Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
S
slapos
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Kirill Smelkov
slapos
Commits
619f368a
Commit
619f368a
authored
Nov 10, 2020
by
Kirill Smelkov
Browse files
Options
Browse Files
Download
Plain Diff
Merge remote-tracking branch 'origin/master' into t
parents
7376afed
3d747c95
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
171 additions
and
119 deletions
+171
-119
software/caddy-frontend/buildout.hash.cfg
software/caddy-frontend/buildout.hash.cfg
+2
-2
software/caddy-frontend/instance-apache-replicate.cfg.in
software/caddy-frontend/instance-apache-replicate.cfg.in
+5
-11
software/caddy-frontend/templates/replicate-publish-slave-information.cfg.in
...tend/templates/replicate-publish-slave-information.cfg.in
+5
-5
software/caddy-frontend/test/test.py
software/caddy-frontend/test/test.py
+159
-101
No files found.
software/caddy-frontend/buildout.hash.cfg
View file @
619f368a
...
@@ -26,7 +26,7 @@ md5sum = e7d7e1448b6420657e953026573311ca
...
@@ -26,7 +26,7 @@ md5sum = e7d7e1448b6420657e953026573311ca
[profile-caddy-replicate]
[profile-caddy-replicate]
filename = instance-apache-replicate.cfg.in
filename = instance-apache-replicate.cfg.in
md5sum =
b70f9ce80dd927ead51b4526997b75ed
md5sum =
2d421ce6def12f7796cfa28f59eef0df
[profile-slave-list]
[profile-slave-list]
_update_hash_filename_ = templates/apache-custom-slave-list.cfg.in
_update_hash_filename_ = templates/apache-custom-slave-list.cfg.in
...
@@ -34,7 +34,7 @@ md5sum = ab143bfa2e20725aa35940c9033fa0ee
...
@@ -34,7 +34,7 @@ md5sum = ab143bfa2e20725aa35940c9033fa0ee
[profile-replicate-publish-slave-information]
[profile-replicate-publish-slave-information]
_update_hash_filename_ = templates/replicate-publish-slave-information.cfg.in
_update_hash_filename_ = templates/replicate-publish-slave-information.cfg.in
md5sum = d
e268251dafa5ad83ebf5b20636365d9
md5sum = d
f304a8aee87b6f2425241016a48f7a5
[profile-caddy-frontend-configuration]
[profile-caddy-frontend-configuration]
_update_hash_filename_ = templates/Caddyfile.in
_update_hash_filename_ = templates/Caddyfile.in
...
...
software/caddy-frontend/instance-apache-replicate.cfg.in
View file @
619f368a
...
@@ -217,11 +217,11 @@ context =
...
@@ -217,11 +217,11 @@ context =
{% endfor %}
{% endfor %}
{% do authorized_slave_list.append(authorized_slave) %}
{% do authorized_slave_list.append(authorized_slave) %}
{% else %}
{% else %}
{% do rejected_slave_dict.__setitem__(slave.get('slave_reference'), s
lave_error_list
) %}
{% do rejected_slave_dict.__setitem__(slave.get('slave_reference'), s
orted(slave_error_list)
) %}
{% do rejected_slave_title_dict.__setitem__(slave.get('slave_title'), s
lave_error_list
) %}
{% do rejected_slave_title_dict.__setitem__(slave.get('slave_title'), s
orted(slave_error_list)
) %}
{% endif %}
{% endif %}
{% if len(slave_warning_list) > 0 %}
{% if len(slave_warning_list) > 0 %}
{% do warning_slave_dict.__setitem__(slave.get('slave_reference'), s
lave_warning_list
) %}
{% do warning_slave_dict.__setitem__(slave.get('slave_reference'), s
orted(slave_warning_list)
) %}
{% endif %}
{% endif %}
{% endfor %}
{% endfor %}
{% do authorized_slave_list.sort() %}
{% do authorized_slave_list.sort() %}
...
@@ -379,16 +379,10 @@ sla-{{ key[sla_kedifa_key_length:] }} = {{ slapparameter_dict.pop(key) }}
...
@@ -379,16 +379,10 @@ sla-{{ key[sla_kedifa_key_length:] }} = {{ slapparameter_dict.pop(key) }}
{% endfor %}
{% endfor %}
[rejected-slave-information]
[rejected-slave-information]
{% for slave_id, rejected_list in rejected_slave_dict.iteritems() %}
rejected-slave-dict = {{ dumps(rejected_slave_dict) }}
{# sort_keys are important in order to avoid shuffling parameters on each run #}
{{ slave_id }} = {{ dumps(json_module.dumps(rejected_list, sort_keys=True)) }}
{% endfor %}
[warning-slave-information]
[warning-slave-information]
{% for slave_id, warning_list in warning_slave_dict.iteritems() %}
warning-slave-dict = {{ dumps(warning_slave_dict) }}
{# sort_keys are important in order to avoid shuffling parameters on each run #}
{{ slave_id }} = {{ dumps(json_module.dumps(warning_list, sort_keys=True)) }}
{% endfor %}
[slave-information]
[slave-information]
{% for frontend_section in frontend_section_list %}
{% for frontend_section in frontend_section_list %}
...
...
software/caddy-frontend/templates/replicate-publish-slave-information.cfg.in
View file @
619f368a
...
@@ -27,22 +27,22 @@
...
@@ -27,22 +27,22 @@
{% endfor %}
{% endfor %}
{% endfor %}
{% endfor %}
{% for slave_reference, rejected_info_list in rejected_slave_information.iteritems() %}
{% for slave_reference, rejected_info_list in rejected_slave_information
['rejected-slave-dict']
.iteritems() %}
{% if slave_reference not in slave_information_dict %}
{% if slave_reference not in slave_information_dict %}
{% do slave_information_dict.__setitem__(slave_reference, {}) %}
{% do slave_information_dict.__setitem__(slave_reference, {}) %}
{% endif %}
{% endif %}
{% do slave_information_dict[slave_reference].__setitem__('request-error-list',
rejected_info_list
) %}
{% do slave_information_dict[slave_reference].__setitem__('request-error-list',
json_module.dumps(rejected_info_list)
) %}
{% endfor %}
{% endfor %}
{% for slave_reference, warning_info_list in warning_slave_information.iteritems() %}
{% for slave_reference, warning_info_list in warning_slave_information
['warning-slave-dict']
.iteritems() %}
{% if slave_reference not in slave_information_dict %}
{% if slave_reference not in slave_information_dict %}
{% do slave_information_dict.__setitem__(slave_reference, {}) %}
{% do slave_information_dict.__setitem__(slave_reference, {}) %}
{% endif %}
{% endif %}
{% do slave_information_dict[slave_reference].__setitem__('warning-list',
warning_info_list
) %}
{% do slave_information_dict[slave_reference].__setitem__('warning-list',
json_module.dumps(warning_info_list)
) %}
{% endfor %}
{% endfor %}
{% for slave_reference, kedifa_dict in json_module.loads(slave_kedifa_information).iteritems() %}
{% for slave_reference, kedifa_dict in json_module.loads(slave_kedifa_information).iteritems() %}
{% if slave_reference not in rejected_slave_information %}
{% if slave_reference not in rejected_slave_information
['rejected-slave-dict']
%}
{% if slave_reference not in slave_information_dict %}
{% if slave_reference not in slave_information_dict %}
{% do slave_information_dict.__setitem__(slave_reference, {}) %}
{% do slave_information_dict.__setitem__(slave_reference, {}) %}
{% endif %}
{% endif %}
...
...
software/caddy-frontend/test/test.py
View file @
619f368a
...
@@ -1717,7 +1717,26 @@ class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -1717,7 +1717,26 @@ class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
self
.
assertNotIn
(
'Sending telemetry'
,
fh
.
read
(),
'Telemetry enabled'
)
self
.
assertNotIn
(
'Sending telemetry'
,
fh
.
read
(),
'Telemetry enabled'
)
def
test_url
(
self
):
def
test_url
(
self
):
parameter_dict
=
self
.
assertSlaveBase
(
'Url'
)
reference
=
'Url'
parameter_dict
=
self
.
parseSlaveParameterDict
(
reference
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
,
''
)
hostname
=
reference
.
translate
(
None
,
'_-'
).
lower
()
self
.
assertEqual
(
{
'domain'
:
'%s.example.com'
%
(
hostname
,),
'replication_number'
:
'1'
,
'url'
:
'http://%s.example.com'
%
(
hostname
,
),
'site_url'
:
'http://%s.example.com'
%
(
hostname
,
),
'secure_access'
:
'https://%s.example.com'
%
(
hostname
,
),
'public-ipv4'
:
self
.
_ipv4_address
,
'backend-client-caucase-url'
:
'http://[%s]:8990'
%
self
.
_ipv6_address
,
'warning-list'
:
[
"slave url ' %s ' has been converted to '%s'"
%
(
self
.
backend_url
,
self
.
backend_url
)],
},
parameter_dict
)
result
=
fakeHTTPSResult
(
result
=
fakeHTTPSResult
(
parameter_dict
[
'domain'
],
parameter_dict
[
'public-ipv4'
],
parameter_dict
[
'domain'
],
parameter_dict
[
'public-ipv4'
],
...
@@ -2022,7 +2041,27 @@ class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -2022,7 +2041,27 @@ class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
)
)
def
test_compressed_result
(
self
):
def
test_compressed_result
(
self
):
parameter_dict
=
self
.
assertSlaveBase
(
'Url'
)
reference
=
'Url'
parameter_dict
=
self
.
parseSlaveParameterDict
(
reference
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
,
''
)
hostname
=
reference
.
translate
(
None
,
'_-'
).
lower
()
self
.
assertEqual
(
{
'domain'
:
'%s.example.com'
%
(
hostname
,),
'replication_number'
:
'1'
,
'url'
:
'http://%s.example.com'
%
(
hostname
,
),
'site_url'
:
'http://%s.example.com'
%
(
hostname
,
),
'secure_access'
:
'https://%s.example.com'
%
(
hostname
,
),
'public-ipv4'
:
self
.
_ipv4_address
,
'backend-client-caucase-url'
:
'http://[%s]:8990'
%
self
.
_ipv6_address
,
'warning-list'
:
[
"slave url ' %s ' has been converted to '%s'"
%
(
self
.
backend_url
,
self
.
backend_url
)],
},
parameter_dict
)
result_compressed
=
fakeHTTPSResult
(
result_compressed
=
fakeHTTPSResult
(
parameter_dict
[
'domain'
],
parameter_dict
[
'public-ipv4'
],
parameter_dict
[
'domain'
],
parameter_dict
[
'public-ipv4'
],
'test-path/deep/.././deeper'
,
'test-path/deep/.././deeper'
,
...
@@ -2055,7 +2094,26 @@ class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -2055,7 +2094,26 @@ class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
self
.
assertFalse
(
'Content-Encoding'
in
result_not_compressed
.
headers
)
self
.
assertFalse
(
'Content-Encoding'
in
result_not_compressed
.
headers
)
def
test_no_content_type_alter
(
self
):
def
test_no_content_type_alter
(
self
):
parameter_dict
=
self
.
assertSlaveBase
(
'Url'
)
reference
=
'Url'
parameter_dict
=
self
.
parseSlaveParameterDict
(
reference
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
,
''
)
hostname
=
reference
.
translate
(
None
,
'_-'
).
lower
()
self
.
assertEqual
(
{
'domain'
:
'%s.example.com'
%
(
hostname
,),
'replication_number'
:
'1'
,
'url'
:
'http://%s.example.com'
%
(
hostname
,
),
'site_url'
:
'http://%s.example.com'
%
(
hostname
,
),
'secure_access'
:
'https://%s.example.com'
%
(
hostname
,
),
'public-ipv4'
:
self
.
_ipv4_address
,
'backend-client-caucase-url'
:
'http://[%s]:8990'
%
self
.
_ipv6_address
,
'warning-list'
:
[
"slave url ' %s ' has been converted to '%s'"
%
(
self
.
backend_url
,
self
.
backend_url
)],
},
parameter_dict
)
result
=
fakeHTTPSResult
(
result
=
fakeHTTPSResult
(
parameter_dict
[
'domain'
],
parameter_dict
[
'public-ipv4'
],
parameter_dict
[
'domain'
],
parameter_dict
[
'public-ipv4'
],
'test-path/deep/.././deeper'
,
'test-path/deep/.././deeper'
,
...
@@ -5279,46 +5337,46 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5279,46 +5337,46 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
],
],
'
warning
-
slave
-
dict
': {
'
warning
-
slave
-
dict
': {
u'
_custom_domain_ssl_crt_ssl_key
': [
u'
_custom_domain_ssl_crt_ssl_key
': [
u'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_
crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_
crt
is
obsolete
,
please
use
key
-
upload
-
url
'
u'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
'
],
],
u'
_custom_domain_ssl_crt_ssl_key_ssl_ca_crt
': [
u'
_custom_domain_ssl_crt_ssl_key_ssl_ca_crt
': [
u'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
'
u'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
'
],
],
u'
_ssl_ca_crt_does_not_match
': [
u'
_ssl_ca_crt_does_not_match
': [
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
],
],
u'
_ssl_ca_crt_garbage
': [
u'
_ssl_ca_crt_garbage
': [
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
],
],
# u'
_ssl_ca_crt_only
': [
# u'
_ssl_ca_crt_only
': [
# u'
ssl_ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
# u'
ssl_ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
# ],
# ],
u'
_ssl_from_slave
': [
u'
_ssl_from_slave
': [
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
],
],
u'
_ssl_from_slave_kedifa_overrides
': [
u'
_ssl_from_slave_kedifa_overrides
': [
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
],
],
# u'
_ssl_key
-
ssl_crt
-
unsafe
': [
# u'
_ssl_key
-
ssl_crt
-
unsafe
': [
# u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
# u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
# u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
# u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
# ],
# ],
u'
_type
-
notebook
-
ssl_from_slave
': [
u'
_type
-
notebook
-
ssl_from_slave
': [
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
],
],
u'
_type
-
notebook
-
ssl_from_slave_kedifa_overrides
': [
u'
_type
-
notebook
-
ssl_from_slave_kedifa_overrides
': [
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
u'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
],
],
}
}
}
}
...
@@ -5427,8 +5485,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5427,8 +5485,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
]
]
},
},
parameter_dict
parameter_dict
...
@@ -5460,8 +5518,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5460,8 +5518,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
]
]
},
},
parameter_dict
parameter_dict
...
@@ -5607,8 +5665,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5607,8 +5665,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
]
]
},
},
parameter_dict
parameter_dict
...
@@ -5640,8 +5698,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5640,8 +5698,8 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_key
is
obsolete
,
please
use
key
-
upload
-
url
',
]
]
},
},
parameter_dict
parameter_dict
...
@@ -5734,9 +5792,9 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5734,9 +5792,9 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
'
'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
'
]
]
},
},
parameter_dict
parameter_dict
...
@@ -5825,9 +5883,9 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5825,9 +5883,9 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
']
'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
']
},
},
parameter_dict
parameter_dict
)
)
...
@@ -5857,9 +5915,9 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
...
@@ -5857,9 +5915,9 @@ class TestSlaveSlapOSMasterCertificateCompatibility(
'
public
-
ipv4
': self._ipv4_address,
'
public
-
ipv4
': self._ipv4_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
backend
-
client
-
caucase
-
url
': '
http
:
//
[
%
s
]:
8990
' % self._ipv6_address,
'
warning
-
list
': [
'
warning
-
list
': [
'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_crt
is
obsolete
,
please
use
key
-
upload
-
url
',
'
ssl_
ca_crt
is
obsolete
,
please
use
key
-
upload
-
url
'
'
ssl_
key
is
obsolete
,
please
use
key
-
upload
-
url
'
]
]
},
},
parameter_dict
parameter_dict
...
@@ -6152,82 +6210,82 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6152,82 +6210,82 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
@classmethod
@classmethod
def fillSlaveParameterDictDict(cls):
def fillSlaveParameterDictDict(cls):
cls.slave_parameter_dict_dict = {
cls.slave_parameter_dict_dict = {
'
url
': {
'
URL
': {
'
url
': "https://[fd46::c2ae]:!py!u'
123123
'",
'
url
': "https://[fd46::c2ae]:!py!u'
123123
'",
},
},
'
https
-
url
': {
'
HTTPS
-
URL
': {
'
https
-
url
': "https://[fd46::c2ae]:!py!u'
123123
'",
'
https
-
url
': "https://[fd46::c2ae]:!py!u'
123123
'",
},
},
'
ssl
-
proxy
-
verify_ssl_proxy_ca_crt_damaged
': {
'
SSL
-
PROXY
-
VERIFY_SSL_PROXY_CA_CRT_DAMAGED
': {
'
url
': cls.backend_https_url,
'
url
': cls.backend_https_url,
'
ssl
-
proxy
-
verify
': True,
'
ssl
-
proxy
-
verify
': True,
'
ssl_proxy_ca_crt
': '
damaged
',
'
ssl_proxy_ca_crt
': '
damaged
',
},
},
'
ssl
-
proxy
-
verify_ssl_proxy_ca_crt_empty
': {
'
SSL
-
PROXY
-
VERIFY_SSL_PROXY_CA_CRT_EMPTY
': {
'
url
': cls.backend_https_url,
'
url
': cls.backend_https_url,
'
ssl
-
proxy
-
verify
': True,
'
ssl
-
proxy
-
verify
': True,
'
ssl_proxy_ca_crt
': '',
'
ssl_proxy_ca_crt
': '',
},
},
'
bad
-
backend
': {
'
BAD
-
BACKEND
': {
'
url
': '
http
:
//
1
:
2
:
3
:
4
',
'
url
': '
http
:
//
1
:
2
:
3
:
4
',
'
https
-
url
': '
http
:
//
host
.
domain
:
badport
',
'
https
-
url
': '
http
:
//
host
.
domain
:
badport
',
},
},
'
empty
-
backend
': {
'
EMPTY
-
BACKEND
': {
'
url
': '',
'
url
': '',
'
https
-
url
': '',
'
https
-
url
': '',
},
},
'
custom_domain
-
unsafe
': {
'
CUSTOM_DOMAIN
-
UNSAFE
': {
'
custom_domain
': '
$
{
section
:
option
}
afterspace
\
nafternewline
',
'
custom_domain
': '
$
{
section
:
option
}
afterspace
\
nafternewline
',
},
},
'
server
-
alias
-
unsafe
': {
'
SERVER
-
ALIAS
-
UNSAFE
': {
'
server
-
alias
': '
$
{
section
:
option
}
afterspace
',
'
server
-
alias
': '
$
{
section
:
option
}
afterspace
',
},
},
'
server
-
alias
-
same
': {
'
SERVER
-
ALIAS
-
SAME
': {
'
url
': cls.backend_url,
'
url
': cls.backend_url,
'
server
-
alias
': '
serveraliassame
.
example
.
com
',
'
server
-
alias
': '
serveraliassame
.
example
.
com
',
},
},
'
virtualhostroot
-
http
-
port
-
unsafe
': {
'
VIRTUALHOSTROOT
-
HTTP
-
PORT
-
UNSAFE
': {
'
type
': '
zope
',
'
type
': '
zope
',
'
url
': cls.backend_url,
'
url
': cls.backend_url,
'
virtualhostroot
-
http
-
port
': '
$
{
section
:
option
}
',
'
virtualhostroot
-
http
-
port
': '
$
{
section
:
option
}
',
},
},
'
virtualhostroot
-
https
-
port
-
unsafe
': {
'
VIRTUALHOSTROOT
-
HTTPS
-
PORT
-
UNSAFE
': {
'
type
': '
zope
',
'
type
': '
zope
',
'
url
': cls.backend_url,
'
url
': cls.backend_url,
'
virtualhostroot
-
https
-
port
': '
$
{
section
:
option
}
',
'
virtualhostroot
-
https
-
port
': '
$
{
section
:
option
}
',
},
},
'
default
-
path
-
unsafe
': {
'
DEFAULT
-
PATH
-
UNSAFE
': {
'
type
': '
zope
',
'
type
': '
zope
',
'
url
': cls.backend_url,
'
url
': cls.backend_url,
'
default
-
path
': '
$
{
section
:
option
}
\
nn
"
\
n
ewline
\
n
}
\
n
}proxy
\
n
/slashed',
'
default
-
path
': '
$
{
section
:
option
}
\
nn
"
\
n
ewline
\
n
}
\
n
}proxy
\
n
/slashed',
},
},
'
monitor-ipv4-test-unsafe
': {
'
MONITOR-IPV4-TEST-UNSAFE
': {
'monitor-ipv4-test': '${section:option}
\
n
afternewline ipv4',
'monitor-ipv4-test': '${section:option}
\
n
afternewline ipv4',
},
},
'
monitor-ipv6-test-unsafe
': {
'
MONITOR-IPV6-TEST-UNSAFE
': {
'monitor-ipv6-test': '${section:option}
\
n
afternewline ipv6',
'monitor-ipv6-test': '${section:option}
\
n
afternewline ipv6',
},
},
'
bad-ciphers
': {
'
BAD-CIPHERS
': {
'ciphers': 'bad ECDHE-ECDSA-AES256-GCM-SHA384 again',
'ciphers': 'bad ECDHE-ECDSA-AES256-GCM-SHA384 again',
},
},
'
site
_1': {
'
SITE
_1': {
'custom_domain': 'duplicate.example.com',
'custom_domain': 'duplicate.example.com',
},
},
'
site
_2': {
'
SITE
_2': {
'custom_domain': 'duplicate.example.com',
'custom_domain': 'duplicate.example.com',
},
},
'
site
_3': {
'
SITE
_3': {
'server-alias': 'duplicate.example.com',
'server-alias': 'duplicate.example.com',
},
},
'
site
_4': {
'
SITE
_4': {
'custom_domain': 'duplicate.example.com',
'custom_domain': 'duplicate.example.com',
'server-alias': 'duplicate.example.com',
'server-alias': 'duplicate.example.com',
},
},
'
ssl_ca_crt_only
': {
'
SSL_CA_CRT_ONLY
': {
'url': cls.backend_url,
'url': cls.backend_url,
'ssl_ca_crt': cls.ca.certificate_pem,
'ssl_ca_crt': cls.ca.certificate_pem,
},
},
'
ssl_key-ssl_crt-unsafe
': {
'
SSL_KEY-SSL_CRT-UNSAFE
': {
'ssl_key': '${section:option}ssl_keyunsafe
\
n
unsafe',
'ssl_key': '${section:option}ssl_keyunsafe
\
n
unsafe',
'ssl_crt': '${section:option}ssl_crtunsafe
\
n
unsafe',
'ssl_crt': '${section:option}ssl_crtunsafe
\
n
unsafe',
},
},
...
@@ -6248,46 +6306,46 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6248,46 +6306,46 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
'rejected-slave-amount': '14',
'rejected-slave-amount': '14',
'slave-amount': '21',
'slave-amount': '21',
'rejected-slave-dict': {
'rejected-slave-dict': {
'_
https-url
': ['slave https-url "
https
:
//
[
fd46
::
c2ae
]:
!
py
!
u
\
'123123
\
'
"'
'_
HTTPS-URL
': ['slave https-url "
https
:
//
[
fd46
::
c2ae
]:
!
py
!
u
\
'123123
\
'
"'
' invalid'
],
' invalid'
],
'_
url
'
:
[
u'slave url "https://[fd46::c2ae]:!py!u
\
'
123123
\
'
" invalid'
],
'_
URL
'
:
[
u'slave url "https://[fd46::c2ae]:!py!u
\
'
123123
\
'
" invalid'
],
'_
ssl-proxy-verify_ssl_proxy_ca_crt_damaged
'
:
[
'_
SSL-PROXY-VERIFY_SSL_PROXY_CA_CRT_DAMAGED
'
:
[
'ssl_proxy_ca_crt is invalid'
'ssl_proxy_ca_crt is invalid'
],
],
'_
ssl-proxy-verify_ssl_proxy_ca_crt_empty
'
:
[
'_
SSL-PROXY-VERIFY_SSL_PROXY_CA_CRT_EMPTY
'
:
[
'ssl_proxy_ca_crt is invalid'
'ssl_proxy_ca_crt is invalid'
],
],
'_
bad-ciphers
'
:
[
'_
BAD-CIPHERS
'
:
[
"Cipher '
bad
' is not supported."
,
"Cipher '
again
' is not supported."
,
"Cipher '
again
' is not supported."
"Cipher '
bad
' is not supported."
],
],
'_
custom_domain-unsafe
'
:
[
'_
CUSTOM_DOMAIN-UNSAFE
'
:
[
"custom_domain '${section:option} afterspace
\
\
nafternewline' invalid"
"custom_domain '${section:option} afterspace
\
\
nafternewline' invalid"
],
],
'_
server-alias-unsafe
'
:
[
'_
SERVER-ALIAS-UNSAFE
'
:
[
"server-alias '${section:option}' not valid"
,
"server-alias '${section:option}' not valid"
,
"server-alias 'afterspace' not valid"
"server-alias 'afterspace' not valid"
],
],
'_
site
_2'
:
[
"custom_domain 'duplicate.example.com' clashes"
],
'_
SITE
_2'
:
[
"custom_domain 'duplicate.example.com' clashes"
],
'_
site
_3'
:
[
"server-alias 'duplicate.example.com' clashes"
],
'_
SITE
_3'
:
[
"server-alias 'duplicate.example.com' clashes"
],
'_
site
_4'
:
[
"custom_domain 'duplicate.example.com' clashes"
],
'_
SITE
_4'
:
[
"custom_domain 'duplicate.example.com' clashes"
],
'_
ssl_ca_crt_only
'
:
[
'_
SSL_CA_CRT_ONLY
'
:
[
"ssl_ca_crt is present, so ssl_crt and ssl_key are required"
],
"ssl_ca_crt is present, so ssl_crt and ssl_key are required"
],
'_
ssl_key-ssl_crt-unsafe
'
:
[
'_
SSL_KEY-SSL_CRT-UNSAFE
'
:
[
"slave ssl_key and ssl_crt does not match"
],
"slave ssl_key and ssl_crt does not match"
],
'_
bad-backend
'
:
[
'_
BAD-BACKEND
'
:
[
"slave
url 'http://1:2:3:4
' invalid"
,
"slave
https-url 'http://host.domain:badport
' invalid"
,
"slave
https-url 'http://host.domain:badport
' invalid"
],
"slave
url 'http://1:2:3:4
' invalid"
],
'_
empty-backend
'
:
[
'_
EMPTY-BACKEND
'
:
[
"slave url '' invalid"
,
"slave
https-
url '' invalid"
,
"slave
https-
url '' invalid"
],
"slave url '' invalid"
],
},
},
'warning-slave-dict'
:
{
'warning-slave-dict'
:
{
'_
ssl_ca_crt_only
'
:
[
'_
SSL_CA_CRT_ONLY
'
:
[
'ssl_ca_crt is obsolete, please use key-upload-url'
],
'ssl_ca_crt is obsolete, please use key-upload-url'
],
'_
ssl_key-ssl_crt-unsafe
'
:
[
'_
SSL_KEY-SSL_CRT-UNSAFE
'
:
[
'ssl_
key
is obsolete, please use key-upload-url'
,
'ssl_
crt
is obsolete, please use key-upload-url'
,
'ssl_
crt
is obsolete, please use key-upload-url'
]}
'ssl_
key
is obsolete, please use key-upload-url'
]}
}
}
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6296,7 +6354,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6296,7 +6354,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_url
(
self
):
def
test_url
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
url
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
URL
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
...
@@ -6306,7 +6364,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6306,7 +6364,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_https_url
(
self
):
def
test_https_url
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
https-url
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
HTTPS-URL
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
...
@@ -6317,7 +6375,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6317,7 +6375,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
def
test_ssl_proxy_verify_ssl_proxy_ca_crt_damaged
(
self
):
def
test_ssl_proxy_verify_ssl_proxy_ca_crt_damaged
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
ssl-proxy-verify_ssl_proxy_ca_crt_damaged
'
)
'
SSL-PROXY-VERIFY_SSL_PROXY_CA_CRT_DAMAGED
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
'request-error-list'
:
[
"ssl_proxy_ca_crt is invalid"
]},
{
'request-error-list'
:
[
"ssl_proxy_ca_crt is invalid"
]},
parameter_dict
parameter_dict
...
@@ -6325,14 +6383,14 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6325,14 +6383,14 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
def
test_ssl_proxy_verify_ssl_proxy_ca_crt_empty
(
self
):
def
test_ssl_proxy_verify_ssl_proxy_ca_crt_empty
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
ssl-proxy-verify_ssl_proxy_ca_crt_empty
'
)
'
SSL-PROXY-VERIFY_SSL_PROXY_CA_CRT_EMPTY
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
'request-error-list'
:
[
"ssl_proxy_ca_crt is invalid"
]},
{
'request-error-list'
:
[
"ssl_proxy_ca_crt is invalid"
]},
parameter_dict
parameter_dict
)
)
def
test_server_alias_same
(
self
):
def
test_server_alias_same
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
server-alias-same
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SERVER-ALIAS-SAME
'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6358,7 +6416,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6358,7 +6416,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
self
.
assertEqualResultJson
(
result
,
'Path'
,
'/test-path'
)
self
.
assertEqualResultJson
(
result
,
'Path'
,
'/test-path'
)
def
test_custom_domain_unsafe
(
self
):
def
test_custom_domain_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
custom_domain-unsafe
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
CUSTOM_DOMAIN-UNSAFE
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
...
@@ -6369,7 +6427,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6369,7 +6427,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_server_alias_unsafe
(
self
):
def
test_server_alias_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
server-alias-unsafe
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SERVER-ALIAS-UNSAFE
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
...
@@ -6380,12 +6438,12 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6380,12 +6438,12 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_bad_ciphers
(
self
):
def
test_bad_ciphers
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
bad-ciphers
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
BAD-CIPHERS
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
"Cipher '
bad
' is not supported."
,
"Cipher '
again
' is not supported."
,
"Cipher '
again
' is not supported."
"Cipher '
bad
' is not supported."
]
]
},
},
parameter_dict
parameter_dict
...
@@ -6393,7 +6451,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6393,7 +6451,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
def
test_virtualhostroot_http_port_unsafe
(
self
):
def
test_virtualhostroot_http_port_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
virtualhostroot-http-port-unsafe
'
)
'
VIRTUALHOSTROOT-HTTP-PORT-UNSAFE
'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6417,7 +6475,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6417,7 +6475,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
def
test_virtualhostroot_https_port_unsafe
(
self
):
def
test_virtualhostroot_https_port_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
virtualhostroot-https-port-unsafe
'
)
'
VIRTUALHOSTROOT-HTTPS-PORT-UNSAFE
'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6449,7 +6507,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6449,7 +6507,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
default_path_unsafe
(
self
):
def
default_path_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
default-path-unsafe
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
DEFAULT-PATH-UNSAFE
'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
,
'master-'
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
,
'master-'
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6484,7 +6542,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6484,7 +6542,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_monitor_ipv4_test_unsafe
(
self
):
def
test_monitor_ipv4_test_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
monitor-ipv4-test-unsafe
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
MONITOR-IPV4-TEST-UNSAFE
'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6516,7 +6574,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6516,7 +6574,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
monitor_file
=
glob
.
glob
(
monitor_file
=
glob
.
glob
(
os
.
path
.
join
(
os
.
path
.
join
(
self
.
instance_path
,
'*'
,
'etc'
,
'plugin'
,
self
.
instance_path
,
'*'
,
'etc'
,
'plugin'
,
'check-_
monitor-ipv4-test-unsafe
-ipv4-packet-list-test.py'
))[
0
]
'check-_
MONITOR-IPV4-TEST-UNSAFE
-ipv4-packet-list-test.py'
))[
0
]
# get promise module and check that parameters are ok
# get promise module and check that parameters are ok
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6529,7 +6587,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6529,7 +6587,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_monitor_ipv6_test_unsafe
(
self
):
def
test_monitor_ipv6_test_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
monitor-ipv6-test-unsafe
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
MONITOR-IPV6-TEST-UNSAFE
'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6561,7 +6619,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6561,7 +6619,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
monitor_file
=
glob
.
glob
(
monitor_file
=
glob
.
glob
(
os
.
path
.
join
(
os
.
path
.
join
(
self
.
instance_path
,
'*'
,
'etc'
,
'plugin'
,
self
.
instance_path
,
'*'
,
'etc'
,
'plugin'
,
'check-_
monitor-ipv6-test-unsafe
-ipv6-packet-list-test.py'
))[
0
]
'check-_
MONITOR-IPV6-TEST-UNSAFE
-ipv6-packet-list-test.py'
))[
0
]
# get promise module and check that parameters are ok
# get promise module and check that parameters are ok
self
.
assertEqual
(
self
.
assertEqual
(
getPromisePluginParameterDict
(
monitor_file
),
getPromisePluginParameterDict
(
monitor_file
),
...
@@ -6572,7 +6630,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6572,7 +6630,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_site_1
(
self
):
def
test_site_1
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
site
_1'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SITE
_1'
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertKedifaKeysWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -6589,7 +6647,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6589,7 +6647,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_site_2
(
self
):
def
test_site_2
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
site
_2'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SITE
_2'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
"custom_domain 'duplicate.example.com' clashes"
]
'request-error-list'
:
[
"custom_domain 'duplicate.example.com' clashes"
]
...
@@ -6598,7 +6656,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6598,7 +6656,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_site_3
(
self
):
def
test_site_3
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
site
_3'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SITE
_3'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
"server-alias 'duplicate.example.com' clashes"
]
'request-error-list'
:
[
"server-alias 'duplicate.example.com' clashes"
]
...
@@ -6607,7 +6665,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6607,7 +6665,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_site_4
(
self
):
def
test_site_4
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
site
_4'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SITE
_4'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
"custom_domain 'duplicate.example.com' clashes"
]
'request-error-list'
:
[
"custom_domain 'duplicate.example.com' clashes"
]
...
@@ -6616,7 +6674,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6616,7 +6674,7 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_ssl_ca_crt_only
(
self
):
def
test_ssl_ca_crt_only
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
ssl_ca_crt_only
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SSL_CA_CRT_ONLY
'
)
self
.
assertEqual
(
self
.
assertEqual
(
parameter_dict
,
parameter_dict
,
...
@@ -6630,35 +6688,35 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
...
@@ -6630,35 +6688,35 @@ class TestSlaveRejectReportUnsafeDamaged(SlaveHttpFrontendTestCase):
)
)
def
test_ssl_key_ssl_crt_unsafe
(
self
):
def
test_ssl_key_ssl_crt_unsafe
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
ssl_key-ssl_crt-unsafe
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
SSL_KEY-SSL_CRT-UNSAFE
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
"slave ssl_key and ssl_crt does not match"
],
'request-error-list'
:
[
"slave ssl_key and ssl_crt does not match"
],
'warning-list'
:
[
'warning-list'
:
[
'ssl_
key
is obsolete, please use key-upload-url'
,
'ssl_
crt
is obsolete, please use key-upload-url'
,
'ssl_
crt
is obsolete, please use key-upload-url'
]
'ssl_
key
is obsolete, please use key-upload-url'
]
},
},
parameter_dict
parameter_dict
)
)
def
test_bad_backend
(
self
):
def
test_bad_backend
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
bad-backend
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
BAD-BACKEND
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
"slave
url 'http://1:2:3:4
' invalid"
,
"slave
https-url 'http://host.domain:badport
' invalid"
,
"slave
https-url 'http://host.domain:badport
' invalid"
],
"slave
url 'http://1:2:3:4
' invalid"
],
},
},
parameter_dict
parameter_dict
)
)
def
test_empty_backend
(
self
):
def
test_empty_backend
(
self
):
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
empty-backend
'
)
parameter_dict
=
self
.
parseSlaveParameterDict
(
'
EMPTY-BACKEND
'
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
'request-error-list'
:
[
'request-error-list'
:
[
"slave url '' invalid"
,
"slave
https-
url '' invalid"
,
"slave
https-url '' invalid"
],
"slave
url '' invalid"
]
},
},
parameter_dict
parameter_dict
)
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment