forked from dcramer/django-compositepks
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Updates to the test suite to allow for newly deprecated and removed f…
…eatures git-svn-id: http://code.djangoproject.com/svn/django/trunk@15990 bcc190cf-cafb-0310-a4f2-bffc1f526a37
- Loading branch information
russellm
committed
Apr 2, 2011
1 parent
eb70cae
commit 2680899
Showing
28 changed files
with
255 additions
and
298 deletions.
There are no files selected for viewing
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
# from django.conf import settings | ||
from django.contrib.auth import authenticate | ||
from django.db.models import Q | ||
from django.test import TestCase | ||
# from django.template import Template | ||
|
||
class AuthContextProcessorTests(TestCase): | ||
""" | ||
Tests for the ``django.contrib.auth.context_processors.auth`` processor | ||
""" | ||
urls = 'regressiontests.context_processors.urls' | ||
fixtures = ['context-processors-users.xml'] | ||
|
||
def test_session_not_accessed(self): | ||
""" | ||
Tests that the session is not accessed simply by including | ||
the auth context processor | ||
""" | ||
response = self.client.get('/auth_processor_no_attr_access/') | ||
self.assertContains(response, "Session not accessed") | ||
|
||
def test_session_is_accessed(self): | ||
""" | ||
Tests that the session is accessed if the auth context processor | ||
is used and relevant attributes accessed. | ||
""" | ||
response = self.client.get('/auth_processor_attr_access/') | ||
self.assertContains(response, "Session accessed") | ||
|
||
def test_perms_attrs(self): | ||
self.client.login(username='super', password='secret') | ||
response = self.client.get('/auth_processor_perms/') | ||
self.assertContains(response, "Has auth permissions") | ||
|
||
def test_message_attrs(self): | ||
self.client.login(username='super', password='secret') | ||
response = self.client.get('/auth_processor_messages/') | ||
self.assertContains(response, "Message 1") | ||
|
||
def test_user_attrs(self): | ||
""" | ||
Test that the lazy objects returned behave just like the wrapped objects. | ||
""" | ||
# These are 'functional' level tests for common use cases. Direct | ||
# testing of the implementation (SimpleLazyObject) is in the 'utils' | ||
# tests. | ||
self.client.login(username='super', password='secret') | ||
user = authenticate(username='super', password='secret') | ||
response = self.client.get('/auth_processor_user/') | ||
self.assertContains(response, "unicode: super") | ||
self.assertContains(response, "id: 100") | ||
self.assertContains(response, "username: super") | ||
# bug #12037 is tested by the {% url %} in the template: | ||
self.assertContains(response, "url: /userpage/super/") | ||
|
||
# See if this object can be used for queries where a Q() comparing | ||
# a user can be used with another Q() (in an AND or OR fashion). | ||
# This simulates what a template tag might do with the user from the | ||
# context. Note that we don't need to execute a query, just build it. | ||
# | ||
# The failure case (bug #12049) on Python 2.4 with a LazyObject-wrapped | ||
# User is a fatal TypeError: "function() takes at least 2 arguments | ||
# (0 given)" deep inside deepcopy(). | ||
# | ||
# Python 2.5 and 2.6 succeeded, but logged internally caught exception | ||
# spew: | ||
# | ||
# Exception RuntimeError: 'maximum recursion depth exceeded while | ||
# calling a Python object' in <type 'exceptions.AttributeError'> | ||
# ignored" | ||
query = Q(user=response.context['user']) & Q(someflag=True) | ||
|
||
# Tests for user equality. This is hard because User defines | ||
# equality in a non-duck-typing way | ||
# See bug #12060 | ||
self.assertEqual(response.context['user'], user) | ||
self.assertEqual(user, response.context['user']) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
from django.conf.urls.defaults import patterns | ||
from django.conf.urls.defaults import patterns, url | ||
from django.contrib.auth.urls import urlpatterns | ||
from django.contrib.auth.views import password_reset | ||
from django.contrib.auth.decorators import login_required | ||
|
@@ -13,6 +13,35 @@ def remote_user_auth_view(request): | |
c = RequestContext(request, {}) | ||
return HttpResponse(t.render(c)) | ||
|
||
def auth_processor_no_attr_access(request): | ||
r1 = render_to_response('context_processors/auth_attrs_no_access.html', | ||
RequestContext(request, {}, processors=[context_processors.auth])) | ||
# *After* rendering, we check whether the session was accessed | ||
return render_to_response('context_processors/auth_attrs_test_access.html', | ||
{'session_accessed':request.session.accessed}) | ||
|
||
def auth_processor_attr_access(request): | ||
r1 = render_to_response('context_processors/auth_attrs_access.html', | ||
RequestContext(request, {}, processors=[context_processors.auth])) | ||
return render_to_response('context_processors/auth_attrs_test_access.html', | ||
{'session_accessed':request.session.accessed}) | ||
|
||
def auth_processor_user(request): | ||
return render_to_response('context_processors/auth_attrs_user.html', | ||
RequestContext(request, {}, processors=[context_processors.auth])) | ||
|
||
def auth_processor_perms(request): | ||
return render_to_response('context_processors/auth_attrs_perms.html', | ||
RequestContext(request, {}, processors=[context_processors.auth])) | ||
|
||
def auth_processor_messages(request): | ||
request.user.message_set.create(message="Message 1") | ||
return render_to_response('context_processors/auth_attrs_messages.html', | ||
RequestContext(request, {}, processors=[context_processors.auth])) | ||
|
||
def userpage(request): | ||
pass | ||
|
||
# special urls for auth test cases | ||
urlpatterns = urlpatterns + patterns('', | ||
(r'^logout/custom_query/$', 'django.contrib.auth.views.logout', dict(redirect_field_name='follow')), | ||
|
@@ -21,5 +50,12 @@ def remote_user_auth_view(request): | |
(r'^password_reset_from_email/$', 'django.contrib.auth.views.password_reset', dict(from_email='[email protected]')), | ||
(r'^login_required/$', login_required(password_reset)), | ||
(r'^login_required_login_url/$', login_required(password_reset, login_url='/somewhere/')), | ||
|
||
(r'^auth_processor_no_attr_access/$', auth_processor_no_attr_access), | ||
(r'^auth_processor_attr_access/$', auth_processor_attr_access), | ||
(r'^auth_processor_user/$', auth_processor_user), | ||
(r'^auth_processor_perms/$', auth_processor_perms), | ||
(r'^auth_processor_messages/$', auth_processor_messages), | ||
url(r'^userpage/(.+)/$', userpage, name="userpage"), | ||
) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.