mirror of
				https://github.com/django/django.git
				synced 2025-10-31 09:41:08 +00:00 
			
		
		
		
	This initial work adds a pair of settings to configure specific CSP directives for enforcing or reporting policy violations, a new `django.middleware.csp.ContentSecurityPolicyMiddleware` to apply the appropriate headers to responses, and a context processor to support CSP nonces in templates for safely inlining assets. Relevant documentation has been added for the 6.0 release notes, security overview, a new how-to page, and a dedicated reference section. Thanks to the multiple reviewers for their precise and valuable feedback. Co-authored-by: Natalia <124304+nessita@users.noreply.github.com>
		
			
				
	
	
		
			162 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			162 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| """
 | |
| Tests for Django's bundled context processors.
 | |
| """
 | |
| 
 | |
| from django.test import SimpleTestCase, TestCase, modify_settings, override_settings
 | |
| from django.utils.csp import CSP
 | |
| 
 | |
| 
 | |
| @override_settings(
 | |
|     ROOT_URLCONF="context_processors.urls",
 | |
|     TEMPLATES=[
 | |
|         {
 | |
|             "BACKEND": "django.template.backends.django.DjangoTemplates",
 | |
|             "APP_DIRS": True,
 | |
|             "OPTIONS": {
 | |
|                 "context_processors": [
 | |
|                     "django.template.context_processors.request",
 | |
|                 ],
 | |
|             },
 | |
|         }
 | |
|     ],
 | |
| )
 | |
| class RequestContextProcessorTests(SimpleTestCase):
 | |
|     """
 | |
|     Tests for the ``django.template.context_processors.request`` processor.
 | |
|     """
 | |
| 
 | |
|     def test_request_attributes(self):
 | |
|         """
 | |
|         The request object is available in the template and that its
 | |
|         attributes can't be overridden by GET and POST parameters (#3828).
 | |
|         """
 | |
|         url = "/request_attrs/"
 | |
|         # We should have the request object in the template.
 | |
|         response = self.client.get(url)
 | |
|         self.assertContains(response, "Have request")
 | |
|         # Test is_secure.
 | |
|         response = self.client.get(url)
 | |
|         self.assertContains(response, "Not secure")
 | |
|         response = self.client.get(url, {"is_secure": "blah"})
 | |
|         self.assertContains(response, "Not secure")
 | |
|         response = self.client.post(url, {"is_secure": "blah"})
 | |
|         self.assertContains(response, "Not secure")
 | |
|         # Test path.
 | |
|         response = self.client.get(url)
 | |
|         self.assertContains(response, url)
 | |
|         response = self.client.get(url, {"path": "/blah/"})
 | |
|         self.assertContains(response, url)
 | |
|         response = self.client.post(url, {"path": "/blah/"})
 | |
|         self.assertContains(response, url)
 | |
| 
 | |
| 
 | |
| @override_settings(
 | |
|     DEBUG=True,
 | |
|     INTERNAL_IPS=["127.0.0.1"],
 | |
|     ROOT_URLCONF="context_processors.urls",
 | |
|     TEMPLATES=[
 | |
|         {
 | |
|             "BACKEND": "django.template.backends.django.DjangoTemplates",
 | |
|             "APP_DIRS": True,
 | |
|             "OPTIONS": {
 | |
|                 "context_processors": [
 | |
|                     "django.template.context_processors.debug",
 | |
|                 ],
 | |
|             },
 | |
|         }
 | |
|     ],
 | |
| )
 | |
| class DebugContextProcessorTests(TestCase):
 | |
|     """
 | |
|     Tests for the ``django.template.context_processors.debug`` processor.
 | |
|     """
 | |
| 
 | |
|     databases = {"default", "other"}
 | |
| 
 | |
|     def test_debug(self):
 | |
|         url = "/debug/"
 | |
|         # We should have the debug flag in the template.
 | |
|         response = self.client.get(url)
 | |
|         self.assertContains(response, "Have debug")
 | |
| 
 | |
|         # And now we should not
 | |
|         with override_settings(DEBUG=False):
 | |
|             response = self.client.get(url)
 | |
|             self.assertNotContains(response, "Have debug")
 | |
| 
 | |
|     def test_sql_queries(self):
 | |
|         """
 | |
|         Test whether sql_queries represents the actual amount
 | |
|         of queries executed. (#23364)
 | |
|         """
 | |
|         url = "/debug/"
 | |
|         response = self.client.get(url)
 | |
|         self.assertContains(response, "First query list: 0")
 | |
|         self.assertContains(response, "Second query list: 1")
 | |
|         # Check we have not actually memoized connection.queries
 | |
|         self.assertContains(response, "Third query list: 2")
 | |
|         # Check queries for DB connection 'other'
 | |
|         self.assertContains(response, "Fourth query list: 3")
 | |
| 
 | |
| 
 | |
| @override_settings(
 | |
|     ROOT_URLCONF="context_processors.urls",
 | |
|     TEMPLATES=[
 | |
|         {
 | |
|             "BACKEND": "django.template.backends.django.DjangoTemplates",
 | |
|             "APP_DIRS": True,
 | |
|             "OPTIONS": {
 | |
|                 "context_processors": [
 | |
|                     "django.template.context_processors.csp",
 | |
|                 ],
 | |
|             },
 | |
|         }
 | |
|     ],
 | |
|     MIDDLEWARE=[
 | |
|         "django.middleware.csp.ContentSecurityPolicyMiddleware",
 | |
|     ],
 | |
|     SECURE_CSP={
 | |
|         "script-src": [CSP.SELF, CSP.NONCE],
 | |
|     },
 | |
| )
 | |
| class CSPContextProcessorTests(TestCase):
 | |
|     """
 | |
|     Tests for the django.template.context_processors.csp_nonce processor.
 | |
|     """
 | |
| 
 | |
|     def test_csp_nonce_in_context(self):
 | |
|         response = self.client.get("/csp_nonce/")
 | |
|         self.assertIn("csp_nonce", response.context)
 | |
| 
 | |
|     @modify_settings(
 | |
|         MIDDLEWARE={"remove": "django.middleware.csp.ContentSecurityPolicyMiddleware"}
 | |
|     )
 | |
|     def test_csp_nonce_in_context_no_middleware(self):
 | |
|         response = self.client.get("/csp_nonce/")
 | |
|         self.assertIn("csp_nonce", response.context)
 | |
| 
 | |
|     def test_csp_nonce_in_header(self):
 | |
|         response = self.client.get("/csp_nonce/")
 | |
|         self.assertIn(CSP.HEADER_ENFORCE, response.headers)
 | |
|         csp_header = response.headers[CSP.HEADER_ENFORCE]
 | |
|         nonce = response.context["csp_nonce"]
 | |
|         self.assertIn(f"'nonce-{nonce}'", csp_header)
 | |
| 
 | |
|     def test_different_nonce_per_request(self):
 | |
|         response1 = self.client.get("/csp_nonce/")
 | |
|         response2 = self.client.get("/csp_nonce/")
 | |
|         self.assertNotEqual(
 | |
|             response1.context["csp_nonce"],
 | |
|             response2.context["csp_nonce"],
 | |
|         )
 | |
| 
 | |
|     def test_csp_nonce_in_template(self):
 | |
|         response = self.client.get("/csp_nonce/")
 | |
|         nonce = response.context["csp_nonce"]
 | |
|         self.assertIn(f'<script nonce="{nonce}">', response.text)
 | |
| 
 | |
|     def test_csp_nonce_length(self):
 | |
|         response = self.client.get("/csp_nonce/")
 | |
|         nonce = response.context["csp_nonce"]
 | |
|         self.assertEqual(len(nonce), 22)  # Based on secrets.token_urlsafe of 16 bytes.
 |