desc
stringlengths
3
26.7k
decl
stringlengths
11
7.89k
bodies
stringlengths
8
553k
'This test is related to the above one, testing that there aren\'t old JOINs in the query.'
def test_order_by_join_unref(self):
qs = Celebrity.objects.order_by(u'greatest_fan__fan_of') self.assertIn(u'OUTER JOIN', str(qs.query)) qs = qs.order_by(u'id') self.assertNotIn(u'OUTER JOIN', str(qs.query))
'Ensure that Meta.ordering=None works the same as Meta.ordering=[]'
def test_ticket17429(self):
original_ordering = Tag._meta.ordering Tag._meta.ordering = None self.assertQuerysetEqual(Tag.objects.all(), [u'<Tag: t1>', u'<Tag: t2>', u'<Tag: t3>', u'<Tag: t4>', u'<Tag: t5>']) Tag._meta.ordering = original_ordering
'Subselects honor any manual ordering'
def test_ordered_subselect(self):
try: query = DumbCategory.objects.filter(id__in=DumbCategory.objects.order_by(u'-id')[0:2]) self.assertEqual(set(query.values_list(u'id', flat=True)), set([2, 3])) query = DumbCategory.objects.filter(id__in=DumbCategory.objects.order_by(u'-id')[:2]) self.assertEqual(set(query.values_list(u'id', flat=True)), set([2, 3])) query = DumbCategory.objects.filter(id__in=DumbCategory.objects.order_by(u'-id')[2:]) self.assertEqual(set(query.values_list(u'id', flat=True)), set([1])) except DatabaseError: self.assertFalse(connections[DEFAULT_DB_ALIAS].features.allow_sliced_subqueries)
'Delete queries can safely contain sliced subqueries'
def test_sliced_delete(self):
try: DumbCategory.objects.filter(id__in=DumbCategory.objects.order_by(u'-id')[0:1]).delete() self.assertEqual(set(DumbCategory.objects.values_list(u'id', flat=True)), set([1, 2])) except DatabaseError: self.assertFalse(connections[DEFAULT_DB_ALIAS].features.allow_sliced_subqueries)
'#13227 -- If a queryset is already evaluated, it can still be used as a query arg'
def test_evaluated_queryset_as_argument(self):
n = Note(note=u'Test1', misc=u'misc') n.save() e = ExtraInfo(info=u'good', note=n) e.save() n_list = Note.objects.all() list(n_list) self.assertEqual(ExtraInfo.objects.filter(note__in=n_list)[0].info, u'good')
'The following case is not handled properly because SQL\'s COL NOT IN (list containing null) handling is too weird to abstract away.'
@unittest.expectedFailure def test_col_not_in_list_containing_null(self):
self.assertQuerysetEqual(NullableName.objects.exclude(name__in=[None]), [u'i1'], attrgetter(u'name'))
'Test that generating the query string doesn\'t alter the query\'s state in irreversible ways. Refs #18248.'
def test_evaluated_proxy_count(self):
ProxyCategory.objects.create() qs = ProxyCategory.objects.all() self.assertEqual(qs.count(), 1) str(qs.query) self.assertEqual(qs.count(), 1)
'Test QueryDict with one key/value pair'
def test_single_key_value(self):
q = QueryDict(str(u'foo=bar')) self.assertEqual(q[u'foo'], u'bar') self.assertRaises(KeyError, q.__getitem__, u'bar') self.assertRaises(AttributeError, q.__setitem__, u'something', u'bar') self.assertEqual(q.get(u'foo', u'default'), u'bar') self.assertEqual(q.get(u'bar', u'default'), u'default') self.assertEqual(q.getlist(u'foo'), [u'bar']) self.assertEqual(q.getlist(u'bar'), []) self.assertRaises(AttributeError, q.setlist, u'foo', [u'bar']) self.assertRaises(AttributeError, q.appendlist, u'foo', [u'bar']) if (not six.PY3): self.assertTrue(q.has_key(u'foo')) self.assertTrue((u'foo' in q)) if (not six.PY3): self.assertFalse(q.has_key(u'bar')) self.assertFalse((u'bar' in q)) self.assertEqual(list(six.iteritems(q)), [(u'foo', u'bar')]) self.assertEqual(list(six.iterlists(q)), [(u'foo', [u'bar'])]) self.assertEqual(list(six.iterkeys(q)), [u'foo']) self.assertEqual(list(six.itervalues(q)), [u'bar']) self.assertEqual(len(q), 1) self.assertRaises(AttributeError, q.update, {u'foo': u'bar'}) self.assertRaises(AttributeError, q.pop, u'foo') self.assertRaises(AttributeError, q.popitem) self.assertRaises(AttributeError, q.clear) self.assertRaises(AttributeError, q.setdefault, u'foo', u'bar') self.assertEqual(q.urlencode(), u'foo=bar')
'A copy of a QueryDict is mutable.'
def test_mutable_copy(self):
q = QueryDict(str(u'')).copy() self.assertRaises(KeyError, q.__getitem__, u'foo') q[u'name'] = u'john' self.assertEqual(q[u'name'], u'john')
'Test QueryDict with two key/value pairs with same keys.'
def test_multiple_keys(self):
q = QueryDict(str(u'vote=yes&vote=no')) self.assertEqual(q[u'vote'], u'no') self.assertRaises(AttributeError, q.__setitem__, u'something', u'bar') self.assertEqual(q.get(u'vote', u'default'), u'no') self.assertEqual(q.get(u'foo', u'default'), u'default') self.assertEqual(q.getlist(u'vote'), [u'yes', u'no']) self.assertEqual(q.getlist(u'foo'), []) self.assertRaises(AttributeError, q.setlist, u'foo', [u'bar', u'baz']) self.assertRaises(AttributeError, q.setlist, u'foo', [u'bar', u'baz']) self.assertRaises(AttributeError, q.appendlist, u'foo', [u'bar']) if (not six.PY3): self.assertEqual(q.has_key(u'vote'), True) self.assertEqual((u'vote' in q), True) if (not six.PY3): self.assertEqual(q.has_key(u'foo'), False) self.assertEqual((u'foo' in q), False) self.assertEqual(list(six.iteritems(q)), [(u'vote', u'no')]) self.assertEqual(list(six.iterlists(q)), [(u'vote', [u'yes', u'no'])]) self.assertEqual(list(six.iterkeys(q)), [u'vote']) self.assertEqual(list(six.itervalues(q)), [u'no']) self.assertEqual(len(q), 1) self.assertRaises(AttributeError, q.update, {u'foo': u'bar'}) self.assertRaises(AttributeError, q.pop, u'foo') self.assertRaises(AttributeError, q.popitem) self.assertRaises(AttributeError, q.clear) self.assertRaises(AttributeError, q.setdefault, u'foo', u'bar') self.assertRaises(AttributeError, q.__delitem__, u'vote')
'Regression test for #8278: QueryDict.update(QueryDict)'
def test_update_from_querydict(self):
x = QueryDict(str(u'a=1&a=2'), mutable=True) y = QueryDict(str(u'a=3&a=4')) x.update(y) self.assertEqual(x.getlist(u'a'), [u'1', u'2', u'3', u'4'])
'#13572 - QueryDict with a non-default encoding'
def test_non_default_encoding(self):
q = QueryDict(str(u'cur=%A4'), encoding=u'iso-8859-15') self.assertEqual(q.encoding, u'iso-8859-15') self.assertEqual(list(six.iteritems(q)), [(u'cur', u'\u20ac')]) self.assertEqual(q.urlencode(), u'cur=%A4') q = q.copy() self.assertEqual(q.encoding, u'iso-8859-15') self.assertEqual(list(six.iteritems(q)), [(u'cur', u'\u20ac')]) self.assertEqual(q.urlencode(), u'cur=%A4') self.assertEqual(copy.copy(q).encoding, u'iso-8859-15') self.assertEqual(copy.deepcopy(q).encoding, u'iso-8859-15')
'Test for bug #14020: Make HttpResponse.get work like dict.get'
def test_dict_behavior(self):
r = HttpResponse() self.assertEqual(r.get(u'test'), None)
'Test that we don\'t output tricky characters in encoded value'
def test_encode(self):
c = SimpleCookie() c[u'test'] = u'An,awkward;value' self.assertTrue((u';' not in c.output().rstrip(u';'))) self.assertTrue((u',' not in c.output().rstrip(u';')))
'Test that we can still preserve semi-colons and commas'
def test_decode(self):
c = SimpleCookie() c[u'test'] = u'An,awkward;value' c2 = SimpleCookie() c2.load(c.output()) self.assertEqual(c[u'test'].value, c2[u'test'].value)
'Test that we haven\'t broken normal encoding'
def test_decode_2(self):
c = SimpleCookie() c[u'test'] = '\xf0' c2 = SimpleCookie() c2.load(c.output()) self.assertEqual(c[u'test'].value, c2[u'test'].value)
'Test that a single non-standard cookie name doesn\'t affect all cookies. Ticket #13007.'
def test_nonstandard_keys(self):
self.assertTrue((u'good_cookie' in parse_cookie(u'good_cookie=yes;bad:cookie=yes').keys()))
'Test that a repeated non-standard name doesn\'t affect all cookies. Ticket #15852'
def test_repeated_nonstandard_keys(self):
self.assertTrue((u'good_cookie' in parse_cookie(u'a:=b; a:=c; good_cookie=yes').keys()))
'Test that we can use httponly attribute on cookies that we load'
def test_httponly_after_load(self):
c = SimpleCookie() c.load(u'name=val') c[u'name'][u'httponly'] = True self.assertTrue(c[u'name'][u'httponly'])
'Tests that django decorators set certain attributes of the wrapped function.'
def test_attributes(self):
self.assertEqual(fully_decorated.__name__, 'fully_decorated') self.assertEqual(fully_decorated.__doc__, 'Expected __doc__') self.assertEqual(fully_decorated.__dict__['anything'], 'Expected __dict__')
'Test that the user_passes_test decorator can be applied multiple times (#9474).'
def test_user_passes_test_composition(self):
def test1(user): user.decorators_applied.append('test1') return True def test2(user): user.decorators_applied.append('test2') return True def callback(request): return request.user.decorators_applied callback = user_passes_test(test1)(callback) callback = user_passes_test(test2)(callback) class DummyUser(object, ): pass class DummyRequest(object, ): pass request = DummyRequest() request.user = DummyUser() request.user.decorators_applied = [] response = callback(request) self.assertEqual(response, ['test2', 'test1'])
'Test that we can call cache_page the new way'
def test_cache_page_new_style(self):
def my_view(request): return 'response' my_view_cached = cache_page(123)(my_view) self.assertEqual(my_view_cached(HttpRequest()), 'response') my_view_cached2 = cache_page(123, key_prefix='test')(my_view) self.assertEqual(my_view_cached2(HttpRequest()), 'response')
'Test that we can call cache_page the old way'
def test_cache_page_old_style(self):
def my_view(request): return 'response' with warnings.catch_warnings(record=True): my_view_cached = cache_page(my_view, 123) self.assertEqual(my_view_cached(HttpRequest()), 'response') my_view_cached2 = cache_page(my_view, 123, key_prefix='test') self.assertEqual(my_view_cached2(HttpRequest()), 'response') my_view_cached3 = cache_page(my_view) self.assertEqual(my_view_cached3(HttpRequest()), 'response') my_view_cached4 = cache_page()(my_view) self.assertEqual(my_view_cached4(HttpRequest()), 'response')
'Test for the require_safe decorator. A view returns either a response or an exception. Refs #15637.'
def test_require_safe_accepts_only_safe_methods(self):
def my_view(request): return HttpResponse('OK') my_safe_view = require_safe(my_view) request = HttpRequest() request.method = 'GET' self.assertTrue(isinstance(my_safe_view(request), HttpResponse)) request.method = 'HEAD' self.assertTrue(isinstance(my_safe_view(request), HttpResponse)) request.method = 'POST' self.assertTrue(isinstance(my_safe_view(request), HttpResponseNotAllowed)) request.method = 'PUT' self.assertTrue(isinstance(my_safe_view(request), HttpResponseNotAllowed)) request.method = 'DELETE' self.assertTrue(isinstance(my_safe_view(request), HttpResponseNotAllowed))
'Ensures @xframe_options_deny properly sets the X-Frame-Options header.'
def test_deny_decorator(self):
@xframe_options_deny def a_view(request): return HttpResponse() r = a_view(HttpRequest()) self.assertEqual(r['X-Frame-Options'], 'DENY')
'Ensures @xframe_options_sameorigin properly sets the X-Frame-Options header.'
def test_sameorigin_decorator(self):
@xframe_options_sameorigin def a_view(request): return HttpResponse() r = a_view(HttpRequest()) self.assertEqual(r['X-Frame-Options'], 'SAMEORIGIN')
'Ensures @xframe_options_exempt properly instructs the XFrameOptionsMiddleware to NOT set the header.'
def test_exempt_decorator(self):
@xframe_options_exempt def a_view(request): return HttpResponse() req = HttpRequest() resp = a_view(req) self.assertEqual(resp.get('X-Frame-Options', None), None) self.assertTrue(resp.xframe_options_exempt) r = XFrameOptionsMiddleware().process_response(req, resp) self.assertEqual(r.get('X-Frame-Options', None), None)
'Test that empty DATABASES setting default to the dummy backend.'
def test_no_databases(self):
DATABASES = {} conns = ConnectionHandler(DATABASES) self.assertEqual(conns[DEFAULT_DB_ALIAS].settings_dict[u'ENGINE'], u'django.db.backends.dummy')
'Check that auto_increment fields are reset correctly by sql_flush(). Before MySQL version 5.0.13 TRUNCATE did not do auto_increment reset. Refs #16961.'
@unittest.skipUnless((connection.vendor == u'mysql'), u'Test valid only for MySQL') def test_autoincrement(self):
statements = connection.ops.sql_flush(no_style(), tables=[u'test'], sequences=[{u'table': u'test', u'col': u'somecol'}]) found_reset = False for sql in statements: found_reset = (found_reset or (u'ALTER TABLE' in sql)) if (connection.mysql_version < (5, 0, 13)): self.assertTrue(found_reset) else: self.assertFalse(found_reset)
'Test the custom ``django_date_trunc method``, in particular against fields which clash with strings passed to it (e.g. \'year\') - see #12818__. __: http://code.djangoproject.com/ticket/12818'
def test_django_date_trunc(self):
updated = datetime.datetime(2010, 2, 20) models.SchoolClass.objects.create(year=2009, last_updated=updated) years = models.SchoolClass.objects.dates(u'last_updated', u'year') self.assertEqual(list(years), [datetime.datetime(2010, 1, 1, 0, 0)])
'Test the custom ``django_extract method``, in particular against fields which clash with strings passed to it (e.g. \'day\') - see #12818__. __: http://code.djangoproject.com/ticket/12818'
def test_django_extract(self):
updated = datetime.datetime(2010, 2, 20) models.SchoolClass.objects.create(year=2009, last_updated=updated) classes = models.SchoolClass.objects.filter(last_updated__day=20) self.assertEqual(len(classes), 1)
'Test that last_executed_query() returns an Unicode string'
def test_query_encoding(self):
tags = models.Tag.objects.extra(select={u'f\xf6\xf6': 1}) (sql, params) = tags.query.sql_with_params() cursor = tags.query.get_compiler(u'default').execute_sql(None) last_sql = cursor.db.ops.last_executed_query(cursor, sql, params) self.assertTrue(isinstance(last_sql, six.text_type))
'An executemany call with too many/not enough parameters will raise an exception (Refs #12612)'
def test_bad_parameter_count(self):
cursor = connection.cursor() query = (u'INSERT INTO %s (%s, %s) VALUES (%%s, %%s)' % (connection.introspection.table_name_converter(u'backends_square'), connection.ops.quote_name(u'root'), connection.ops.quote_name(u'square'))) self.assertRaises(Exception, cursor.executemany, query, [(1, 2, 3)]) self.assertRaises(Exception, cursor.executemany, query, [(1,)])
'Test creation of model with long name and long pk name doesn\'t error. Ref #8901'
@skipUnlessDBFeature(u'supports_long_model_names') def test_sequence_name_length_limits_create(self):
models.VeryLongModelNameZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ.objects.create()
'Test an m2m save of a model with a long name and a long m2m field name doesn\'t error as on Django >=1.2 this now uses object saves. Ref #8901'
@skipUnlessDBFeature(u'supports_long_model_names') def test_sequence_name_length_limits_m2m(self):
obj = models.VeryLongModelNameZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ.objects.create() rel_obj = models.Person.objects.create(first_name=u'Django', last_name=u'Reinhardt') obj.m2m_also_quite_long_zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz.add(rel_obj)
'Test that sequence resetting as part of a flush with model with long name and long pk name doesn\'t error. Ref #8901'
@skipUnlessDBFeature(u'supports_long_model_names') def test_sequence_name_length_limits_flush(self):
VLM = models.VeryLongModelNameZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ VLM_m2m = VLM.m2m_also_quite_long_zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz.through tables = [VLM._meta.db_table, VLM_m2m._meta.db_table] sequences = [{u'column': VLM._meta.pk.column, u'table': VLM._meta.db_table}] cursor = connection.cursor() for statement in connection.ops.sql_flush(no_style(), tables, sequences): cursor.execute(statement)
'Sequence names are correct when resetting generic relations (Ref #13941)'
def test_generic_relation(self):
models.Post.objects.create(id=10, name=u'1st post', text=u'hello world') cursor = connection.cursor() commands = connections[DEFAULT_DB_ALIAS].ops.sequence_reset_sql(no_style(), [models.Post]) for sql in commands: cursor.execute(sql) obj = models.Post.objects.create(name=u'New post', text=u'goodbye world') self.assertTrue((obj.pk > 10))
'Test PostgreSQL version parsing from `SELECT version()` output'
def test_parsing(self):
self.assert_parses(u'PostgreSQL 8.3 beta4', 80300) self.assert_parses(u'PostgreSQL 8.3', 80300) self.assert_parses(u'EnterpriseDB 8.3', 80300) self.assert_parses(u'PostgreSQL 8.3.6', 80306) self.assert_parses(u'PostgreSQL 8.4beta1', 80400) self.assert_parses(u'PostgreSQL 8.3.1 on i386-apple-darwin9.2.2, compiled by GCC i686-apple-darwin9-gcc-4.0.1 (GCC) 4.0.1 (Apple Inc. build 5478)', 80301)
'Test PostgreSQL version detection'
def test_version_detection(self):
class CursorMock(object, ): u'Very simple mock of DB-API cursor' def execute(self, arg): pass def fetchone(self): return [u'PostgreSQL 8.3'] class OlderConnectionMock(object, ): u'Mock of psycopg2 (< 2.0.12) connection' def cursor(self): return CursorMock() conn = OlderConnectionMock() self.assertEqual(pg_version.get_version(conn), 80300)
'Test that creating an existing table returns a DatabaseError'
def test_duplicate_table_error(self):
cursor = connection.cursor() query = (u'CREATE TABLE %s (id INTEGER);' % models.Article._meta.db_table) with self.assertRaises(DatabaseError): cursor.execute(query)
'Try to create a model instance that violates a FK constraint. If it fails it should fail with IntegrityError.'
def test_integrity_checks_on_creation(self):
a = models.Article(headline=u'This is a test', pub_date=datetime.datetime(2005, 7, 27), reporter_id=30) try: a.save() except IntegrityError: return self.skipTest(u'This backend does not support integrity checks.')
'Try to update a model instance introducing a FK constraint violation. If it fails it should fail with IntegrityError.'
def test_integrity_checks_on_update(self):
models.Article.objects.create(headline=u'Test article', pub_date=datetime.datetime(2010, 9, 4), reporter=self.r) a = models.Article.objects.get(headline=u'Test article') a.reporter_id = 30 try: a.save() except IntegrityError: return self.skipTest(u'This backend does not support integrity checks.')
'When constraint checks are disabled, should be able to write bad data without IntegrityErrors.'
def test_disable_constraint_checks_manually(self):
with transaction.commit_manually(): models.Article.objects.create(headline=u'Test article', pub_date=datetime.datetime(2010, 9, 4), reporter=self.r) a = models.Article.objects.get(headline=u'Test article') a.reporter_id = 30 try: connection.disable_constraint_checking() a.save() connection.enable_constraint_checking() except IntegrityError: self.fail(u'IntegrityError should not have occurred.') finally: transaction.rollback()
'When constraint checks are disabled (using context manager), should be able to write bad data without IntegrityErrors.'
def test_disable_constraint_checks_context_manager(self):
with transaction.commit_manually(): models.Article.objects.create(headline=u'Test article', pub_date=datetime.datetime(2010, 9, 4), reporter=self.r) a = models.Article.objects.get(headline=u'Test article') a.reporter_id = 30 try: with connection.constraint_checks_disabled(): a.save() except IntegrityError: self.fail(u'IntegrityError should not have occurred.') finally: transaction.rollback()
'Constraint checks should raise an IntegrityError when bad data is in the DB.'
def test_check_constraints(self):
with transaction.commit_manually(): models.Article.objects.create(headline=u'Test article', pub_date=datetime.datetime(2010, 9, 4), reporter=self.r) a = models.Article.objects.get(headline=u'Test article') a.reporter_id = 30 try: with connection.constraint_checks_disabled(): a.save() with self.assertRaises(IntegrityError): connection.check_constraints() finally: transaction.rollback()
'Ensure that the default connection (i.e. django.db.connection) is different for each thread. Refs #17258.'
def test_default_connection_thread_local(self):
connections_set = set() connection.cursor() connections_set.add(connection.connection) def runner(): from django.db import connection connection.cursor() connections_set.add(connection.connection) for x in range(2): t = threading.Thread(target=runner) t.start() t.join() self.assertEqual(len(connections_set), 3) for conn in connections_set: if (conn != connection.connection): conn.close()
'Ensure that the connections are different for each thread. Refs #17258.'
def test_connections_thread_local(self):
connections_dict = {} for conn in connections.all(): connections_dict[id(conn)] = conn def runner(): from django.db import connections for conn in connections.all(): conn.allow_thread_sharing = True connections_dict[id(conn)] = conn for x in range(2): t = threading.Thread(target=runner) t.start() t.join() self.assertEqual(len(connections_dict), 6) for conn in connections_dict.values(): if (conn != connection): conn.close()
'Ensure that a connection can be passed from one thread to the other. Refs #17258.'
def test_pass_connection_between_threads(self):
models.Person.objects.create(first_name=u'John', last_name=u'Doe') def do_thread(): def runner(main_thread_connection): from django.db import connections connections[u'default'] = main_thread_connection try: models.Person.objects.get(first_name=u'John', last_name=u'Doe') except Exception as e: exceptions.append(e) t = threading.Thread(target=runner, args=[connections[u'default']]) t.start() t.join() exceptions = [] do_thread() self.assertIsInstance(exceptions[0], DatabaseError) connections[u'default'].allow_thread_sharing = False exceptions = [] do_thread() self.assertIsInstance(exceptions[0], DatabaseError) connections[u'default'].allow_thread_sharing = True exceptions = [] do_thread() self.assertEqual(exceptions, [])
'Ensure that a connection that is not explicitly shareable cannot be closed by another thread. Refs #17258.'
def test_closing_non_shared_connections(self):
exceptions = set() def runner1(): def runner2(other_thread_connection): try: other_thread_connection.close() except DatabaseError as e: exceptions.add(e) t2 = threading.Thread(target=runner2, args=[connections[u'default']]) t2.start() t2.join() t1 = threading.Thread(target=runner1) t1.start() t1.join() self.assertEqual(len(exceptions), 1) exceptions = set() def runner1(): def runner2(other_thread_connection): try: other_thread_connection.close() except DatabaseError as e: exceptions.add(e) connections[u'default'].allow_thread_sharing = True t2 = threading.Thread(target=runner2, args=[connections[u'default']]) t2.start() t2.join() t1 = threading.Thread(target=runner1) t1.start() t1.join() self.assertEqual(len(exceptions), 0)
'Regression test for the use of None as a query value. None is interpreted as an SQL NULL, but only in __exact queries. Set up some initial polls and choices'
def test_none_as_null(self):
p1 = Poll(question='Why?') p1.save() c1 = Choice(poll=p1, choice='Because.') c1.save() c2 = Choice(poll=p1, choice='Why Not?') c2.save() self.assertQuerysetEqual(Choice.objects.filter(choice__exact=None), []) self.assertQuerysetEqual(Choice.objects.exclude(choice=None).order_by('id'), ['<Choice: Choice: Because. in poll Q: Why? >', '<Choice: Choice: Why Not? in poll Q: Why? >']) self.assertRaises(FieldError, Choice.objects.filter, foo__exact=None) self.assertRaises(ValueError, Choice.objects.filter, id__gt=None) self.assertRaises(ValueError, Choice.objects.filter, foo__gt=None) p2 = Poll(question='How?') self.assertEqual(repr(p2.choice_set.all()), '[]')
'Querying across reverse relations and then another relation should insert outer joins correctly so as not to exclude results.'
def test_reverse_relations(self):
obj = OuterA.objects.create() self.assertQuerysetEqual(OuterA.objects.filter(inner__second=None), ['<OuterA: OuterA object>']) self.assertQuerysetEqual(OuterA.objects.filter(inner__second__data=None), ['<OuterA: OuterA object>']) inner_obj = Inner.objects.create(first=obj) self.assertQuerysetEqual(Inner.objects.filter(first__inner__second=None), ['<Inner: Inner object>']) objB = OuterB.objects.create(data='reverse') self.assertQuerysetEqual(OuterB.objects.filter(inner__isnull=False), []) Inner.objects.create(first=obj) self.assertQuerysetEqual(OuterB.objects.exclude(inner__isnull=False), ['<OuterB: OuterB object>'])
'Ensure that the LiveServerTestCase serves 404s. Refs #2879.'
def test_404(self):
try: self.urlopen(u'/') except HTTPError as err: self.assertEqual(err.code, 404, u'Expected 404 response') else: self.fail(u'Expected 404 response')
'Ensure that the LiveServerTestCase serves views. Refs #2879.'
def test_view(self):
f = self.urlopen(u'/example_view/') self.assertEqual(f.read(), 'example view')
'Ensure that the LiveServerTestCase serves static files. Refs #2879.'
def test_static_files(self):
f = self.urlopen(u'/static/example_static_file.txt') self.assertEqual(f.read().rstrip('\r\n'), 'example static file')
'Ensure that the LiveServerTestCase serves media files. Refs #2879.'
def test_media_files(self):
f = self.urlopen(u'/media/example_media_file.txt') self.assertEqual(f.read().rstrip('\r\n'), 'example media file')
'Ensure that fixtures are properly loaded and visible to the live server thread. Refs #2879.'
def test_fixtures_loaded(self):
f = self.urlopen(u'/model_view/') self.assertEqual(f.read().splitlines(), ['jane', 'robert'])
'Ensure that data written to the database by a view can be read. Refs #2879.'
def test_database_writes(self):
self.urlopen(u'/create_model_instance/') self.assertQuerysetEqual(Person.objects.all().order_by(u'pk'), [u'jane', u'robert', u'emily'], (lambda b: b.name))
'Tests that content is removed from regular and streaming responses with a status_code of 100-199, 204, 304 or a method of "HEAD".'
def test_conditional_content_removal(self):
req = HttpRequest() res = HttpResponse(u'abc') conditional_content_removal(req, res) self.assertEqual(res.content, 'abc') res = StreamingHttpResponse([u'abc']) conditional_content_removal(req, res) self.assertEqual(''.join(res), 'abc') for status_code in (100, 150, 199, 204, 304): res = HttpResponse(u'abc', status=status_code) conditional_content_removal(req, res) self.assertEqual(res.content, '') res = StreamingHttpResponse([u'abc'], status=status_code) conditional_content_removal(req, res) self.assertEqual(''.join(res), '') req.method = u'HEAD' res = HttpResponse(u'abc') conditional_content_removal(req, res) self.assertEqual(res.content, '') res = StreamingHttpResponse([u'abc']) conditional_content_removal(req, res) self.assertEqual(''.join(res), '')
'Testing utility asserting that text1 appears before text2 in response content.'
def assertContentBefore(self, response, text1, text2, failing_msg=None):
self.assertEqual(response.status_code, 200) self.assertTrue((response.content.index(force_bytes(text1)) < response.content.index(force_bytes(text2))), failing_msg)
'If you leave off the trailing slash, app should redirect and add it.'
def testTrailingSlashRequired(self):
response = self.client.get((u'/test_admin/%s/admin_views/article/add' % self.urlbit)) self.assertRedirects(response, (u'/test_admin/%s/admin_views/article/add/' % self.urlbit), status_code=301)
'A smoke test to ensure GET on the add_view works.'
def testBasicAddGet(self):
response = self.client.get((u'/test_admin/%s/admin_views/section/add/' % self.urlbit)) self.assertIsInstance(response, TemplateResponse) self.assertEqual(response.status_code, 200)
'A smoke test to ensure GET on the change_view works.'
def testBasicEditGet(self):
response = self.client.get((u'/test_admin/%s/admin_views/section/1/' % self.urlbit)) self.assertIsInstance(response, TemplateResponse) self.assertEqual(response.status_code, 200)
'A smoke test to ensure GET on the change_view works (returns an HTTP 404 error, see #11191) when passing a string as the PK argument for a model with an integer PK field.'
def testBasicEditGetStringPK(self):
response = self.client.get((u'/test_admin/%s/admin_views/section/abc/' % self.urlbit)) self.assertEqual(response.status_code, 404)
'A smoke test to ensure POST on add_view works.'
def testBasicAddPost(self):
post_data = {u'name': u'Another Section', u'article_set-TOTAL_FORMS': u'3', u'article_set-INITIAL_FORMS': u'0', u'article_set-MAX_NUM_FORMS': u'0'} response = self.client.post((u'/test_admin/%s/admin_views/section/add/' % self.urlbit), post_data) self.assertEqual(response.status_code, 302)
'Ensure http response from a popup is properly escaped.'
def testPopupAddPost(self):
post_data = {u'_popup': u'1', u'title': u'title with a new\nline', u'content': u'some content', u'date_0': u'2010-09-10', u'date_1': u'14:55:39'} response = self.client.post((u'/test_admin/%s/admin_views/article/add/' % self.urlbit), post_data) self.assertEqual(response.status_code, 200) self.assertContains(response, u'dismissAddAnotherPopup') self.assertContains(response, u'title with a new\\u000Aline')
'A smoke test to ensure POST on edit_view works.'
def testBasicEditPost(self):
response = self.client.post((u'/test_admin/%s/admin_views/section/1/' % self.urlbit), self.inline_post_data) self.assertEqual(response.status_code, 302)
'Test "save as".'
def testEditSaveAs(self):
post_data = self.inline_post_data.copy() post_data.update({u'_saveasnew': u'Save+as+new', u'article_set-1-section': u'1', u'article_set-2-section': u'1', u'article_set-3-section': u'1', u'article_set-4-section': u'1', u'article_set-5-section': u'1'}) response = self.client.post((u'/test_admin/%s/admin_views/section/1/' % self.urlbit), post_data) self.assertEqual(response.status_code, 302)
'Ensure we can sort on a list_display field that is a callable (column 2 is callable_year in ArticleAdmin)'
def testChangeListSortingCallable(self):
response = self.client.get((u'/test_admin/%s/admin_views/article/' % self.urlbit), {u'o': 2}) self.assertContentBefore(response, u'Oldest content', u'Middle content', u'Results of sorting on callable are out of order.') self.assertContentBefore(response, u'Middle content', u'Newest content', u'Results of sorting on callable are out of order.')
'Ensure we can sort on a list_display field that is a Model method (colunn 3 is \'model_year\' in ArticleAdmin)'
def testChangeListSortingModel(self):
response = self.client.get((u'/test_admin/%s/admin_views/article/' % self.urlbit), {u'o': u'-3'}) self.assertContentBefore(response, u'Newest content', u'Middle content', u'Results of sorting on Model method are out of order.') self.assertContentBefore(response, u'Middle content', u'Oldest content', u'Results of sorting on Model method are out of order.')
'Ensure we can sort on a list_display field that is a ModelAdmin method (colunn 4 is \'modeladmin_year\' in ArticleAdmin)'
def testChangeListSortingModelAdmin(self):
response = self.client.get((u'/test_admin/%s/admin_views/article/' % self.urlbit), {u'o': u'4'}) self.assertContentBefore(response, u'Oldest content', u'Middle content', u'Results of sorting on ModelAdmin method are out of order.') self.assertContentBefore(response, u'Middle content', u'Newest content', u'Results of sorting on ModelAdmin method are out of order.')
'If no ordering is defined in `ModelAdmin.ordering` or in the query string, then the underlying order of the queryset should not be changed, even if it is defined in `Modeladmin.queryset()`. Refs #11868, #7309.'
def testChangeListSortingPreserveQuerySetOrdering(self):
p1 = Person.objects.create(name=u'Amy', gender=1, alive=True, age=80) p2 = Person.objects.create(name=u'Bob', gender=1, alive=True, age=70) p3 = Person.objects.create(name=u'Chris', gender=2, alive=False, age=60) link1 = reverse(u'admin:admin_views_person_change', args=(p1.pk,)) link2 = reverse(u'admin:admin_views_person_change', args=(p2.pk,)) link3 = reverse(u'admin:admin_views_person_change', args=(p3.pk,)) response = self.client.get(u'/test_admin/admin/admin_views/person/', {}) self.assertContentBefore(response, link3, link2) self.assertContentBefore(response, link2, link1)
'Ensures that the admin shows default sort indicators for all kinds of \'ordering\' fields: field names, method on the model admin and model itself, and other callables. See #17252.'
def testSortIndicatorsAdminOrder(self):
models = [(AdminOrderedField, u'adminorderedfield'), (AdminOrderedModelMethod, u'adminorderedmodelmethod'), (AdminOrderedAdminMethod, u'adminorderedadminmethod'), (AdminOrderedCallable, u'adminorderedcallable')] for (model, url) in models: a1 = model.objects.create(stuff=u'The Last Item', order=3) a2 = model.objects.create(stuff=u'The First Item', order=1) a3 = model.objects.create(stuff=u'The Middle Item', order=2) response = self.client.get((u'/test_admin/admin/admin_views/%s/' % url), {}) self.assertEqual(response.status_code, 200) self.assertContains(response, u'<th scope="col"', count=3, msg_prefix=url) self.assertEqual(response.context[u'cl'].get_ordering_field_columns(), {2: u'asc'}) self.assertContentBefore(response, u'The First Item', u'The Middle Item') self.assertContentBefore(response, u'The Middle Item', u'The Last Item')
'Ensure admin changelist filters do not contain objects excluded via limit_choices_to. This also tests relation-spanning filters (e.g. \'color__value\').'
def testLimitedFilter(self):
response = self.client.get((u'/test_admin/%s/admin_views/thing/' % self.urlbit)) self.assertEqual(response.status_code, 200) self.assertContains(response, u'<div id="changelist-filter">', msg_prefix=u'Expected filter not found in changelist view') self.assertNotContains(response, u'<a href="?color__id__exact=3">Blue</a>', msg_prefix=u'Changelist filter not correctly limited by limit_choices_to')
'Ensure incorrect lookup parameters are handled gracefully.'
def testIncorrectLookupParameters(self):
response = self.client.get((u'/test_admin/%s/admin_views/thing/' % self.urlbit), {u'notarealfield': u'5'}) self.assertRedirects(response, (u'/test_admin/%s/admin_views/thing/?e=1' % self.urlbit)) response = self.client.get((u'/test_admin/%s/admin_views/thing/' % self.urlbit), {u'notarealfield__whatever': u'5'}) self.assertRedirects(response, (u'/test_admin/%s/admin_views/thing/?e=1' % self.urlbit)) response = self.client.get((u'/test_admin/%s/admin_views/thing/' % self.urlbit), {u'color__id__exact': u'StringNotInteger!'}) self.assertRedirects(response, (u'/test_admin/%s/admin_views/thing/?e=1' % self.urlbit)) response = self.client.get((u'/test_admin/%s/admin_views/thing/' % self.urlbit), {u'pub_date__gte': u'foo'}) self.assertRedirects(response, (u'/test_admin/%s/admin_views/thing/?e=1' % self.urlbit))
'Ensure is_null is handled correctly.'
def testIsNullLookups(self):
Article.objects.create(title=u'I Could Go Anywhere', content=u'Versatile', date=datetime.datetime.now()) response = self.client.get((u'/test_admin/%s/admin_views/article/' % self.urlbit)) self.assertContains(response, u'4 articles') response = self.client.get((u'/test_admin/%s/admin_views/article/' % self.urlbit), {u'section__isnull': u'false'}) self.assertContains(response, u'3 articles') response = self.client.get((u'/test_admin/%s/admin_views/article/' % self.urlbit), {u'section__isnull': u'true'}) self.assertContains(response, u'1 article')
'Ensures the admin changelist shows correct values in the relevant column for rows corresponding to instances of a model in which a named group has been used in the choices option of a field.'
def testNamedGroupFieldChoicesChangeList(self):
link1 = reverse(u'admin:admin_views_fabric_change', args=(1,), current_app=self.urlbit) link2 = reverse(u'admin:admin_views_fabric_change', args=(2,), current_app=self.urlbit) response = self.client.get((u'/test_admin/%s/admin_views/fabric/' % self.urlbit)) fail_msg = u"Changelist table isn't showing the right human-readable values set by a model field 'choices' option named group." self.assertContains(response, (u'<a href="%s">Horizontal</a>' % link1), msg_prefix=fail_msg, html=True) self.assertContains(response, (u'<a href="%s">Vertical</a>' % link2), msg_prefix=fail_msg, html=True)
'Ensures the filter UI shows correctly when at least one named group has been used in the choices option of a model field.'
def testNamedGroupFieldChoicesFilter(self):
response = self.client.get((u'/test_admin/%s/admin_views/fabric/' % self.urlbit)) fail_msg = u"Changelist filter isn't showing options contained inside a model field 'choices' option named group." self.assertContains(response, u'<div id="changelist-filter">') self.assertContains(response, u'<a href="?surface__exact=x">Horizontal</a>', msg_prefix=fail_msg, html=True) self.assertContains(response, u'<a href="?surface__exact=y">Vertical</a>', msg_prefix=fail_msg, html=True)
'Check if the JavaScript i18n view returns an empty language catalog if the default language is non-English but the selected language is English. See #13388 and #3594 for more details.'
def testI18NLanguageNonEnglishDefault(self):
with self.settings(LANGUAGE_CODE=u'fr'): with translation.override(u'en-us'): response = self.client.get(u'/test_admin/admin/jsi18n/') self.assertNotContains(response, u'Choisir une heure')
'Makes sure that the fallback language is still working properly in cases where the selected language cannot be found.'
def testI18NLanguageNonEnglishFallback(self):
with self.settings(LANGUAGE_CODE=u'fr'): with translation.override(u'none'): response = self.client.get(u'/test_admin/admin/jsi18n/') self.assertContains(response, u'Choisir une heure')
'Check if L10N is deactivated, the JavaScript i18n view doesn\'t return localized date/time formats. Refs #14824.'
def testL10NDeactivated(self):
with self.settings(LANGUAGE_CODE=u'ru', USE_L10N=False): with translation.override(u'none'): response = self.client.get(u'/test_admin/admin/jsi18n/') self.assertNotContains(response, u'%d.%m.%Y %H:%M:%S') self.assertContains(response, u'%Y-%m-%d %H:%M:%S')
'Regressions test for ticket 15103 - filtering on fields defined in a ForeignKey \'limit_choices_to\' should be allowed, otherwise raw_id_fields can break.'
def test_allowed_filtering_15103(self):
try: self.client.get(u'/test_admin/admin/admin_views/inquisition/?leader__name=Palin&leader__age=27') except SuspiciousOperation: self.fail(u'Filters should be allowed if they are defined on a ForeignKey pointing to this model')
'Tests if the "change password" link in the admin is hidden if the User does not have a usable password set. (against 9bea85795705d015cdadc82c68b99196a8554f5c)'
def test_hide_change_password(self):
user = User.objects.get(username=u'super') password = user.password user.set_unusable_password() user.save() response = self.client.get(u'/test_admin/admin/') self.assertNotContains(response, reverse(u'admin:password_change'), msg_prefix=u'The "change password" link should not be displayed if a user does not have a usable password.')
'Ensured that the \'show_delete\' context variable in the admin\'s change view actually controls the display of the delete button. Refs #10057.'
def test_change_view_with_show_delete_extra_context(self):
instance = UndeletableObject.objects.create(name=u'foo') response = self.client.get((u'/test_admin/%s/admin_views/undeletableobject/%d/' % (self.urlbit, instance.pk))) self.assertNotContains(response, u'deletelink')
'Ensure that AttributeErrors are allowed to bubble when raised inside a change list view. Requires a model to be created so there\'s something to be displayed Refs: #16655, #18593, and #18747'
def test_allows_attributeerror_to_bubble_up(self):
Simple.objects.create() with self.assertRaises(AttributeError): self.client.get((u'/test_admin/%s/admin_views/simple/' % self.urlbit))
'Tests whether change_view has form_url in response.context'
def testChangeFormUrlHasCorrectValue(self):
response = self.client.get((u'/test_admin/%s/admin_views/section/1/' % self.urlbit)) self.assertTrue((u'form_url' in response.context), msg=u'form_url not present in response.context') self.assertEqual(response.context[u'form_url'], u'pony')
'Ensure that one can use a custom template to render an admin filter. Refs #17515.'
def test_filter_with_custom_template(self):
template_dirs = (settings.TEMPLATE_DIRS + (os.path.join(os.path.dirname(upath(__file__)), u'templates'),)) with self.settings(TEMPLATE_DIRS=template_dirs): response = self.client.get(u'/test_admin/admin/admin_views/color2/') self.assertTrue((u'custom_filter_template.html' in [t.name for t in response.templates]))
'JavaScript-assisted auto-focus on first field.'
def testSingleWidgetFirsFieldFocus(self):
response = self.client.get((u'/test_admin/%s/admin_views/picture/add/' % u'admin')) self.assertContains(response, u'<script type="text/javascript">document.getElementById("id_name").focus();</script>')
'JavaScript-assisted auto-focus should work if a model/ModelAdmin setup is such that the first form field has a MultiWidget.'
def testMultiWidgetFirsFieldFocus(self):
response = self.client.get((u'/test_admin/%s/admin_views/reservation/add/' % u'admin')) self.assertContains(response, u'<script type="text/javascript">document.getElementById("id_start_date_0").focus();</script>')
'Ensure that the minified versions of the JS files are only used when DEBUG is False. Refs #17521.'
def test_js_minified_only_if_debug_is_false(self):
with override_settings(DEBUG=False): response = self.client.get((u'/test_admin/%s/admin_views/section/add/' % u'admin')) self.assertNotContains(response, u'jquery.js') self.assertContains(response, u'jquery.min.js') self.assertNotContains(response, u'prepopulate.js') self.assertContains(response, u'prepopulate.min.js') self.assertNotContains(response, u'actions.js') self.assertContains(response, u'actions.min.js') self.assertNotContains(response, u'collapse.js') self.assertContains(response, u'collapse.min.js') self.assertNotContains(response, u'inlines.js') self.assertContains(response, u'inlines.min.js') with override_settings(DEBUG=True): response = self.client.get((u'/test_admin/%s/admin_views/section/add/' % u'admin')) self.assertContains(response, u'jquery.js') self.assertNotContains(response, u'jquery.min.js') self.assertContains(response, u'prepopulate.js') self.assertNotContains(response, u'prepopulate.min.js') self.assertContains(response, u'actions.js') self.assertNotContains(response, u'actions.min.js') self.assertContains(response, u'collapse.js') self.assertNotContains(response, u'collapse.min.js') self.assertContains(response, u'inlines.js') self.assertNotContains(response, u'inlines.min.js')
'Ensure save as actually creates a new person'
def test_save_as_duplication(self):
post_data = {u'_saveasnew': u'', u'name': u'John M', u'gender': 1, u'age': 42} response = self.client.post(u'/test_admin/admin/admin_views/person/1/', post_data) self.assertEqual(len(Person.objects.filter(name=u'John M')), 1) self.assertEqual(len(Person.objects.filter(id=1)), 1)
'Ensure that \'save as\' is displayed when activated and after submitting invalid data aside save_as_new will not show us a form to overwrite the initial model.'
def test_save_as_display(self):
response = self.client.get(u'/test_admin/admin/admin_views/person/1/') self.assertTrue(response.context[u'save_as']) post_data = {u'_saveasnew': u'', u'name': u'John M', u'gender': 3, u'alive': u'checked'} response = self.client.post(u'/test_admin/admin/admin_views/person/1/', post_data) self.assertEqual(response.context[u'form_url'], u'/test_admin/admin/admin_views/person/add/')
'Test setup.'
def setUp(self):
opts = Article._meta add_user = User.objects.get(username=u'adduser') add_user.user_permissions.add(get_perm(Article, opts.get_add_permission())) change_user = User.objects.get(username=u'changeuser') change_user.user_permissions.add(get_perm(Article, opts.get_change_permission())) delete_user = User.objects.get(username=u'deleteuser') delete_user.user_permissions.add(get_perm(Article, opts.get_delete_permission())) delete_user.user_permissions.add(get_perm(Section, Section._meta.get_delete_permission())) self.super_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'super', u'password': u'secret'} self.super_email_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'[email protected]', u'password': u'secret'} self.super_email_bad_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'[email protected]', u'password': u'notsecret'} self.adduser_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'adduser', u'password': u'secret'} self.changeuser_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'changeuser', u'password': u'secret'} self.deleteuser_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'deleteuser', u'password': u'secret'} self.joepublic_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'username': u'joepublic', u'password': u'secret'} self.no_username_login = {REDIRECT_FIELD_NAME: u'/test_admin/admin/', LOGIN_FORM_KEY: 1, u'password': u'secret'}
'Make sure only staff members can log in. Successful posts to the login page will redirect to the orignal url. Unsuccessfull attempts will continue to render the login page with a 200 status code.'
def testLogin(self):
response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.super_login) self.assertRedirects(login, u'/test_admin/admin/') self.assertFalse(login.context) self.client.get(u'/test_admin/admin/logout/') response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.super_email_login) self.assertContains(login, ERROR_MESSAGE) login = self.client.post(u'/test_admin/admin/', self.super_email_bad_login) self.assertContains(login, ERROR_MESSAGE) new_user = User(username=u'jondoe', password=u'secret', email=u'[email protected]') new_user.save() login = self.client.post(u'/test_admin/admin/', self.super_email_login) self.assertContains(login, ERROR_MESSAGE) response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.adduser_login) self.assertRedirects(login, u'/test_admin/admin/') self.assertFalse(login.context) self.client.get(u'/test_admin/admin/logout/') response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.changeuser_login) self.assertRedirects(login, u'/test_admin/admin/') self.assertFalse(login.context) self.client.get(u'/test_admin/admin/logout/') response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.deleteuser_login) self.assertRedirects(login, u'/test_admin/admin/') self.assertFalse(login.context) self.client.get(u'/test_admin/admin/logout/') response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.joepublic_login) self.assertEqual(login.status_code, 200) self.assertContains(login, ERROR_MESSAGE) response = self.client.get(u'/test_admin/admin/') self.assertEqual(response.status_code, 200) login = self.client.post(u'/test_admin/admin/', self.no_username_login) self.assertEqual(login.status_code, 200) form = login.context[0].get(u'form') self.assertEqual(form.errors[u'username'][0], u'This field is required.')
'Test add view restricts access and actually adds items.'
def testAddView(self):
add_dict = {u'title': u'D\xf8m ikke', u'content': u'<p>great article</p>', u'date_0': u'2008-03-18', u'date_1': u'10:54:39', u'section': 1} self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.changeuser_login) self.assertEqual(self.client.session.test_cookie_worked(), False) response = self.client.get(u'/test_admin/admin/admin_views/article/add/') self.assertEqual(response.status_code, 403) post = self.client.post(u'/test_admin/admin/admin_views/article/add/', add_dict) self.assertEqual(post.status_code, 403) self.assertEqual(Article.objects.all().count(), 3) self.client.get(u'/test_admin/admin/logout/') self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.adduser_login) addpage = self.client.get(u'/test_admin/admin/admin_views/article/add/') change_list_link = u'&rsaquo; <a href="/test_admin/admin/admin_views/article/">Articles</a>' self.assertNotContains(addpage, change_list_link, msg_prefix=u'User restricted to add permission is given link to change list view in breadcrumbs.') post = self.client.post(u'/test_admin/admin/admin_views/article/add/', add_dict) self.assertRedirects(post, u'/test_admin/admin/') self.assertEqual(Article.objects.all().count(), 4) self.assertEqual(len(mail.outbox), 1) self.assertEqual(mail.outbox[0].subject, u'Greetings from a created object') self.client.get(u'/test_admin/admin/logout/') self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.super_login) addpage = self.client.get(u'/test_admin/admin/admin_views/article/add/') self.assertContains(addpage, change_list_link, msg_prefix=u'Unrestricted user is not given link to change list view in breadcrumbs.') post = self.client.post(u'/test_admin/admin/admin_views/article/add/', add_dict) self.assertRedirects(post, u'/test_admin/admin/admin_views/article/') self.assertEqual(Article.objects.all().count(), 5) self.client.get(u'/test_admin/admin/logout/') login = self.client.login(username=u'joepublic', password=u'secret') self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.super_login) self.assertEqual(self.client.session.test_cookie_worked(), False)
'Change view should restrict access and allow users to edit items.'
def testChangeView(self):
change_dict = {u'title': u'Ikke ford\xf8mt', u'content': u'<p>edited article</p>', u'date_0': u'2008-03-18', u'date_1': u'10:54:39', u'section': 1} self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.adduser_login) response = self.client.get(u'/test_admin/admin/admin_views/article/') self.assertEqual(response.status_code, 403) response = self.client.get(u'/test_admin/admin/admin_views/article/1/') self.assertEqual(response.status_code, 403) post = self.client.post(u'/test_admin/admin/admin_views/article/1/', change_dict) self.assertEqual(post.status_code, 403) self.client.get(u'/test_admin/admin/logout/') self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.changeuser_login) response = self.client.get(u'/test_admin/admin/admin_views/article/') self.assertEqual(response.status_code, 200) response = self.client.get(u'/test_admin/admin/admin_views/article/1/') self.assertEqual(response.status_code, 200) post = self.client.post(u'/test_admin/admin/admin_views/article/1/', change_dict) self.assertRedirects(post, u'/test_admin/admin/admin_views/article/') self.assertEqual(Article.objects.get(pk=1).content, u'<p>edited article</p>') change_dict[u'title'] = u'' post = self.client.post(u'/test_admin/admin/admin_views/article/1/', change_dict) self.assertContains(post, u'Please correct the error below.', msg_prefix=u'Singular error message not found in response to post with one error') change_dict[u'content'] = u'' post = self.client.post(u'/test_admin/admin/admin_views/article/1/', change_dict) self.assertContains(post, u'Please correct the errors below.', msg_prefix=u'Plural error message not found in response to post with multiple errors') self.client.get(u'/test_admin/admin/logout/') RowLevelChangePermissionModel.objects.create(id=1, name=u'odd id') RowLevelChangePermissionModel.objects.create(id=2, name=u'even id') for login_dict in [self.super_login, self.changeuser_login, self.adduser_login, self.deleteuser_login]: self.client.post(u'/test_admin/admin/', login_dict) response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/1/') self.assertEqual(response.status_code, 403) response = self.client.post(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/1/', {u'name': u'changed'}) self.assertEqual(RowLevelChangePermissionModel.objects.get(id=1).name, u'odd id') self.assertEqual(response.status_code, 403) response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/2/') self.assertEqual(response.status_code, 200) response = self.client.post(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/2/', {u'name': u'changed'}) self.assertEqual(RowLevelChangePermissionModel.objects.get(id=2).name, u'changed') self.assertRedirects(response, u'/test_admin/admin/') self.client.get(u'/test_admin/admin/logout/') for login_dict in [self.joepublic_login, self.no_username_login]: self.client.post(u'/test_admin/admin/', login_dict) response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/1/') self.assertEqual(response.status_code, 200) self.assertContains(response, u'login-form') response = self.client.post(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/1/', {u'name': u'changed'}) self.assertEqual(RowLevelChangePermissionModel.objects.get(id=1).name, u'odd id') self.assertEqual(response.status_code, 200) self.assertContains(response, u'login-form') response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/2/') self.assertEqual(response.status_code, 200) self.assertContains(response, u'login-form') response = self.client.post(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/2/', {u'name': u'changed again'}) self.assertEqual(RowLevelChangePermissionModel.objects.get(id=2).name, u'changed') self.assertEqual(response.status_code, 200) self.assertContains(response, u'login-form') self.client.get(u'/test_admin/admin/logout/')
'History view should restrict access.'
def testHistoryView(self):
self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.adduser_login) response = self.client.get(u'/test_admin/admin/admin_views/article/1/history/') self.assertEqual(response.status_code, 403) self.client.get(u'/test_admin/admin/logout/') self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.changeuser_login) response = self.client.get(u'/test_admin/admin/admin_views/article/1/history/') self.assertEqual(response.status_code, 200) RowLevelChangePermissionModel.objects.create(id=1, name=u'odd id') RowLevelChangePermissionModel.objects.create(id=2, name=u'even id') for login_dict in [self.super_login, self.changeuser_login, self.adduser_login, self.deleteuser_login]: self.client.post(u'/test_admin/admin/', login_dict) response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/1/history/') self.assertEqual(response.status_code, 403) response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/2/history/') self.assertEqual(response.status_code, 200) self.client.get(u'/test_admin/admin/logout/') for login_dict in [self.joepublic_login, self.no_username_login]: self.client.post(u'/test_admin/admin/', login_dict) response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/1/history/') self.assertEqual(response.status_code, 200) self.assertContains(response, u'login-form') response = self.client.get(u'/test_admin/admin/admin_views/rowlevelchangepermissionmodel/2/history/') self.assertEqual(response.status_code, 200) self.assertContains(response, u'login-form') self.client.get(u'/test_admin/admin/logout/')
'The foreign key widget should only show the "add related" button if the user has permission to add that related item.'
def testConditionallyShowAddSectionLink(self):
url = u'/test_admin/admin/admin_views/article/add/' add_link_text = u' class="add-another"' self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.adduser_login) response = self.client.get(url) self.assertNotContains(response, add_link_text) add_user = User.objects.get(username=u'adduser') perm = get_perm(Section, Section._meta.get_add_permission()) add_user.user_permissions.add(perm) response = self.client.get(url) self.assertContains(response, add_link_text)
'Delete view should restrict access and actually delete items.'
def testDeleteView(self):
delete_dict = {u'post': u'yes'} self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.adduser_login) response = self.client.get(u'/test_admin/admin/admin_views/article/1/delete/') self.assertEqual(response.status_code, 403) post = self.client.post(u'/test_admin/admin/admin_views/article/1/delete/', delete_dict) self.assertEqual(post.status_code, 403) self.assertEqual(Article.objects.all().count(), 3) self.client.get(u'/test_admin/admin/logout/') self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.deleteuser_login) response = self.client.get(u'/test_admin/admin/admin_views/section/1/delete/') self.assertContains(response, u'admin_views/article/1/') response = self.client.get(u'/test_admin/admin/admin_views/article/1/delete/') self.assertEqual(response.status_code, 200) post = self.client.post(u'/test_admin/admin/admin_views/article/1/delete/', delete_dict) self.assertRedirects(post, u'/test_admin/admin/') self.assertEqual(Article.objects.all().count(), 2) self.assertEqual(len(mail.outbox), 1) self.assertEqual(mail.outbox[0].subject, u'Greetings from a deleted object') article_ct = ContentType.objects.get_for_model(Article) logged = LogEntry.objects.get(content_type=article_ct, action_flag=DELETION) self.assertEqual(logged.object_id, u'1') self.client.get(u'/test_admin/admin/logout/')
'Admin index views don\'t break when user\'s ModelAdmin removes standard urls'
def test_no_standard_modeladmin_urls(self):
self.client.get(u'/test_admin/admin/') self.client.post(u'/test_admin/admin/', self.changeuser_login) r = self.client.get(u'/test_admin/admin/') self.assertEqual(r.status_code, 200) self.client.get(u'/test_admin/admin/logout/')
'Objects should be nested to display the relationships that cause them to be scheduled for deletion.'
def test_nesting(self):
pattern = re.compile('<li>Plot: <a href=".+/admin_views/plot/1/">World Domination</a>\\s*<ul>\\s*<li>Plot details: <a href=".+/admin_views/plotdetails/1/">almost finished</a>') response = self.client.get((u'/test_admin/admin/admin_views/villain/%s/delete/' % quote(1))) self.assertRegexpMatches(response.content, pattern)