Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1 | import unittest |
Benjamin Peterson | ee8712c | 2008-05-20 21:35:26 +0000 | [diff] [blame] | 2 | from test import support |
Serhiy Storchaka | f54c350 | 2014-09-06 21:41:39 +0300 | [diff] [blame] | 3 | from test import test_urllib |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 4 | |
Christian Heimes | 05e8be1 | 2008-02-23 18:30:17 +0000 | [diff] [blame] | 5 | import os |
Guido van Rossum | 34d1928 | 2007-08-09 01:03:29 +0000 | [diff] [blame] | 6 | import io |
Georg Brandl | f78e02b | 2008-06-10 17:40:04 +0000 | [diff] [blame] | 7 | import socket |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 8 | import array |
Senthil Kumaran | 4de00a2 | 2011-05-11 21:17:57 +0800 | [diff] [blame] | 9 | import sys |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 10 | import tempfile |
| 11 | import subprocess |
Jeremy Hylton | e3e6104 | 2001-05-09 15:50:25 +0000 | [diff] [blame] | 12 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 13 | import urllib.request |
Ronald Oussoren | e72e161 | 2011-03-14 18:15:25 -0400 | [diff] [blame] | 14 | # The proxy bypass method imported below has logic specific to the OSX |
| 15 | # proxy config data structure but is testable on all platforms. |
R David Murray | 4c7f995 | 2015-04-16 16:36:18 -0400 | [diff] [blame] | 16 | from urllib.request import (Request, OpenerDirector, HTTPBasicAuthHandler, |
| 17 | HTTPPasswordMgrWithPriorAuth, _parse_proxy, |
Berker Peksag | e88dd1c | 2016-03-06 16:16:40 +0200 | [diff] [blame] | 18 | _proxy_bypass_macosx_sysconf, |
| 19 | AbstractDigestAuthHandler) |
Senthil Kumaran | 8307075 | 2013-05-24 09:14:12 -0700 | [diff] [blame] | 20 | from urllib.parse import urlparse |
guido@google.com | a119df9 | 2011-03-29 11:41:02 -0700 | [diff] [blame] | 21 | import urllib.error |
Serhiy Storchaka | f54c350 | 2014-09-06 21:41:39 +0300 | [diff] [blame] | 22 | import http.client |
Jeremy Hylton | e3e6104 | 2001-05-09 15:50:25 +0000 | [diff] [blame] | 23 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 24 | # XXX |
| 25 | # Request |
| 26 | # CacheFTPHandler (hard to write) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 27 | # parse_keqv_list, parse_http_list, HTTPDigestAuthHandler |
Jeremy Hylton | e3e6104 | 2001-05-09 15:50:25 +0000 | [diff] [blame] | 28 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 29 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 30 | class TrivialTests(unittest.TestCase): |
Senthil Kumaran | 6c5bd40 | 2011-11-01 23:20:31 +0800 | [diff] [blame] | 31 | |
| 32 | def test___all__(self): |
| 33 | # Verify which names are exposed |
| 34 | for module in 'request', 'response', 'parse', 'error', 'robotparser': |
| 35 | context = {} |
| 36 | exec('from urllib.%s import *' % module, context) |
| 37 | del context['__builtins__'] |
Florent Xicluna | 3dbb1f1 | 2011-11-04 22:15:37 +0100 | [diff] [blame] | 38 | if module == 'request' and os.name == 'nt': |
| 39 | u, p = context.pop('url2pathname'), context.pop('pathname2url') |
| 40 | self.assertEqual(u.__module__, 'nturl2path') |
| 41 | self.assertEqual(p.__module__, 'nturl2path') |
Senthil Kumaran | 6c5bd40 | 2011-11-01 23:20:31 +0800 | [diff] [blame] | 42 | for k, v in context.items(): |
| 43 | self.assertEqual(v.__module__, 'urllib.%s' % module, |
| 44 | "%r is exposed in 'urllib.%s' but defined in %r" % |
| 45 | (k, module, v.__module__)) |
| 46 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 47 | def test_trivial(self): |
| 48 | # A couple trivial tests |
Guido van Rossum | e2ae77b | 2001-10-24 20:42:55 +0000 | [diff] [blame] | 49 | |
Victor Stinner | 7cb9204 | 2019-07-02 14:50:19 +0200 | [diff] [blame] | 50 | # clear _opener global variable |
| 51 | self.addCleanup(urllib.request.urlcleanup) |
| 52 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 53 | self.assertRaises(ValueError, urllib.request.urlopen, 'bogus url') |
Tim Peters | 861adac | 2001-07-16 20:49:49 +0000 | [diff] [blame] | 54 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 55 | # XXX Name hacking to get this to work on Windows. |
Serhiy Storchaka | 5106d04 | 2015-01-26 10:26:14 +0200 | [diff] [blame] | 56 | fname = os.path.abspath(urllib.request.__file__).replace(os.sep, '/') |
Senthil Kumaran | d587e30 | 2010-01-10 17:45:52 +0000 | [diff] [blame] | 57 | |
Senthil Kumaran | d587e30 | 2010-01-10 17:45:52 +0000 | [diff] [blame] | 58 | if os.name == 'nt': |
| 59 | file_url = "file:///%s" % fname |
| 60 | else: |
| 61 | file_url = "file://%s" % fname |
| 62 | |
Serhiy Storchaka | 5b10b98 | 2019-03-05 10:06:26 +0200 | [diff] [blame] | 63 | with urllib.request.urlopen(file_url) as f: |
| 64 | f.read() |
Tim Peters | f5f32b4 | 2005-07-17 23:16:17 +0000 | [diff] [blame] | 65 | |
Georg Brandl | e1b13d2 | 2005-08-24 22:20:32 +0000 | [diff] [blame] | 66 | def test_parse_http_list(self): |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 67 | tests = [ |
| 68 | ('a,b,c', ['a', 'b', 'c']), |
| 69 | ('path"o,l"og"i"cal, example', ['path"o,l"og"i"cal', 'example']), |
| 70 | ('a, b, "c", "d", "e,f", g, h', |
| 71 | ['a', 'b', '"c"', '"d"', '"e,f"', 'g', 'h']), |
| 72 | ('a="b\\"c", d="e\\,f", g="h\\\\i"', |
| 73 | ['a="b"c"', 'd="e,f"', 'g="h\\i"'])] |
Georg Brandl | e1b13d2 | 2005-08-24 22:20:32 +0000 | [diff] [blame] | 74 | for string, list in tests: |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 75 | self.assertEqual(urllib.request.parse_http_list(string), list) |
Georg Brandl | e1b13d2 | 2005-08-24 22:20:32 +0000 | [diff] [blame] | 76 | |
Senthil Kumaran | 843fae9 | 2013-03-19 13:43:42 -0700 | [diff] [blame] | 77 | def test_URLError_reasonstr(self): |
| 78 | err = urllib.error.URLError('reason') |
| 79 | self.assertIn(err.reason, str(err)) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 80 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 81 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 82 | class RequestHdrsTests(unittest.TestCase): |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 83 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 84 | def test_request_headers_dict(self): |
| 85 | """ |
| 86 | The Request.headers dictionary is not a documented interface. It |
| 87 | should stay that way, because the complete set of headers are only |
| 88 | accessible through the .get_header(), .has_header(), .header_items() |
| 89 | interface. However, .headers pre-dates those methods, and so real code |
| 90 | will be using the dictionary. |
| 91 | |
| 92 | The introduction in 2.4 of those methods was a mistake for the same |
| 93 | reason: code that previously saw all (urllib2 user)-provided headers in |
| 94 | .headers now sees only a subset. |
| 95 | |
| 96 | """ |
| 97 | url = "http://example.com" |
| 98 | self.assertEqual(Request(url, |
| 99 | headers={"Spam-eggs": "blah"} |
| 100 | ).headers["Spam-eggs"], "blah") |
| 101 | self.assertEqual(Request(url, |
| 102 | headers={"spam-EggS": "blah"} |
| 103 | ).headers["Spam-eggs"], "blah") |
| 104 | |
| 105 | def test_request_headers_methods(self): |
| 106 | """ |
| 107 | Note the case normalization of header names here, to |
| 108 | .capitalize()-case. This should be preserved for |
| 109 | backwards-compatibility. (In the HTTP case, normalization to |
| 110 | .title()-case is done by urllib2 before sending headers to |
| 111 | http.client). |
| 112 | |
| 113 | Note that e.g. r.has_header("spam-EggS") is currently False, and |
| 114 | r.get_header("spam-EggS") returns None, but that could be changed in |
| 115 | future. |
| 116 | |
| 117 | Method r.remove_header should remove items both from r.headers and |
| 118 | r.unredirected_hdrs dictionaries |
| 119 | """ |
| 120 | url = "http://example.com" |
| 121 | req = Request(url, headers={"Spam-eggs": "blah"}) |
| 122 | self.assertTrue(req.has_header("Spam-eggs")) |
| 123 | self.assertEqual(req.header_items(), [('Spam-eggs', 'blah')]) |
| 124 | |
| 125 | req.add_header("Foo-Bar", "baz") |
| 126 | self.assertEqual(sorted(req.header_items()), |
| 127 | [('Foo-bar', 'baz'), ('Spam-eggs', 'blah')]) |
| 128 | self.assertFalse(req.has_header("Not-there")) |
| 129 | self.assertIsNone(req.get_header("Not-there")) |
| 130 | self.assertEqual(req.get_header("Not-there", "default"), "default") |
| 131 | |
| 132 | req.remove_header("Spam-eggs") |
| 133 | self.assertFalse(req.has_header("Spam-eggs")) |
| 134 | |
| 135 | req.add_unredirected_header("Unredirected-spam", "Eggs") |
| 136 | self.assertTrue(req.has_header("Unredirected-spam")) |
| 137 | |
| 138 | req.remove_header("Unredirected-spam") |
| 139 | self.assertFalse(req.has_header("Unredirected-spam")) |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 140 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 141 | def test_password_manager(self): |
| 142 | mgr = urllib.request.HTTPPasswordMgr() |
| 143 | add = mgr.add_password |
| 144 | find_user_pass = mgr.find_user_password |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 145 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 146 | add("Some Realm", "http://example.com/", "joe", "password") |
| 147 | add("Some Realm", "http://example.com/ni", "ni", "ni") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 148 | add("Some Realm", "http://c.example.com:3128", "3", "c") |
| 149 | add("Some Realm", "d.example.com", "4", "d") |
| 150 | add("Some Realm", "e.example.com:3128", "5", "e") |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 151 | |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 152 | # For the same realm, password set the highest path is the winner. |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 153 | self.assertEqual(find_user_pass("Some Realm", "example.com"), |
| 154 | ('joe', 'password')) |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 155 | self.assertEqual(find_user_pass("Some Realm", "http://example.com/ni"), |
| 156 | ('joe', 'password')) |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 157 | self.assertEqual(find_user_pass("Some Realm", "http://example.com"), |
| 158 | ('joe', 'password')) |
| 159 | self.assertEqual(find_user_pass("Some Realm", "http://example.com/"), |
| 160 | ('joe', 'password')) |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 161 | self.assertEqual(find_user_pass("Some Realm", |
| 162 | "http://example.com/spam"), |
| 163 | ('joe', 'password')) |
| 164 | |
| 165 | self.assertEqual(find_user_pass("Some Realm", |
| 166 | "http://example.com/spam/spam"), |
| 167 | ('joe', 'password')) |
| 168 | |
| 169 | # You can have different passwords for different paths. |
| 170 | |
| 171 | add("c", "http://example.com/foo", "foo", "ni") |
| 172 | add("c", "http://example.com/bar", "bar", "nini") |
| 173 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 174 | self.assertEqual(find_user_pass("c", "http://example.com/foo"), |
| 175 | ('foo', 'ni')) |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 176 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 177 | self.assertEqual(find_user_pass("c", "http://example.com/bar"), |
| 178 | ('bar', 'nini')) |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 179 | |
| 180 | # For the same path, newer password should be considered. |
| 181 | |
| 182 | add("b", "http://example.com/", "first", "blah") |
| 183 | add("b", "http://example.com/", "second", "spam") |
| 184 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 185 | self.assertEqual(find_user_pass("b", "http://example.com/"), |
| 186 | ('second', 'spam')) |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 187 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 188 | # No special relationship between a.example.com and example.com: |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 189 | |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 190 | add("a", "http://example.com", "1", "a") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 191 | self.assertEqual(find_user_pass("a", "http://example.com/"), |
| 192 | ('1', 'a')) |
Senthil Kumaran | 1f5425f | 2017-03-31 22:27:27 -0700 | [diff] [blame] | 193 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 194 | self.assertEqual(find_user_pass("a", "http://a.example.com/"), |
| 195 | (None, None)) |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 196 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 197 | # Ports: |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 198 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 199 | self.assertEqual(find_user_pass("Some Realm", "c.example.com"), |
| 200 | (None, None)) |
| 201 | self.assertEqual(find_user_pass("Some Realm", "c.example.com:3128"), |
| 202 | ('3', 'c')) |
| 203 | self.assertEqual( |
| 204 | find_user_pass("Some Realm", "http://c.example.com:3128"), |
| 205 | ('3', 'c')) |
| 206 | self.assertEqual(find_user_pass("Some Realm", "d.example.com"), |
| 207 | ('4', 'd')) |
| 208 | self.assertEqual(find_user_pass("Some Realm", "e.example.com:3128"), |
| 209 | ('5', 'e')) |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 210 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 211 | def test_password_manager_default_port(self): |
| 212 | """ |
| 213 | The point to note here is that we can't guess the default port if |
| 214 | there's no scheme. This applies to both add_password and |
| 215 | find_user_password. |
| 216 | """ |
| 217 | mgr = urllib.request.HTTPPasswordMgr() |
| 218 | add = mgr.add_password |
| 219 | find_user_pass = mgr.find_user_password |
| 220 | add("f", "http://g.example.com:80", "10", "j") |
| 221 | add("g", "http://h.example.com", "11", "k") |
| 222 | add("h", "i.example.com:80", "12", "l") |
| 223 | add("i", "j.example.com", "13", "m") |
| 224 | self.assertEqual(find_user_pass("f", "g.example.com:100"), |
| 225 | (None, None)) |
| 226 | self.assertEqual(find_user_pass("f", "g.example.com:80"), |
| 227 | ('10', 'j')) |
| 228 | self.assertEqual(find_user_pass("f", "g.example.com"), |
| 229 | (None, None)) |
| 230 | self.assertEqual(find_user_pass("f", "http://g.example.com:100"), |
| 231 | (None, None)) |
| 232 | self.assertEqual(find_user_pass("f", "http://g.example.com:80"), |
| 233 | ('10', 'j')) |
| 234 | self.assertEqual(find_user_pass("f", "http://g.example.com"), |
| 235 | ('10', 'j')) |
| 236 | self.assertEqual(find_user_pass("g", "h.example.com"), ('11', 'k')) |
| 237 | self.assertEqual(find_user_pass("g", "h.example.com:80"), ('11', 'k')) |
| 238 | self.assertEqual(find_user_pass("g", "http://h.example.com:80"), |
| 239 | ('11', 'k')) |
| 240 | self.assertEqual(find_user_pass("h", "i.example.com"), (None, None)) |
| 241 | self.assertEqual(find_user_pass("h", "i.example.com:80"), ('12', 'l')) |
| 242 | self.assertEqual(find_user_pass("h", "http://i.example.com:80"), |
| 243 | ('12', 'l')) |
| 244 | self.assertEqual(find_user_pass("i", "j.example.com"), ('13', 'm')) |
| 245 | self.assertEqual(find_user_pass("i", "j.example.com:80"), |
| 246 | (None, None)) |
| 247 | self.assertEqual(find_user_pass("i", "http://j.example.com"), |
| 248 | ('13', 'm')) |
| 249 | self.assertEqual(find_user_pass("i", "http://j.example.com:80"), |
| 250 | (None, None)) |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 251 | |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 252 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 253 | class MockOpener: |
| 254 | addheaders = [] |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 255 | |
Senthil Kumaran | fb8cc2f | 2009-07-19 02:44:19 +0000 | [diff] [blame] | 256 | def open(self, req, data=None, timeout=socket._GLOBAL_DEFAULT_TIMEOUT): |
| 257 | self.req, self.data, self.timeout = req, data, timeout |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 258 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 259 | def error(self, proto, *args): |
| 260 | self.proto, self.args = proto, args |
| 261 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 262 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 263 | class MockFile: |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 264 | def read(self, count=None): |
| 265 | pass |
| 266 | |
| 267 | def readline(self, count=None): |
| 268 | pass |
| 269 | |
| 270 | def close(self): |
| 271 | pass |
| 272 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 273 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 274 | class MockHeaders(dict): |
| 275 | def getheaders(self, name): |
Guido van Rossum | cc2b016 | 2007-02-11 06:12:03 +0000 | [diff] [blame] | 276 | return list(self.values()) |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 277 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 278 | |
Guido van Rossum | 34d1928 | 2007-08-09 01:03:29 +0000 | [diff] [blame] | 279 | class MockResponse(io.StringIO): |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 280 | def __init__(self, code, msg, headers, data, url=None): |
Guido van Rossum | 34d1928 | 2007-08-09 01:03:29 +0000 | [diff] [blame] | 281 | io.StringIO.__init__(self, data) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 282 | self.code, self.msg, self.headers, self.url = code, msg, headers, url |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 283 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 284 | def info(self): |
| 285 | return self.headers |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 286 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 287 | def geturl(self): |
| 288 | return self.url |
| 289 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 290 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 291 | class MockCookieJar: |
| 292 | def add_cookie_header(self, request): |
| 293 | self.ach_req = request |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 294 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 295 | def extract_cookies(self, response, request): |
| 296 | self.ec_req, self.ec_r = request, response |
| 297 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 298 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 299 | class FakeMethod: |
| 300 | def __init__(self, meth_name, action, handle): |
| 301 | self.meth_name = meth_name |
| 302 | self.handle = handle |
| 303 | self.action = action |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 304 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 305 | def __call__(self, *args): |
| 306 | return self.handle(self.meth_name, self.action, *args) |
| 307 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 308 | |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 309 | class MockHTTPResponse(io.IOBase): |
| 310 | def __init__(self, fp, msg, status, reason): |
| 311 | self.fp = fp |
| 312 | self.msg = msg |
| 313 | self.status = status |
| 314 | self.reason = reason |
| 315 | self.code = 200 |
| 316 | |
| 317 | def read(self): |
| 318 | return '' |
| 319 | |
| 320 | def info(self): |
| 321 | return {} |
| 322 | |
| 323 | def geturl(self): |
| 324 | return self.url |
| 325 | |
| 326 | |
| 327 | class MockHTTPClass: |
| 328 | def __init__(self): |
| 329 | self.level = 0 |
| 330 | self.req_headers = [] |
| 331 | self.data = None |
| 332 | self.raise_on_endheaders = False |
Nadeem Vawda | bd26b54 | 2012-10-21 17:37:43 +0200 | [diff] [blame] | 333 | self.sock = None |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 334 | self._tunnel_headers = {} |
| 335 | |
| 336 | def __call__(self, host, timeout=socket._GLOBAL_DEFAULT_TIMEOUT): |
| 337 | self.host = host |
| 338 | self.timeout = timeout |
| 339 | return self |
| 340 | |
| 341 | def set_debuglevel(self, level): |
| 342 | self.level = level |
| 343 | |
| 344 | def set_tunnel(self, host, port=None, headers=None): |
| 345 | self._tunnel_host = host |
| 346 | self._tunnel_port = port |
| 347 | if headers: |
| 348 | self._tunnel_headers = headers |
| 349 | else: |
| 350 | self._tunnel_headers.clear() |
| 351 | |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 352 | def request(self, method, url, body=None, headers=None, *, |
| 353 | encode_chunked=False): |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 354 | self.method = method |
| 355 | self.selector = url |
Benjamin Peterson | 3d5b8db | 2009-12-24 01:14:05 +0000 | [diff] [blame] | 356 | if headers is not None: |
| 357 | self.req_headers += headers.items() |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 358 | self.req_headers.sort() |
| 359 | if body: |
| 360 | self.data = body |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 361 | self.encode_chunked = encode_chunked |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 362 | if self.raise_on_endheaders: |
Andrew Svetlov | 0832af6 | 2012-12-18 23:10:48 +0200 | [diff] [blame] | 363 | raise OSError() |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 364 | |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 365 | def getresponse(self): |
| 366 | return MockHTTPResponse(MockFile(), {}, 200, "OK") |
| 367 | |
Victor Stinner | a4c45d7 | 2011-06-17 14:01:18 +0200 | [diff] [blame] | 368 | def close(self): |
| 369 | pass |
| 370 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 371 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 372 | class MockHandler: |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 373 | # useful for testing handler machinery |
| 374 | # see add_ordered_mock_handlers() docstring |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 375 | handler_order = 500 |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 376 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 377 | def __init__(self, methods): |
| 378 | self._define_methods(methods) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 379 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 380 | def _define_methods(self, methods): |
| 381 | for spec in methods: |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 382 | if len(spec) == 2: |
| 383 | name, action = spec |
| 384 | else: |
| 385 | name, action = spec, None |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 386 | meth = FakeMethod(name, action, self.handle) |
| 387 | setattr(self.__class__, name, meth) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 388 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 389 | def handle(self, fn_name, action, *args, **kwds): |
| 390 | self.parent.calls.append((self, fn_name, args, kwds)) |
| 391 | if action is None: |
| 392 | return None |
| 393 | elif action == "return self": |
| 394 | return self |
| 395 | elif action == "return response": |
| 396 | res = MockResponse(200, "OK", {}, "") |
| 397 | return res |
| 398 | elif action == "return request": |
| 399 | return Request("http://blah/") |
| 400 | elif action.startswith("error"): |
| 401 | code = action[action.rfind(" ")+1:] |
| 402 | try: |
| 403 | code = int(code) |
| 404 | except ValueError: |
| 405 | pass |
| 406 | res = MockResponse(200, "OK", {}, "") |
| 407 | return self.parent.error("http", args[0], res, code, "", {}) |
| 408 | elif action == "raise": |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 409 | raise urllib.error.URLError("blah") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 410 | assert False |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 411 | |
| 412 | def close(self): |
| 413 | pass |
| 414 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 415 | def add_parent(self, parent): |
| 416 | self.parent = parent |
| 417 | self.parent.calls = [] |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 418 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 419 | def __lt__(self, other): |
| 420 | if not hasattr(other, "handler_order"): |
| 421 | # No handler_order, leave in original order. Yuck. |
| 422 | return True |
| 423 | return self.handler_order < other.handler_order |
| 424 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 425 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 426 | def add_ordered_mock_handlers(opener, meth_spec): |
| 427 | """Create MockHandlers and add them to an OpenerDirector. |
| 428 | |
| 429 | meth_spec: list of lists of tuples and strings defining methods to define |
| 430 | on handlers. eg: |
| 431 | |
| 432 | [["http_error", "ftp_open"], ["http_open"]] |
| 433 | |
| 434 | defines methods .http_error() and .ftp_open() on one handler, and |
| 435 | .http_open() on another. These methods just record their arguments and |
| 436 | return None. Using a tuple instead of a string causes the method to |
| 437 | perform some action (see MockHandler.handle()), eg: |
| 438 | |
| 439 | [["http_error"], [("http_open", "return request")]] |
| 440 | |
| 441 | defines .http_error() on one handler (which simply returns None), and |
| 442 | .http_open() on another handler, which returns a Request object. |
| 443 | |
| 444 | """ |
| 445 | handlers = [] |
| 446 | count = 0 |
| 447 | for meths in meth_spec: |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 448 | class MockHandlerSubclass(MockHandler): |
| 449 | pass |
| 450 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 451 | h = MockHandlerSubclass(meths) |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 452 | h.handler_order += count |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 453 | h.add_parent(opener) |
| 454 | count = count + 1 |
| 455 | handlers.append(h) |
| 456 | opener.add_handler(h) |
| 457 | return handlers |
| 458 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 459 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 460 | def build_test_opener(*handler_instances): |
| 461 | opener = OpenerDirector() |
| 462 | for h in handler_instances: |
| 463 | opener.add_handler(h) |
| 464 | return opener |
| 465 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 466 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 467 | class MockHTTPHandler(urllib.request.BaseHandler): |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 468 | # useful for testing redirections and auth |
| 469 | # sends supplied headers and code as first response |
| 470 | # sends 200 OK as second response |
| 471 | def __init__(self, code, headers): |
| 472 | self.code = code |
| 473 | self.headers = headers |
| 474 | self.reset() |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 475 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 476 | def reset(self): |
| 477 | self._count = 0 |
| 478 | self.requests = [] |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 479 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 480 | def http_open(self, req): |
Martin Panter | ce6e068 | 2016-05-16 01:07:13 +0000 | [diff] [blame] | 481 | import email, copy |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 482 | self.requests.append(copy.deepcopy(req)) |
| 483 | if self._count == 0: |
| 484 | self._count = self._count + 1 |
Georg Brandl | 2442015 | 2008-05-26 16:32:26 +0000 | [diff] [blame] | 485 | name = http.client.responses[self.code] |
Barry Warsaw | 820c120 | 2008-06-12 04:06:45 +0000 | [diff] [blame] | 486 | msg = email.message_from_string(self.headers) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 487 | return self.parent.error( |
| 488 | "http", req, MockFile(), self.code, name, msg) |
| 489 | else: |
| 490 | self.req = req |
Barry Warsaw | 820c120 | 2008-06-12 04:06:45 +0000 | [diff] [blame] | 491 | msg = email.message_from_string("\r\n\r\n") |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 492 | return MockResponse(200, "OK", msg, "", req.get_full_url()) |
| 493 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 494 | |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 495 | class MockHTTPSHandler(urllib.request.AbstractHTTPHandler): |
| 496 | # Useful for testing the Proxy-Authorization request by verifying the |
| 497 | # properties of httpcon |
Benjamin Peterson | 3d5b8db | 2009-12-24 01:14:05 +0000 | [diff] [blame] | 498 | |
Senthil Kumaran | 9642eed | 2016-05-13 01:32:42 -0700 | [diff] [blame] | 499 | def __init__(self, debuglevel=0): |
| 500 | urllib.request.AbstractHTTPHandler.__init__(self, debuglevel=debuglevel) |
Benjamin Peterson | 3d5b8db | 2009-12-24 01:14:05 +0000 | [diff] [blame] | 501 | self.httpconn = MockHTTPClass() |
| 502 | |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 503 | def https_open(self, req): |
| 504 | return self.do_open(self.httpconn, req) |
| 505 | |
R David Murray | 4c7f995 | 2015-04-16 16:36:18 -0400 | [diff] [blame] | 506 | |
| 507 | class MockHTTPHandlerCheckAuth(urllib.request.BaseHandler): |
| 508 | # useful for testing auth |
| 509 | # sends supplied code response |
| 510 | # checks if auth header is specified in request |
| 511 | def __init__(self, code): |
| 512 | self.code = code |
| 513 | self.has_auth_header = False |
| 514 | |
| 515 | def reset(self): |
| 516 | self.has_auth_header = False |
| 517 | |
| 518 | def http_open(self, req): |
| 519 | if req.has_header('Authorization'): |
| 520 | self.has_auth_header = True |
| 521 | name = http.client.responses[self.code] |
| 522 | return MockResponse(self.code, name, MockFile(), "", req.get_full_url()) |
| 523 | |
| 524 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 525 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 526 | class MockPasswordManager: |
| 527 | def add_password(self, realm, uri, user, password): |
| 528 | self.realm = realm |
| 529 | self.url = uri |
| 530 | self.user = user |
| 531 | self.password = password |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 532 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 533 | def find_user_password(self, realm, authuri): |
| 534 | self.target_realm = realm |
| 535 | self.target_url = authuri |
| 536 | return self.user, self.password |
| 537 | |
| 538 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 539 | class OpenerDirectorTests(unittest.TestCase): |
| 540 | |
Guido van Rossum | b5a755e | 2007-07-18 18:15:48 +0000 | [diff] [blame] | 541 | def test_add_non_handler(self): |
| 542 | class NonHandler(object): |
| 543 | pass |
| 544 | self.assertRaises(TypeError, |
| 545 | OpenerDirector().add_handler, NonHandler()) |
| 546 | |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 547 | def test_badly_named_methods(self): |
| 548 | # test work-around for three methods that accidentally follow the |
| 549 | # naming conventions for handler methods |
| 550 | # (*_open() / *_request() / *_response()) |
| 551 | |
| 552 | # These used to call the accidentally-named methods, causing a |
| 553 | # TypeError in real code; here, returning self from these mock |
| 554 | # methods would either cause no exception, or AttributeError. |
| 555 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 556 | from urllib.error import URLError |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 557 | |
| 558 | o = OpenerDirector() |
| 559 | meth_spec = [ |
| 560 | [("do_open", "return self"), ("proxy_open", "return self")], |
| 561 | [("redirect_request", "return self")], |
| 562 | ] |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 563 | add_ordered_mock_handlers(o, meth_spec) |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 564 | o.add_handler(urllib.request.UnknownHandler()) |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 565 | for scheme in "do", "proxy", "redirect": |
| 566 | self.assertRaises(URLError, o.open, scheme+"://example.com/") |
| 567 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 568 | def test_handled(self): |
| 569 | # handler returning non-None means no more handlers will be called |
| 570 | o = OpenerDirector() |
| 571 | meth_spec = [ |
| 572 | ["http_open", "ftp_open", "http_error_302"], |
| 573 | ["ftp_open"], |
| 574 | [("http_open", "return self")], |
| 575 | [("http_open", "return self")], |
| 576 | ] |
| 577 | handlers = add_ordered_mock_handlers(o, meth_spec) |
| 578 | |
| 579 | req = Request("http://example.com/") |
| 580 | r = o.open(req) |
| 581 | # Second .http_open() gets called, third doesn't, since second returned |
| 582 | # non-None. Handlers without .http_open() never get any methods called |
| 583 | # on them. |
| 584 | # In fact, second mock handler defining .http_open() returns self |
| 585 | # (instead of response), which becomes the OpenerDirector's return |
| 586 | # value. |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 587 | self.assertEqual(r, handlers[2]) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 588 | calls = [(handlers[0], "http_open"), (handlers[2], "http_open")] |
| 589 | for expected, got in zip(calls, o.calls): |
| 590 | handler, name, args, kwds = got |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 591 | self.assertEqual((handler, name), expected) |
| 592 | self.assertEqual(args, (req,)) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 593 | |
| 594 | def test_handler_order(self): |
| 595 | o = OpenerDirector() |
| 596 | handlers = [] |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 597 | for meths, handler_order in [([("http_open", "return self")], 500), |
| 598 | (["http_open"], 0)]: |
| 599 | class MockHandlerSubclass(MockHandler): |
| 600 | pass |
| 601 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 602 | h = MockHandlerSubclass(meths) |
| 603 | h.handler_order = handler_order |
| 604 | handlers.append(h) |
| 605 | o.add_handler(h) |
| 606 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 607 | o.open("http://example.com/") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 608 | # handlers called in reverse order, thanks to their sort order |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 609 | self.assertEqual(o.calls[0][0], handlers[1]) |
| 610 | self.assertEqual(o.calls[1][0], handlers[0]) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 611 | |
| 612 | def test_raise(self): |
| 613 | # raising URLError stops processing of request |
| 614 | o = OpenerDirector() |
| 615 | meth_spec = [ |
| 616 | [("http_open", "raise")], |
| 617 | [("http_open", "return self")], |
| 618 | ] |
| 619 | handlers = add_ordered_mock_handlers(o, meth_spec) |
| 620 | |
| 621 | req = Request("http://example.com/") |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 622 | self.assertRaises(urllib.error.URLError, o.open, req) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 623 | self.assertEqual(o.calls, [(handlers[0], "http_open", (req,), {})]) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 624 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 625 | def test_http_error(self): |
| 626 | # XXX http_error_default |
| 627 | # http errors are a special case |
| 628 | o = OpenerDirector() |
| 629 | meth_spec = [ |
| 630 | [("http_open", "error 302")], |
| 631 | [("http_error_400", "raise"), "http_open"], |
| 632 | [("http_error_302", "return response"), "http_error_303", |
| 633 | "http_error"], |
| 634 | [("http_error_302")], |
| 635 | ] |
| 636 | handlers = add_ordered_mock_handlers(o, meth_spec) |
| 637 | |
| 638 | class Unknown: |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 639 | def __eq__(self, other): |
| 640 | return True |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 641 | |
| 642 | req = Request("http://example.com/") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 643 | o.open(req) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 644 | assert len(o.calls) == 2 |
| 645 | calls = [(handlers[0], "http_open", (req,)), |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 646 | (handlers[2], "http_error_302", |
| 647 | (req, Unknown(), 302, "", {}))] |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 648 | for expected, got in zip(calls, o.calls): |
| 649 | handler, method_name, args = expected |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 650 | self.assertEqual((handler, method_name), got[:2]) |
| 651 | self.assertEqual(args, got[2]) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 652 | |
| 653 | def test_processors(self): |
| 654 | # *_request / *_response methods get called appropriately |
| 655 | o = OpenerDirector() |
| 656 | meth_spec = [ |
| 657 | [("http_request", "return request"), |
| 658 | ("http_response", "return response")], |
| 659 | [("http_request", "return request"), |
| 660 | ("http_response", "return response")], |
| 661 | ] |
| 662 | handlers = add_ordered_mock_handlers(o, meth_spec) |
| 663 | |
| 664 | req = Request("http://example.com/") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 665 | o.open(req) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 666 | # processor methods are called on *all* handlers that define them, |
| 667 | # not just the first handler that handles the request |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 668 | calls = [ |
| 669 | (handlers[0], "http_request"), (handlers[1], "http_request"), |
| 670 | (handlers[0], "http_response"), (handlers[1], "http_response")] |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 671 | |
| 672 | for i, (handler, name, args, kwds) in enumerate(o.calls): |
| 673 | if i < 2: |
| 674 | # *_request |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 675 | self.assertEqual((handler, name), calls[i]) |
| 676 | self.assertEqual(len(args), 1) |
Ezio Melotti | e961593 | 2010-01-24 19:26:24 +0000 | [diff] [blame] | 677 | self.assertIsInstance(args[0], Request) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 678 | else: |
| 679 | # *_response |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 680 | self.assertEqual((handler, name), calls[i]) |
| 681 | self.assertEqual(len(args), 2) |
Ezio Melotti | e961593 | 2010-01-24 19:26:24 +0000 | [diff] [blame] | 682 | self.assertIsInstance(args[0], Request) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 683 | # response from opener.open is None, because there's no |
| 684 | # handler that defines http_open to handle it |
Serhiy Storchaka | 25d8aea | 2014-02-08 14:50:08 +0200 | [diff] [blame] | 685 | if args[1] is not None: |
| 686 | self.assertIsInstance(args[1], MockResponse) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 687 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 688 | |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 689 | def sanepathname2url(path): |
Victor Stinner | 6c6f851 | 2010-08-07 10:09:35 +0000 | [diff] [blame] | 690 | try: |
Marc-André Lemburg | 8f36af7 | 2011-02-25 15:42:01 +0000 | [diff] [blame] | 691 | path.encode("utf-8") |
Victor Stinner | 6c6f851 | 2010-08-07 10:09:35 +0000 | [diff] [blame] | 692 | except UnicodeEncodeError: |
| 693 | raise unittest.SkipTest("path is not encodable to utf8") |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 694 | urlpath = urllib.request.pathname2url(path) |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 695 | if os.name == "nt" and urlpath.startswith("///"): |
| 696 | urlpath = urlpath[2:] |
| 697 | # XXX don't ask me about the mac... |
| 698 | return urlpath |
| 699 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 700 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 701 | class HandlerTests(unittest.TestCase): |
| 702 | |
| 703 | def test_ftp(self): |
| 704 | class MockFTPWrapper: |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 705 | def __init__(self, data): |
| 706 | self.data = data |
| 707 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 708 | def retrfile(self, filename, filetype): |
| 709 | self.filename, self.filetype = filename, filetype |
Guido van Rossum | 34d1928 | 2007-08-09 01:03:29 +0000 | [diff] [blame] | 710 | return io.StringIO(self.data), len(self.data) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 711 | |
| 712 | def close(self): |
| 713 | pass |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 714 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 715 | class NullFTPHandler(urllib.request.FTPHandler): |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 716 | def __init__(self, data): |
| 717 | self.data = data |
| 718 | |
Georg Brandl | f78e02b | 2008-06-10 17:40:04 +0000 | [diff] [blame] | 719 | def connect_ftp(self, user, passwd, host, port, dirs, |
| 720 | timeout=socket._GLOBAL_DEFAULT_TIMEOUT): |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 721 | self.user, self.passwd = user, passwd |
| 722 | self.host, self.port = host, port |
| 723 | self.dirs = dirs |
| 724 | self.ftpwrapper = MockFTPWrapper(self.data) |
| 725 | return self.ftpwrapper |
| 726 | |
Georg Brandl | f78e02b | 2008-06-10 17:40:04 +0000 | [diff] [blame] | 727 | import ftplib |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 728 | data = "rheum rhaponicum" |
| 729 | h = NullFTPHandler(data) |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 730 | h.parent = MockOpener() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 731 | |
Senthil Kumaran | daa29d0 | 2010-11-18 15:36:41 +0000 | [diff] [blame] | 732 | for url, host, port, user, passwd, type_, dirs, filename, mimetype in [ |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 733 | ("ftp://localhost/foo/bar/baz.html", |
Senthil Kumaran | daa29d0 | 2010-11-18 15:36:41 +0000 | [diff] [blame] | 734 | "localhost", ftplib.FTP_PORT, "", "", "I", |
| 735 | ["foo", "bar"], "baz.html", "text/html"), |
| 736 | ("ftp://parrot@localhost/foo/bar/baz.html", |
| 737 | "localhost", ftplib.FTP_PORT, "parrot", "", "I", |
| 738 | ["foo", "bar"], "baz.html", "text/html"), |
| 739 | ("ftp://%25parrot@localhost/foo/bar/baz.html", |
| 740 | "localhost", ftplib.FTP_PORT, "%parrot", "", "I", |
| 741 | ["foo", "bar"], "baz.html", "text/html"), |
| 742 | ("ftp://%2542parrot@localhost/foo/bar/baz.html", |
| 743 | "localhost", ftplib.FTP_PORT, "%42parrot", "", "I", |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 744 | ["foo", "bar"], "baz.html", "text/html"), |
Kurt B. Kaiser | 3f7cb5d | 2004-07-11 17:14:13 +0000 | [diff] [blame] | 745 | ("ftp://localhost:80/foo/bar/", |
Senthil Kumaran | daa29d0 | 2010-11-18 15:36:41 +0000 | [diff] [blame] | 746 | "localhost", 80, "", "", "D", |
Kurt B. Kaiser | 3f7cb5d | 2004-07-11 17:14:13 +0000 | [diff] [blame] | 747 | ["foo", "bar"], "", None), |
| 748 | ("ftp://localhost/baz.gif;type=a", |
Senthil Kumaran | daa29d0 | 2010-11-18 15:36:41 +0000 | [diff] [blame] | 749 | "localhost", ftplib.FTP_PORT, "", "", "A", |
Kurt B. Kaiser | 3f7cb5d | 2004-07-11 17:14:13 +0000 | [diff] [blame] | 750 | [], "baz.gif", None), # XXX really this should guess image/gif |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 751 | ]: |
Guido van Rossum | cd16bf6 | 2007-06-13 18:07:49 +0000 | [diff] [blame] | 752 | req = Request(url) |
| 753 | req.timeout = None |
| 754 | r = h.ftp_open(req) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 755 | # ftp authentication not yet implemented by FTPHandler |
Senthil Kumaran | daa29d0 | 2010-11-18 15:36:41 +0000 | [diff] [blame] | 756 | self.assertEqual(h.user, user) |
| 757 | self.assertEqual(h.passwd, passwd) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 758 | self.assertEqual(h.host, socket.gethostbyname(host)) |
| 759 | self.assertEqual(h.port, port) |
| 760 | self.assertEqual(h.dirs, dirs) |
| 761 | self.assertEqual(h.ftpwrapper.filename, filename) |
| 762 | self.assertEqual(h.ftpwrapper.filetype, type_) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 763 | headers = r.info() |
Kurt B. Kaiser | 3f7cb5d | 2004-07-11 17:14:13 +0000 | [diff] [blame] | 764 | self.assertEqual(headers.get("Content-type"), mimetype) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 765 | self.assertEqual(int(headers["Content-length"]), len(data)) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 766 | |
| 767 | def test_file(self): |
Senthil Kumaran | bc07ac5 | 2014-07-22 00:15:20 -0700 | [diff] [blame] | 768 | import email.utils |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 769 | h = urllib.request.FileHandler() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 770 | o = h.parent = MockOpener() |
| 771 | |
Benjamin Peterson | ee8712c | 2008-05-20 21:35:26 +0000 | [diff] [blame] | 772 | TESTFN = support.TESTFN |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 773 | urlpath = sanepathname2url(os.path.abspath(TESTFN)) |
Guido van Rossum | 6a2ccd0 | 2007-07-16 20:51:57 +0000 | [diff] [blame] | 774 | towrite = b"hello, world\n" |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 775 | urls = [ |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 776 | "file://localhost%s" % urlpath, |
| 777 | "file://%s" % urlpath, |
| 778 | "file://%s%s" % (socket.gethostbyname('localhost'), urlpath), |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 779 | ] |
| 780 | try: |
| 781 | localaddr = socket.gethostbyname(socket.gethostname()) |
| 782 | except socket.gaierror: |
| 783 | localaddr = '' |
| 784 | if localaddr: |
| 785 | urls.append("file://%s%s" % (localaddr, urlpath)) |
| 786 | |
| 787 | for url in urls: |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 788 | f = open(TESTFN, "wb") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 789 | try: |
| 790 | try: |
| 791 | f.write(towrite) |
| 792 | finally: |
| 793 | f.close() |
| 794 | |
| 795 | r = h.file_open(Request(url)) |
| 796 | try: |
| 797 | data = r.read() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 798 | headers = r.info() |
Senthil Kumaran | 4fbed10 | 2010-05-08 03:29:09 +0000 | [diff] [blame] | 799 | respurl = r.geturl() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 800 | finally: |
| 801 | r.close() |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 802 | stats = os.stat(TESTFN) |
Benjamin Peterson | a0c0a4a | 2008-06-12 22:15:50 +0000 | [diff] [blame] | 803 | modified = email.utils.formatdate(stats.st_mtime, usegmt=True) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 804 | finally: |
| 805 | os.remove(TESTFN) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 806 | self.assertEqual(data, towrite) |
| 807 | self.assertEqual(headers["Content-type"], "text/plain") |
| 808 | self.assertEqual(headers["Content-length"], "13") |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 809 | self.assertEqual(headers["Last-modified"], modified) |
Senthil Kumaran | 4fbed10 | 2010-05-08 03:29:09 +0000 | [diff] [blame] | 810 | self.assertEqual(respurl, url) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 811 | |
| 812 | for url in [ |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 813 | "file://localhost:80%s" % urlpath, |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 814 | "file:///file_does_not_exist.txt", |
Senthil Kumaran | bc07ac5 | 2014-07-22 00:15:20 -0700 | [diff] [blame] | 815 | "file://not-a-local-host.com//dir/file.txt", |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 816 | "file://%s:80%s/%s" % (socket.gethostbyname('localhost'), |
| 817 | os.getcwd(), TESTFN), |
| 818 | "file://somerandomhost.ontheinternet.com%s/%s" % |
| 819 | (os.getcwd(), TESTFN), |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 820 | ]: |
| 821 | try: |
Tim Peters | 58eb11c | 2004-01-18 20:29:55 +0000 | [diff] [blame] | 822 | f = open(TESTFN, "wb") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 823 | try: |
| 824 | f.write(towrite) |
| 825 | finally: |
| 826 | f.close() |
| 827 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 828 | self.assertRaises(urllib.error.URLError, |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 829 | h.file_open, Request(url)) |
| 830 | finally: |
| 831 | os.remove(TESTFN) |
| 832 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 833 | h = urllib.request.FileHandler() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 834 | o = h.parent = MockOpener() |
| 835 | # XXXX why does // mean ftp (and /// mean not ftp!), and where |
| 836 | # is file: scheme specified? I think this is really a bug, and |
| 837 | # what was intended was to distinguish between URLs like: |
| 838 | # file:/blah.txt (a file) |
| 839 | # file://localhost/blah.txt (a file) |
| 840 | # file:///blah.txt (a file) |
| 841 | # file://ftp.example.com/blah.txt (an ftp URL) |
| 842 | for url, ftp in [ |
Senthil Kumaran | 383c32d | 2010-10-14 11:57:35 +0000 | [diff] [blame] | 843 | ("file://ftp.example.com//foo.txt", False), |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 844 | ("file://ftp.example.com///foo.txt", False), |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 845 | ("file://ftp.example.com/foo.txt", False), |
Senthil Kumaran | 383c32d | 2010-10-14 11:57:35 +0000 | [diff] [blame] | 846 | ("file://somehost//foo/something.txt", False), |
Senthil Kumaran | 2ef1632 | 2010-07-11 03:12:43 +0000 | [diff] [blame] | 847 | ("file://localhost//foo/something.txt", False), |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 848 | ]: |
| 849 | req = Request(url) |
| 850 | try: |
| 851 | h.file_open(req) |
Senthil Kumaran | ed3dd1c | 2017-03-30 22:43:05 -0700 | [diff] [blame] | 852 | except urllib.error.URLError: |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 853 | self.assertFalse(ftp) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 854 | else: |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 855 | self.assertIs(o.req, req) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 856 | self.assertEqual(req.type, "ftp") |
Łukasz Langa | d7e81cc | 2011-01-09 18:18:53 +0000 | [diff] [blame] | 857 | self.assertEqual(req.type == "ftp", ftp) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 858 | |
| 859 | def test_http(self): |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 860 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 861 | h = urllib.request.AbstractHTTPHandler() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 862 | o = h.parent = MockOpener() |
| 863 | |
| 864 | url = "http://example.com/" |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 865 | for method, data in [("GET", None), ("POST", b"blah")]: |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 866 | req = Request(url, data, {"Foo": "bar"}) |
Guido van Rossum | cd16bf6 | 2007-06-13 18:07:49 +0000 | [diff] [blame] | 867 | req.timeout = None |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 868 | req.add_unredirected_header("Spam", "eggs") |
| 869 | http = MockHTTPClass() |
| 870 | r = h.do_open(http, req) |
| 871 | |
| 872 | # result attributes |
| 873 | r.read; r.readline # wrapped MockFile methods |
| 874 | r.info; r.geturl # addinfourl methods |
| 875 | r.code, r.msg == 200, "OK" # added from MockHTTPClass.getreply() |
| 876 | hdrs = r.info() |
Guido van Rossum | e2b70bc | 2006-08-18 22:13:04 +0000 | [diff] [blame] | 877 | hdrs.get; hdrs.__contains__ # r.info() gives dict from .getreply() |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 878 | self.assertEqual(r.geturl(), url) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 879 | |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 880 | self.assertEqual(http.host, "example.com") |
| 881 | self.assertEqual(http.level, 0) |
| 882 | self.assertEqual(http.method, method) |
| 883 | self.assertEqual(http.selector, "/") |
| 884 | self.assertEqual(http.req_headers, |
Jeremy Hylton | b3ee6f9 | 2004-02-24 19:40:35 +0000 | [diff] [blame] | 885 | [("Connection", "close"), |
| 886 | ("Foo", "bar"), ("Spam", "eggs")]) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 887 | self.assertEqual(http.data, data) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 888 | |
Andrew Svetlov | 0832af6 | 2012-12-18 23:10:48 +0200 | [diff] [blame] | 889 | # check OSError converted to URLError |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 890 | http.raise_on_endheaders = True |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 891 | self.assertRaises(urllib.error.URLError, h.do_open, http, req) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 892 | |
Senthil Kumaran | 2933312 | 2011-02-11 11:25:47 +0000 | [diff] [blame] | 893 | # Check for TypeError on POST data which is str. |
| 894 | req = Request("http://example.com/","badpost") |
| 895 | self.assertRaises(TypeError, h.do_request_, req) |
| 896 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 897 | # check adding of standard headers |
| 898 | o.addheaders = [("Spam", "eggs")] |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 899 | for data in b"", None: # POST, GET |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 900 | req = Request("http://example.com/", data) |
| 901 | r = MockResponse(200, "OK", {}, "") |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 902 | newreq = h.do_request_(req) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 903 | if data is None: # GET |
Benjamin Peterson | 577473f | 2010-01-19 00:09:57 +0000 | [diff] [blame] | 904 | self.assertNotIn("Content-length", req.unredirected_hdrs) |
| 905 | self.assertNotIn("Content-type", req.unredirected_hdrs) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 906 | else: # POST |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 907 | self.assertEqual(req.unredirected_hdrs["Content-length"], "0") |
| 908 | self.assertEqual(req.unredirected_hdrs["Content-type"], |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 909 | "application/x-www-form-urlencoded") |
| 910 | # XXX the details of Host could be better tested |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 911 | self.assertEqual(req.unredirected_hdrs["Host"], "example.com") |
| 912 | self.assertEqual(req.unredirected_hdrs["Spam"], "eggs") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 913 | |
| 914 | # don't clobber existing headers |
| 915 | req.add_unredirected_header("Content-length", "foo") |
| 916 | req.add_unredirected_header("Content-type", "bar") |
| 917 | req.add_unredirected_header("Host", "baz") |
| 918 | req.add_unredirected_header("Spam", "foo") |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 919 | newreq = h.do_request_(req) |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 920 | self.assertEqual(req.unredirected_hdrs["Content-length"], "foo") |
| 921 | self.assertEqual(req.unredirected_hdrs["Content-type"], "bar") |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 922 | self.assertEqual(req.unredirected_hdrs["Host"], "baz") |
| 923 | self.assertEqual(req.unredirected_hdrs["Spam"], "foo") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 924 | |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 925 | def test_http_body_file(self): |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 926 | # A regular file - chunked encoding is used unless Content Length is |
| 927 | # already set. |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 928 | |
| 929 | h = urllib.request.AbstractHTTPHandler() |
| 930 | o = h.parent = MockOpener() |
| 931 | |
| 932 | file_obj = tempfile.NamedTemporaryFile(mode='w+b', delete=False) |
| 933 | file_path = file_obj.name |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 934 | file_obj.close() |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 935 | self.addCleanup(os.unlink, file_path) |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 936 | |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 937 | with open(file_path, "rb") as f: |
| 938 | req = Request("http://example.com/", f, {}) |
| 939 | newreq = h.do_request_(req) |
| 940 | te = newreq.get_header('Transfer-encoding') |
| 941 | self.assertEqual(te, "chunked") |
| 942 | self.assertFalse(newreq.has_header('Content-length')) |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 943 | |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 944 | with open(file_path, "rb") as f: |
| 945 | req = Request("http://example.com/", f, {"Content-Length": 30}) |
| 946 | newreq = h.do_request_(req) |
| 947 | self.assertEqual(int(newreq.get_header('Content-length')), 30) |
| 948 | self.assertFalse(newreq.has_header("Transfer-encoding")) |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 949 | |
| 950 | def test_http_body_fileobj(self): |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 951 | # A file object - chunked encoding is used |
| 952 | # unless Content Length is already set. |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 953 | # (Note that there are some subtle differences to a regular |
| 954 | # file, that is why we are testing both cases.) |
| 955 | |
| 956 | h = urllib.request.AbstractHTTPHandler() |
| 957 | o = h.parent = MockOpener() |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 958 | file_obj = io.BytesIO() |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 959 | |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 960 | req = Request("http://example.com/", file_obj, {}) |
| 961 | newreq = h.do_request_(req) |
| 962 | self.assertEqual(newreq.get_header('Transfer-encoding'), 'chunked') |
| 963 | self.assertFalse(newreq.has_header('Content-length')) |
| 964 | |
| 965 | headers = {"Content-Length": 30} |
| 966 | req = Request("http://example.com/", file_obj, headers) |
| 967 | newreq = h.do_request_(req) |
| 968 | self.assertEqual(int(newreq.get_header('Content-length')), 30) |
| 969 | self.assertFalse(newreq.has_header("Transfer-encoding")) |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 970 | |
| 971 | file_obj.close() |
| 972 | |
| 973 | def test_http_body_pipe(self): |
| 974 | # A file reading from a pipe. |
| 975 | # A pipe cannot be seek'ed. There is no way to determine the |
| 976 | # content length up front. Thus, do_request_() should fall |
| 977 | # back to Transfer-encoding chunked. |
| 978 | |
| 979 | h = urllib.request.AbstractHTTPHandler() |
| 980 | o = h.parent = MockOpener() |
| 981 | |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 982 | cmd = [sys.executable, "-c", r"pass"] |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 983 | for headers in {}, {"Content-Length": 30}: |
| 984 | with subprocess.Popen(cmd, stdout=subprocess.PIPE) as proc: |
| 985 | req = Request("http://example.com/", proc.stdout, headers) |
| 986 | newreq = h.do_request_(req) |
| 987 | if not headers: |
| 988 | self.assertEqual(newreq.get_header('Content-length'), None) |
| 989 | self.assertEqual(newreq.get_header('Transfer-encoding'), |
| 990 | 'chunked') |
| 991 | else: |
| 992 | self.assertEqual(int(newreq.get_header('Content-length')), |
| 993 | 30) |
| 994 | |
| 995 | def test_http_body_iterable(self): |
| 996 | # Generic iterable. There is no way to determine the content |
| 997 | # length up front. Fall back to Transfer-encoding chunked. |
| 998 | |
| 999 | h = urllib.request.AbstractHTTPHandler() |
| 1000 | o = h.parent = MockOpener() |
| 1001 | |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1002 | def iterable_body(): |
| 1003 | yield b"one" |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1004 | |
| 1005 | for headers in {}, {"Content-Length": 11}: |
| 1006 | req = Request("http://example.com/", iterable_body(), headers) |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 1007 | newreq = h.do_request_(req) |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1008 | if not headers: |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 1009 | self.assertEqual(newreq.get_header('Content-length'), None) |
| 1010 | self.assertEqual(newreq.get_header('Transfer-encoding'), |
| 1011 | 'chunked') |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1012 | else: |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 1013 | self.assertEqual(int(newreq.get_header('Content-length')), 11) |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1014 | |
Martin Panter | ef91bb2 | 2016-08-27 01:39:26 +0000 | [diff] [blame] | 1015 | def test_http_body_empty_seq(self): |
| 1016 | # Zero-length iterable body should be treated like any other iterable |
| 1017 | h = urllib.request.AbstractHTTPHandler() |
| 1018 | h.parent = MockOpener() |
| 1019 | req = h.do_request_(Request("http://example.com/", ())) |
| 1020 | self.assertEqual(req.get_header("Transfer-encoding"), "chunked") |
| 1021 | self.assertFalse(req.has_header("Content-length")) |
| 1022 | |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 1023 | def test_http_body_array(self): |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1024 | # array.array Iterable - Content Length is calculated |
| 1025 | |
Martin Panter | 3c0d0ba | 2016-08-24 06:33:33 +0000 | [diff] [blame] | 1026 | h = urllib.request.AbstractHTTPHandler() |
| 1027 | o = h.parent = MockOpener() |
| 1028 | |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1029 | iterable_array = array.array("I",[1,2,3,4]) |
| 1030 | |
| 1031 | for headers in {}, {"Content-Length": 16}: |
| 1032 | req = Request("http://example.com/", iterable_array, headers) |
| 1033 | newreq = h.do_request_(req) |
| 1034 | self.assertEqual(int(newreq.get_header('Content-length')),16) |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1035 | |
Senthil Kumaran | 9642eed | 2016-05-13 01:32:42 -0700 | [diff] [blame] | 1036 | def test_http_handler_debuglevel(self): |
| 1037 | o = OpenerDirector() |
| 1038 | h = MockHTTPSHandler(debuglevel=1) |
| 1039 | o.add_handler(h) |
| 1040 | o.open("https://www.example.com") |
| 1041 | self.assertEqual(h._debuglevel, 1) |
| 1042 | |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1043 | def test_http_doubleslash(self): |
| 1044 | # Checks the presence of any unnecessary double slash in url does not |
| 1045 | # break anything. Previously, a double slash directly after the host |
Ezio Melotti | e130a52 | 2011-10-19 10:58:56 +0300 | [diff] [blame] | 1046 | # could cause incorrect parsing. |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1047 | h = urllib.request.AbstractHTTPHandler() |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1048 | h.parent = MockOpener() |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1049 | |
Senthil Kumaran | 7bc0d87 | 2010-12-19 10:49:52 +0000 | [diff] [blame] | 1050 | data = b"" |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1051 | ds_urls = [ |
| 1052 | "http://example.com/foo/bar/baz.html", |
| 1053 | "http://example.com//foo/bar/baz.html", |
| 1054 | "http://example.com/foo//bar/baz.html", |
| 1055 | "http://example.com/foo/bar//baz.html" |
| 1056 | ] |
| 1057 | |
| 1058 | for ds_url in ds_urls: |
| 1059 | ds_req = Request(ds_url, data) |
| 1060 | |
| 1061 | # Check whether host is determined correctly if there is no proxy |
| 1062 | np_ds_req = h.do_request_(ds_req) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1063 | self.assertEqual(np_ds_req.unredirected_hdrs["Host"], "example.com") |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1064 | |
| 1065 | # Check whether host is determined correctly if there is a proxy |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1066 | ds_req.set_proxy("someproxy:3128", None) |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1067 | p_ds_req = h.do_request_(ds_req) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1068 | self.assertEqual(p_ds_req.unredirected_hdrs["Host"], "example.com") |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1069 | |
Senthil Kumaran | 5238092 | 2013-04-25 05:45:48 -0700 | [diff] [blame] | 1070 | def test_full_url_setter(self): |
| 1071 | # Checks to ensure that components are set correctly after setting the |
| 1072 | # full_url of a Request object |
| 1073 | |
| 1074 | urls = [ |
| 1075 | 'http://example.com?foo=bar#baz', |
| 1076 | 'http://example.com?foo=bar&spam=eggs#bash', |
| 1077 | 'http://example.com', |
| 1078 | ] |
| 1079 | |
| 1080 | # testing a reusable request instance, but the url parameter is |
| 1081 | # required, so just use a dummy one to instantiate |
| 1082 | r = Request('http://example.com') |
| 1083 | for url in urls: |
| 1084 | r.full_url = url |
Senthil Kumaran | 8307075 | 2013-05-24 09:14:12 -0700 | [diff] [blame] | 1085 | parsed = urlparse(url) |
| 1086 | |
Senthil Kumaran | 5238092 | 2013-04-25 05:45:48 -0700 | [diff] [blame] | 1087 | self.assertEqual(r.get_full_url(), url) |
Senthil Kumaran | 8307075 | 2013-05-24 09:14:12 -0700 | [diff] [blame] | 1088 | # full_url setter uses splittag to split into components. |
| 1089 | # splittag sets the fragment as None while urlparse sets it to '' |
| 1090 | self.assertEqual(r.fragment or '', parsed.fragment) |
| 1091 | self.assertEqual(urlparse(r.get_full_url()).query, parsed.query) |
Senthil Kumaran | 5238092 | 2013-04-25 05:45:48 -0700 | [diff] [blame] | 1092 | |
| 1093 | def test_full_url_deleter(self): |
| 1094 | r = Request('http://www.example.com') |
| 1095 | del r.full_url |
| 1096 | self.assertIsNone(r.full_url) |
| 1097 | self.assertIsNone(r.fragment) |
| 1098 | self.assertEqual(r.selector, '') |
| 1099 | |
Senthil Kumaran | c295862 | 2010-11-22 04:48:26 +0000 | [diff] [blame] | 1100 | def test_fixpath_in_weirdurls(self): |
| 1101 | # Issue4493: urllib2 to supply '/' when to urls where path does not |
| 1102 | # start with'/' |
| 1103 | |
| 1104 | h = urllib.request.AbstractHTTPHandler() |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1105 | h.parent = MockOpener() |
Senthil Kumaran | c295862 | 2010-11-22 04:48:26 +0000 | [diff] [blame] | 1106 | |
| 1107 | weird_url = 'http://www.python.org?getspam' |
| 1108 | req = Request(weird_url) |
| 1109 | newreq = h.do_request_(req) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1110 | self.assertEqual(newreq.host, 'www.python.org') |
| 1111 | self.assertEqual(newreq.selector, '/?getspam') |
Senthil Kumaran | c295862 | 2010-11-22 04:48:26 +0000 | [diff] [blame] | 1112 | |
| 1113 | url_without_path = 'http://www.python.org' |
| 1114 | req = Request(url_without_path) |
| 1115 | newreq = h.do_request_(req) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1116 | self.assertEqual(newreq.host, 'www.python.org') |
| 1117 | self.assertEqual(newreq.selector, '') |
Facundo Batista | 72dc1ea | 2008-08-16 14:44:32 +0000 | [diff] [blame] | 1118 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1119 | def test_errors(self): |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1120 | h = urllib.request.HTTPErrorProcessor() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1121 | o = h.parent = MockOpener() |
| 1122 | |
| 1123 | url = "http://example.com/" |
| 1124 | req = Request(url) |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 1125 | # all 2xx are passed through |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1126 | r = MockResponse(200, "OK", {}, "", url) |
| 1127 | newr = h.http_response(req, r) |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1128 | self.assertIs(r, newr) |
| 1129 | self.assertFalse(hasattr(o, "proto")) # o.error not called |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 1130 | r = MockResponse(202, "Accepted", {}, "", url) |
| 1131 | newr = h.http_response(req, r) |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1132 | self.assertIs(r, newr) |
| 1133 | self.assertFalse(hasattr(o, "proto")) # o.error not called |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 1134 | r = MockResponse(206, "Partial content", {}, "", url) |
| 1135 | newr = h.http_response(req, r) |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1136 | self.assertIs(r, newr) |
| 1137 | self.assertFalse(hasattr(o, "proto")) # o.error not called |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1138 | # anything else calls o.error (and MockOpener returns None, here) |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 1139 | r = MockResponse(502, "Bad gateway", {}, "", url) |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1140 | self.assertIsNone(h.http_response(req, r)) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 1141 | self.assertEqual(o.proto, "http") # o.error called |
Guido van Rossum | d8faa36 | 2007-04-27 19:54:29 +0000 | [diff] [blame] | 1142 | self.assertEqual(o.args, (req, r, 502, "Bad gateway", {})) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1143 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1144 | def test_cookies(self): |
| 1145 | cj = MockCookieJar() |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1146 | h = urllib.request.HTTPCookieProcessor(cj) |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1147 | h.parent = MockOpener() |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1148 | |
| 1149 | req = Request("http://example.com/") |
| 1150 | r = MockResponse(200, "OK", {}, "") |
| 1151 | newreq = h.http_request(req) |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1152 | self.assertIs(cj.ach_req, req) |
| 1153 | self.assertIs(cj.ach_req, newreq) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1154 | self.assertEqual(req.origin_req_host, "example.com") |
| 1155 | self.assertFalse(req.unverifiable) |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1156 | newr = h.http_response(req, r) |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1157 | self.assertIs(cj.ec_req, req) |
| 1158 | self.assertIs(cj.ec_r, r) |
| 1159 | self.assertIs(r, newr) |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1160 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1161 | def test_redirect(self): |
| 1162 | from_url = "http://example.com/a.html" |
| 1163 | to_url = "http://example.com/b.html" |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1164 | h = urllib.request.HTTPRedirectHandler() |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1165 | o = h.parent = MockOpener() |
| 1166 | |
| 1167 | # ordinary redirect behaviour |
| 1168 | for code in 301, 302, 303, 307: |
| 1169 | for data in None, "blah\nblah\n": |
| 1170 | method = getattr(h, "http_error_%s" % code) |
| 1171 | req = Request(from_url, data) |
Senthil Kumaran | fb8cc2f | 2009-07-19 02:44:19 +0000 | [diff] [blame] | 1172 | req.timeout = socket._GLOBAL_DEFAULT_TIMEOUT |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1173 | req.add_header("Nonsense", "viking=withhold") |
Christian Heimes | 77c02eb | 2008-02-09 02:18:51 +0000 | [diff] [blame] | 1174 | if data is not None: |
| 1175 | req.add_header("Content-Length", str(len(data))) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1176 | req.add_unredirected_header("Spam", "spam") |
| 1177 | try: |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1178 | method(req, MockFile(), code, "Blah", |
| 1179 | MockHeaders({"location": to_url})) |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1180 | except urllib.error.HTTPError: |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1181 | # 307 in response to POST requires user OK |
Serhiy Storchaka | 25d8aea | 2014-02-08 14:50:08 +0200 | [diff] [blame] | 1182 | self.assertEqual(code, 307) |
| 1183 | self.assertIsNotNone(data) |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 1184 | self.assertEqual(o.req.get_full_url(), to_url) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1185 | try: |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 1186 | self.assertEqual(o.req.get_method(), "GET") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1187 | except AttributeError: |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1188 | self.assertFalse(o.req.data) |
Christian Heimes | 77c02eb | 2008-02-09 02:18:51 +0000 | [diff] [blame] | 1189 | |
| 1190 | # now it's a GET, there should not be headers regarding content |
| 1191 | # (possibly dragged from before being a POST) |
| 1192 | headers = [x.lower() for x in o.req.headers] |
Benjamin Peterson | 577473f | 2010-01-19 00:09:57 +0000 | [diff] [blame] | 1193 | self.assertNotIn("content-length", headers) |
| 1194 | self.assertNotIn("content-type", headers) |
Christian Heimes | 77c02eb | 2008-02-09 02:18:51 +0000 | [diff] [blame] | 1195 | |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 1196 | self.assertEqual(o.req.headers["Nonsense"], |
| 1197 | "viking=withhold") |
Benjamin Peterson | 577473f | 2010-01-19 00:09:57 +0000 | [diff] [blame] | 1198 | self.assertNotIn("Spam", o.req.headers) |
| 1199 | self.assertNotIn("Spam", o.req.unredirected_hdrs) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1200 | |
| 1201 | # loop detection |
| 1202 | req = Request(from_url) |
Senthil Kumaran | fb8cc2f | 2009-07-19 02:44:19 +0000 | [diff] [blame] | 1203 | req.timeout = socket._GLOBAL_DEFAULT_TIMEOUT |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1204 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1205 | def redirect(h, req, url=to_url): |
| 1206 | h.http_error_302(req, MockFile(), 302, "Blah", |
| 1207 | MockHeaders({"location": url})) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1208 | # Note that the *original* request shares the same record of |
| 1209 | # redirections with the sub-requests caused by the redirections. |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1210 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1211 | # detect infinite loop redirect of a URL to itself |
| 1212 | req = Request(from_url, origin_req_host="example.com") |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1213 | count = 0 |
Senthil Kumaran | fb8cc2f | 2009-07-19 02:44:19 +0000 | [diff] [blame] | 1214 | req.timeout = socket._GLOBAL_DEFAULT_TIMEOUT |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1215 | try: |
| 1216 | while 1: |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1217 | redirect(h, req, "http://example.com/") |
| 1218 | count = count + 1 |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1219 | except urllib.error.HTTPError: |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1220 | # don't stop until max_repeats, because cookies may introduce state |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1221 | self.assertEqual(count, urllib.request.HTTPRedirectHandler.max_repeats) |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1222 | |
| 1223 | # detect endless non-repeating chain of redirects |
| 1224 | req = Request(from_url, origin_req_host="example.com") |
| 1225 | count = 0 |
Senthil Kumaran | fb8cc2f | 2009-07-19 02:44:19 +0000 | [diff] [blame] | 1226 | req.timeout = socket._GLOBAL_DEFAULT_TIMEOUT |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1227 | try: |
| 1228 | while 1: |
| 1229 | redirect(h, req, "http://example.com/%d" % count) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1230 | count = count + 1 |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1231 | except urllib.error.HTTPError: |
Jeremy Hylton | df38ea9 | 2003-12-17 20:42:38 +0000 | [diff] [blame] | 1232 | self.assertEqual(count, |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1233 | urllib.request.HTTPRedirectHandler.max_redirections) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1234 | |
guido@google.com | a119df9 | 2011-03-29 11:41:02 -0700 | [diff] [blame] | 1235 | def test_invalid_redirect(self): |
| 1236 | from_url = "http://example.com/a.html" |
| 1237 | valid_schemes = ['http','https','ftp'] |
| 1238 | invalid_schemes = ['file','imap','ldap'] |
| 1239 | schemeless_url = "example.com/b.html" |
| 1240 | h = urllib.request.HTTPRedirectHandler() |
| 1241 | o = h.parent = MockOpener() |
| 1242 | req = Request(from_url) |
| 1243 | req.timeout = socket._GLOBAL_DEFAULT_TIMEOUT |
| 1244 | |
| 1245 | for scheme in invalid_schemes: |
| 1246 | invalid_url = scheme + '://' + schemeless_url |
| 1247 | self.assertRaises(urllib.error.HTTPError, h.http_error_302, |
| 1248 | req, MockFile(), 302, "Security Loophole", |
| 1249 | MockHeaders({"location": invalid_url})) |
| 1250 | |
| 1251 | for scheme in valid_schemes: |
| 1252 | valid_url = scheme + '://' + schemeless_url |
| 1253 | h.http_error_302(req, MockFile(), 302, "That's fine", |
| 1254 | MockHeaders({"location": valid_url})) |
| 1255 | self.assertEqual(o.req.get_full_url(), valid_url) |
| 1256 | |
Senthil Kumaran | 6497aa3 | 2012-01-04 13:46:59 +0800 | [diff] [blame] | 1257 | def test_relative_redirect(self): |
| 1258 | from_url = "http://example.com/a.html" |
| 1259 | relative_url = "/b.html" |
| 1260 | h = urllib.request.HTTPRedirectHandler() |
| 1261 | o = h.parent = MockOpener() |
| 1262 | req = Request(from_url) |
| 1263 | req.timeout = socket._GLOBAL_DEFAULT_TIMEOUT |
| 1264 | |
| 1265 | valid_url = urllib.parse.urljoin(from_url,relative_url) |
| 1266 | h.http_error_302(req, MockFile(), 302, "That's fine", |
| 1267 | MockHeaders({"location": valid_url})) |
| 1268 | self.assertEqual(o.req.get_full_url(), valid_url) |
| 1269 | |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1270 | def test_cookie_redirect(self): |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1271 | # cookies shouldn't leak into redirected requests |
Georg Brandl | 2442015 | 2008-05-26 16:32:26 +0000 | [diff] [blame] | 1272 | from http.cookiejar import CookieJar |
| 1273 | from test.test_http_cookiejar import interact_netscape |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1274 | |
| 1275 | cj = CookieJar() |
| 1276 | interact_netscape(cj, "http://www.example.com/", "spam=eggs") |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1277 | hh = MockHTTPHandler(302, "Location: http://www.cracker.com/\r\n\r\n") |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1278 | hdeh = urllib.request.HTTPDefaultErrorHandler() |
| 1279 | hrh = urllib.request.HTTPRedirectHandler() |
| 1280 | cp = urllib.request.HTTPCookieProcessor(cj) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1281 | o = build_test_opener(hh, hdeh, hrh, cp) |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1282 | o.open("http://www.example.com/") |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1283 | self.assertFalse(hh.req.has_header("Cookie")) |
Martin v. Löwis | 2a6ba90 | 2004-05-31 18:22:40 +0000 | [diff] [blame] | 1284 | |
Senthil Kumaran | 2643041 | 2011-04-13 07:01:19 +0800 | [diff] [blame] | 1285 | def test_redirect_fragment(self): |
| 1286 | redirected_url = 'http://www.example.com/index.html#OK\r\n\r\n' |
| 1287 | hh = MockHTTPHandler(302, 'Location: ' + redirected_url) |
| 1288 | hdeh = urllib.request.HTTPDefaultErrorHandler() |
| 1289 | hrh = urllib.request.HTTPRedirectHandler() |
| 1290 | o = build_test_opener(hh, hdeh, hrh) |
| 1291 | fp = o.open('http://www.example.com') |
| 1292 | self.assertEqual(fp.geturl(), redirected_url.strip()) |
| 1293 | |
Martin Panter | ce6e068 | 2016-05-16 01:07:13 +0000 | [diff] [blame] | 1294 | def test_redirect_no_path(self): |
| 1295 | # Issue 14132: Relative redirect strips original path |
Victor Stinner | 7cb9204 | 2019-07-02 14:50:19 +0200 | [diff] [blame] | 1296 | |
| 1297 | # clear _opener global variable |
| 1298 | self.addCleanup(urllib.request.urlcleanup) |
| 1299 | |
Martin Panter | ce6e068 | 2016-05-16 01:07:13 +0000 | [diff] [blame] | 1300 | real_class = http.client.HTTPConnection |
| 1301 | response1 = b"HTTP/1.1 302 Found\r\nLocation: ?query\r\n\r\n" |
| 1302 | http.client.HTTPConnection = test_urllib.fakehttp(response1) |
| 1303 | self.addCleanup(setattr, http.client, "HTTPConnection", real_class) |
| 1304 | urls = iter(("/path", "/path?query")) |
| 1305 | def request(conn, method, url, *pos, **kw): |
| 1306 | self.assertEqual(url, next(urls)) |
| 1307 | real_class.request(conn, method, url, *pos, **kw) |
| 1308 | # Change response for subsequent connection |
| 1309 | conn.__class__.fakedata = b"HTTP/1.1 200 OK\r\n\r\nHello!" |
| 1310 | http.client.HTTPConnection.request = request |
| 1311 | fp = urllib.request.urlopen("http://python.org/path") |
| 1312 | self.assertEqual(fp.geturl(), "http://python.org/path?query") |
| 1313 | |
Martin Panter | e6f0609 | 2016-05-16 01:14:20 +0000 | [diff] [blame] | 1314 | def test_redirect_encoding(self): |
| 1315 | # Some characters in the redirect target may need special handling, |
| 1316 | # but most ASCII characters should be treated as already encoded |
| 1317 | class Handler(urllib.request.HTTPHandler): |
| 1318 | def http_open(self, req): |
| 1319 | result = self.do_open(self.connection, req) |
| 1320 | self.last_buf = self.connection.buf |
| 1321 | # Set up a normal response for the next request |
| 1322 | self.connection = test_urllib.fakehttp( |
| 1323 | b'HTTP/1.1 200 OK\r\n' |
| 1324 | b'Content-Length: 3\r\n' |
| 1325 | b'\r\n' |
| 1326 | b'123' |
| 1327 | ) |
| 1328 | return result |
| 1329 | handler = Handler() |
| 1330 | opener = urllib.request.build_opener(handler) |
| 1331 | tests = ( |
| 1332 | (b'/p\xC3\xA5-dansk/', b'/p%C3%A5-dansk/'), |
| 1333 | (b'/spaced%20path/', b'/spaced%20path/'), |
| 1334 | (b'/spaced path/', b'/spaced%20path/'), |
| 1335 | (b'/?p\xC3\xA5-dansk', b'/?p%C3%A5-dansk'), |
| 1336 | ) |
| 1337 | for [location, result] in tests: |
| 1338 | with self.subTest(repr(location)): |
| 1339 | handler.connection = test_urllib.fakehttp( |
| 1340 | b'HTTP/1.1 302 Redirect\r\n' |
| 1341 | b'Location: ' + location + b'\r\n' |
| 1342 | b'\r\n' |
| 1343 | ) |
| 1344 | response = opener.open('http://example.com/') |
| 1345 | expected = b'GET ' + result + b' ' |
| 1346 | request = handler.last_buf |
| 1347 | self.assertTrue(request.startswith(expected), repr(request)) |
| 1348 | |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 1349 | def test_proxy(self): |
| 1350 | o = OpenerDirector() |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1351 | ph = urllib.request.ProxyHandler(dict(http="proxy.example.com:3128")) |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 1352 | o.add_handler(ph) |
| 1353 | meth_spec = [ |
| 1354 | [("http_open", "return response")] |
| 1355 | ] |
| 1356 | handlers = add_ordered_mock_handlers(o, meth_spec) |
| 1357 | |
| 1358 | req = Request("http://acme.example.com/") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1359 | self.assertEqual(req.host, "acme.example.com") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1360 | o.open(req) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1361 | self.assertEqual(req.host, "proxy.example.com:3128") |
Thomas Wouters | 49fd7fa | 2006-04-21 10:40:58 +0000 | [diff] [blame] | 1362 | |
| 1363 | self.assertEqual([(handlers[0], "http_open")], |
| 1364 | [tup[0:2] for tup in o.calls]) |
| 1365 | |
Senthil Kumaran | 7bb0497 | 2009-10-11 04:58:55 +0000 | [diff] [blame] | 1366 | def test_proxy_no_proxy(self): |
| 1367 | os.environ['no_proxy'] = 'python.org' |
| 1368 | o = OpenerDirector() |
| 1369 | ph = urllib.request.ProxyHandler(dict(http="proxy.example.com")) |
| 1370 | o.add_handler(ph) |
| 1371 | req = Request("http://www.perl.org/") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1372 | self.assertEqual(req.host, "www.perl.org") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1373 | o.open(req) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1374 | self.assertEqual(req.host, "proxy.example.com") |
Senthil Kumaran | 7bb0497 | 2009-10-11 04:58:55 +0000 | [diff] [blame] | 1375 | req = Request("http://www.python.org") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1376 | self.assertEqual(req.host, "www.python.org") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1377 | o.open(req) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1378 | self.assertEqual(req.host, "www.python.org") |
Senthil Kumaran | 7bb0497 | 2009-10-11 04:58:55 +0000 | [diff] [blame] | 1379 | del os.environ['no_proxy'] |
| 1380 | |
Ronald Oussoren | e72e161 | 2011-03-14 18:15:25 -0400 | [diff] [blame] | 1381 | def test_proxy_no_proxy_all(self): |
| 1382 | os.environ['no_proxy'] = '*' |
| 1383 | o = OpenerDirector() |
| 1384 | ph = urllib.request.ProxyHandler(dict(http="proxy.example.com")) |
| 1385 | o.add_handler(ph) |
| 1386 | req = Request("http://www.python.org") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1387 | self.assertEqual(req.host, "www.python.org") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1388 | o.open(req) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1389 | self.assertEqual(req.host, "www.python.org") |
Ronald Oussoren | e72e161 | 2011-03-14 18:15:25 -0400 | [diff] [blame] | 1390 | del os.environ['no_proxy'] |
| 1391 | |
Senthil Kumaran | 97f0c6b | 2009-07-25 04:24:38 +0000 | [diff] [blame] | 1392 | def test_proxy_https(self): |
| 1393 | o = OpenerDirector() |
| 1394 | ph = urllib.request.ProxyHandler(dict(https="proxy.example.com:3128")) |
| 1395 | o.add_handler(ph) |
| 1396 | meth_spec = [ |
| 1397 | [("https_open", "return response")] |
| 1398 | ] |
| 1399 | handlers = add_ordered_mock_handlers(o, meth_spec) |
| 1400 | |
| 1401 | req = Request("https://www.example.com/") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1402 | self.assertEqual(req.host, "www.example.com") |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1403 | o.open(req) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1404 | self.assertEqual(req.host, "proxy.example.com:3128") |
Senthil Kumaran | 97f0c6b | 2009-07-25 04:24:38 +0000 | [diff] [blame] | 1405 | self.assertEqual([(handlers[0], "https_open")], |
| 1406 | [tup[0:2] for tup in o.calls]) |
| 1407 | |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 1408 | def test_proxy_https_proxy_authorization(self): |
| 1409 | o = OpenerDirector() |
| 1410 | ph = urllib.request.ProxyHandler(dict(https='proxy.example.com:3128')) |
| 1411 | o.add_handler(ph) |
| 1412 | https_handler = MockHTTPSHandler() |
| 1413 | o.add_handler(https_handler) |
| 1414 | req = Request("https://www.example.com/") |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1415 | req.add_header("Proxy-Authorization", "FooBar") |
| 1416 | req.add_header("User-Agent", "Grail") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1417 | self.assertEqual(req.host, "www.example.com") |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 1418 | self.assertIsNone(req._tunnel_host) |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1419 | o.open(req) |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 1420 | # Verify Proxy-Authorization gets tunneled to request. |
| 1421 | # httpsconn req_headers do not have the Proxy-Authorization header but |
| 1422 | # the req will have. |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1423 | self.assertNotIn(("Proxy-Authorization", "FooBar"), |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 1424 | https_handler.httpconn.req_headers) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1425 | self.assertIn(("User-Agent", "Grail"), |
Ezio Melotti | b58e0bd | 2010-01-23 15:40:09 +0000 | [diff] [blame] | 1426 | https_handler.httpconn.req_headers) |
Senthil Kumaran | 47fff87 | 2009-12-20 07:10:31 +0000 | [diff] [blame] | 1427 | self.assertIsNotNone(req._tunnel_host) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1428 | self.assertEqual(req.host, "proxy.example.com:3128") |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1429 | self.assertEqual(req.get_header("Proxy-authorization"), "FooBar") |
Senthil Kumaran | 97f0c6b | 2009-07-25 04:24:38 +0000 | [diff] [blame] | 1430 | |
Senthil Kumaran | 4de00a2 | 2011-05-11 21:17:57 +0800 | [diff] [blame] | 1431 | @unittest.skipUnless(sys.platform == 'darwin', "only relevant for OSX") |
Ronald Oussoren | e72e161 | 2011-03-14 18:15:25 -0400 | [diff] [blame] | 1432 | def test_osx_proxy_bypass(self): |
| 1433 | bypass = { |
| 1434 | 'exclude_simple': False, |
| 1435 | 'exceptions': ['foo.bar', '*.bar.com', '127.0.0.1', '10.10', |
| 1436 | '10.0/16'] |
| 1437 | } |
| 1438 | # Check hosts that should trigger the proxy bypass |
| 1439 | for host in ('foo.bar', 'www.bar.com', '127.0.0.1', '10.10.0.1', |
| 1440 | '10.0.0.1'): |
| 1441 | self.assertTrue(_proxy_bypass_macosx_sysconf(host, bypass), |
| 1442 | 'expected bypass of %s to be True' % host) |
| 1443 | # Check hosts that should not trigger the proxy bypass |
R David Murray | fdbe918 | 2014-03-15 12:00:14 -0400 | [diff] [blame] | 1444 | for host in ('abc.foo.bar', 'bar.com', '127.0.0.2', '10.11.0.1', |
| 1445 | 'notinbypass'): |
Ronald Oussoren | e72e161 | 2011-03-14 18:15:25 -0400 | [diff] [blame] | 1446 | self.assertFalse(_proxy_bypass_macosx_sysconf(host, bypass), |
| 1447 | 'expected bypass of %s to be False' % host) |
| 1448 | |
| 1449 | # Check the exclude_simple flag |
| 1450 | bypass = {'exclude_simple': True, 'exceptions': []} |
| 1451 | self.assertTrue(_proxy_bypass_macosx_sysconf('test', bypass)) |
| 1452 | |
Christian Heimes | 4fbc72b | 2008-03-22 00:47:35 +0000 | [diff] [blame] | 1453 | def test_basic_auth(self, quote_char='"'): |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1454 | opener = OpenerDirector() |
| 1455 | password_manager = MockPasswordManager() |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1456 | auth_handler = urllib.request.HTTPBasicAuthHandler(password_manager) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1457 | realm = "ACME Widget Store" |
| 1458 | http_handler = MockHTTPHandler( |
Christian Heimes | 4fbc72b | 2008-03-22 00:47:35 +0000 | [diff] [blame] | 1459 | 401, 'WWW-Authenticate: Basic realm=%s%s%s\r\n\r\n' % |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1460 | (quote_char, realm, quote_char)) |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1461 | opener.add_handler(auth_handler) |
| 1462 | opener.add_handler(http_handler) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1463 | self._test_basic_auth(opener, auth_handler, "Authorization", |
| 1464 | realm, http_handler, password_manager, |
| 1465 | "http://acme.example.com/protected", |
| 1466 | "http://acme.example.com/protected", |
| 1467 | ) |
| 1468 | |
Christian Heimes | 4fbc72b | 2008-03-22 00:47:35 +0000 | [diff] [blame] | 1469 | def test_basic_auth_with_single_quoted_realm(self): |
| 1470 | self.test_basic_auth(quote_char="'") |
| 1471 | |
Senthil Kumaran | 34f3fcc | 2012-05-15 22:30:25 +0800 | [diff] [blame] | 1472 | def test_basic_auth_with_unquoted_realm(self): |
| 1473 | opener = OpenerDirector() |
| 1474 | password_manager = MockPasswordManager() |
| 1475 | auth_handler = urllib.request.HTTPBasicAuthHandler(password_manager) |
| 1476 | realm = "ACME Widget Store" |
| 1477 | http_handler = MockHTTPHandler( |
| 1478 | 401, 'WWW-Authenticate: Basic realm=%s\r\n\r\n' % realm) |
| 1479 | opener.add_handler(auth_handler) |
| 1480 | opener.add_handler(http_handler) |
Senthil Kumaran | 0ea91cb | 2012-05-15 23:59:42 +0800 | [diff] [blame] | 1481 | with self.assertWarns(UserWarning): |
| 1482 | self._test_basic_auth(opener, auth_handler, "Authorization", |
| 1483 | realm, http_handler, password_manager, |
| 1484 | "http://acme.example.com/protected", |
| 1485 | "http://acme.example.com/protected", |
| 1486 | ) |
Senthil Kumaran | 34f3fcc | 2012-05-15 22:30:25 +0800 | [diff] [blame] | 1487 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1488 | def test_proxy_basic_auth(self): |
| 1489 | opener = OpenerDirector() |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1490 | ph = urllib.request.ProxyHandler(dict(http="proxy.example.com:3128")) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1491 | opener.add_handler(ph) |
| 1492 | password_manager = MockPasswordManager() |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1493 | auth_handler = urllib.request.ProxyBasicAuthHandler(password_manager) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1494 | realm = "ACME Networks" |
| 1495 | http_handler = MockHTTPHandler( |
| 1496 | 407, 'Proxy-Authenticate: Basic realm="%s"\r\n\r\n' % realm) |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1497 | opener.add_handler(auth_handler) |
| 1498 | opener.add_handler(http_handler) |
Thomas Wouters | 00ee7ba | 2006-08-21 19:07:27 +0000 | [diff] [blame] | 1499 | self._test_basic_auth(opener, auth_handler, "Proxy-authorization", |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1500 | realm, http_handler, password_manager, |
| 1501 | "http://acme.example.com:3128/protected", |
| 1502 | "proxy.example.com:3128", |
| 1503 | ) |
| 1504 | |
| 1505 | def test_basic_and_digest_auth_handlers(self): |
Andrew Svetlov | 7bd61cb | 2012-12-19 22:49:25 +0200 | [diff] [blame] | 1506 | # HTTPDigestAuthHandler raised an exception if it couldn't handle a 40* |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1507 | # response (http://python.org/sf/1479302), where it should instead |
| 1508 | # return None to allow another handler (especially |
| 1509 | # HTTPBasicAuthHandler) to handle the response. |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1510 | |
| 1511 | # Also (http://python.org/sf/14797027, RFC 2617 section 1.2), we must |
| 1512 | # try digest first (since it's the strongest auth scheme), so we record |
| 1513 | # order of calls here to check digest comes first: |
| 1514 | class RecordingOpenerDirector(OpenerDirector): |
| 1515 | def __init__(self): |
| 1516 | OpenerDirector.__init__(self) |
| 1517 | self.recorded = [] |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1518 | |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1519 | def record(self, info): |
| 1520 | self.recorded.append(info) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1521 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1522 | class TestDigestAuthHandler(urllib.request.HTTPDigestAuthHandler): |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1523 | def http_error_401(self, *args, **kwds): |
| 1524 | self.parent.record("digest") |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1525 | urllib.request.HTTPDigestAuthHandler.http_error_401(self, |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1526 | *args, **kwds) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1527 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1528 | class TestBasicAuthHandler(urllib.request.HTTPBasicAuthHandler): |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1529 | def http_error_401(self, *args, **kwds): |
| 1530 | self.parent.record("basic") |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1531 | urllib.request.HTTPBasicAuthHandler.http_error_401(self, |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1532 | *args, **kwds) |
| 1533 | |
| 1534 | opener = RecordingOpenerDirector() |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1535 | password_manager = MockPasswordManager() |
| 1536 | digest_handler = TestDigestAuthHandler(password_manager) |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1537 | basic_handler = TestBasicAuthHandler(password_manager) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1538 | realm = "ACME Networks" |
| 1539 | http_handler = MockHTTPHandler( |
| 1540 | 401, 'WWW-Authenticate: Basic realm="%s"\r\n\r\n' % realm) |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1541 | opener.add_handler(basic_handler) |
| 1542 | opener.add_handler(digest_handler) |
| 1543 | opener.add_handler(http_handler) |
| 1544 | |
| 1545 | # check basic auth isn't blocked by digest handler failing |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1546 | self._test_basic_auth(opener, basic_handler, "Authorization", |
| 1547 | realm, http_handler, password_manager, |
| 1548 | "http://acme.example.com/protected", |
| 1549 | "http://acme.example.com/protected", |
| 1550 | ) |
Thomas Wouters | 4d70c3d | 2006-06-08 14:42:34 +0000 | [diff] [blame] | 1551 | # check digest was tried before basic (twice, because |
| 1552 | # _test_basic_auth called .open() twice) |
| 1553 | self.assertEqual(opener.recorded, ["digest", "basic"]*2) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1554 | |
Senthil Kumaran | 4de00a2 | 2011-05-11 21:17:57 +0800 | [diff] [blame] | 1555 | def test_unsupported_auth_digest_handler(self): |
| 1556 | opener = OpenerDirector() |
| 1557 | # While using DigestAuthHandler |
| 1558 | digest_auth_handler = urllib.request.HTTPDigestAuthHandler(None) |
| 1559 | http_handler = MockHTTPHandler( |
| 1560 | 401, 'WWW-Authenticate: Kerberos\r\n\r\n') |
| 1561 | opener.add_handler(digest_auth_handler) |
| 1562 | opener.add_handler(http_handler) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1563 | self.assertRaises(ValueError, opener.open, "http://www.example.com") |
Senthil Kumaran | 4de00a2 | 2011-05-11 21:17:57 +0800 | [diff] [blame] | 1564 | |
| 1565 | def test_unsupported_auth_basic_handler(self): |
| 1566 | # While using BasicAuthHandler |
| 1567 | opener = OpenerDirector() |
| 1568 | basic_auth_handler = urllib.request.HTTPBasicAuthHandler(None) |
| 1569 | http_handler = MockHTTPHandler( |
| 1570 | 401, 'WWW-Authenticate: NTLM\r\n\r\n') |
| 1571 | opener.add_handler(basic_auth_handler) |
| 1572 | opener.add_handler(http_handler) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1573 | self.assertRaises(ValueError, opener.open, "http://www.example.com") |
Senthil Kumaran | 4de00a2 | 2011-05-11 21:17:57 +0800 | [diff] [blame] | 1574 | |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1575 | def _test_basic_auth(self, opener, auth_handler, auth_header, |
| 1576 | realm, http_handler, password_manager, |
| 1577 | request_url, protected_url): |
Christian Heimes | 05e8be1 | 2008-02-23 18:30:17 +0000 | [diff] [blame] | 1578 | import base64 |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1579 | user, password = "wile", "coyote" |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1580 | |
| 1581 | # .add_password() fed through to password manager |
| 1582 | auth_handler.add_password(realm, request_url, user, password) |
| 1583 | self.assertEqual(realm, password_manager.realm) |
| 1584 | self.assertEqual(request_url, password_manager.url) |
| 1585 | self.assertEqual(user, password_manager.user) |
| 1586 | self.assertEqual(password, password_manager.password) |
| 1587 | |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1588 | opener.open(request_url) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1589 | |
| 1590 | # should have asked the password manager for the username/password |
| 1591 | self.assertEqual(password_manager.target_realm, realm) |
| 1592 | self.assertEqual(password_manager.target_url, protected_url) |
| 1593 | |
| 1594 | # expect one request without authorization, then one with |
| 1595 | self.assertEqual(len(http_handler.requests), 2) |
| 1596 | self.assertFalse(http_handler.requests[0].has_header(auth_header)) |
Guido van Rossum | 98b349f | 2007-08-27 21:47:52 +0000 | [diff] [blame] | 1597 | userpass = bytes('%s:%s' % (user, password), "ascii") |
Guido van Rossum | 98297ee | 2007-11-06 21:34:58 +0000 | [diff] [blame] | 1598 | auth_hdr_value = ('Basic ' + |
Georg Brandl | 706824f | 2009-06-04 09:42:55 +0000 | [diff] [blame] | 1599 | base64.encodebytes(userpass).strip().decode()) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1600 | self.assertEqual(http_handler.requests[1].get_header(auth_header), |
| 1601 | auth_hdr_value) |
Senthil Kumaran | ca2fc9e | 2010-02-24 16:53:16 +0000 | [diff] [blame] | 1602 | self.assertEqual(http_handler.requests[1].unredirected_hdrs[auth_header], |
| 1603 | auth_hdr_value) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1604 | # if the password manager can't find a password, the handler won't |
| 1605 | # handle the HTTP auth error |
| 1606 | password_manager.user = password_manager.password = None |
| 1607 | http_handler.reset() |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1608 | opener.open(request_url) |
Thomas Wouters | 477c8d5 | 2006-05-27 19:21:47 +0000 | [diff] [blame] | 1609 | self.assertEqual(len(http_handler.requests), 1) |
| 1610 | self.assertFalse(http_handler.requests[0].has_header(auth_header)) |
| 1611 | |
R David Murray | 4c7f995 | 2015-04-16 16:36:18 -0400 | [diff] [blame] | 1612 | def test_basic_prior_auth_auto_send(self): |
| 1613 | # Assume already authenticated if is_authenticated=True |
| 1614 | # for APIs like Github that don't return 401 |
| 1615 | |
| 1616 | user, password = "wile", "coyote" |
| 1617 | request_url = "http://acme.example.com/protected" |
| 1618 | |
| 1619 | http_handler = MockHTTPHandlerCheckAuth(200) |
| 1620 | |
| 1621 | pwd_manager = HTTPPasswordMgrWithPriorAuth() |
| 1622 | auth_prior_handler = HTTPBasicAuthHandler(pwd_manager) |
| 1623 | auth_prior_handler.add_password( |
| 1624 | None, request_url, user, password, is_authenticated=True) |
| 1625 | |
| 1626 | is_auth = pwd_manager.is_authenticated(request_url) |
| 1627 | self.assertTrue(is_auth) |
| 1628 | |
| 1629 | opener = OpenerDirector() |
| 1630 | opener.add_handler(auth_prior_handler) |
| 1631 | opener.add_handler(http_handler) |
| 1632 | |
| 1633 | opener.open(request_url) |
| 1634 | |
| 1635 | # expect request to be sent with auth header |
| 1636 | self.assertTrue(http_handler.has_auth_header) |
| 1637 | |
| 1638 | def test_basic_prior_auth_send_after_first_success(self): |
| 1639 | # Auto send auth header after authentication is successful once |
| 1640 | |
| 1641 | user, password = 'wile', 'coyote' |
| 1642 | request_url = 'http://acme.example.com/protected' |
| 1643 | realm = 'ACME' |
| 1644 | |
| 1645 | pwd_manager = HTTPPasswordMgrWithPriorAuth() |
| 1646 | auth_prior_handler = HTTPBasicAuthHandler(pwd_manager) |
| 1647 | auth_prior_handler.add_password(realm, request_url, user, password) |
| 1648 | |
| 1649 | is_auth = pwd_manager.is_authenticated(request_url) |
| 1650 | self.assertFalse(is_auth) |
| 1651 | |
| 1652 | opener = OpenerDirector() |
| 1653 | opener.add_handler(auth_prior_handler) |
| 1654 | |
| 1655 | http_handler = MockHTTPHandler( |
| 1656 | 401, 'WWW-Authenticate: Basic realm="%s"\r\n\r\n' % None) |
| 1657 | opener.add_handler(http_handler) |
| 1658 | |
| 1659 | opener.open(request_url) |
| 1660 | |
| 1661 | is_auth = pwd_manager.is_authenticated(request_url) |
| 1662 | self.assertTrue(is_auth) |
| 1663 | |
| 1664 | http_handler = MockHTTPHandlerCheckAuth(200) |
| 1665 | self.assertFalse(http_handler.has_auth_header) |
| 1666 | |
| 1667 | opener = OpenerDirector() |
| 1668 | opener.add_handler(auth_prior_handler) |
| 1669 | opener.add_handler(http_handler) |
| 1670 | |
| 1671 | # After getting 200 from MockHTTPHandler |
| 1672 | # Next request sends header in the first request |
| 1673 | opener.open(request_url) |
| 1674 | |
| 1675 | # expect request to be sent with auth header |
| 1676 | self.assertTrue(http_handler.has_auth_header) |
| 1677 | |
Serhiy Storchaka | f54c350 | 2014-09-06 21:41:39 +0300 | [diff] [blame] | 1678 | def test_http_closed(self): |
| 1679 | """Test the connection is cleaned up when the response is closed""" |
| 1680 | for (transfer, data) in ( |
| 1681 | ("Connection: close", b"data"), |
| 1682 | ("Transfer-Encoding: chunked", b"4\r\ndata\r\n0\r\n\r\n"), |
| 1683 | ("Content-Length: 4", b"data"), |
| 1684 | ): |
| 1685 | header = "HTTP/1.1 200 OK\r\n{}\r\n\r\n".format(transfer) |
| 1686 | conn = test_urllib.fakehttp(header.encode() + data) |
| 1687 | handler = urllib.request.AbstractHTTPHandler() |
| 1688 | req = Request("http://dummy/") |
| 1689 | req.timeout = None |
| 1690 | with handler.do_open(conn, req) as resp: |
| 1691 | resp.read() |
| 1692 | self.assertTrue(conn.fakesock.closed, |
| 1693 | "Connection not closed with {!r}".format(transfer)) |
| 1694 | |
| 1695 | def test_invalid_closed(self): |
| 1696 | """Test the connection is cleaned up after an invalid response""" |
| 1697 | conn = test_urllib.fakehttp(b"") |
| 1698 | handler = urllib.request.AbstractHTTPHandler() |
| 1699 | req = Request("http://dummy/") |
| 1700 | req.timeout = None |
| 1701 | with self.assertRaises(http.client.BadStatusLine): |
| 1702 | handler.do_open(conn, req) |
| 1703 | self.assertTrue(conn.fakesock.closed, "Connection not closed") |
| 1704 | |
Senthil Kumaran | 4de00a2 | 2011-05-11 21:17:57 +0800 | [diff] [blame] | 1705 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1706 | class MiscTests(unittest.TestCase): |
| 1707 | |
Senthil Kumaran | e9853da | 2013-03-19 12:07:43 -0700 | [diff] [blame] | 1708 | def opener_has_handler(self, opener, handler_class): |
| 1709 | self.assertTrue(any(h.__class__ == handler_class |
| 1710 | for h in opener.handlers)) |
| 1711 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1712 | def test_build_opener(self): |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1713 | class MyHTTPHandler(urllib.request.HTTPHandler): |
| 1714 | pass |
| 1715 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1716 | class FooHandler(urllib.request.BaseHandler): |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1717 | def foo_open(self): |
| 1718 | pass |
| 1719 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1720 | class BarHandler(urllib.request.BaseHandler): |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1721 | def bar_open(self): |
| 1722 | pass |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1723 | |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1724 | build_opener = urllib.request.build_opener |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1725 | |
| 1726 | o = build_opener(FooHandler, BarHandler) |
| 1727 | self.opener_has_handler(o, FooHandler) |
| 1728 | self.opener_has_handler(o, BarHandler) |
| 1729 | |
| 1730 | # can take a mix of classes and instances |
| 1731 | o = build_opener(FooHandler, BarHandler()) |
| 1732 | self.opener_has_handler(o, FooHandler) |
| 1733 | self.opener_has_handler(o, BarHandler) |
| 1734 | |
| 1735 | # subclasses of default handlers override default handlers |
| 1736 | o = build_opener(MyHTTPHandler) |
| 1737 | self.opener_has_handler(o, MyHTTPHandler) |
| 1738 | |
| 1739 | # a particular case of overriding: default handlers can be passed |
| 1740 | # in explicitly |
| 1741 | o = build_opener() |
Jeremy Hylton | 1afc169 | 2008-06-18 20:49:58 +0000 | [diff] [blame] | 1742 | self.opener_has_handler(o, urllib.request.HTTPHandler) |
| 1743 | o = build_opener(urllib.request.HTTPHandler) |
| 1744 | self.opener_has_handler(o, urllib.request.HTTPHandler) |
| 1745 | o = build_opener(urllib.request.HTTPHandler()) |
| 1746 | self.opener_has_handler(o, urllib.request.HTTPHandler) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1747 | |
Christian Heimes | 81ee3ef | 2008-05-04 22:42:01 +0000 | [diff] [blame] | 1748 | # Issue2670: multiple handlers sharing the same base class |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1749 | class MyOtherHTTPHandler(urllib.request.HTTPHandler): |
| 1750 | pass |
| 1751 | |
Christian Heimes | 81ee3ef | 2008-05-04 22:42:01 +0000 | [diff] [blame] | 1752 | o = build_opener(MyHTTPHandler, MyOtherHTTPHandler) |
| 1753 | self.opener_has_handler(o, MyHTTPHandler) |
| 1754 | self.opener_has_handler(o, MyOtherHTTPHandler) |
| 1755 | |
Brett Cannon | 80512de | 2013-01-25 22:27:21 -0500 | [diff] [blame] | 1756 | @unittest.skipUnless(support.is_resource_enabled('network'), |
| 1757 | 'test requires network access') |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1758 | def test_issue16464(self): |
Berker Peksag | bcdfc6a | 2015-03-02 06:01:01 +0200 | [diff] [blame] | 1759 | with support.transient_internet("http://www.example.com/"): |
| 1760 | opener = urllib.request.build_opener() |
| 1761 | request = urllib.request.Request("http://www.example.com/") |
| 1762 | self.assertEqual(None, request.data) |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1763 | |
Berker Peksag | bcdfc6a | 2015-03-02 06:01:01 +0200 | [diff] [blame] | 1764 | opener.open(request, "1".encode("us-ascii")) |
| 1765 | self.assertEqual(b"1", request.data) |
| 1766 | self.assertEqual("1", request.get_header("Content-length")) |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1767 | |
Berker Peksag | bcdfc6a | 2015-03-02 06:01:01 +0200 | [diff] [blame] | 1768 | opener.open(request, "1234567890".encode("us-ascii")) |
| 1769 | self.assertEqual(b"1234567890", request.data) |
| 1770 | self.assertEqual("10", request.get_header("Content-length")) |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1771 | |
Senthil Kumaran | e9853da | 2013-03-19 12:07:43 -0700 | [diff] [blame] | 1772 | def test_HTTPError_interface(self): |
| 1773 | """ |
| 1774 | Issue 13211 reveals that HTTPError didn't implement the URLError |
| 1775 | interface even though HTTPError is a subclass of URLError. |
Senthil Kumaran | e9853da | 2013-03-19 12:07:43 -0700 | [diff] [blame] | 1776 | """ |
Senthil Kumaran | fa1b02a | 2013-04-08 22:24:17 -0700 | [diff] [blame] | 1777 | msg = 'something bad happened' |
| 1778 | url = code = fp = None |
| 1779 | hdrs = 'Content-Length: 42' |
| 1780 | err = urllib.error.HTTPError(url, code, msg, hdrs, fp) |
| 1781 | self.assertTrue(hasattr(err, 'reason')) |
| 1782 | self.assertEqual(err.reason, 'something bad happened') |
| 1783 | self.assertTrue(hasattr(err, 'headers')) |
| 1784 | self.assertEqual(err.headers, 'Content-Length: 42') |
| 1785 | expected_errmsg = 'HTTP Error %s: %s' % (err.code, err.msg) |
| 1786 | self.assertEqual(str(err), expected_errmsg) |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1787 | expected_errmsg = '<HTTPError %s: %r>' % (err.code, err.msg) |
| 1788 | self.assertEqual(repr(err), expected_errmsg) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1789 | |
Senthil Kumaran | d8e24f1 | 2014-04-14 16:32:20 -0400 | [diff] [blame] | 1790 | def test_parse_proxy(self): |
| 1791 | parse_proxy_test_cases = [ |
| 1792 | ('proxy.example.com', |
| 1793 | (None, None, None, 'proxy.example.com')), |
| 1794 | ('proxy.example.com:3128', |
| 1795 | (None, None, None, 'proxy.example.com:3128')), |
| 1796 | ('proxy.example.com', (None, None, None, 'proxy.example.com')), |
| 1797 | ('proxy.example.com:3128', |
| 1798 | (None, None, None, 'proxy.example.com:3128')), |
| 1799 | # The authority component may optionally include userinfo |
| 1800 | # (assumed to be # username:password): |
| 1801 | ('joe:password@proxy.example.com', |
| 1802 | (None, 'joe', 'password', 'proxy.example.com')), |
| 1803 | ('joe:password@proxy.example.com:3128', |
| 1804 | (None, 'joe', 'password', 'proxy.example.com:3128')), |
| 1805 | #Examples with URLS |
| 1806 | ('http://proxy.example.com/', |
| 1807 | ('http', None, None, 'proxy.example.com')), |
| 1808 | ('http://proxy.example.com:3128/', |
| 1809 | ('http', None, None, 'proxy.example.com:3128')), |
| 1810 | ('http://joe:password@proxy.example.com/', |
| 1811 | ('http', 'joe', 'password', 'proxy.example.com')), |
| 1812 | ('http://joe:password@proxy.example.com:3128', |
| 1813 | ('http', 'joe', 'password', 'proxy.example.com:3128')), |
| 1814 | # Everything after the authority is ignored |
| 1815 | ('ftp://joe:password@proxy.example.com/rubbish:3128', |
| 1816 | ('ftp', 'joe', 'password', 'proxy.example.com')), |
| 1817 | # Test for no trailing '/' case |
| 1818 | ('http://joe:password@proxy.example.com', |
| 1819 | ('http', 'joe', 'password', 'proxy.example.com')) |
| 1820 | ] |
| 1821 | |
| 1822 | for tc, expected in parse_proxy_test_cases: |
| 1823 | self.assertEqual(_parse_proxy(tc), expected) |
| 1824 | |
| 1825 | self.assertRaises(ValueError, _parse_proxy, 'file:/ftp.example.com'), |
| 1826 | |
Berker Peksag | e88dd1c | 2016-03-06 16:16:40 +0200 | [diff] [blame] | 1827 | def test_unsupported_algorithm(self): |
| 1828 | handler = AbstractDigestAuthHandler() |
| 1829 | with self.assertRaises(ValueError) as exc: |
| 1830 | handler.get_algorithm_impls('invalid') |
| 1831 | self.assertEqual( |
| 1832 | str(exc.exception), |
| 1833 | "Unsupported digest authentication algorithm 'invalid'" |
| 1834 | ) |
| 1835 | |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1836 | |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1837 | class RequestTests(unittest.TestCase): |
Jason R. Coombs | 4a65242 | 2013-09-08 13:03:40 -0400 | [diff] [blame] | 1838 | class PutRequest(Request): |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1839 | method = 'PUT' |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1840 | |
| 1841 | def setUp(self): |
| 1842 | self.get = Request("http://www.python.org/~jeremy/") |
| 1843 | self.post = Request("http://www.python.org/~jeremy/", |
| 1844 | "data", |
| 1845 | headers={"X-Test": "test"}) |
Jason R. Coombs | 4a65242 | 2013-09-08 13:03:40 -0400 | [diff] [blame] | 1846 | self.head = Request("http://www.python.org/~jeremy/", method='HEAD') |
| 1847 | self.put = self.PutRequest("http://www.python.org/~jeremy/") |
| 1848 | self.force_post = self.PutRequest("http://www.python.org/~jeremy/", |
| 1849 | method="POST") |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1850 | |
| 1851 | def test_method(self): |
| 1852 | self.assertEqual("POST", self.post.get_method()) |
| 1853 | self.assertEqual("GET", self.get.get_method()) |
Senthil Kumaran | 0b5463f | 2013-09-09 23:13:06 -0700 | [diff] [blame] | 1854 | self.assertEqual("HEAD", self.head.get_method()) |
Jason R. Coombs | 4a65242 | 2013-09-08 13:03:40 -0400 | [diff] [blame] | 1855 | self.assertEqual("PUT", self.put.get_method()) |
| 1856 | self.assertEqual("POST", self.force_post.get_method()) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1857 | |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1858 | def test_data(self): |
| 1859 | self.assertFalse(self.get.data) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1860 | self.assertEqual("GET", self.get.get_method()) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1861 | self.get.data = "spam" |
| 1862 | self.assertTrue(self.get.data) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1863 | self.assertEqual("POST", self.get.get_method()) |
| 1864 | |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1865 | # issue 16464 |
| 1866 | # if we change data we need to remove content-length header |
| 1867 | # (cause it's most probably calculated for previous value) |
| 1868 | def test_setting_data_should_remove_content_length(self): |
R David Murray | 9cc7d45 | 2013-03-20 00:10:51 -0400 | [diff] [blame] | 1869 | self.assertNotIn("Content-length", self.get.unredirected_hdrs) |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1870 | self.get.add_unredirected_header("Content-length", 42) |
| 1871 | self.assertEqual(42, self.get.unredirected_hdrs["Content-length"]) |
| 1872 | self.get.data = "spam" |
R David Murray | 9cc7d45 | 2013-03-20 00:10:51 -0400 | [diff] [blame] | 1873 | self.assertNotIn("Content-length", self.get.unredirected_hdrs) |
| 1874 | |
| 1875 | # issue 17485 same for deleting data. |
| 1876 | def test_deleting_data_should_remove_content_length(self): |
| 1877 | self.assertNotIn("Content-length", self.get.unredirected_hdrs) |
| 1878 | self.get.data = 'foo' |
| 1879 | self.get.add_unredirected_header("Content-length", 3) |
| 1880 | self.assertEqual(3, self.get.unredirected_hdrs["Content-length"]) |
| 1881 | del self.get.data |
| 1882 | self.assertNotIn("Content-length", self.get.unredirected_hdrs) |
Andrew Svetlov | bff98fe | 2012-11-27 23:06:19 +0200 | [diff] [blame] | 1883 | |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1884 | def test_get_full_url(self): |
| 1885 | self.assertEqual("http://www.python.org/~jeremy/", |
| 1886 | self.get.get_full_url()) |
| 1887 | |
| 1888 | def test_selector(self): |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1889 | self.assertEqual("/~jeremy/", self.get.selector) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1890 | req = Request("http://www.python.org/") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1891 | self.assertEqual("/", req.selector) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1892 | |
| 1893 | def test_get_type(self): |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1894 | self.assertEqual("http", self.get.type) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1895 | |
| 1896 | def test_get_host(self): |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1897 | self.assertEqual("www.python.org", self.get.host) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1898 | |
| 1899 | def test_get_host_unquote(self): |
| 1900 | req = Request("http://www.%70ython.org/") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1901 | self.assertEqual("www.python.org", req.host) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1902 | |
| 1903 | def test_proxy(self): |
Florent Xicluna | 419e384 | 2010-08-08 16:16:07 +0000 | [diff] [blame] | 1904 | self.assertFalse(self.get.has_proxy()) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1905 | self.get.set_proxy("www.perl.org", "http") |
Benjamin Peterson | c9c0f20 | 2009-06-30 23:06:06 +0000 | [diff] [blame] | 1906 | self.assertTrue(self.get.has_proxy()) |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1907 | self.assertEqual("www.python.org", self.get.origin_req_host) |
| 1908 | self.assertEqual("www.perl.org", self.get.host) |
Benjamin Peterson | 6ebe78f | 2008-12-21 00:06:59 +0000 | [diff] [blame] | 1909 | |
Senthil Kumaran | d95cc75 | 2010-08-08 11:27:53 +0000 | [diff] [blame] | 1910 | def test_wrapped_url(self): |
| 1911 | req = Request("<URL:http://www.python.org>") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1912 | self.assertEqual("www.python.org", req.host) |
Senthil Kumaran | d95cc75 | 2010-08-08 11:27:53 +0000 | [diff] [blame] | 1913 | |
Senthil Kumaran | 2643041 | 2011-04-13 07:01:19 +0800 | [diff] [blame] | 1914 | def test_url_fragment(self): |
Senthil Kumaran | d95cc75 | 2010-08-08 11:27:53 +0000 | [diff] [blame] | 1915 | req = Request("http://www.python.org/?qs=query#fragment=true") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1916 | self.assertEqual("/?qs=query", req.selector) |
Senthil Kumaran | d95cc75 | 2010-08-08 11:27:53 +0000 | [diff] [blame] | 1917 | req = Request("http://www.python.org/#fun=true") |
Senthil Kumaran | 77ebfcc | 2012-08-20 13:43:59 -0700 | [diff] [blame] | 1918 | self.assertEqual("/", req.selector) |
Senthil Kumaran | d95cc75 | 2010-08-08 11:27:53 +0000 | [diff] [blame] | 1919 | |
Senthil Kumaran | 2643041 | 2011-04-13 07:01:19 +0800 | [diff] [blame] | 1920 | # Issue 11703: geturl() omits fragment in the original URL. |
| 1921 | url = 'http://docs.python.org/library/urllib2.html#OK' |
| 1922 | req = Request(url) |
| 1923 | self.assertEqual(req.get_full_url(), url) |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1924 | |
Senthil Kumaran | 8307075 | 2013-05-24 09:14:12 -0700 | [diff] [blame] | 1925 | def test_url_fullurl_get_full_url(self): |
| 1926 | urls = ['http://docs.python.org', |
| 1927 | 'http://docs.python.org/library/urllib2.html#OK', |
Facundo Batista | 244afcf | 2015-04-22 18:35:54 -0300 | [diff] [blame] | 1928 | 'http://www.python.org/?qs=query#fragment=true'] |
Senthil Kumaran | 8307075 | 2013-05-24 09:14:12 -0700 | [diff] [blame] | 1929 | for url in urls: |
| 1930 | req = Request(url) |
| 1931 | self.assertEqual(req.get_full_url(), req.full_url) |
| 1932 | |
Jeremy Hylton | c1be59f | 2003-12-14 05:27:34 +0000 | [diff] [blame] | 1933 | |
| 1934 | if __name__ == "__main__": |
Berker Peksag | bcdfc6a | 2015-03-02 06:01:01 +0200 | [diff] [blame] | 1935 | unittest.main() |