mirror of
https://github.com/django/django.git
synced 2025-03-30 11:10:45 +00:00
111 lines
4.5 KiB
Python
111 lines
4.5 KiB
Python
import sys
|
|
|
|
from django.utils import http
|
|
from django.utils import unittest
|
|
from django.utils.datastructures import MultiValueDict
|
|
from django.http import HttpResponse, utils
|
|
from django.test import RequestFactory
|
|
|
|
class TestUtilsHttp(unittest.TestCase):
|
|
|
|
def test_same_origin_true(self):
|
|
# Identical
|
|
self.assertTrue(http.same_origin('http://foo.com/', 'http://foo.com/'))
|
|
# One with trailing slash - see #15617
|
|
self.assertTrue(http.same_origin('http://foo.com', 'http://foo.com/'))
|
|
self.assertTrue(http.same_origin('http://foo.com/', 'http://foo.com'))
|
|
# With port
|
|
self.assertTrue(http.same_origin('https://foo.com:8000', 'https://foo.com:8000/'))
|
|
|
|
def test_same_origin_false(self):
|
|
# Different scheme
|
|
self.assertFalse(http.same_origin('http://foo.com', 'https://foo.com'))
|
|
# Different host
|
|
self.assertFalse(http.same_origin('http://foo.com', 'http://goo.com'))
|
|
# Different host again
|
|
self.assertFalse(http.same_origin('http://foo.com', 'http://foo.com.evil.com'))
|
|
# Different port
|
|
self.assertFalse(http.same_origin('http://foo.com:8000', 'http://foo.com:8001'))
|
|
|
|
def test_urlencode(self):
|
|
# 2-tuples (the norm)
|
|
result = http.urlencode((('a', 1), ('b', 2), ('c', 3)))
|
|
self.assertEqual(result, 'a=1&b=2&c=3')
|
|
# A dictionary
|
|
result = http.urlencode({ 'a': 1, 'b': 2, 'c': 3})
|
|
acceptable_results = [
|
|
# Need to allow all of these as dictionaries have to be treated as
|
|
# unordered
|
|
'a=1&b=2&c=3',
|
|
'a=1&c=3&b=2',
|
|
'b=2&a=1&c=3',
|
|
'b=2&c=3&a=1',
|
|
'c=3&a=1&b=2',
|
|
'c=3&b=2&a=1'
|
|
]
|
|
self.assertTrue(result in acceptable_results)
|
|
# A MultiValueDict
|
|
result = http.urlencode(MultiValueDict({
|
|
'name': ['Adrian', 'Simon'],
|
|
'position': ['Developer']
|
|
}), doseq=True)
|
|
acceptable_results = [
|
|
# MultiValueDicts are similarly unordered
|
|
'name=Adrian&name=Simon&position=Developer',
|
|
'position=Developer&name=Adrian&name=Simon'
|
|
]
|
|
self.assertTrue(result in acceptable_results)
|
|
|
|
def test_base36(self):
|
|
# reciprocity works
|
|
for n in [0, 1, 1000, 1000000, sys.maxint]:
|
|
self.assertEqual(n, http.base36_to_int(http.int_to_base36(n)))
|
|
|
|
# bad input
|
|
for n in [-1, sys.maxint+1, '1', 'foo', {1:2}, (1,2,3)]:
|
|
self.assertRaises(ValueError, http.int_to_base36, n)
|
|
|
|
for n in ['#', ' ']:
|
|
self.assertRaises(ValueError, http.base36_to_int, n)
|
|
|
|
for n in [123, {1:2}, (1,2,3)]:
|
|
self.assertRaises(TypeError, http.base36_to_int, n)
|
|
|
|
# non-integer input
|
|
self.assertRaises(TypeError, http.int_to_base36, 3.141)
|
|
|
|
# more explicit output testing
|
|
for n, b36 in [(0, '0'), (1, '1'), (42, '16'), (818469960, 'django')]:
|
|
self.assertEqual(http.int_to_base36(n), b36)
|
|
self.assertEqual(http.base36_to_int(b36), n)
|
|
|
|
def test_is_safe_url(self):
|
|
for bad_url in ('http://example.com',
|
|
'http:///example.com',
|
|
'https://example.com',
|
|
'ftp://exampel.com',
|
|
r'\\example.com',
|
|
r'\\\example.com',
|
|
r'/\\/example.com',
|
|
r'\\\example.com',
|
|
r'\\example.com',
|
|
r'\\//example.com',
|
|
r'/\/example.com',
|
|
r'\/example.com',
|
|
r'/\example.com',
|
|
'http:///example.com',
|
|
'http:/\//example.com',
|
|
'http:\/example.com',
|
|
'http:/\example.com',
|
|
'javascript:alert("XSS")'):
|
|
self.assertFalse(http.is_safe_url(bad_url, host='testserver'), "%s should be blocked" % bad_url)
|
|
for good_url in ('/view/?param=http://example.com',
|
|
'/view/?param=https://example.com',
|
|
'/view?param=ftp://exampel.com',
|
|
'view/?param=//example.com',
|
|
'https://testserver/',
|
|
'HTTPS://testserver/',
|
|
'//testserver/',
|
|
'/url%20with%20spaces/'):
|
|
self.assertTrue(http.is_safe_url(good_url, host='testserver'), "%s should be allowed" % good_url)
|