cmdctl_test.py 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582
  1. # Copyright (C) 2009 Internet Systems Consortium.
  2. #
  3. # Permission to use, copy, modify, and distribute this software for any
  4. # purpose with or without fee is hereby granted, provided that the above
  5. # copyright notice and this permission notice appear in all copies.
  6. #
  7. # THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SYSTEMS CONSORTIUM
  8. # DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
  9. # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
  10. # INTERNET SYSTEMS CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
  11. # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
  12. # FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
  13. # NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
  14. # WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  15. import unittest
  16. import socket
  17. import tempfile
  18. import stat
  19. import sys
  20. from cmdctl import *
  21. import isc.log
  22. assert 'CMDCTL_TESTDATA_PATH' in os.environ,\
  23. "Please run this test with 'make check'"
  24. SRC_FILE_PATH = os.environ['CMDCTL_TESTDATA_PATH'] + os.sep
  25. assert 'CMDCTL_BUILD_PATH' in os.environ,\
  26. "Please run this test with 'make check'"
  27. BUILD_FILE_PATH = os.environ['CMDCTL_BUILD_PATH'] + os.sep
  28. # Rewrite the class for unittest.
  29. class MySecureHTTPRequestHandler(SecureHTTPRequestHandler):
  30. def __init__(self):
  31. self.session_id = None
  32. def send_response(self, rcode):
  33. self.rcode = rcode
  34. def end_headers(self):
  35. pass
  36. def do_GET(self):
  37. self.wfile = open('tmp.file', 'wb')
  38. super().do_GET()
  39. self.wfile.close()
  40. os.remove('tmp.file')
  41. def do_POST(self):
  42. self.wfile = open("tmp.file", 'wb')
  43. super().do_POST()
  44. self.wfile.close()
  45. os.remove('tmp.file')
  46. class FakeSecureHTTPServer(SecureHTTPServer):
  47. def __init__(self):
  48. self.user_sessions = {}
  49. self.cmdctl = FakeCommandControlForTestRequestHandler()
  50. self._verbose = True
  51. self._user_infos = {}
  52. self.idle_timeout = 1200
  53. self._lock = threading.Lock()
  54. class FakeCommandControlForTestRequestHandler(CommandControl):
  55. def __init__(self):
  56. self._config_data = {}
  57. self.modules_spec = {}
  58. self._lock = threading.Lock()
  59. def send_command(self, mod, cmd, param):
  60. return 0, {}
  61. # context to temporarily make a file unreadable
  62. class UnreadableFile:
  63. def __init__(self, file_name):
  64. self.file_name = file_name
  65. self.orig_mode = os.stat(file_name).st_mode
  66. def __enter__(self):
  67. os.chmod(self.file_name, self.orig_mode & ~stat.S_IRUSR)
  68. def __exit__(self, type, value, traceback):
  69. os.chmod(self.file_name, self.orig_mode)
  70. class TestSecureHTTPRequestHandler(unittest.TestCase):
  71. def setUp(self):
  72. self.old_stdout = sys.stdout
  73. sys.stdout = open(os.devnull, 'w')
  74. self.handler = MySecureHTTPRequestHandler()
  75. self.handler.server = FakeSecureHTTPServer()
  76. self.handler.server.user_sessions = {}
  77. self.handler.server._user_infos = {}
  78. self.handler.headers = {}
  79. self.handler.rfile = open("check.tmp", 'w+b')
  80. def tearDown(self):
  81. sys.stdout.close()
  82. sys.stdout = self.old_stdout
  83. self.handler.rfile.close()
  84. os.remove('check.tmp')
  85. def test_is_session_valid(self):
  86. self.assertIsNone(self.handler.session_id)
  87. self.assertFalse(self.handler._is_session_valid())
  88. self.handler.session_id = 4234
  89. self.assertTrue(self.handler._is_session_valid())
  90. def test_parse_request_path(self):
  91. self.handler.path = ''
  92. mod, cmd = self.handler._parse_request_path()
  93. self.assertTrue((mod == None) and (cmd == None))
  94. self.handler.path = '/abc'
  95. mod, cmd = self.handler._parse_request_path()
  96. self.assertTrue((mod == 'abc') and (cmd == None))
  97. self.handler.path = '/abc/edf'
  98. mod, cmd = self.handler._parse_request_path()
  99. self.assertTrue((mod == 'abc') and (cmd == 'edf'))
  100. self.handler.path = '/abc/edf/ghi'
  101. mod, cmd = self.handler._parse_request_path()
  102. self.assertTrue((mod == 'abc') and (cmd == 'edf'))
  103. def test_parse_request_path_1(self):
  104. self.handler.path = '/ab*c'
  105. mod, cmd = self.handler._parse_request_path()
  106. self.assertTrue((mod == 'ab') and cmd == None)
  107. self.handler.path = '/abc/ed*fdd/ddd'
  108. mod, cmd = self.handler._parse_request_path()
  109. self.assertTrue((mod == 'abc') and cmd == 'ed')
  110. self.handler.path = '/-*/edfdd/ddd'
  111. mod, cmd = self.handler._parse_request_path()
  112. self.assertTrue((mod == None) and (cmd == None))
  113. self.handler.path = '/-*/edfdd/ddd'
  114. mod, cmd = self.handler._parse_request_path()
  115. self.assertTrue((mod == None) and (cmd == None))
  116. def test_do_GET(self):
  117. self.handler.do_GET()
  118. self.assertEqual(self.handler.rcode, http.client.BAD_REQUEST)
  119. def test_do_GET_1(self):
  120. self.handler.headers['cookie'] = 12345
  121. self.handler.do_GET()
  122. self.assertEqual(self.handler.rcode, http.client.UNAUTHORIZED)
  123. def test_do_GET_2(self):
  124. self.handler.headers['cookie'] = 12345
  125. self.handler.server.user_sessions[12345] = time.time() + 1000000
  126. self.handler.path = '/how/are'
  127. self.handler.do_GET()
  128. self.assertEqual(self.handler.rcode, http.client.NO_CONTENT)
  129. def test_do_GET_3(self):
  130. self.handler.headers['cookie'] = 12346
  131. self.handler.server.user_sessions[12346] = time.time() + 1000000
  132. path_vec = ['config_data', 'module_spec']
  133. for path in path_vec:
  134. self.handler.path = '/' + path
  135. self.handler.do_GET()
  136. self.assertEqual(self.handler.rcode, http.client.OK)
  137. def test_user_logged_in(self):
  138. self.handler.server.user_sessions = {}
  139. self.handler.session_id = 12345
  140. self.assertTrue(self.handler._is_user_logged_in() == False)
  141. self.handler.server.user_sessions[12345] = time.time()
  142. self.assertTrue(self.handler._is_user_logged_in())
  143. self.handler.server.user_sessions[12345] = time.time() - 1500
  144. self.handler.idle_timeout = 1200
  145. self.assertTrue(self.handler._is_user_logged_in() == False)
  146. def test_check_user_name_and_pwd(self):
  147. self.handler.headers = {}
  148. ret, msg = self.handler._check_user_name_and_pwd()
  149. self.assertFalse(ret)
  150. self.assertEqual(msg, ['invalid username or password'])
  151. def test_check_user_name_and_pwd_1(self):
  152. user_info = {'username':'root', 'password':'abc123'}
  153. len = self.handler.rfile.write(json.dumps(user_info).encode())
  154. self.handler.headers['Content-Length'] = len
  155. self.handler.rfile.seek(0, 0)
  156. self.handler.server._user_infos['root'] = ['aa', 'aaa']
  157. ret, msg = self.handler._check_user_name_and_pwd()
  158. self.assertFalse(ret)
  159. self.assertEqual(msg, ['username or password error'])
  160. def test_check_user_name_and_pwd_2(self):
  161. user_info = {'username':'root', 'password':'abc123'}
  162. len = self.handler.rfile.write(json.dumps(user_info).encode())
  163. self.handler.headers['Content-Length'] = len - 1
  164. self.handler.rfile.seek(0, 0)
  165. ret, msg = self.handler._check_user_name_and_pwd()
  166. self.assertFalse(ret)
  167. self.assertEqual(msg, ['invalid username or password'])
  168. def test_check_user_name_and_pwd_3(self):
  169. user_info = {'usernae':'root', 'password':'abc123'}
  170. len = self.handler.rfile.write(json.dumps(user_info).encode())
  171. self.handler.headers['Content-Length'] = len
  172. self.handler.rfile.seek(0, 0)
  173. ret, msg = self.handler._check_user_name_and_pwd()
  174. self.assertFalse(ret)
  175. self.assertEqual(msg, ['need user name'])
  176. def test_check_user_name_and_pwd_4(self):
  177. user_info = {'username':'root', 'pssword':'abc123'}
  178. len = self.handler.rfile.write(json.dumps(user_info).encode())
  179. self.handler.headers['Content-Length'] = len
  180. self.handler.rfile.seek(0, 0)
  181. self.handler.server._user_infos['root'] = ['aa', 'aaa']
  182. ret, msg = self.handler._check_user_name_and_pwd()
  183. self.assertFalse(ret)
  184. self.assertEqual(msg, ['need password'])
  185. def test_check_user_name_and_pwd_5(self):
  186. user_info = {'username':'root', 'password':'abc123'}
  187. len = self.handler.rfile.write(json.dumps(user_info).encode())
  188. self.handler.headers['Content-Length'] = len
  189. self.handler.rfile.seek(0, 0)
  190. ret, msg = self.handler._check_user_name_and_pwd()
  191. self.assertFalse(ret)
  192. self.assertEqual(msg, ['username or password error'])
  193. def test_do_POST(self):
  194. self.handler.headers = {}
  195. self.handler.do_POST()
  196. self.assertEqual(self.handler.rcode, http.client.BAD_REQUEST)
  197. def test_do_POST_1(self):
  198. self.handler.headers = {}
  199. self.handler.headers['cookie'] = 12345
  200. self.handler.path = '/'
  201. self.handler.do_POST()
  202. self.assertEqual(self.handler.rcode, http.client.UNAUTHORIZED)
  203. def test_handle_post_request(self):
  204. self.handler.path = '/cfgmgr/revert'
  205. self.handler.headers = {}
  206. rcode, reply = self.handler._handle_post_request()
  207. self.assertEqual(http.client.BAD_REQUEST, rcode)
  208. def test_handle_post_request_1(self):
  209. self.handler.path = '/*d/revert'
  210. self.handler.headers = {}
  211. rcode, reply = self.handler._handle_post_request()
  212. self.assertEqual(http.client.BAD_REQUEST, rcode)
  213. def _gen_module_spec(self):
  214. spec = { 'commands': [
  215. { 'command_name' :'command',
  216. 'command_args': [ {
  217. 'item_name' : 'param1',
  218. 'item_type' : 'integer',
  219. 'item_optional' : False,
  220. 'item_default' : 0
  221. } ],
  222. 'command_description' : 'cmd description'
  223. }
  224. ]
  225. }
  226. return spec
  227. def test_handle_post_request_2(self):
  228. params = {'param1':123}
  229. len = self.handler.rfile.write(json.dumps(params).encode())
  230. self.handler.headers['Content-Length'] = len
  231. self.handler.rfile.seek(0, 0)
  232. self.handler.path = '/module/command'
  233. self.handler.server.cmdctl.modules_spec = {}
  234. self.handler.server.cmdctl.modules_spec['module'] = self._gen_module_spec()
  235. rcode, reply = self.handler._handle_post_request()
  236. self.assertEqual(http.client.OK, rcode)
  237. def test_handle_post_request_3(self):
  238. params = {'param1':'abc'}
  239. len = self.handler.rfile.write(json.dumps(params).encode())
  240. self.handler.headers['Content-Length'] = len
  241. self.handler.rfile.seek(0, 0)
  242. self.handler.path = '/module/command'
  243. self.handler.server.cmdctl.modules_spec = {}
  244. self.handler.server.cmdctl.modules_spec['module'] = self._gen_module_spec()
  245. rcode, reply = self.handler._handle_post_request()
  246. self.assertEqual(http.client.BAD_REQUEST, rcode)
  247. class MyCommandControl(CommandControl):
  248. def _get_modules_specification(self):
  249. return {}
  250. def _get_config_data_from_config_manager(self):
  251. return {}
  252. def _setup_session(self):
  253. spec_file = BUILD_FILE_PATH + 'cmdctl.spec'
  254. module_spec = isc.config.module_spec_from_file(spec_file)
  255. config = isc.config.config_data.ConfigData(module_spec)
  256. self._module_name = 'Cmdctl'
  257. self._cmdctl_config_data = config.get_full_config()
  258. def _handle_msg_from_msgq(self):
  259. pass
  260. class TestCommandControl(unittest.TestCase):
  261. def setUp(self):
  262. self.old_stdout = sys.stdout
  263. sys.stdout = open(os.devnull, 'w')
  264. self.cmdctl = MyCommandControl(None, True)
  265. def tearDown(self):
  266. sys.stdout.close()
  267. sys.stdout = self.old_stdout
  268. def _check_config(self, cmdctl):
  269. key, cert, account = cmdctl.get_cmdctl_config_data()
  270. self.assertIsNotNone(key)
  271. self.assertIsNotNone(cert)
  272. self.assertIsNotNone(account)
  273. def test_get_cmdctl_config_data(self):
  274. old_env = os.environ
  275. if 'B10_FROM_SOURCE' in os.environ:
  276. del os.environ['B10_FROM_SOURCE']
  277. self.cmdctl.get_cmdctl_config_data()
  278. self._check_config(self.cmdctl)
  279. os.environ = old_env
  280. old_env = os.environ
  281. os.environ['B10_FROM_SOURCE'] = '../'
  282. self._check_config(self.cmdctl)
  283. os.environ = old_env
  284. def test_parse_command_result(self):
  285. self.assertEqual({}, self.cmdctl._parse_command_result(1, {'error' : 1}))
  286. self.assertEqual({'a': 1}, self.cmdctl._parse_command_result(0, {'a' : 1}))
  287. def _check_answer(self, answer, rcode_, msg_):
  288. rcode, msg = ccsession.parse_answer(answer)
  289. self.assertEqual(rcode, rcode_)
  290. self.assertEqual(msg, msg_)
  291. def test_command_handler(self):
  292. answer = self.cmdctl.command_handler('unknown-command', None)
  293. self._check_answer(answer, 1, 'unknown command: unknown-command')
  294. answer = self.cmdctl.command_handler('print_settings', None)
  295. rcode, msg = ccsession.parse_answer(answer)
  296. self.assertEqual(rcode, 0)
  297. self.assertTrue(msg != None)
  298. def test_command_handler_spec_update(self):
  299. # Should not be present
  300. self.assertFalse("foo" in self.cmdctl.modules_spec)
  301. answer = self.cmdctl.command_handler(
  302. ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", {} ])
  303. rcode, msg = ccsession.parse_answer(answer)
  304. self.assertEqual(rcode, 0)
  305. self.assertEqual(msg, None)
  306. # Should now be present
  307. self.assertTrue("foo" in self.cmdctl.modules_spec)
  308. # When sending specification 'None', it should be removed
  309. answer = self.cmdctl.command_handler(
  310. ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", None ])
  311. rcode, msg = ccsession.parse_answer(answer)
  312. self.assertEqual(rcode, 0)
  313. self.assertEqual(msg, None)
  314. # Should no longer be present
  315. self.assertFalse("foo" in self.cmdctl.modules_spec)
  316. # Don't store 'None' if it wasn't there in the first place!
  317. answer = self.cmdctl.command_handler(
  318. ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", None ])
  319. rcode, msg = ccsession.parse_answer(answer)
  320. self.assertEqual(rcode, 1)
  321. self.assertEqual(msg, "No such module: foo")
  322. # Should still not present
  323. self.assertFalse("foo" in self.cmdctl.modules_spec)
  324. def test_check_config_handler(self):
  325. answer = self.cmdctl.config_handler({'non-exist': 123})
  326. self._check_answer(answer, 1, 'unknown config item: non-exist')
  327. old_env = os.environ
  328. os.environ['B10_FROM_SOURCE'] = '../'
  329. self._check_config(self.cmdctl)
  330. os.environ = old_env
  331. answer = self.cmdctl.config_handler({'key_file': '/user/non-exist_folder'})
  332. self._check_answer(answer, 1, "'/user/non-exist_folder' does not exist")
  333. answer = self.cmdctl.config_handler({'cert_file': '/user/non-exist_folder'})
  334. self._check_answer(answer, 1, "'/user/non-exist_folder' does not exist")
  335. answer = self.cmdctl.config_handler({'accounts_file': '/user/non-exist_folder'})
  336. self._check_answer(answer, 1,
  337. "Invalid accounts file: [Errno 2] No such file or directory: '/user/non-exist_folder'")
  338. # Test with invalid accounts file
  339. file_name = 'tmp.account.file'
  340. temp_file = open(file_name, 'w')
  341. writer = csv.writer(temp_file)
  342. writer.writerow(['a', 'b'])
  343. temp_file.close()
  344. answer = self.cmdctl.config_handler({'accounts_file': file_name})
  345. self._check_answer(answer, 1, "Invalid accounts file: list index out of range")
  346. os.remove(file_name)
  347. def test_send_command(self):
  348. rcode, value = self.cmdctl.send_command('Cmdctl', 'print_settings', None)
  349. self.assertEqual(rcode, 0)
  350. class MySecureHTTPServer(SecureHTTPServer):
  351. def server_bind(self):
  352. pass
  353. class TestSecureHTTPServer(unittest.TestCase):
  354. def setUp(self):
  355. self.old_stdout = sys.stdout
  356. self.old_stderr = sys.stderr
  357. sys.stdout = open(os.devnull, 'w')
  358. sys.stderr = sys.stdout
  359. self.server = MySecureHTTPServer(('localhost', 8080),
  360. MySecureHTTPRequestHandler,
  361. MyCommandControl, verbose=True)
  362. def tearDown(self):
  363. # both sys.stdout and sys.stderr are the same, so closing one is
  364. # sufficient
  365. sys.stdout.close()
  366. sys.stdout = self.old_stdout
  367. sys.stderr = self.old_stderr
  368. def test_addr_in_use(self):
  369. server_one = None
  370. try:
  371. server_one = SecureHTTPServer(('localhost', 53531),
  372. MySecureHTTPRequestHandler,
  373. MyCommandControl)
  374. except CmdctlException:
  375. pass
  376. else:
  377. self.assertRaises(CmdctlException, SecureHTTPServer,
  378. ('localhost', 53531),
  379. MySecureHTTPRequestHandler, MyCommandControl)
  380. if server_one:
  381. server_one.server_close()
  382. def test_create_user_info(self):
  383. self.server._create_user_info('/local/not-exist')
  384. self.assertEqual(0, len(self.server._user_infos))
  385. self.server._create_user_info(SRC_FILE_PATH + 'cmdctl-accounts.csv')
  386. self.assertEqual(1, len(self.server._user_infos))
  387. self.assertTrue('root' in self.server._user_infos)
  388. def test_get_user_info(self):
  389. self.assertIsNone(self.server.get_user_info('root'))
  390. self.server._create_user_info(SRC_FILE_PATH + 'cmdctl-accounts.csv')
  391. self.assertIn('6f0c73bd33101a5ec0294b3ca39fec90ef4717fe',
  392. self.server.get_user_info('root'))
  393. def test_get_num_users(self):
  394. self.server._create_user_info('/local/not-exist')
  395. self.assertEqual(0, self.server.get_num_users())
  396. self.server._create_user_info(SRC_FILE_PATH + 'cmdctl-accounts.csv')
  397. self.assertEqual(1, self.server.get_num_users())
  398. def test_check_file(self):
  399. # Just some file that we know exists
  400. file_name = BUILD_FILE_PATH + 'cmdctl-keyfile.pem'
  401. check_file(file_name)
  402. with UnreadableFile(file_name):
  403. self.assertRaises(CmdctlException, check_file, file_name)
  404. self.assertRaises(CmdctlException, check_file, '/local/not-exist')
  405. self.assertRaises(CmdctlException, check_file, '/')
  406. def test_check_key_and_cert(self):
  407. keyfile = BUILD_FILE_PATH + 'cmdctl-keyfile.pem'
  408. certfile = BUILD_FILE_PATH + 'cmdctl-certfile.pem'
  409. # no exists
  410. self.assertRaises(CmdctlException, self.server._check_key_and_cert,
  411. keyfile, '/local/not-exist')
  412. self.assertRaises(CmdctlException, self.server._check_key_and_cert,
  413. '/local/not-exist', certfile)
  414. # not a file
  415. self.assertRaises(CmdctlException, self.server._check_key_and_cert,
  416. keyfile, '/')
  417. self.assertRaises(CmdctlException, self.server._check_key_and_cert,
  418. '/', certfile)
  419. # no read permission
  420. with UnreadableFile(certfile):
  421. self.assertRaises(CmdctlException,
  422. self.server._check_key_and_cert,
  423. keyfile, certfile)
  424. with UnreadableFile(keyfile):
  425. self.assertRaises(CmdctlException,
  426. self.server._check_key_and_cert,
  427. keyfile, certfile)
  428. # All OK (also happens to check the context code above works)
  429. self.server._check_key_and_cert(keyfile, certfile)
  430. def test_wrap_sock_in_ssl_context(self):
  431. sock = socket.socket()
  432. # Bad files should result in a socket.error raised by our own
  433. # code in the basic file checks
  434. self.assertRaises(socket.error,
  435. self.server._wrap_socket_in_ssl_context,
  436. sock,
  437. 'no_such_file', 'no_such_file')
  438. # Using a non-certificate file would cause an SSLError, which
  439. # is caught by our code which then raises a basic socket.error
  440. self.assertRaises(socket.error,
  441. self.server._wrap_socket_in_ssl_context,
  442. sock,
  443. BUILD_FILE_PATH + 'cmdctl.py',
  444. BUILD_FILE_PATH + 'cmdctl-certfile.pem')
  445. # Should succeed
  446. sock1 = socket.socket()
  447. ssl_sock = self.server._wrap_socket_in_ssl_context(sock1,
  448. BUILD_FILE_PATH + 'cmdctl-keyfile.pem',
  449. BUILD_FILE_PATH + 'cmdctl-certfile.pem')
  450. self.assertTrue(isinstance(ssl_sock, ssl.SSLSocket))
  451. # wrap_socket can also raise IOError, which should be caught and
  452. # handled like the other errors.
  453. # Force this by temporarily disabling our own file checks
  454. orig_check_func = self.server._check_key_and_cert
  455. try:
  456. self.server._check_key_and_cert = lambda x,y: None
  457. self.assertRaises(socket.error,
  458. self.server._wrap_socket_in_ssl_context,
  459. sock,
  460. 'no_such_file', 'no_such_file')
  461. finally:
  462. self.server._check_key_and_cert = orig_check_func
  463. class TestFuncNotInClass(unittest.TestCase):
  464. def test_check_port(self):
  465. self.assertRaises(OptionValueError, check_port, None, 'port', -1, None)
  466. self.assertRaises(OptionValueError, check_port, None, 'port', 65536, None)
  467. self.assertRaises(OptionValueError, check_addr, None, 'ipstr', 'a.b.d', None)
  468. self.assertRaises(OptionValueError, check_addr, None, 'ipstr', '1::0:a.b', None)
  469. if __name__== "__main__":
  470. isc.log.resetUnitTestRootLogger()
  471. unittest.main()