diff options
| author | Tom Christie | 2013-09-25 09:44:26 +0100 | 
|---|---|---|
| committer | Tom Christie | 2013-09-25 09:44:26 +0100 | 
| commit | 21cd6386593aea0b122abec1c5cc3bd5c544aa87 (patch) | |
| tree | b7d197c9c04f56448bee36c4789c93c66fb541a8 /rest_framework/tests | |
| parent | 9a5b2eefa92dede844ab94d049093e91ac98af5b (diff) | |
| parent | e8c6cd5622f62fcf2d4cf2b28b504fe5ff5228f9 (diff) | |
| download | django-rest-framework-21cd6386593aea0b122abec1c5cc3bd5c544aa87.tar.bz2 | |
Merge master
Diffstat (limited to 'rest_framework/tests')
| -rw-r--r-- | rest_framework/tests/test_filters.py | 14 | ||||
| -rw-r--r-- | rest_framework/tests/test_generics.py | 42 | ||||
| -rw-r--r-- | rest_framework/tests/test_pagination.py | 2 | ||||
| -rw-r--r-- | rest_framework/tests/test_permissions.py | 170 | ||||
| -rw-r--r-- | rest_framework/tests/test_relations_pk.py | 9 | ||||
| -rw-r--r-- | rest_framework/tests/test_views.py | 41 | 
6 files changed, 241 insertions, 37 deletions
diff --git a/rest_framework/tests/test_filters.py b/rest_framework/tests/test_filters.py index c9d9e7ff..379db29d 100644 --- a/rest_framework/tests/test_filters.py +++ b/rest_framework/tests/test_filters.py @@ -113,7 +113,7 @@ class IntegrationTestFiltering(CommonFilteringTestCase):      Integration tests for filtered list views.      """ -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_get_filtered_fields_root_view(self):          """          GET requests to paginated ListCreateAPIView should return paginated results. @@ -142,7 +142,7 @@ class IntegrationTestFiltering(CommonFilteringTestCase):          expected_data = [f for f in self.data if f['date'] == search_date]          self.assertEqual(response.data, expected_data) -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_filter_with_queryset(self):          """          Regression test for #814. @@ -157,7 +157,7 @@ class IntegrationTestFiltering(CommonFilteringTestCase):          expected_data = [f for f in self.data if f['decimal'] == search_decimal]          self.assertEqual(response.data, expected_data) -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_filter_with_get_queryset_only(self):          """          Regression test for #834. @@ -168,7 +168,7 @@ class IntegrationTestFiltering(CommonFilteringTestCase):          # Used to raise "issubclass() arg 2 must be a class or tuple of classes"          # here when neither `model' nor `queryset' was specified. -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_get_filtered_class_root_view(self):          """          GET requests to filtered ListCreateAPIView that have a filter_class set @@ -216,7 +216,7 @@ class IntegrationTestFiltering(CommonFilteringTestCase):                           f['decimal'] < search_decimal]          self.assertEqual(response.data, expected_data) -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_incorrectly_configured_filter(self):          """          An error should be displayed when the filter class is misconfigured. @@ -226,7 +226,7 @@ class IntegrationTestFiltering(CommonFilteringTestCase):          request = factory.get('/')          self.assertRaises(AssertionError, view, request) -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_unknown_filter(self):          """          GET requests with filters that aren't configured should return 200. @@ -248,7 +248,7 @@ class IntegrationTestDetailFiltering(CommonFilteringTestCase):      def _get_url(self, item):          return reverse('detail-view', kwargs=dict(pk=item.pk)) -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_get_filtered_detail_view(self):          """          GET requests to filtered RetrieveAPIView that have a filter_class set diff --git a/rest_framework/tests/test_generics.py b/rest_framework/tests/test_generics.py index 7a87d389..79cd99ac 100644 --- a/rest_framework/tests/test_generics.py +++ b/rest_framework/tests/test_generics.py @@ -272,6 +272,48 @@ class TestInstanceView(TestCase):          self.assertEqual(response.status_code, status.HTTP_200_OK)          self.assertEqual(response.data, expected) +    def test_options_before_instance_create(self): +        """ +        OPTIONS requests to RetrieveUpdateDestroyAPIView should return metadata +        before the instance has been created +        """ +        request = factory.options('/999') +        with self.assertNumQueries(1): +            response = self.view(request, pk=999).render() +        expected = { +            'parses': [ +                'application/json', +                'application/x-www-form-urlencoded', +                'multipart/form-data' +            ], +            'renders': [ +                'application/json', +                'text/html' +            ], +            'name': 'Instance', +            'description': 'Example description for OPTIONS.', +            'actions': { +                'PUT': { +                    'text': { +                        'max_length': 100, +                        'read_only': False, +                        'required': True, +                        'type': 'string', +                        'label': 'Text comes here', +                        'help_text': 'Text description.' +                    }, +                    'id': { +                        'read_only': True, +                        'required': False, +                        'type': 'integer', +                        'label': 'ID', +                    }, +                } +            } +        } +        self.assertEqual(response.status_code, status.HTTP_200_OK) +        self.assertEqual(response.data, expected) +      def test_get_instance_view_incorrect_arg(self):          """          GET requests with an incorrect pk type, should raise 404, not 500. diff --git a/rest_framework/tests/test_pagination.py b/rest_framework/tests/test_pagination.py index 4170d4b6..d6bc7895 100644 --- a/rest_framework/tests/test_pagination.py +++ b/rest_framework/tests/test_pagination.py @@ -122,7 +122,7 @@ class IntegrationTestPaginationAndFiltering(TestCase):              for obj in self.objects.all()          ] -    @unittest.skipUnless(django_filters, 'django-filters not installed') +    @unittest.skipUnless(django_filters, 'django-filter not installed')      def test_get_django_filter_paginated_filtered_root_view(self):          """          GET requests to paginated filtered ListCreateAPIView should return diff --git a/rest_framework/tests/test_permissions.py b/rest_framework/tests/test_permissions.py index e2cca380..d08124f4 100644 --- a/rest_framework/tests/test_permissions.py +++ b/rest_framework/tests/test_permissions.py @@ -1,18 +1,17 @@  from __future__ import unicode_literals -from django.contrib.auth.models import User, Permission +from django.contrib.auth.models import User, Permission, Group  from django.db import models  from django.test import TestCase +from django.utils import unittest  from rest_framework import generics, status, permissions, authentication, HTTP_HEADER_ENCODING +from rest_framework.compat import guardian +from rest_framework.filters import DjangoObjectPermissionsFilter  from rest_framework.test import APIRequestFactory +from rest_framework.tests.models import BasicModel  import base64  factory = APIRequestFactory() - -class BasicModel(models.Model): -    text = models.CharField(max_length=100) - -  class RootView(generics.ListCreateAPIView):      model = BasicModel      authentication_classes = [authentication.BasicAuthentication] @@ -144,45 +143,158 @@ class ModelPermissionsIntegrationTests(TestCase):          self.assertEqual(list(response.data['actions'].keys()), ['PUT']) -class OwnerModel(models.Model): +class BasicPermModel(models.Model):      text = models.CharField(max_length=100) -    owner = models.ForeignKey(User) +    class Meta: +        app_label = 'tests' +        permissions = ( +            ('view_basicpermmodel', 'Can view basic perm model'), +            # add, change, delete built in to django +        ) + +# Custom object-level permission, that includes 'view' permissions +class ViewObjectPermissions(permissions.DjangoObjectPermissions): +    perms_map = { +        'GET': ['%(app_label)s.view_%(model_name)s'], +        'OPTIONS': ['%(app_label)s.view_%(model_name)s'], +        'HEAD': ['%(app_label)s.view_%(model_name)s'], +        'POST': ['%(app_label)s.add_%(model_name)s'], +        'PUT': ['%(app_label)s.change_%(model_name)s'], +        'PATCH': ['%(app_label)s.change_%(model_name)s'], +        'DELETE': ['%(app_label)s.delete_%(model_name)s'], +    } + + +class ObjectPermissionInstanceView(generics.RetrieveUpdateDestroyAPIView): +    model = BasicPermModel +    authentication_classes = [authentication.BasicAuthentication] +    permission_classes = [ViewObjectPermissions] -class IsOwnerPermission(permissions.BasePermission): -    def has_object_permission(self, request, view, obj): -        return request.user == obj.owner +object_permissions_view = ObjectPermissionInstanceView.as_view() -class OwnerInstanceView(generics.RetrieveUpdateDestroyAPIView): -    model = OwnerModel +class ObjectPermissionListView(generics.ListAPIView): +    model = BasicPermModel      authentication_classes = [authentication.BasicAuthentication] -    permission_classes = [IsOwnerPermission] - +    permission_classes = [ViewObjectPermissions] -owner_instance_view = OwnerInstanceView.as_view() +object_permissions_list_view = ObjectPermissionListView.as_view() +@unittest.skipUnless(guardian, 'django-guardian not installed')  class ObjectPermissionsIntegrationTests(TestCase):      """      Integration tests for the object level permissions API.      """ +    @classmethod +    def setUpClass(cls): +        from guardian.shortcuts import assign_perm + +        # create users +        create = User.objects.create_user +        users = { +            'fullaccess': create('fullaccess', 'fullaccess@example.com', 'password'), +            'readonly': create('readonly', 'readonly@example.com', 'password'), +            'writeonly': create('writeonly', 'writeonly@example.com', 'password'), +            'deleteonly': create('deleteonly', 'deleteonly@example.com', 'password'), +        } + +        # give everyone model level permissions, as we are not testing those +        everyone = Group.objects.create(name='everyone') +        model_name = BasicPermModel._meta.module_name +        app_label = BasicPermModel._meta.app_label +        f = '{0}_{1}'.format +        perms = { +            'view':   f('view', model_name), +            'change': f('change', model_name), +            'delete': f('delete', model_name) +        } +        for perm in perms.values(): +            perm = '{0}.{1}'.format(app_label, perm) +            assign_perm(perm, everyone) +        everyone.user_set.add(*users.values()) + +        cls.perms = perms +        cls.users = users      def setUp(self): -        User.objects.create_user('not_owner', 'not_owner@example.com', 'password') -        user = User.objects.create_user('owner', 'owner@example.com', 'password') +        from guardian.shortcuts import assign_perm +        perms = self.perms +        users = self.users + +        # appropriate object level permissions +        readers = Group.objects.create(name='readers') +        writers = Group.objects.create(name='writers') +        deleters = Group.objects.create(name='deleters') + +        model = BasicPermModel.objects.create(text='foo') +         +        assign_perm(perms['view'], readers, model) +        assign_perm(perms['change'], writers, model) +        assign_perm(perms['delete'], deleters, model) + +        readers.user_set.add(users['fullaccess'], users['readonly']) +        writers.user_set.add(users['fullaccess'], users['writeonly']) +        deleters.user_set.add(users['fullaccess'], users['deleteonly']) + +        self.credentials = {} +        for user in users.values(): +            self.credentials[user.username] = basic_auth_header(user.username, 'password') + +    # Delete +    def test_can_delete_permissions(self): +        request = factory.delete('/1', HTTP_AUTHORIZATION=self.credentials['deleteonly']) +        response = object_permissions_view(request, pk='1') +        self.assertEqual(response.status_code, status.HTTP_204_NO_CONTENT) -        self.not_owner_credentials = basic_auth_header('not_owner', 'password') -        self.owner_credentials = basic_auth_header('owner', 'password') +    def test_cannot_delete_permissions(self): +        request = factory.delete('/1', HTTP_AUTHORIZATION=self.credentials['readonly']) +        response = object_permissions_view(request, pk='1') +        self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN) -        OwnerModel(text='foo', owner=user).save() +    # Update +    def test_can_update_permissions(self): +        request = factory.patch('/1', {'text': 'foobar'}, format='json', +            HTTP_AUTHORIZATION=self.credentials['writeonly']) +        response = object_permissions_view(request, pk='1') +        self.assertEqual(response.status_code, status.HTTP_200_OK) +        self.assertEqual(response.data.get('text'), 'foobar') + +    def test_cannot_update_permissions(self): +        request = factory.patch('/1', {'text': 'foobar'}, format='json', +            HTTP_AUTHORIZATION=self.credentials['deleteonly']) +        response = object_permissions_view(request, pk='1') +        self.assertEqual(response.status_code, status.HTTP_404_NOT_FOUND) + +    def test_cannot_update_permissions_non_existing(self): +        request = factory.patch('/999', {'text': 'foobar'}, format='json', +            HTTP_AUTHORIZATION=self.credentials['deleteonly']) +        response = object_permissions_view(request, pk='999') +        self.assertEqual(response.status_code, status.HTTP_404_NOT_FOUND) + +    # Read +    def test_can_read_permissions(self): +        request = factory.get('/1', HTTP_AUTHORIZATION=self.credentials['readonly']) +        response = object_permissions_view(request, pk='1') +        self.assertEqual(response.status_code, status.HTTP_200_OK) -    def test_owner_has_delete_permissions(self): -        request = factory.delete('/1', HTTP_AUTHORIZATION=self.owner_credentials) -        response = owner_instance_view(request, pk='1') -        self.assertEqual(response.status_code, status.HTTP_204_NO_CONTENT) +    def test_cannot_read_permissions(self): +        request = factory.get('/1', HTTP_AUTHORIZATION=self.credentials['writeonly']) +        response = object_permissions_view(request, pk='1') +        self.assertEqual(response.status_code, status.HTTP_404_NOT_FOUND) -    def test_non_owner_does_not_have_delete_permissions(self): -        request = factory.delete('/1', HTTP_AUTHORIZATION=self.not_owner_credentials) -        response = owner_instance_view(request, pk='1') -        self.assertEqual(response.status_code, status.HTTP_403_FORBIDDEN) +    # Read list +    def test_can_read_list_permissions(self): +        request = factory.get('/', HTTP_AUTHORIZATION=self.credentials['readonly']) +        object_permissions_list_view.cls.filter_backends = (DjangoObjectPermissionsFilter,) +        response = object_permissions_list_view(request) +        self.assertEqual(response.status_code, status.HTTP_200_OK) +        self.assertEqual(response.data[0].get('id'), 1) + +    def test_cannot_read_list_permissions(self): +        request = factory.get('/', HTTP_AUTHORIZATION=self.credentials['writeonly']) +        object_permissions_list_view.cls.filter_backends = (DjangoObjectPermissionsFilter,) +        response = object_permissions_list_view(request) +        self.assertEqual(response.status_code, status.HTTP_200_OK) +        self.assertListEqual(response.data, []) diff --git a/rest_framework/tests/test_relations_pk.py b/rest_framework/tests/test_relations_pk.py index e2a1b815..3815afdd 100644 --- a/rest_framework/tests/test_relations_pk.py +++ b/rest_framework/tests/test_relations_pk.py @@ -283,6 +283,15 @@ class PKForeignKeyTests(TestCase):          self.assertFalse(serializer.is_valid())          self.assertEqual(serializer.errors, {'target': ['This field is required.']}) +    def test_foreign_key_with_empty(self): +        """ +        Regression test for #1072 + +        https://github.com/tomchristie/django-rest-framework/issues/1072 +        """ +        serializer = NullableForeignKeySourceSerializer() +        self.assertEqual(serializer.data['target'], None) +  class PKNullableForeignKeyTests(TestCase):      def setUp(self): diff --git a/rest_framework/tests/test_views.py b/rest_framework/tests/test_views.py index c0bec5ae..65c7e50e 100644 --- a/rest_framework/tests/test_views.py +++ b/rest_framework/tests/test_views.py @@ -32,6 +32,16 @@ def basic_view(request):          return {'method': 'PATCH', 'data': request.DATA} +class ErrorView(APIView): +    def get(self, request, *args, **kwargs): +        raise Exception + + +@api_view(['GET']) +def error_view(request): +    raise Exception + +  def sanitise_json_error(error_dict):      """      Exact contents of JSON error messages depend on the installed version @@ -99,3 +109,34 @@ class FunctionBasedViewIntegrationTests(TestCase):          }          self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST)          self.assertEqual(sanitise_json_error(response.data), expected) + + +class TestCustomExceptionHandler(TestCase): +    def setUp(self): +        self.DEFAULT_HANDLER = api_settings.EXCEPTION_HANDLER + +        def exception_handler(exc): +            return Response('Error!', status=status.HTTP_400_BAD_REQUEST) + +        api_settings.EXCEPTION_HANDLER = exception_handler + +    def tearDown(self): +        api_settings.EXCEPTION_HANDLER = self.DEFAULT_HANDLER + +    def test_class_based_view_exception_handler(self): +        view = ErrorView.as_view() + +        request = factory.get('/', content_type='application/json') +        response = view(request) +        expected = 'Error!' +        self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST) +        self.assertEqual(response.data, expected) + +    def test_function_based_view_exception_handler(self): +        view = error_view + +        request = factory.get('/', content_type='application/json') +        response = view(request) +        expected = 'Error!' +        self.assertEqual(response.status_code, status.HTTP_400_BAD_REQUEST) +        self.assertEqual(response.data, expected)  | 
