", to=["to@example.com"], ) email.send() @@ -2122,9 +2035,7 @@ class SMTPBackendTests(BaseEmailBackendTests, SMTPBackendTestsBase): # connection exception. backend.connection = mock.Mock(spec=object()) backend.open = lambda: None - email = EmailMessage( - "Subject", "Content", "from@example.com", ["to@example.com"] - ) + email = EmailMessage(to=["to@example.com"]) self.assertEqual(backend.send_messages([email]), 0) def test_send_messages_empty_list(self): diff --git a/tests/migration_test_data_persistence/tests.py b/tests/migration_test_data_persistence/tests.py index a04259bba1..ca044f310f 100644 --- a/tests/migration_test_data_persistence/tests.py +++ b/tests/migration_test_data_persistence/tests.py @@ -32,7 +32,7 @@ class MigrationDataPersistenceClassSetup(TransactionTestCase): @classmethod def setUpClass(cls): # Simulate another TransactionTestCase having just torn down. - call_command("flush", verbosity=0, interactive=False) + call_command("flush", verbosity=0, interactive=False, allow_cascade=True) super().setUpClass() cls.book = Book.objects.first() diff --git a/tests/migrations/test_autodetector.py b/tests/migrations/test_autodetector.py index d4345208ca..de62170eb3 100644 --- a/tests/migrations/test_autodetector.py +++ b/tests/migrations/test_autodetector.py @@ -2969,6 +2969,71 @@ class AutodetectorTests(BaseAutodetectorTests): ["CreateModel", "AddField", "AddIndex"], ) + def test_alter_constraint(self): + book_constraint = models.CheckConstraint( + condition=models.Q(title__contains="title"), + name="title_contains_title", + ) + book_altered_constraint = models.CheckConstraint( + condition=models.Q(title__contains="title"), + name="title_contains_title", + violation_error_code="error_code", + ) + author_altered_constraint = models.CheckConstraint( + condition=models.Q(name__contains="Bob"), + name="name_contains_bob", + violation_error_message="Name doesn't contain Bob", + ) + + book_check_constraint = copy.deepcopy(self.book) + book_check_constraint_with_error_message = copy.deepcopy(self.book) + author_name_check_constraint_with_error_message = copy.deepcopy( + self.author_name_check_constraint + ) + + book_check_constraint.options = {"constraints": [book_constraint]} + book_check_constraint_with_error_message.options = { + "constraints": [book_altered_constraint] + } + author_name_check_constraint_with_error_message.options = { + "constraints": [author_altered_constraint] + } + + changes = self.get_changes( + [self.author_name_check_constraint, book_check_constraint], + [ + author_name_check_constraint_with_error_message, + book_check_constraint_with_error_message, + ], + ) + + self.assertNumberMigrations(changes, "testapp", 1) + self.assertOperationTypes(changes, "testapp", 0, ["AlterConstraint"]) + self.assertOperationAttributes( + changes, + "testapp", + 0, + 0, + model_name="author", + name="name_contains_bob", + constraint=author_altered_constraint, + ) + + self.assertNumberMigrations(changes, "otherapp", 1) + self.assertOperationTypes(changes, "otherapp", 0, ["AlterConstraint"]) + self.assertOperationAttributes( + changes, + "otherapp", + 0, + 0, + model_name="book", + name="title_contains_title", + constraint=book_altered_constraint, + ) + self.assertMigrationDependencies( + changes, "otherapp", 0, [("testapp", "auto_1")] + ) + def test_remove_constraints(self): """Test change detection of removed constraints.""" changes = self.get_changes( @@ -2981,6 +3046,43 @@ class AutodetectorTests(BaseAutodetectorTests): changes, "testapp", 0, 0, model_name="author", name="name_contains_bob" ) + def test_constraint_dropped_and_recreated(self): + altered_constraint = models.CheckConstraint( + condition=models.Q(name__contains="bob"), + name="name_contains_bob", + ) + author_name_check_constraint_lowercased = copy.deepcopy( + self.author_name_check_constraint + ) + author_name_check_constraint_lowercased.options = { + "constraints": [altered_constraint] + } + changes = self.get_changes( + [self.author_name_check_constraint], + [author_name_check_constraint_lowercased], + ) + + self.assertNumberMigrations(changes, "testapp", 1) + self.assertOperationTypes( + changes, "testapp", 0, ["RemoveConstraint", "AddConstraint"] + ) + self.assertOperationAttributes( + changes, + "testapp", + 0, + 0, + model_name="author", + name="name_contains_bob", + ) + self.assertOperationAttributes( + changes, + "testapp", + 0, + 1, + model_name="author", + constraint=altered_constraint, + ) + def test_add_unique_together(self): """Tests unique_together detection.""" changes = self.get_changes( diff --git a/tests/migrations/test_commands.py b/tests/migrations/test_commands.py index cab2906ed1..724c88a28f 100644 --- a/tests/migrations/test_commands.py +++ b/tests/migrations/test_commands.py @@ -9,6 +9,10 @@ from unittest import mock from django.apps import apps from django.core.management import CommandError, call_command +from django.core.management.commands.makemigrations import ( + Command as MakeMigrationsCommand, +) +from django.core.management.commands.migrate import Command as MigrateCommand from django.db import ( ConnectionHandler, DatabaseError, @@ -19,10 +23,11 @@ from django.db import ( ) from django.db.backends.base.schema import BaseDatabaseSchemaEditor from django.db.backends.utils import truncate_name +from django.db.migrations.autodetector import MigrationAutodetector from django.db.migrations.exceptions import InconsistentMigrationHistory from django.db.migrations.recorder import MigrationRecorder from django.test import TestCase, override_settings, skipUnlessDBFeature -from django.test.utils import captured_stdout, extend_sys_path +from django.test.utils import captured_stdout, extend_sys_path, isolate_apps from django.utils import timezone from django.utils.version import get_docs_version @@ -3296,3 +3301,59 @@ class OptimizeMigrationTests(MigrationTestBase): msg = "Cannot find a migration matching 'nonexistent' from app 'migrations'." with self.assertRaisesMessage(CommandError, msg): call_command("optimizemigration", "migrations", "nonexistent") + + +class CustomMigrationCommandTests(MigrationTestBase): + @override_settings( + MIGRATION_MODULES={"migrations": "migrations.test_migrations"}, + INSTALLED_APPS=["migrations.migrations_test_apps.migrated_app"], + ) + @isolate_apps("migrations.migrations_test_apps.migrated_app") + def test_makemigrations_custom_autodetector(self): + class CustomAutodetector(MigrationAutodetector): + def changes(self, *args, **kwargs): + return [] + + class CustomMakeMigrationsCommand(MakeMigrationsCommand): + autodetector = CustomAutodetector + + class NewModel(models.Model): + class Meta: + app_label = "migrated_app" + + out = io.StringIO() + command = CustomMakeMigrationsCommand(stdout=out) + call_command(command, "migrated_app", stdout=out) + self.assertIn("No changes detected", out.getvalue()) + + @override_settings(INSTALLED_APPS=["migrations.migrations_test_apps.migrated_app"]) + @isolate_apps("migrations.migrations_test_apps.migrated_app") + def test_migrate_custom_autodetector(self): + class CustomAutodetector(MigrationAutodetector): + def changes(self, *args, **kwargs): + return [] + + class CustomMigrateCommand(MigrateCommand): + autodetector = CustomAutodetector + + class NewModel(models.Model): + class Meta: + app_label = "migrated_app" + + out = io.StringIO() + command = CustomMigrateCommand(stdout=out) + + out = io.StringIO() + try: + call_command(command, verbosity=0) + call_command(command, stdout=out, no_color=True) + command_stdout = out.getvalue().lower() + self.assertEqual( + "operations to perform:\n" + " apply all migrations: migrated_app\n" + "running migrations:\n" + " no migrations to apply.\n", + command_stdout, + ) + finally: + call_command(command, "migrated_app", "zero", verbosity=0) diff --git a/tests/migrations/test_operations.py b/tests/migrations/test_operations.py index 3ac813b899..da0ec93dcd 100644 --- a/tests/migrations/test_operations.py +++ b/tests/migrations/test_operations.py @@ -4366,6 +4366,81 @@ class OperationTests(OperationTestBase): {"model_name": "Pony", "name": "test_remove_constraint_pony_pink_gt_2"}, ) + def test_alter_constraint(self): + constraint = models.UniqueConstraint( + fields=["pink"], name="test_alter_constraint_pony_fields_uq" + ) + project_state = self.set_up_test_model( + "test_alterconstraint", constraints=[constraint] + ) + + new_state = project_state.clone() + violation_error_message = "Pink isn't unique" + uq_constraint = models.UniqueConstraint( + fields=["pink"], + name="test_alter_constraint_pony_fields_uq", + violation_error_message=violation_error_message, + ) + uq_operation = migrations.AlterConstraint( + "Pony", "test_alter_constraint_pony_fields_uq", uq_constraint + ) + self.assertEqual( + uq_operation.describe(), + "Alter constraint test_alter_constraint_pony_fields_uq on Pony", + ) + self.assertEqual( + uq_operation.formatted_description(), + "~ Alter constraint test_alter_constraint_pony_fields_uq on Pony", + ) + self.assertEqual( + uq_operation.migration_name_fragment, + "alter_pony_test_alter_constraint_pony_fields_uq", + ) + + uq_operation.state_forwards("test_alterconstraint", new_state) + self.assertEqual( + project_state.models["test_alterconstraint", "pony"] + .options["constraints"][0] + .violation_error_message, + "Constraint “%(name)s” is violated.", + ) + self.assertEqual( + new_state.models["test_alterconstraint", "pony"] + .options["constraints"][0] + .violation_error_message, + violation_error_message, + ) + + with connection.schema_editor() as editor, self.assertNumQueries(0): + uq_operation.database_forwards( + "test_alterconstraint", editor, project_state, new_state + ) + self.assertConstraintExists( + "test_alterconstraint_pony", + "test_alter_constraint_pony_fields_uq", + value=False, + ) + with connection.schema_editor() as editor, self.assertNumQueries(0): + uq_operation.database_backwards( + "test_alterconstraint", editor, project_state, new_state + ) + self.assertConstraintExists( + "test_alterconstraint_pony", + "test_alter_constraint_pony_fields_uq", + value=False, + ) + definition = uq_operation.deconstruct() + self.assertEqual(definition[0], "AlterConstraint") + self.assertEqual(definition[1], []) + self.assertEqual( + definition[2], + { + "model_name": "Pony", + "name": "test_alter_constraint_pony_fields_uq", + "constraint": uq_constraint, + }, + ) + def test_add_partial_unique_constraint(self): project_state = self.set_up_test_model("test_addpartialuniqueconstraint") partial_unique_constraint = models.UniqueConstraint( diff --git a/tests/migrations/test_optimizer.py b/tests/migrations/test_optimizer.py index 0a40b50edc..a871e67a45 100644 --- a/tests/migrations/test_optimizer.py +++ b/tests/migrations/test_optimizer.py @@ -1232,6 +1232,80 @@ class OptimizerTests(OptimizerTestBase): ], ) + def test_multiple_alter_constraints(self): + gt_constraint_violation_msg_added = models.CheckConstraint( + condition=models.Q(pink__gt=2), + name="pink_gt_2", + violation_error_message="ERROR", + ) + gt_constraint_violation_msg_altered = models.CheckConstraint( + condition=models.Q(pink__gt=2), + name="pink_gt_2", + violation_error_message="error", + ) + self.assertOptimizesTo( + [ + migrations.AlterConstraint( + "Pony", "pink_gt_2", gt_constraint_violation_msg_added + ), + migrations.AlterConstraint( + "Pony", "pink_gt_2", gt_constraint_violation_msg_altered + ), + ], + [ + migrations.AlterConstraint( + "Pony", "pink_gt_2", gt_constraint_violation_msg_altered + ) + ], + ) + other_constraint_violation_msg = models.CheckConstraint( + condition=models.Q(weight__gt=3), + name="pink_gt_3", + violation_error_message="error", + ) + self.assertDoesNotOptimize( + [ + migrations.AlterConstraint( + "Pony", "pink_gt_2", gt_constraint_violation_msg_added + ), + migrations.AlterConstraint( + "Pony", "pink_gt_3", other_constraint_violation_msg + ), + ] + ) + + def test_alter_remove_constraint(self): + self.assertOptimizesTo( + [ + migrations.AlterConstraint( + "Pony", + "pink_gt_2", + models.CheckConstraint( + condition=models.Q(pink__gt=2), name="pink_gt_2" + ), + ), + migrations.RemoveConstraint("Pony", "pink_gt_2"), + ], + [migrations.RemoveConstraint("Pony", "pink_gt_2")], + ) + + def test_add_alter_constraint(self): + constraint = models.CheckConstraint( + condition=models.Q(pink__gt=2), name="pink_gt_2" + ) + constraint_with_error = models.CheckConstraint( + condition=models.Q(pink__gt=2), + name="pink_gt_2", + violation_error_message="error", + ) + self.assertOptimizesTo( + [ + migrations.AddConstraint("Pony", constraint), + migrations.AlterConstraint("Pony", "pink_gt_2", constraint_with_error), + ], + [migrations.AddConstraint("Pony", constraint_with_error)], + ) + def test_create_model_add_index(self): self.assertOptimizesTo( [ diff --git a/tests/migrations/test_questioner.py b/tests/migrations/test_questioner.py index c1aebcb224..ec1013923b 100644 --- a/tests/migrations/test_questioner.py +++ b/tests/migrations/test_questioner.py @@ -61,10 +61,32 @@ class QuestionerHelperMethodsTests(SimpleTestCase): ) @mock.patch("builtins.input", side_effect=["bad code", "exit"]) - def test_questioner_no_default_bad_user_entry_code(self, mock_input): + def test_questioner_no_default_syntax_error(self, mock_input): with self.assertRaises(SystemExit): self.questioner._ask_default() - self.assertIn("Invalid input: ", self.prompt.getvalue()) + self.assertIn("SyntaxError: invalid syntax", self.prompt.getvalue()) + + @mock.patch("builtins.input", side_effect=["datetim", "exit"]) + def test_questioner_no_default_name_error(self, mock_input): + with self.assertRaises(SystemExit): + self.questioner._ask_default() + self.assertIn( + "NameError: name 'datetim' is not defined", self.prompt.getvalue() + ) + + @mock.patch("builtins.input", side_effect=["datetime.dat", "exit"]) + def test_questioner_no_default_attribute_error(self, mock_input): + with self.assertRaises(SystemExit): + self.questioner._ask_default() + self.assertIn( + "AttributeError: module 'datetime' has no attribute 'dat'", + self.prompt.getvalue(), + ) + + @mock.patch("builtins.input", side_effect=[KeyboardInterrupt()]) + def test_questioner_no_default_keyboard_interrupt(self, mock_input): + with self.assertRaises(KeyboardInterrupt): + self.questioner._ask_default() @mock.patch("builtins.input", side_effect=["", "n"]) def test_questioner_no_default_no_user_entry_boolean(self, mock_input): diff --git a/tests/queries/test_explain.py b/tests/queries/test_explain.py index 67440cb502..95ca913cfc 100644 --- a/tests/queries/test_explain.py +++ b/tests/queries/test_explain.py @@ -90,13 +90,24 @@ class ExplainTests(TestCase): ] if connection.features.is_postgresql_16: test_options.append({"generic_plan": True}) + if connection.features.is_postgresql_17: + test_options.append({"memory": True}) + test_options.append({"serialize": "TEXT", "analyze": True}) + test_options.append({"serialize": "text", "analyze": True}) + test_options.append({"serialize": "BINARY", "analyze": True}) + test_options.append({"serialize": "binary", "analyze": True}) for options in test_options: with self.subTest(**options), transaction.atomic(): with CaptureQueriesContext(connection) as captured_queries: qs.explain(format="text", **options) self.assertEqual(len(captured_queries), 1) for name, value in options.items(): - option = "{} {}".format(name.upper(), "true" if value else "false") + if isinstance(value, str): + option = "{} {}".format(name.upper(), value.upper()) + else: + option = "{} {}".format( + name.upper(), "true" if value else "false" + ) self.assertIn(option, captured_queries[0]["sql"]) @skipUnlessDBFeature("supports_select_union") diff --git a/tests/queries/test_qs_combinators.py b/tests/queries/test_qs_combinators.py index ad1017c8af..ba44b5ed87 100644 --- a/tests/queries/test_qs_combinators.py +++ b/tests/queries/test_qs_combinators.py @@ -1,7 +1,9 @@ import operator +from datetime import datetime from django.db import DatabaseError, NotSupportedError, connection from django.db.models import ( + DateTimeField, Exists, F, IntegerField, @@ -10,11 +12,21 @@ from django.db.models import ( Transform, Value, ) -from django.db.models.functions import Mod +from django.db.models.functions import Cast, Mod from django.test import TestCase, skipIfDBFeature, skipUnlessDBFeature from django.test.utils import CaptureQueriesContext -from .models import Author, Celebrity, ExtraInfo, Number, ReservedName +from .models import ( + Annotation, + Article, + Author, + Celebrity, + ExtraInfo, + Note, + Number, + ReservedName, + Tag, +) @skipUnlessDBFeature("supports_select_union") @@ -431,6 +443,39 @@ class QuerySetSetOperationTests(TestCase): [("c1", -10, "cb"), ("rn1", 10, "rn")], ) + def test_union_multiple_models_with_values_list_and_datetime_annotations(self): + gen_x = datetime(1966, 6, 6) + Article.objects.create(name="Bellatrix", created=gen_x) + column_names = ["name", "created", "order"] + qs1 = Article.objects.annotate(order=Value(1)).values_list(*column_names) + + gen_y = datetime(1991, 10, 10) + ReservedName.objects.create(name="Rigel", order=2) + qs2 = ReservedName.objects.annotate( + created=Cast(Value(gen_y), DateTimeField()) + ).values_list(*column_names) + + expected_result = [("Bellatrix", gen_x, 1), ("Rigel", gen_y, 2)] + self.assertEqual(list(qs1.union(qs2).order_by("order")), expected_result) + + def test_union_multiple_models_with_values_and_datetime_annotations(self): + gen_x = datetime(1966, 6, 6) + Article.objects.create(name="Bellatrix", created=gen_x) + column_names = ["name", "created", "order"] + qs1 = Article.objects.values(*column_names, order=Value(1)) + + gen_y = datetime(1991, 10, 10) + ReservedName.objects.create(name="Rigel", order=2) + qs2 = ReservedName.objects.values( + *column_names, created=Cast(Value(gen_y), DateTimeField()) + ) + + expected_result = [ + {"name": "Bellatrix", "created": gen_x, "order": 1}, + {"name": "Rigel", "created": gen_y, "order": 2}, + ] + self.assertEqual(list(qs1.union(qs2).order_by("order")), expected_result) + def test_union_in_subquery(self): ReservedName.objects.bulk_create( [ @@ -450,6 +495,27 @@ class QuerySetSetOperationTests(TestCase): [8, 1], ) + @skipUnlessDBFeature("supports_select_intersection") + def test_intersection_in_nested_subquery(self): + tag = Tag.objects.create(name="tag") + note = Note.objects.create(tag=tag) + annotation = Annotation.objects.create(tag=tag) + tags = Tag.objects.order_by() + tags = tags.filter(id=OuterRef("tag_id")).intersection( + tags.filter(id=OuterRef(OuterRef("tag_id"))) + ) + qs = Note.objects.filter( + Exists( + Annotation.objects.filter( + Exists(tags), + notes__in=OuterRef("pk"), + ) + ) + ) + self.assertIsNone(qs.first()) + annotation.notes.add(note) + self.assertEqual(qs.first(), note) + def test_union_in_subquery_related_outerref(self): e1 = ExtraInfo.objects.create(value=7, info="e3") e2 = ExtraInfo.objects.create(value=5, info="e2") diff --git a/tests/requirements/py3.txt b/tests/requirements/py3.txt index a9679af97c..f0e208a115 100644 --- a/tests/requirements/py3.txt +++ b/tests/requirements/py3.txt @@ -6,8 +6,8 @@ black docutils >= 0.19 geoip2 jinja2 >= 2.11.0 -numpy -Pillow >= 6.2.1 +numpy; python_version < '3.14' +Pillow >= 6.2.1; sys.platform != 'win32' or python_version < '3.14' # pylibmc/libmemcached can't be built on Windows. pylibmc; sys_platform != 'win32' pymemcache >= 3.4.0 diff --git a/tests/schema/tests.py b/tests/schema/tests.py index 33a4bc527b..935267c2d6 100644 --- a/tests/schema/tests.py +++ b/tests/schema/tests.py @@ -5223,6 +5223,51 @@ class SchemaTests(TransactionTestCase): ["schema_tag_slug_2c418ba3_like", "schema_tag_slug_key"], ) + @isolate_apps("schema") + @unittest.skipUnless(connection.vendor == "postgresql", "PostgreSQL specific") + def test_indexed_charfield_to_textfield(self): + class SimpleModel(Model): + field1 = CharField(max_length=10, db_index=True) + + class Meta: + app_label = "schema" + + with connection.schema_editor() as editor: + editor.create_model(SimpleModel) + self.assertEqual( + self.get_constraints_for_column(SimpleModel, "field1"), + [ + "schema_simplemodel_field1_f07a3d6a", + "schema_simplemodel_field1_f07a3d6a_like", + ], + ) + # Change to TextField. + old_field1 = SimpleModel._meta.get_field("field1") + new_field1 = TextField(db_index=True) + new_field1.set_attributes_from_name("field1") + with connection.schema_editor() as editor: + editor.alter_field(SimpleModel, old_field1, new_field1, strict=True) + self.assertEqual( + self.get_constraints_for_column(SimpleModel, "field1"), + [ + "schema_simplemodel_field1_f07a3d6a", + "schema_simplemodel_field1_f07a3d6a_like", + ], + ) + # Change back to CharField. + old_field1 = SimpleModel._meta.get_field("field1") + new_field1 = CharField(max_length=10, db_index=True) + new_field1.set_attributes_from_name("field1") + with connection.schema_editor() as editor: + editor.alter_field(SimpleModel, old_field1, new_field1, strict=True) + self.assertEqual( + self.get_constraints_for_column(SimpleModel, "field1"), + [ + "schema_simplemodel_field1_f07a3d6a", + "schema_simplemodel_field1_f07a3d6a_like", + ], + ) + def test_alter_field_add_index_to_integerfield(self): # Create the table and verify no initial indexes. with connection.schema_editor() as editor: diff --git a/tests/serializers/models/data.py b/tests/serializers/models/data.py index 212ea0e06f..b82e8b4b33 100644 --- a/tests/serializers/models/data.py +++ b/tests/serializers/models/data.py @@ -242,11 +242,15 @@ class SmallPKData(models.Model): data = models.SmallIntegerField(primary_key=True) -# class TextPKData(models.Model): -# data = models.TextField(primary_key=True) +class TextPKData(models.Model): + data = models.TextField(primary_key=True) -# class TimePKData(models.Model): -# data = models.TimeField(primary_key=True) + class Meta: + required_db_features = ["supports_index_on_text_field"] + + +class TimePKData(models.Model): + data = models.TimeField(primary_key=True) class UUIDData(models.Model): diff --git a/tests/serializers/test_data.py b/tests/serializers/test_data.py index 33ea3458de..808db41634 100644 --- a/tests/serializers/test_data.py +++ b/tests/serializers/test_data.py @@ -68,7 +68,9 @@ from .models import ( SmallPKData, Tag, TextData, + TextPKData, TimeData, + TimePKData, UniqueAnchor, UUIDData, UUIDDefaultData, @@ -386,11 +388,16 @@ The end.""", (pk_obj, 750, SmallPKData, 12), (pk_obj, 751, SmallPKData, -12), (pk_obj, 752, SmallPKData, 0), - # (pk_obj, 760, TextPKData, """This is a long piece of text. - # It contains line breaks. - # Several of them. - # The end."""), - # (pk_obj, 770, TimePKData, datetime.time(10, 42, 37)), + ( + pk_obj, + 760, + TextPKData, + """This is a long piece of text. + It contains line breaks. + Several of them. + The end.""", + ), + (pk_obj, 770, TimePKData, datetime.time(10, 42, 37)), (pk_obj, 791, UUIDData, uuid_obj), (fk_obj, 792, FKToUUID, uuid_obj), (pk_obj, 793, UUIDDefaultData, uuid_obj), @@ -428,6 +435,10 @@ if connection.features.interprets_empty_strings_as_nulls: ] +if not connection.features.supports_index_on_text_field: + test_data = [data for data in test_data if data[2] != TextPKData] + + class SerializerDataTests(TestCase): pass diff --git a/tests/serializers/tests.py b/tests/serializers/tests.py index 6ca0c15e04..420246db0b 100644 --- a/tests/serializers/tests.py +++ b/tests/serializers/tests.py @@ -155,7 +155,7 @@ class SerializersTestBase: if isinstance(stream, StringIO): self.assertEqual(string_data, stream.getvalue()) else: - self.assertEqual(string_data, stream.content.decode()) + self.assertEqual(string_data, stream.text) def test_serialize_specific_fields(self): obj = ComplexModel(field1="first", field2="second", field3="third") diff --git a/tests/shortcuts/tests.py b/tests/shortcuts/tests.py index 8e9c13d206..b80b8f5951 100644 --- a/tests/shortcuts/tests.py +++ b/tests/shortcuts/tests.py @@ -1,3 +1,5 @@ +from django.http.response import HttpResponseRedirectBase +from django.shortcuts import redirect from django.test import SimpleTestCase, override_settings from django.test.utils import require_jinja2 @@ -35,3 +37,22 @@ class RenderTests(SimpleTestCase): self.assertEqual(response.content, b"DTL\n") response = self.client.get("/render/using/?using=jinja2") self.assertEqual(response.content, b"Jinja2\n") + + +class RedirectTests(SimpleTestCase): + def test_redirect_response_status_code(self): + tests = [ + (True, False, 301), + (False, False, 302), + (False, True, 307), + (True, True, 308), + ] + for permanent, preserve_request, expected_status_code in tests: + with self.subTest(permanent=permanent, preserve_request=preserve_request): + response = redirect( + "/path/is/irrelevant/", + permanent=permanent, + preserve_request=preserve_request, + ) + self.assertIsInstance(response, HttpResponseRedirectBase) + self.assertEqual(response.status_code, expected_status_code) diff --git a/tests/sitemaps_tests/test_generic.py b/tests/sitemaps_tests/test_generic.py index dc998eec93..f0cd14699b 100644 --- a/tests/sitemaps_tests/test_generic.py +++ b/tests/sitemaps_tests/test_generic.py @@ -45,7 +45,7 @@ class GenericViewsSitemapTests(SitemapTestsBase): "%s\n" "" ) % expected - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_generic_sitemap_lastmod(self): test_model = TestModel.objects.first() @@ -61,7 +61,7 @@ class GenericViewsSitemapTests(SitemapTestsBase): self.base_url, test_model.pk, ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) self.assertEqual( response.headers["Last-Modified"], "Wed, 13 Mar 2013 10:00:00 GMT" ) @@ -89,4 +89,4 @@ class GenericViewsSitemapTests(SitemapTestsBase): http://example.com/simple/sitemap-generic.xml2013-03-13T10:00:00 """ - self.assertXMLEqual(response.content.decode("utf-8"), expected_content) + self.assertXMLEqual(response.text, expected_content) diff --git a/tests/sitemaps_tests/test_http.py b/tests/sitemaps_tests/test_http.py index 74d183a7b0..6ae7e0d7c4 100644 --- a/tests/sitemaps_tests/test_http.py +++ b/tests/sitemaps_tests/test_http.py @@ -29,7 +29,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_sitemap_not_callable(self): """A sitemap may not be callable.""" @@ -42,7 +42,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_paged_sitemap(self): """A sitemap may have multiple pages.""" @@ -54,7 +54,7 @@ class HTTPSitemapTests(SitemapTestsBase): """.format( self.base_url, date.today() ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings( TEMPLATES=[ @@ -76,7 +76,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_simple_sitemap_section(self): "A simple sitemap section can be rendered" @@ -92,7 +92,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_no_section(self): response = self.client.get("/simple/sitemap-simple2.xml") @@ -126,7 +126,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings( TEMPLATES=[ @@ -148,7 +148,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_sitemap_last_modified(self): "Last-Modified header is set correctly" @@ -268,7 +268,7 @@ class HTTPSitemapTests(SitemapTestsBase): "never0.5\n" "" ) % date.today() - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_sitemap_get_urls_no_site_1(self): """ @@ -316,7 +316,7 @@ class HTTPSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_x_robots_sitemap(self): response = self.client.get("/simple/index.xml") @@ -346,7 +346,7 @@ class HTTPSitemapTests(SitemapTestsBase): "never0.5\n" "" ).format(self.base_url, self.i18n_model.pk) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings(LANGUAGES=(("en", "English"), ("pt", "Portuguese"))) def test_alternate_i18n_sitemap_index(self): @@ -374,7 +374,7 @@ class HTTPSitemapTests(SitemapTestsBase): f"{expected_urls}\n" f"" ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings( LANGUAGES=(("en", "English"), ("pt", "Portuguese"), ("es", "Spanish")) @@ -404,7 +404,7 @@ class HTTPSitemapTests(SitemapTestsBase): f"{expected_urls}\n" f"" ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings(LANGUAGES=(("en", "English"), ("pt", "Portuguese"))) def test_alternate_i18n_sitemap_xdefault(self): @@ -434,7 +434,7 @@ class HTTPSitemapTests(SitemapTestsBase): f"{expected_urls}\n" f"" ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings(LANGUAGES=(("en", "English"), ("pt", "Portuguese"))) def test_language_for_item_i18n_sitemap(self): @@ -460,7 +460,7 @@ class HTTPSitemapTests(SitemapTestsBase): f"{expected_urls}\n" f"" ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings(LANGUAGES=(("en", "English"), ("pt", "Portuguese"))) def test_alternate_language_for_item_i18n_sitemap(self): @@ -500,7 +500,7 @@ class HTTPSitemapTests(SitemapTestsBase): f"{expected_urls}\n" f"" ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_sitemap_without_entries(self): response = self.client.get("/sitemap-without-entries/sitemap.xml") @@ -510,7 +510,7 @@ class HTTPSitemapTests(SitemapTestsBase): 'xmlns:xhtml="http://www.w3.org/1999/xhtml">\n\n' "" ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_callable_sitemod_partial(self): """ @@ -535,8 +535,8 @@ class HTTPSitemapTests(SitemapTestsBase): "http://example.com/location/\n" "" ) - self.assertXMLEqual(index_response.content.decode(), expected_content_index) - self.assertXMLEqual(sitemap_response.content.decode(), expected_content_sitemap) + self.assertXMLEqual(index_response.text, expected_content_index) + self.assertXMLEqual(sitemap_response.text, expected_content_sitemap) def test_callable_sitemod_full(self): """ @@ -566,8 +566,8 @@ class HTTPSitemapTests(SitemapTestsBase): "2014-03-13\n" "" ) - self.assertXMLEqual(index_response.content.decode(), expected_content_index) - self.assertXMLEqual(sitemap_response.content.decode(), expected_content_sitemap) + self.assertXMLEqual(index_response.text, expected_content_index) + self.assertXMLEqual(sitemap_response.text, expected_content_sitemap) def test_callable_sitemod_no_items(self): index_response = self.client.get("/callable-lastmod-no-items/index.xml") @@ -577,4 +577,4 @@ class HTTPSitemapTests(SitemapTestsBase): http://example.com/simple/sitemap-callable-lastmod.xml """ - self.assertXMLEqual(index_response.content.decode(), expected_content_index) + self.assertXMLEqual(index_response.text, expected_content_index) diff --git a/tests/sitemaps_tests/test_https.py b/tests/sitemaps_tests/test_https.py index 2eae71e4cc..a5369869f9 100644 --- a/tests/sitemaps_tests/test_https.py +++ b/tests/sitemaps_tests/test_https.py @@ -20,7 +20,7 @@ class HTTPSSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_secure_sitemap_section(self): "A secure sitemap section can be rendered" @@ -36,7 +36,7 @@ class HTTPSSitemapTests(SitemapTestsBase): self.base_url, date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) @override_settings(SECURE_PROXY_SSL_HEADER=False) @@ -54,7 +54,7 @@ class HTTPSDetectionSitemapTests(SitemapTestsBase): self.base_url.replace("http://", "https://"), date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) def test_sitemap_section_with_https_request(self): "A sitemap section requested in HTTPS is rendered with HTTPS links" @@ -70,4 +70,4 @@ class HTTPSDetectionSitemapTests(SitemapTestsBase): self.base_url.replace("http://", "https://"), date.today(), ) - self.assertXMLEqual(response.content.decode(), expected_content) + self.assertXMLEqual(response.text, expected_content) diff --git a/tests/template_backends/test_jinja2.py b/tests/template_backends/test_jinja2.py index 55c9299f85..508971f581 100644 --- a/tests/template_backends/test_jinja2.py +++ b/tests/template_backends/test_jinja2.py @@ -1,8 +1,9 @@ from pathlib import Path from unittest import mock, skipIf +from django.contrib.auth.models import User from django.template import TemplateSyntaxError -from django.test import RequestFactory +from django.test import RequestFactory, TestCase from .test_dummy import TemplateStringsTests @@ -135,3 +136,31 @@ class Jinja2Tests(TemplateStringsTests): self.assertEqual(len(debug["source_lines"]), 0) self.assertTrue(debug["name"].endswith("nonexistent.html")) self.assertIn("message", debug) + + +@skipIf(jinja2 is None, "this test requires jinja2") +class Jinja2SandboxTests(TestCase): + engine_class = Jinja2 + backend_name = "jinja2" + options = {"environment": "jinja2.sandbox.SandboxedEnvironment"} + + @classmethod + def setUpClass(cls): + super().setUpClass() + params = { + "DIRS": [], + "APP_DIRS": True, + "NAME": cls.backend_name, + "OPTIONS": cls.options, + } + cls.engine = cls.engine_class(params) + + def test_set_alters_data(self): + template = self.engine.from_string( + "{% set test = User.objects.create_superuser(" + "username='evil', email='a@b.com', password='xxx') %}" + "{{ test }}" + ) + with self.assertRaises(jinja2.exceptions.SecurityError): + template.render(context={"User": User}) + self.assertEqual(User.objects.count(), 0) diff --git a/tests/template_tests/templates/test_extends_block_error.html b/tests/template_tests/templates/test_extends_block_error.html index c4733747a2..8133c93ccd 100644 --- a/tests/template_tests/templates/test_extends_block_error.html +++ b/tests/template_tests/templates/test_extends_block_error.html @@ -1,2 +1,2 @@ {% extends "test_extends_block_error_parent.html" %} -{% block content %}{% include "missing.html" %}{% endblock %} +{% block content %}{% include "index.html" %}{% include "missing.html" %}{% include "index.html" %}{% endblock %} diff --git a/tests/template_tests/templatetags/custom.py b/tests/template_tests/templatetags/custom.py index 8d1130ae78..2c0a1b7f3f 100644 --- a/tests/template_tests/templatetags/custom.py +++ b/tests/template_tests/templatetags/custom.py @@ -20,6 +20,16 @@ def make_data_div(value): return '
' % value +@register.simple_block_tag +def div(content, id="test"): + return format_html("
{}
", id, content) + + +@register.simple_block_tag(end_name="divend") +def div_custom_end(content): + return format_html("
{}
", content) + + @register.filter def noop(value, param=None): """A noop filter that always return its first argument and does nothing with @@ -51,6 +61,12 @@ def one_param(arg): one_param.anything = "Expected one_param __dict__" +@register.simple_block_tag +def one_param_block(content, arg): + """Expected one_param_block __doc__""" + return f"one_param_block - Expected result: {arg} with content {content}" + + @register.simple_tag(takes_context=False) def explicit_no_context(arg): """Expected explicit_no_context __doc__""" @@ -60,6 +76,12 @@ def explicit_no_context(arg): explicit_no_context.anything = "Expected explicit_no_context __dict__" +@register.simple_block_tag(takes_context=False) +def explicit_no_context_block(content, arg): + """Expected explicit_no_context_block __doc__""" + return f"explicit_no_context_block - Expected result: {arg} with content {content}" + + @register.simple_tag(takes_context=True) def no_params_with_context(context): """Expected no_params_with_context __doc__""" @@ -72,6 +94,15 @@ def no_params_with_context(context): no_params_with_context.anything = "Expected no_params_with_context __dict__" +@register.simple_block_tag(takes_context=True) +def no_params_with_context_block(context, content): + """Expected no_params_with_context_block __doc__""" + return ( + "no_params_with_context_block - Expected result (context value: %s) " + "(content value: %s)" % (context["value"], content) + ) + + @register.simple_tag(takes_context=True) def params_and_context(context, arg): """Expected params_and_context __doc__""" @@ -84,6 +115,20 @@ def params_and_context(context, arg): params_and_context.anything = "Expected params_and_context __dict__" +@register.simple_block_tag(takes_context=True) +def params_and_context_block(context, content, arg): + """Expected params_and_context_block __doc__""" + return ( + "params_and_context_block - Expected result (context value: %s) " + "(content value: %s): %s" + % ( + context["value"], + content, + arg, + ) + ) + + @register.simple_tag def simple_two_params(one, two): """Expected simple_two_params __doc__""" @@ -93,16 +138,48 @@ def simple_two_params(one, two): simple_two_params.anything = "Expected simple_two_params __dict__" +@register.simple_block_tag +def simple_two_params_block(content, one, two): + """Expected simple_two_params_block __doc__""" + return "simple_two_params_block - Expected result (content value: %s): %s, %s" % ( + content, + one, + two, + ) + + @register.simple_tag def simple_keyword_only_param(*, kwarg): return "simple_keyword_only_param - Expected result: %s" % kwarg +@register.simple_block_tag +def simple_keyword_only_param_block(content, *, kwarg): + return ( + "simple_keyword_only_param_block - Expected result (content value: %s): %s" + % ( + content, + kwarg, + ) + ) + + @register.simple_tag def simple_keyword_only_default(*, kwarg=42): return "simple_keyword_only_default - Expected result: %s" % kwarg +@register.simple_block_tag +def simple_keyword_only_default_block(content, *, kwarg=42): + return ( + "simple_keyword_only_default_block - Expected result (content value: %s): %s" + % ( + content, + kwarg, + ) + ) + + @register.simple_tag def simple_one_default(one, two="hi"): """Expected simple_one_default __doc__""" @@ -112,6 +189,16 @@ def simple_one_default(one, two="hi"): simple_one_default.anything = "Expected simple_one_default __dict__" +@register.simple_block_tag +def simple_one_default_block(content, one, two="hi"): + """Expected simple_one_default_block __doc__""" + return "simple_one_default_block - Expected result (content value: %s): %s, %s" % ( + content, + one, + two, + ) + + @register.simple_tag def simple_unlimited_args(one, two="hi", *args): """Expected simple_unlimited_args __doc__""" @@ -123,6 +210,15 @@ def simple_unlimited_args(one, two="hi", *args): simple_unlimited_args.anything = "Expected simple_unlimited_args __dict__" +@register.simple_block_tag +def simple_unlimited_args_block(content, one, two="hi", *args): + """Expected simple_unlimited_args_block __doc__""" + return "simple_unlimited_args_block - Expected result (content value: %s): %s" % ( + content, + ", ".join(str(arg) for arg in [one, two, *args]), + ) + + @register.simple_tag def simple_only_unlimited_args(*args): """Expected simple_only_unlimited_args __doc__""" @@ -134,6 +230,18 @@ def simple_only_unlimited_args(*args): simple_only_unlimited_args.anything = "Expected simple_only_unlimited_args __dict__" +@register.simple_block_tag +def simple_only_unlimited_args_block(content, *args): + """Expected simple_only_unlimited_args_block __doc__""" + return ( + "simple_only_unlimited_args_block - Expected result (content value: %s): %s" + % ( + content, + ", ".join(str(arg) for arg in args), + ) + ) + + @register.simple_tag def simple_unlimited_args_kwargs(one, two="hi", *args, **kwargs): """Expected simple_unlimited_args_kwargs __doc__""" @@ -146,6 +254,38 @@ def simple_unlimited_args_kwargs(one, two="hi", *args, **kwargs): simple_unlimited_args_kwargs.anything = "Expected simple_unlimited_args_kwargs __dict__" +@register.simple_block_tag +def simple_unlimited_args_kwargs_block(content, one, two="hi", *args, **kwargs): + """Expected simple_unlimited_args_kwargs_block __doc__""" + return ( + "simple_unlimited_args_kwargs_block - Expected result (content value: %s): " + "%s / %s" + % ( + content, + ", ".join(str(arg) for arg in [one, two, *args]), + ", ".join("%s=%s" % (k, v) for (k, v) in kwargs.items()), + ) + ) + + +@register.simple_block_tag(takes_context=True) +def simple_block_tag_without_context_parameter(arg): + """Expected simple_block_tag_without_context_parameter __doc__""" + return "Expected result" + + +@register.simple_block_tag +def simple_tag_without_content_parameter(arg): + """Expected simple_tag_without_content_parameter __doc__""" + return "Expected result" + + +@register.simple_block_tag(takes_context=True) +def simple_tag_with_context_without_content_parameter(context, arg): + """Expected simple_tag_with_context_without_content_parameter __doc__""" + return "Expected result" + + @register.simple_tag(takes_context=True) def simple_tag_without_context_parameter(arg): """Expected simple_tag_without_context_parameter __doc__""" @@ -157,6 +297,12 @@ simple_tag_without_context_parameter.anything = ( ) +@register.simple_block_tag(takes_context=True) +def simple_tag_takes_context_without_params_block(): + """Expected simple_tag_takes_context_without_params_block __doc__""" + return "Expected result" + + @register.simple_tag(takes_context=True) def simple_tag_takes_context_without_params(): """Expected simple_tag_takes_context_without_params __doc__""" @@ -168,24 +314,52 @@ simple_tag_takes_context_without_params.anything = ( ) +@register.simple_block_tag +def simple_block_tag_without_content(): + return "Expected result" + + +@register.simple_block_tag(takes_context=True) +def simple_block_tag_with_context_without_content(): + return "Expected result" + + @register.simple_tag(takes_context=True) def escape_naive(context): """A tag that doesn't even think about escaping issues""" return "Hello {}!".format(context["name"]) +@register.simple_block_tag(takes_context=True) +def escape_naive_block(context, content): + """A block tag that doesn't even think about escaping issues""" + return "Hello {}: {}!".format(context["name"], content) + + @register.simple_tag(takes_context=True) def escape_explicit(context): """A tag that uses escape explicitly""" return escape("Hello {}!".format(context["name"])) +@register.simple_block_tag(takes_context=True) +def escape_explicit_block(context, content): + """A block tag that uses escape explicitly""" + return escape("Hello {}: {}!".format(context["name"], content)) + + @register.simple_tag(takes_context=True) def escape_format_html(context): """A tag that uses format_html""" return format_html("Hello {0}!", context["name"]) +@register.simple_block_tag(takes_context=True) +def escape_format_html_block(context, content): + """A block tag that uses format_html""" + return format_html("Hello {0}: {1}!", context["name"], content) + + @register.simple_tag(takes_context=True) def current_app(context): return str(context.current_app) diff --git a/tests/template_tests/test_context.py b/tests/template_tests/test_context.py index 6d8ee7a6e6..f71cf1ff25 100644 --- a/tests/template_tests/test_context.py +++ b/tests/template_tests/test_context.py @@ -1,3 +1,4 @@ +from copy import copy from unittest import mock from django.http import HttpRequest @@ -314,3 +315,10 @@ class RequestContextTests(SimpleTestCase): with self.assertRaisesMessage(TypeError, msg): with request_context.bind_template(Template("")): pass + + def test_context_copyable(self): + request_context = RequestContext(HttpRequest()) + request_context_copy = copy(request_context) + self.assertIsInstance(request_context_copy, RequestContext) + self.assertEqual(request_context_copy.dicts, request_context.dicts) + self.assertIsNot(request_context_copy.dicts, request_context.dicts) diff --git a/tests/template_tests/test_custom.py b/tests/template_tests/test_custom.py index 1697d16ef5..9ec27b481f 100644 --- a/tests/template_tests/test_custom.py +++ b/tests/template_tests/test_custom.py @@ -243,6 +243,343 @@ class SimpleTagTests(TagTestCase): ) +class SimpleBlockTagTests(TagTestCase): + def test_simple_block_tags(self): + c = Context({"value": 42}) + + templates = [ + ( + "{% load custom %}{% div %}content{% enddiv %}", + "
content
", + ), + ( + "{% load custom %}{% one_param_block 37 %}inner" + "{% endone_param_block %}", + "one_param_block - Expected result: 37 with content inner", + ), + ( + "{% load custom %}{% explicit_no_context_block 37 %}inner" + "{% endexplicit_no_context_block %}", + "explicit_no_context_block - Expected result: 37 with content inner", + ), + ( + "{% load custom %}{% no_params_with_context_block %}inner" + "{% endno_params_with_context_block %}", + "no_params_with_context_block - Expected result (context value: 42) " + "(content value: inner)", + ), + ( + "{% load custom %}{% params_and_context_block 37 %}inner" + "{% endparams_and_context_block %}", + "params_and_context_block - Expected result (context value: 42) " + "(content value: inner): 37", + ), + ( + "{% load custom %}{% simple_two_params_block 37 42 %}inner" + "{% endsimple_two_params_block %}", + "simple_two_params_block - Expected result (content value: inner): " + "37, 42", + ), + ( + "{% load custom %}{% simple_keyword_only_param_block kwarg=37 %}thirty " + "seven{% endsimple_keyword_only_param_block %}", + "simple_keyword_only_param_block - Expected result (content value: " + "thirty seven): 37", + ), + ( + "{% load custom %}{% simple_keyword_only_default_block %}forty two" + "{% endsimple_keyword_only_default_block %}", + "simple_keyword_only_default_block - Expected result (content value: " + "forty two): 42", + ), + ( + "{% load custom %}{% simple_keyword_only_default_block kwarg=37 %}" + "thirty seven{% endsimple_keyword_only_default_block %}", + "simple_keyword_only_default_block - Expected result (content value: " + "thirty seven): 37", + ), + ( + "{% load custom %}{% simple_one_default_block 37 %}inner" + "{% endsimple_one_default_block %}", + "simple_one_default_block - Expected result (content value: inner): " + "37, hi", + ), + ( + '{% load custom %}{% simple_one_default_block 37 two="hello" %}inner' + "{% endsimple_one_default_block %}", + "simple_one_default_block - Expected result (content value: inner): " + "37, hello", + ), + ( + '{% load custom %}{% simple_one_default_block one=99 two="hello" %}' + "inner{% endsimple_one_default_block %}", + "simple_one_default_block - Expected result (content value: inner): " + "99, hello", + ), + ( + "{% load custom %}{% simple_one_default_block 37 42 %}inner" + "{% endsimple_one_default_block %}", + "simple_one_default_block - Expected result (content value: inner): " + "37, 42", + ), + ( + "{% load custom %}{% simple_unlimited_args_block 37 %}thirty seven" + "{% endsimple_unlimited_args_block %}", + "simple_unlimited_args_block - Expected result (content value: thirty " + "seven): 37, hi", + ), + ( + "{% load custom %}{% simple_unlimited_args_block 37 42 56 89 %}numbers" + "{% endsimple_unlimited_args_block %}", + "simple_unlimited_args_block - Expected result " + "(content value: numbers): 37, 42, 56, 89", + ), + ( + "{% load custom %}{% simple_only_unlimited_args_block %}inner" + "{% endsimple_only_unlimited_args_block %}", + "simple_only_unlimited_args_block - Expected result (content value: " + "inner): ", + ), + ( + "{% load custom %}{% simple_only_unlimited_args_block 37 42 56 89 %}" + "numbers{% endsimple_only_unlimited_args_block %}", + "simple_only_unlimited_args_block - Expected result " + "(content value: numbers): 37, 42, 56, 89", + ), + ( + "{% load custom %}" + '{% simple_unlimited_args_kwargs_block 37 40|add:2 56 eggs="scrambled" ' + "four=1|add:3 %}inner content" + "{% endsimple_unlimited_args_kwargs_block %}", + "simple_unlimited_args_kwargs_block - Expected result (content value: " + "inner content): 37, 42, 56 / eggs=scrambled, four=4", + ), + ] + + for entry in templates: + with self.subTest(entry[0]): + t = self.engine.from_string(entry[0]) + self.assertEqual(t.render(c), entry[1]) + + def test_simple_block_tag_errors(self): + errors = [ + ( + "'simple_one_default_block' received unexpected keyword argument " + "'three'", + "{% load custom %}" + '{% simple_one_default_block 99 two="hello" three="foo" %}' + "{% endsimple_one_default_block %}", + ), + ( + "'simple_two_params_block' received too many positional arguments", + "{% load custom %}{% simple_two_params_block 37 42 56 %}" + "{% endsimple_two_params_block %}", + ), + ( + "'simple_one_default_block' received too many positional arguments", + "{% load custom %}{% simple_one_default_block 37 42 56 %}" + "{% endsimple_one_default_block %}", + ), + ( + "'simple_keyword_only_param_block' did not receive value(s) for the " + "argument(s): 'kwarg'", + "{% load custom %}{% simple_keyword_only_param_block %}" + "{% endsimple_keyword_only_param_block %}", + ), + ( + "'simple_keyword_only_param_block' received multiple values for " + "keyword argument 'kwarg'", + "{% load custom %}" + "{% simple_keyword_only_param_block kwarg=42 kwarg=37 %}" + "{% endsimple_keyword_only_param_block %}", + ), + ( + "'simple_keyword_only_default_block' received multiple values for " + "keyword argument 'kwarg'", + "{% load custom %}{% simple_keyword_only_default_block kwarg=42 " + "kwarg=37 %}{% endsimple_keyword_only_default_block %}", + ), + ( + "'simple_unlimited_args_kwargs_block' received some positional " + "argument(s) after some keyword argument(s)", + "{% load custom %}" + '{% simple_unlimited_args_kwargs_block 37 40|add:2 eggs="scrambled" 56 ' + "four=1|add:3 %}{% endsimple_unlimited_args_kwargs_block %}", + ), + ( + "'simple_unlimited_args_kwargs_block' received multiple values for " + "keyword argument 'eggs'", + "{% load custom %}" + "{% simple_unlimited_args_kwargs_block 37 " + 'eggs="scrambled" eggs="scrambled" %}' + "{% endsimple_unlimited_args_kwargs_block %}", + ), + ( + "Unclosed tag on line 1: 'div'. Looking for one of: enddiv.", + "{% load custom %}{% div %}Some content", + ), + ( + "Unclosed tag on line 1: 'simple_one_default_block'. Looking for one " + "of: endsimple_one_default_block.", + "{% load custom %}{% simple_one_default_block %}Some content", + ), + ( + "'simple_tag_without_content_parameter' must have a first argument " + "of 'content'", + "{% load custom %}{% simple_tag_without_content_parameter %}", + ), + ( + "'simple_tag_with_context_without_content_parameter' is decorated with " + "takes_context=True so it must have a first argument of 'context' and " + "a second argument of 'content'", + "{% load custom %}" + "{% simple_tag_with_context_without_content_parameter %}", + ), + ] + + for entry in errors: + with self.subTest(entry[1]): + with self.assertRaisesMessage(TemplateSyntaxError, entry[0]): + self.engine.from_string(entry[1]) + + def test_simple_block_tag_escaping_autoescape_off(self): + c = Context({"name": "Jack & Jill"}, autoescape=False) + t = self.engine.from_string( + "{% load custom %}{% escape_naive_block %}{{ name }} again" + "{% endescape_naive_block %}" + ) + self.assertEqual(t.render(c), "Hello Jack & Jill: Jack & Jill again!") + + def test_simple_block_tag_naive_escaping(self): + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}{% escape_naive_block %}{{ name }} again" + "{% endescape_naive_block %}" + ) + self.assertEqual( + t.render(c), "Hello Jack & Jill: Jack &amp; Jill again!" + ) + + def test_simple_block_tag_explicit_escaping(self): + # Check we don't double escape + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}{% escape_explicit_block %}again" + "{% endescape_explicit_block %}" + ) + self.assertEqual(t.render(c), "Hello Jack & Jill: again!") + + def test_simple_block_tag_format_html_escaping(self): + # Check we don't double escape + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}{% escape_format_html_block %}again" + "{% endescape_format_html_block %}" + ) + self.assertEqual(t.render(c), "Hello Jack & Jill: again!") + + def test_simple_block_tag_missing_context(self): + # The 'context' parameter must be present when takes_context is True + msg = ( + "'simple_block_tag_without_context_parameter' is decorated with " + "takes_context=True so it must have a first argument of 'context'" + ) + with self.assertRaisesMessage(TemplateSyntaxError, msg): + self.engine.from_string( + "{% load custom %}{% simple_block_tag_without_context_parameter 123 %}" + "{% endsimple_block_tag_without_context_parameter %}" + ) + + def test_simple_block_tag_missing_context_no_params(self): + msg = ( + "'simple_tag_takes_context_without_params_block' is decorated with " + "takes_context=True so it must have a first argument of 'context'" + ) + with self.assertRaisesMessage(TemplateSyntaxError, msg): + self.engine.from_string( + "{% load custom %}{% simple_tag_takes_context_without_params_block %}" + "{% endsimple_tag_takes_context_without_params_block %}" + ) + + def test_simple_block_tag_missing_content(self): + # The 'content' parameter must be present when takes_context is True + msg = ( + "'simple_block_tag_without_content' must have a first argument of 'content'" + ) + with self.assertRaisesMessage(TemplateSyntaxError, msg): + self.engine.from_string( + "{% load custom %}{% simple_block_tag_without_content %}" + "{% endsimple_block_tag_without_content %}" + ) + + def test_simple_block_tag_with_context_missing_content(self): + # The 'content' parameter must be present when takes_context is True + msg = "'simple_block_tag_with_context_without_content' is decorated with " + "takes_context=True so it must have a first argument of 'context' and a " + "second argument of 'content'" + with self.assertRaisesMessage(TemplateSyntaxError, msg): + self.engine.from_string( + "{% load custom %}{% simple_block_tag_with_context_without_content %}" + "{% endsimple_block_tag_with_context_without_content %}" + ) + + def test_simple_block_gets_context(self): + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string("{% load custom %}{% div %}{{ name }}{% enddiv %}") + self.assertEqual(t.render(c), "
Jack & Jill
") + + def test_simple_block_capture_as(self): + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}{% div as div_content %}{{ name }}{% enddiv %}" + "My div is: {{ div_content }}" + ) + self.assertEqual(t.render(c), "My div is:
Jack & Jill
") + + def test_simple_block_nested(self): + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}Start{% div id='outer' %}Before{% div id='inner' %}" + "{{ name }}{% enddiv %}After{% enddiv %}End" + ) + self.assertEqual( + t.render(c), + "Start
Before
Jack & Jill
After" + "
End", + ) + + def test_different_simple_block_nested(self): + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}Start{% div id='outer' %}Before" + "{% simple_keyword_only_default_block %}Inner" + "{% endsimple_keyword_only_default_block %}" + "After{% enddiv %}End" + ) + self.assertEqual( + t.render(c), + "Start
Before" + "simple_keyword_only_default_block - Expected result (content value: " + "Inner): 42After
End", + ) + + def test_custom_end_tag(self): + c = Context({"name": "Jack & Jill"}) + t = self.engine.from_string( + "{% load custom %}{% div_custom_end %}{{ name }}{% divend %}" + ) + self.assertEqual(t.render(c), "
Jack & Jill
") + + with self.assertRaisesMessage( + TemplateSyntaxError, + "'enddiv_custom_end', expected 'divend'. Did you forget to register or " + "load this tag?", + ): + self.engine.from_string( + "{% load custom %}{% div_custom_end %}{{ name }}{% enddiv_custom_end %}" + ) + + class InclusionTagTests(TagTestCase): def test_inclusion_tags(self): c = Context({"value": 42}) diff --git a/tests/template_tests/test_library.py b/tests/template_tests/test_library.py index 7376832879..98e9d228aa 100644 --- a/tests/template_tests/test_library.py +++ b/tests/template_tests/test_library.py @@ -120,6 +120,47 @@ class SimpleTagRegistrationTests(SimpleTestCase): self.assertTrue(hasattr(func_wrapped, "cache_info")) +class SimpleBlockTagRegistrationTests(SimpleTestCase): + def setUp(self): + self.library = Library() + + def test_simple_block_tag(self): + @self.library.simple_block_tag + def func(content): + return content + + self.assertIn("func", self.library.tags) + + def test_simple_block_tag_parens(self): + @self.library.simple_tag() + def func(content): + return content + + self.assertIn("func", self.library.tags) + + def test_simple_block_tag_name_kwarg(self): + @self.library.simple_block_tag(name="name") + def func(content): + return content + + self.assertIn("name", self.library.tags) + + def test_simple_block_tag_invalid(self): + msg = "Invalid arguments provided to simple_block_tag" + with self.assertRaisesMessage(ValueError, msg): + self.library.simple_block_tag("invalid") + + def test_simple_tag_wrapped(self): + @self.library.simple_block_tag + @functools.lru_cache(maxsize=32) + def func(content): + return content + + func_wrapped = self.library.tags["func"].__wrapped__ + self.assertIs(func_wrapped, func) + self.assertTrue(hasattr(func_wrapped, "cache_info")) + + class TagRegistrationTests(SimpleTestCase): def setUp(self): self.library = Library() diff --git a/tests/template_tests/tests.py b/tests/template_tests/tests.py index 14df81669b..7364c7ca64 100644 --- a/tests/template_tests/tests.py +++ b/tests/template_tests/tests.py @@ -5,7 +5,6 @@ from django.template.base import UNKNOWN_SOURCE from django.test import SimpleTestCase, override_settings from django.urls import NoReverseMatch from django.utils import translation -from django.utils.html import escape class TemplateTestMixin: @@ -158,9 +157,31 @@ class TemplateTestMixin: template.render(context) if self.debug_engine: self.assertEqual( - cm.exception.template_debug["during"], - escape('{% include "missing.html" %}'), + cm.exception.template_debug["before"], + '{% block content %}{% include "index.html" %}', ) + self.assertEqual( + cm.exception.template_debug["during"], + '{% include "missing.html" %}', + ) + self.assertEqual( + cm.exception.template_debug["after"], + '{% include "index.html" %}{% endblock %}\n', + ) + self.assertEqual( + cm.exception.template_debug["source_lines"][0], + (1, '{% extends "test_extends_block_error_parent.html" %}\n'), + ) + self.assertEqual( + cm.exception.template_debug["source_lines"][1], + ( + 2, + '{% block content %}{% include "index.html" %}' + '{% include "missing.html" %}' + '{% include "index.html" %}{% endblock %}\n', + ), + ) + self.assertEqual(cm.exception.template_debug["source_lines"][2], (3, "")) def test_super_errors(self): """ diff --git a/tests/test_client_regress/tests.py b/tests/test_client_regress/tests.py index 4d47fb63af..b8efdca4f2 100644 --- a/tests/test_client_regress/tests.py +++ b/tests/test_client_regress/tests.py @@ -198,7 +198,7 @@ class AssertContainsTests(SimpleTestCase): long_content = ( b"This is a very very very very very very very very long message which " - b"exceedes the max limit of truncation." + b"exceeds the max limit of truncation." ) response = HttpResponse(long_content) msg = f"Couldn't find 'thrice' in the following response\n{long_content}" diff --git a/tests/test_runner/test_discover_runner.py b/tests/test_runner/test_discover_runner.py index a845f6dd67..4f13cceeff 100644 --- a/tests/test_runner/test_discover_runner.py +++ b/tests/test_runner/test_discover_runner.py @@ -45,6 +45,7 @@ def change_loader_patterns(patterns): @mock.patch.dict(os.environ, {}, clear=True) @mock.patch.object(multiprocessing, "cpu_count", return_value=12) # Python 3.8 on macOS defaults to 'spawn' mode. +# Python 3.14 on POSIX systems defaults to 'forkserver' mode. @mock.patch.object(multiprocessing, "get_start_method", return_value="fork") class DiscoverRunnerParallelArgumentTests(SimpleTestCase): def get_parser(self): diff --git a/tests/test_runner/test_parallel.py b/tests/test_runner/test_parallel.py index 73ef480cc1..5026bc36c5 100644 --- a/tests/test_runner/test_parallel.py +++ b/tests/test_runner/test_parallel.py @@ -1,9 +1,12 @@ import pickle import sys import unittest +from unittest.case import TestCase +from unittest.result import TestResult +from unittest.suite import TestSuite, _ErrorHolder from django.test import SimpleTestCase -from django.test.runner import RemoteTestResult +from django.test.runner import ParallelTestSuite, RemoteTestResult from django.utils.version import PY311, PY312 try: @@ -12,6 +15,13 @@ except ImportError: tblib = None +def _test_error_exc_info(): + try: + raise ValueError("woops") + except ValueError: + return sys.exc_info() + + class ExceptionThatFailsUnpickling(Exception): """ After pickling, this class fails unpickling with an error about incorrect @@ -59,42 +69,89 @@ class SampleFailingSubtest(SimpleTestCase): self.fail("expected failure") -class RemoteTestResultTest(SimpleTestCase): - def _test_error_exc_info(self): - try: - raise ValueError("woops") - except ValueError: - return sys.exc_info() +class SampleErrorTest(SimpleTestCase): + @classmethod + def setUpClass(cls): + raise ValueError("woops") + super().setUpClass() + # This method name doesn't begin with "test" to prevent test discovery + # from seeing it. + def dummy_test(self): + raise AssertionError("SampleErrorTest.dummy_test() was called") + + +class RemoteTestResultTest(SimpleTestCase): def test_was_successful_no_events(self): result = RemoteTestResult() self.assertIs(result.wasSuccessful(), True) def test_was_successful_one_success(self): result = RemoteTestResult() - result.addSuccess(None) + test = None + result.startTest(test) + try: + result.addSuccess(test) + finally: + result.stopTest(test) self.assertIs(result.wasSuccessful(), True) def test_was_successful_one_expected_failure(self): result = RemoteTestResult() - result.addExpectedFailure(None, self._test_error_exc_info()) + test = None + result.startTest(test) + try: + result.addExpectedFailure(test, _test_error_exc_info()) + finally: + result.stopTest(test) self.assertIs(result.wasSuccessful(), True) def test_was_successful_one_skip(self): result = RemoteTestResult() - result.addSkip(None, "Skipped") + test = None + result.startTest(test) + try: + result.addSkip(test, "Skipped") + finally: + result.stopTest(test) self.assertIs(result.wasSuccessful(), True) @unittest.skipUnless(tblib is not None, "requires tblib to be installed") def test_was_successful_one_error(self): result = RemoteTestResult() - result.addError(None, self._test_error_exc_info()) + test = None + result.startTest(test) + try: + result.addError(test, _test_error_exc_info()) + finally: + result.stopTest(test) self.assertIs(result.wasSuccessful(), False) @unittest.skipUnless(tblib is not None, "requires tblib to be installed") def test_was_successful_one_failure(self): result = RemoteTestResult() - result.addFailure(None, self._test_error_exc_info()) + test = None + result.startTest(test) + try: + result.addFailure(test, _test_error_exc_info()) + finally: + result.stopTest(test) + self.assertIs(result.wasSuccessful(), False) + + @unittest.skipUnless(tblib is not None, "requires tblib to be installed") + def test_add_error_before_first_test(self): + result = RemoteTestResult() + test_id = "test_foo (tests.test_foo.FooTest.test_foo)" + test = _ErrorHolder(test_id) + # Call addError() without a call to startTest(). + result.addError(test, _test_error_exc_info()) + + (event,) = result.events + self.assertEqual(event[0], "addError") + self.assertEqual(event[1], -1) + self.assertEqual(event[2], test_id) + (error_type, _, _) = event[3] + self.assertEqual(error_type, ValueError) self.assertIs(result.wasSuccessful(), False) def test_picklable(self): @@ -161,3 +218,69 @@ class RemoteTestResultTest(SimpleTestCase): result = RemoteTestResult() result.addDuration(None, 2.3) self.assertEqual(result.collectedDurations, [("None", 2.3)]) + + +class ParallelTestSuiteTest(SimpleTestCase): + @unittest.skipUnless(tblib is not None, "requires tblib to be installed") + def test_handle_add_error_before_first_test(self): + dummy_subsuites = [] + pts = ParallelTestSuite(dummy_subsuites, processes=2) + result = TestResult() + remote_result = RemoteTestResult() + test = SampleErrorTest(methodName="dummy_test") + suite = TestSuite([test]) + suite.run(remote_result) + for event in remote_result.events: + pts.handle_event(result, tests=list(suite), event=event) + + self.assertEqual(len(result.errors), 1) + actual_test, tb_and_details_str = result.errors[0] + self.assertIsInstance(actual_test, _ErrorHolder) + self.assertEqual( + actual_test.id(), "setUpClass (test_runner.test_parallel.SampleErrorTest)" + ) + self.assertIn("Traceback (most recent call last):", tb_and_details_str) + self.assertIn("ValueError: woops", tb_and_details_str) + + def test_handle_add_error_during_test(self): + dummy_subsuites = [] + pts = ParallelTestSuite(dummy_subsuites, processes=2) + result = TestResult() + test = TestCase() + err = _test_error_exc_info() + event = ("addError", 0, err) + pts.handle_event(result, tests=[test], event=event) + + self.assertEqual(len(result.errors), 1) + actual_test, tb_and_details_str = result.errors[0] + self.assertIsInstance(actual_test, TestCase) + self.assertEqual(actual_test.id(), "unittest.case.TestCase.runTest") + self.assertIn("Traceback (most recent call last):", tb_and_details_str) + self.assertIn("ValueError: woops", tb_and_details_str) + + def test_handle_add_failure(self): + dummy_subsuites = [] + pts = ParallelTestSuite(dummy_subsuites, processes=2) + result = TestResult() + test = TestCase() + err = _test_error_exc_info() + event = ("addFailure", 0, err) + pts.handle_event(result, tests=[test], event=event) + + self.assertEqual(len(result.failures), 1) + actual_test, tb_and_details_str = result.failures[0] + self.assertIsInstance(actual_test, TestCase) + self.assertEqual(actual_test.id(), "unittest.case.TestCase.runTest") + self.assertIn("Traceback (most recent call last):", tb_and_details_str) + self.assertIn("ValueError: woops", tb_and_details_str) + + def test_handle_add_success(self): + dummy_subsuites = [] + pts = ParallelTestSuite(dummy_subsuites, processes=2) + result = TestResult() + test = TestCase() + event = ("addSuccess", 0) + pts.handle_event(result, tests=[test], event=event) + + self.assertEqual(len(result.errors), 0) + self.assertEqual(len(result.failures), 0) diff --git a/tests/test_runner/tests.py b/tests/test_runner/tests.py index b900ff69ea..fba8dd3b6f 100644 --- a/tests/test_runner/tests.py +++ b/tests/test_runner/tests.py @@ -506,6 +506,7 @@ class ManageCommandTests(unittest.TestCase): @mock.patch.dict(os.environ, {}, clear=True) @mock.patch.object(multiprocessing, "cpu_count", return_value=12) class ManageCommandParallelTests(SimpleTestCase): + @mock.patch.object(multiprocessing, "get_start_method", return_value="fork") def test_parallel_default(self, *mocked_objects): with captured_stderr() as stderr: call_command( @@ -515,6 +516,7 @@ class ManageCommandParallelTests(SimpleTestCase): ) self.assertIn("parallel=12", stderr.getvalue()) + @mock.patch.object(multiprocessing, "get_start_method", return_value="fork") def test_parallel_auto(self, *mocked_objects): with captured_stderr() as stderr: call_command( @@ -550,12 +552,14 @@ class ManageCommandParallelTests(SimpleTestCase): self.assertEqual(stderr.getvalue(), "") @mock.patch.dict(os.environ, {"DJANGO_TEST_PROCESSES": "7"}) + @mock.patch.object(multiprocessing, "get_start_method", return_value="fork") def test_no_parallel_django_test_processes_env(self, *mocked_objects): with captured_stderr() as stderr: call_command("test", testrunner="test_runner.tests.MockTestRunner") self.assertEqual(stderr.getvalue(), "") @mock.patch.dict(os.environ, {"DJANGO_TEST_PROCESSES": "invalid"}) + @mock.patch.object(multiprocessing, "get_start_method", return_value="fork") def test_django_test_processes_env_non_int(self, *mocked_objects): with self.assertRaises(ValueError): call_command( @@ -565,6 +569,7 @@ class ManageCommandParallelTests(SimpleTestCase): ) @mock.patch.dict(os.environ, {"DJANGO_TEST_PROCESSES": "7"}) + @mock.patch.object(multiprocessing, "get_start_method", return_value="fork") def test_django_test_processes_parallel_default(self, *mocked_objects): for parallel in ["--parallel", "--parallel=auto"]: with self.subTest(parallel=parallel): diff --git a/tests/test_utils/tests.py b/tests/test_utils/tests.py index 4fd9267429..359cf07402 100644 --- a/tests/test_utils/tests.py +++ b/tests/test_utils/tests.py @@ -1046,7 +1046,7 @@ class InHTMLTests(SimpleTestCase): def test_long_haystack(self): haystack = ( "

This is a very very very very very very very very long message which " - "exceedes the max limit of truncation.

" + "exceeds the max limit of truncation.

" ) msg = f"Couldn't find 'Hello' in the following response\n{haystack!r}" with self.assertRaisesMessage(AssertionError, msg): diff --git a/tests/urlpatterns_reverse/tests.py b/tests/urlpatterns_reverse/tests.py index 5843382a8c..91d3f237ec 100644 --- a/tests/urlpatterns_reverse/tests.py +++ b/tests/urlpatterns_reverse/tests.py @@ -522,6 +522,15 @@ class URLPatternReverse(SimpleTestCase): with self.assertRaisesMessage(NoReverseMatch, msg): reverse("places", kwargs={"arg1": 2}) + def test_view_func_from_cbv(self): + expected = "/hello/world/" + url = reverse(views.view_func_from_cbv, kwargs={"name": "world"}) + self.assertEqual(url, expected) + + def test_view_func_from_cbv_no_expected_kwarg(self): + with self.assertRaises(NoReverseMatch): + reverse(views.view_func_from_cbv) + class ResolverTests(SimpleTestCase): def test_resolver_repr(self): diff --git a/tests/urlpatterns_reverse/urls.py b/tests/urlpatterns_reverse/urls.py index c745331483..aca2d06ef7 100644 --- a/tests/urlpatterns_reverse/urls.py +++ b/tests/urlpatterns_reverse/urls.py @@ -8,6 +8,7 @@ from .views import ( empty_view_partial, empty_view_wrapped, nested_view, + view_func_from_cbv, ) other_patterns = [ @@ -136,4 +137,6 @@ urlpatterns = [ path("includes/", include(other_patterns)), # Security tests re_path("(.+)/security/$", empty_view, name="security"), + # View function from cbv. + path("hello//", view_func_from_cbv), ] diff --git a/tests/urlpatterns_reverse/views.py b/tests/urlpatterns_reverse/views.py index 17c7fe1c3d..01dfc1309e 100644 --- a/tests/urlpatterns_reverse/views.py +++ b/tests/urlpatterns_reverse/views.py @@ -3,7 +3,7 @@ from functools import partial, update_wrapper from django.contrib.auth.decorators import user_passes_test from django.http import HttpResponse from django.urls import reverse_lazy -from django.views.generic import RedirectView +from django.views.generic import RedirectView, View def empty_view(request, *args, **kwargs): @@ -58,6 +58,13 @@ def bad_view(request, *args, **kwargs): raise ValueError("I don't think I'm getting good value for this view") +class HelloView(View): + def get(self, request, *args, **kwargs): + return HttpResponse(f"Hello {self.kwargs['name']}") + + +view_func_from_cbv = HelloView.as_view() + empty_view_partial = partial(empty_view, template_name="template.html") empty_view_nested_partial = partial( empty_view_partial, template_name="nested_partial.html" diff --git a/tests/user_commands/tests.py b/tests/user_commands/tests.py index 65e176620d..2a1e904f3b 100644 --- a/tests/user_commands/tests.py +++ b/tests/user_commands/tests.py @@ -400,8 +400,8 @@ class CommandTests(SimpleTestCase): self.assertIn("bar", out.getvalue()) def test_subparser_invalid_option(self): - msg = "invalid choice: 'test' (choose from 'foo')" - with self.assertRaisesMessage(CommandError, msg): + msg = r"invalid choice: 'test' \(choose from '?foo'?\)" + with self.assertRaisesRegex(CommandError, msg): management.call_command("subparser", "test", 12) msg = "Error: the following arguments are required: subcommand" with self.assertRaisesMessage(CommandError, msg): diff --git a/tests/validators/tests.py b/tests/validators/tests.py index ba1db5ea46..4ae0f6413e 100644 --- a/tests/validators/tests.py +++ b/tests/validators/tests.py @@ -635,8 +635,8 @@ TEST_DATA = [ (validate_domain_name, "python-python.com", None), (validate_domain_name, "python.name.uk", None), (validate_domain_name, "python.tips", None), - (validate_domain_name, "http://例子.测试", None), - (validate_domain_name, "http://dashinpunytld.xn---c", None), + (validate_domain_name, "例子.测试", None), + (validate_domain_name, "dashinpunytld.xn---c", None), (validate_domain_name, "python..org", ValidationError), (validate_domain_name, "python-.org", ValidationError), (validate_domain_name, "too-long-name." * 20 + "com", ValidationError), @@ -652,6 +652,16 @@ TEST_DATA = [ ), (DomainNameValidator(accept_idna=False), "ıçğü.com", ValidationError), (DomainNameValidator(accept_idna=False), "not-domain-name", ValidationError), + ( + DomainNameValidator(accept_idna=False), + "not-domain-name, but-has-domain-name-suffix.com", + ValidationError, + ), + ( + DomainNameValidator(accept_idna=False), + "not-domain-name.com, but has domain prefix", + ValidationError, + ), ] # Add valid and invalid URL tests. diff --git a/tests/view_tests/tests/test_i18n.py b/tests/view_tests/tests/test_i18n.py index 93e91bcc83..229ce68bfc 100644 --- a/tests/view_tests/tests/test_i18n.py +++ b/tests/view_tests/tests/test_i18n.py @@ -295,7 +295,7 @@ class I18NViewTests(SimpleTestCase): """ with override("de"): response = self.client.get("/jsoni18n/") - data = json.loads(response.content.decode()) + data = json.loads(response.text) self.assertIn("catalog", data) self.assertIn("formats", data) self.assertEqual( @@ -329,7 +329,7 @@ class I18NViewTests(SimpleTestCase): """ with self.settings(LANGUAGE_CODE="es"), override("en-us"): response = self.client.get("/jsoni18n/") - data = json.loads(response.content.decode()) + data = json.loads(response.text) self.assertIn("catalog", data) self.assertIn("formats", data) self.assertIn("plural", data) diff --git a/tests/view_tests/tests/test_json.py b/tests/view_tests/tests/test_json.py index 145e6e05a4..b314510f3c 100644 --- a/tests/view_tests/tests/test_json.py +++ b/tests/view_tests/tests/test_json.py @@ -10,7 +10,7 @@ class JsonResponseTests(SimpleTestCase): self.assertEqual(response.status_code, 200) self.assertEqual(response.headers["content-type"], "application/json") self.assertEqual( - json.loads(response.content.decode()), + json.loads(response.text), { "a": [1, 2, 3], "foo": {"bar": "baz"},