123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661 |
- # Copyright (C) 2009 Internet Systems Consortium.
- #
- # Permission to use, copy, modify, and distribute this software for any
- # purpose with or without fee is hereby granted, provided that the above
- # copyright notice and this permission notice appear in all copies.
- #
- # THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SYSTEMS CONSORTIUM
- # DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
- # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
- # INTERNET SYSTEMS CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
- # INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
- # FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
- # NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
- # WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
- import unittest
- import socket
- import tempfile
- import time
- import stat
- import sys
- from cmdctl import *
- import isc.log
- assert 'CMDCTL_SRC_PATH' in os.environ,\
- "Please run this test with 'make check'"
- SRC_FILE_PATH = os.environ['CMDCTL_SRC_PATH'] + os.sep
- assert 'CMDCTL_BUILD_PATH' in os.environ,\
- "Please run this test with 'make check'"
- BUILD_FILE_PATH = os.environ['CMDCTL_BUILD_PATH'] + os.sep
- # Rewrite the class for unittest.
- class MySecureHTTPRequestHandler(SecureHTTPRequestHandler):
- def __init__(self):
- pass
- def send_response(self, rcode):
- self.rcode = rcode
- def end_headers(self):
- pass
- def do_GET(self):
- self.wfile = open('tmp.file', 'wb')
- super().do_GET()
- self.wfile.close()
- os.remove('tmp.file')
- def do_POST(self):
- self.wfile = open("tmp.file", 'wb')
- super().do_POST()
- self.wfile.close()
- os.remove('tmp.file')
- class FakeSecureHTTPServer(SecureHTTPServer):
- def __init__(self):
- self.user_sessions = {}
- self.cmdctl = FakeCommandControlForTestRequestHandler()
- self._verbose = True
- self._user_infos = {}
- self.idle_timeout = 1200
- self._lock = threading.Lock()
- class FakeCommandControlForTestRequestHandler(CommandControl):
- def __init__(self):
- self._config_data = {}
- self.modules_spec = {}
- self._lock = threading.Lock()
- def send_command(self, mod, cmd, param):
- return 0, {}
- # context to temporarily make a file unreadable
- class UnreadableFile:
- def __init__(self, file_name):
- self.file_name = file_name
- self.orig_mode = os.stat(file_name).st_mode
- def __enter__(self):
- os.chmod(self.file_name, self.orig_mode & ~stat.S_IRUSR)
- def __exit__(self, type, value, traceback):
- os.chmod(self.file_name, self.orig_mode)
- class TmpTextFile:
- """
- Context class for temporarily creating a text file with some
- lines of content.
- The file is automatically deleted if the context is left, so
- make sure to not use the path of an existing file!
- """
- def __init__(self, path, contents):
- self.__path = path
- self.__contents = contents
- def __enter__(self):
- with open(self.__path, 'w') as f:
- f.write("\n".join(self.__contents) + "\n")
- def __exit__(self, type, value, traceback):
- os.unlink(self.__path)
- class TestSecureHTTPRequestHandler(unittest.TestCase):
- def setUp(self):
- self.old_stdout = sys.stdout
- sys.stdout = open(os.devnull, 'w')
- self.handler = MySecureHTTPRequestHandler()
- self.handler.server = FakeSecureHTTPServer()
- self.handler.server.user_sessions = {}
- self.handler.server._user_infos = {}
- self.handler.headers = {}
- self.handler.rfile = open("check.tmp", 'w+b')
- def tearDown(self):
- sys.stdout.close()
- sys.stdout = self.old_stdout
- self.handler.rfile.close()
- os.remove('check.tmp')
- def test_parse_request_path(self):
- self.handler.path = ''
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == None) and (cmd == None))
- self.handler.path = '/abc'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == 'abc') and (cmd == None))
- self.handler.path = '/abc/edf'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == 'abc') and (cmd == 'edf'))
- self.handler.path = '/abc/edf/ghi'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == 'abc') and (cmd == 'edf'))
- def test_parse_request_path_1(self):
- self.handler.path = '/ab*c'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == 'ab') and cmd == None)
- self.handler.path = '/abc/ed*fdd/ddd'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == 'abc') and cmd == 'ed')
- self.handler.path = '/-*/edfdd/ddd'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == None) and (cmd == None))
- self.handler.path = '/-*/edfdd/ddd'
- mod, cmd = self.handler._parse_request_path()
- self.assertTrue((mod == None) and (cmd == None))
- def test_do_GET(self):
- self.handler.do_GET()
- self.assertEqual(self.handler.rcode, http.client.BAD_REQUEST)
- def test_do_GET_1(self):
- self.handler.headers['cookie'] = 12345
- self.handler.do_GET()
- self.assertEqual(self.handler.rcode, http.client.UNAUTHORIZED)
- def test_do_GET_2(self):
- self.handler.headers['cookie'] = 12345
- self.handler.server.user_sessions[12345] = time.time() + 1000000
- self.handler.path = '/how/are'
- self.handler.do_GET()
- self.assertEqual(self.handler.rcode, http.client.NO_CONTENT)
- def test_do_GET_3(self):
- self.handler.headers['cookie'] = 12346
- self.handler.server.user_sessions[12346] = time.time() + 1000000
- path_vec = ['config_data', 'module_spec']
- for path in path_vec:
- self.handler.path = '/' + path
- self.handler.do_GET()
- self.assertEqual(self.handler.rcode, http.client.OK)
- def test_user_logged_in(self):
- self.handler.server.user_sessions = {}
- self.handler.session_id = 12345
- self.assertTrue(self.handler._is_user_logged_in() == False)
- self.handler.server.user_sessions[12345] = time.time()
- self.assertTrue(self.handler._is_user_logged_in())
- self.handler.server.user_sessions[12345] = time.time() - 1500
- self.handler.idle_timeout = 1200
- self.assertTrue(self.handler._is_user_logged_in() == False)
- def test_check_user_name_and_pwd(self):
- self.handler.headers = {}
- ret, msg = self.handler._check_user_name_and_pwd()
- self.assertFalse(ret)
- self.assertEqual(msg, ['invalid username or password'])
- def test_check_user_name_and_pwd_1(self):
- user_info = {'username':'root', 'password':'abc123'}
- len = self.handler.rfile.write(json.dumps(user_info).encode())
- self.handler.headers['Content-Length'] = len
- self.handler.rfile.seek(0, 0)
- self.handler.server._user_infos['root'] = ['aa', 'aaa']
- ret, msg = self.handler._check_user_name_and_pwd()
- self.assertFalse(ret)
- self.assertEqual(msg, ['username or password error'])
- def test_check_user_name_and_pwd_2(self):
- user_info = {'username':'root', 'password':'abc123'}
- len = self.handler.rfile.write(json.dumps(user_info).encode())
- self.handler.headers['Content-Length'] = len - 1
- self.handler.rfile.seek(0, 0)
- ret, msg = self.handler._check_user_name_and_pwd()
- self.assertFalse(ret)
- self.assertEqual(msg, ['invalid username or password'])
- def test_check_user_name_and_pwd_3(self):
- user_info = {'usernae':'root', 'password':'abc123'}
- len = self.handler.rfile.write(json.dumps(user_info).encode())
- self.handler.headers['Content-Length'] = len
- self.handler.rfile.seek(0, 0)
- ret, msg = self.handler._check_user_name_and_pwd()
- self.assertFalse(ret)
- self.assertEqual(msg, ['need user name'])
- def test_check_user_name_and_pwd_4(self):
- user_info = {'username':'root', 'pssword':'abc123'}
- len = self.handler.rfile.write(json.dumps(user_info).encode())
- self.handler.headers['Content-Length'] = len
- self.handler.rfile.seek(0, 0)
- self.handler.server._user_infos['root'] = ['aa', 'aaa']
- ret, msg = self.handler._check_user_name_and_pwd()
- self.assertFalse(ret)
- self.assertEqual(msg, ['need password'])
- def test_check_user_name_and_pwd_5(self):
- user_info = {'username':'root', 'password':'abc123'}
- len = self.handler.rfile.write(json.dumps(user_info).encode())
- self.handler.headers['Content-Length'] = len
- self.handler.rfile.seek(0, 0)
- ret, msg = self.handler._check_user_name_and_pwd()
- self.assertFalse(ret)
- self.assertEqual(msg, ['username or password error'])
- def test_do_POST(self):
- self.handler.headers = {}
- self.handler.do_POST()
- self.assertEqual(self.handler.rcode, http.client.BAD_REQUEST)
- def test_do_POST_1(self):
- self.handler.headers = {}
- self.handler.headers['cookie'] = 12345
- self.handler.path = '/'
- self.handler.do_POST()
- self.assertEqual(self.handler.rcode, http.client.UNAUTHORIZED)
- def test_handle_post_request(self):
- self.handler.path = '/cfgmgr/revert'
- self.handler.headers = {}
- rcode, reply = self.handler._handle_post_request()
- self.assertEqual(http.client.BAD_REQUEST, rcode)
- def test_handle_post_request_1(self):
- self.handler.path = '/*d/revert'
- self.handler.headers = {}
- rcode, reply = self.handler._handle_post_request()
- self.assertEqual(http.client.BAD_REQUEST, rcode)
- def _gen_module_spec(self):
- spec = { 'commands': [
- { 'command_name' :'command',
- 'command_args': [ {
- 'item_name' : 'param1',
- 'item_type' : 'integer',
- 'item_optional' : False,
- 'item_default' : 0
- } ],
- 'command_description' : 'cmd description'
- }
- ]
- }
- return spec
- def test_handle_post_request_2(self):
- params = {'param1':123}
- len = self.handler.rfile.write(json.dumps(params).encode())
- self.handler.headers['Content-Length'] = len
- self.handler.rfile.seek(0, 0)
- self.handler.path = '/module/command'
- self.handler.server.cmdctl.modules_spec = {}
- self.handler.server.cmdctl.modules_spec['module'] = self._gen_module_spec()
- rcode, reply = self.handler._handle_post_request()
- self.assertEqual(http.client.OK, rcode)
- def test_handle_post_request_3(self):
- params = {'param1':'abc'}
- len = self.handler.rfile.write(json.dumps(params).encode())
- self.handler.headers['Content-Length'] = len
- self.handler.rfile.seek(0, 0)
- self.handler.path = '/module/command'
- self.handler.server.cmdctl.modules_spec = {}
- self.handler.server.cmdctl.modules_spec['module'] = self._gen_module_spec()
- rcode, reply = self.handler._handle_post_request()
- self.assertEqual(http.client.BAD_REQUEST, rcode)
- class MyCommandControl(CommandControl):
- def _get_modules_specification(self):
- return {}
- def _get_config_data_from_config_manager(self):
- return {}
- def _setup_session(self):
- spec_file = BUILD_FILE_PATH + 'cmdctl.spec'
- module_spec = isc.config.module_spec_from_file(spec_file)
- config = isc.config.config_data.ConfigData(module_spec)
- self._module_name = 'Cmdctl'
- self._cmdctl_config_data = config.get_full_config()
- def _handle_msg_from_msgq(self):
- pass
- class TestCommandControl(unittest.TestCase):
- def setUp(self):
- self.old_stdout = sys.stdout
- sys.stdout = open(os.devnull, 'w')
- self.cmdctl = MyCommandControl(None, True)
- def tearDown(self):
- sys.stdout.close()
- sys.stdout = self.old_stdout
- def _check_config(self, cmdctl):
- key, cert, account = cmdctl.get_cmdctl_config_data()
- self.assertIsNotNone(key)
- self.assertIsNotNone(cert)
- self.assertIsNotNone(account)
- def test_get_cmdctl_config_data(self):
- old_env = os.environ
- if 'B10_FROM_SOURCE' in os.environ:
- del os.environ['B10_FROM_SOURCE']
- self.cmdctl.get_cmdctl_config_data()
- self._check_config(self.cmdctl)
- os.environ = old_env
- old_env = os.environ
- os.environ['B10_FROM_SOURCE'] = '../'
- self._check_config(self.cmdctl)
- os.environ = old_env
- def test_parse_command_result(self):
- self.assertEqual({}, self.cmdctl._parse_command_result(1, {'error' : 1}))
- self.assertEqual({'a': 1}, self.cmdctl._parse_command_result(0, {'a' : 1}))
- def _check_answer(self, answer, rcode_, msg_):
- rcode, msg = ccsession.parse_answer(answer)
- self.assertEqual(rcode, rcode_)
- self.assertEqual(msg, msg_)
- def test_command_handler(self):
- answer = self.cmdctl.command_handler('unknown-command', None)
- self._check_answer(answer, 1, 'unknown command: unknown-command')
- answer = self.cmdctl.command_handler('print_settings', None)
- rcode, msg = ccsession.parse_answer(answer)
- self.assertEqual(rcode, 0)
- self.assertTrue(msg != None)
- def test_command_handler_spec_update(self):
- # Should not be present
- self.assertFalse("foo" in self.cmdctl.modules_spec)
- answer = self.cmdctl.command_handler(
- ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", {} ])
- rcode, msg = ccsession.parse_answer(answer)
- self.assertEqual(rcode, 0)
- self.assertEqual(msg, None)
- # Should now be present
- self.assertTrue("foo" in self.cmdctl.modules_spec)
- # When sending specification 'None', it should be removed
- answer = self.cmdctl.command_handler(
- ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", None ])
- rcode, msg = ccsession.parse_answer(answer)
- self.assertEqual(rcode, 0)
- self.assertEqual(msg, None)
- # Should no longer be present
- self.assertFalse("foo" in self.cmdctl.modules_spec)
- # Don't store 'None' if it wasn't there in the first place!
- answer = self.cmdctl.command_handler(
- ccsession.COMMAND_MODULE_SPECIFICATION_UPDATE, [ "foo", None ])
- rcode, msg = ccsession.parse_answer(answer)
- self.assertEqual(rcode, 1)
- self.assertEqual(msg, "No such module: foo")
- # Should still not present
- self.assertFalse("foo" in self.cmdctl.modules_spec)
- def test_check_config_handler(self):
- answer = self.cmdctl.config_handler({'non-exist': 123})
- self._check_answer(answer, 1, 'unknown config item: non-exist')
- old_env = os.environ
- os.environ['B10_FROM_SOURCE'] = '../'
- self._check_config(self.cmdctl)
- os.environ = old_env
- answer = self.cmdctl.config_handler({'key_file': '/user/non-exist_folder'})
- self._check_answer(answer, 1, "'/user/non-exist_folder' does not exist")
- answer = self.cmdctl.config_handler({'cert_file': '/user/non-exist_folder'})
- self._check_answer(answer, 1, "'/user/non-exist_folder' does not exist")
- answer = self.cmdctl.config_handler({'accounts_file': '/user/non-exist_folder'})
- self._check_answer(answer, 1,
- "Invalid accounts file: [Errno 2] No such file or directory: '/user/non-exist_folder'")
- # Test with invalid accounts file
- file_name = 'tmp.account.file'
- temp_file = open(file_name, 'w')
- writer = csv.writer(temp_file)
- writer.writerow(['a', 'b'])
- temp_file.close()
- answer = self.cmdctl.config_handler({'accounts_file': file_name})
- self._check_answer(answer, 1, "Invalid accounts file: list index out of range")
- os.remove(file_name)
- def test_send_command(self):
- rcode, value = self.cmdctl.send_command('Cmdctl', 'print_settings', None)
- self.assertEqual(rcode, 0)
- class MySecureHTTPServer(SecureHTTPServer):
- def server_bind(self):
- pass
- class TestSecureHTTPServer(unittest.TestCase):
- def setUp(self):
- self.old_stdout = sys.stdout
- self.old_stderr = sys.stderr
- sys.stdout = open(os.devnull, 'w')
- sys.stderr = sys.stdout
- self.server = MySecureHTTPServer(('localhost', 8080),
- MySecureHTTPRequestHandler,
- MyCommandControl, verbose=True)
- def tearDown(self):
- # both sys.stdout and sys.stderr are the same, so closing one is
- # sufficient
- sys.stdout.close()
- sys.stdout = self.old_stdout
- sys.stderr = self.old_stderr
- def test_addr_in_use(self):
- server_one = None
- try:
- server_one = SecureHTTPServer(('localhost', 53531),
- MySecureHTTPRequestHandler,
- MyCommandControl)
- except CmdctlException:
- pass
- else:
- self.assertRaises(CmdctlException, SecureHTTPServer,
- ('localhost', 53531),
- MySecureHTTPRequestHandler, MyCommandControl)
- if server_one:
- server_one.server_close()
- def test_create_user_info(self):
- self.server._create_user_info('/local/not-exist')
- self.assertEqual(0, len(self.server._user_infos))
- self.server._create_user_info(SRC_FILE_PATH + 'cmdctl-accounts.csv')
- self.assertEqual(1, len(self.server._user_infos))
- self.assertTrue('root' in self.server._user_infos)
- # When the file is not changed calling _create_user_info() again
- # should have no effect. In order to test this, we overwrite the
- # user-infos that were just set and make sure it isn't touched by
- # the call (so make sure it isn't set to some empty value)
- fake_users_val = { 'notinfile': [] }
- self.server._user_infos = fake_users_val
- self.server._create_user_info(SRC_FILE_PATH + 'cmdctl-accounts.csv')
- self.assertEqual(fake_users_val, self.server._user_infos)
- def test_create_user_info_changing_file_time(self):
- self.assertEqual(0, len(self.server._user_infos))
- # Create a file
- accounts_file = BUILD_FILE_PATH + 'new_file.csv'
- with TmpTextFile(accounts_file, ['root,foo,bar']):
- self.server._create_user_info(accounts_file)
- self.assertEqual(1, len(self.server._user_infos))
- self.assertTrue('root' in self.server._user_infos)
- # Make sure re-reading is a noop if file was not modified
- fake_users_val = { 'notinfile': [] }
- self.server._user_infos = fake_users_val
- self.server._create_user_info(accounts_file)
- self.assertEqual(fake_users_val, self.server._user_infos)
- # Yes sleep sucks, but in this case we need it to check for
- # a changed mtime, not for some thread to do its work
- # (do we run these tests on systems with 1+ secs mtimes?)
- time.sleep(0.1)
- # create the file again, this time read should not be a noop
- with TmpTextFile(accounts_file, ['otherroot,foo,bar']):
- self.server._create_user_info(accounts_file)
- self.assertEqual(1, len(self.server._user_infos))
- self.assertTrue('otherroot' in self.server._user_infos)
- def test_create_user_info_changing_file_name(self):
- """
- Check that the accounts file is re-read if the file name is different
- """
- self.assertEqual(0, len(self.server._user_infos))
- # Create two files
- accounts_file1 = BUILD_FILE_PATH + 'new_file.csv'
- accounts_file2 = BUILD_FILE_PATH + 'new_file2.csv'
- with TmpTextFile(accounts_file2, ['otherroot,foo,bar']):
- with TmpTextFile(accounts_file1, ['root,foo,bar']):
- self.server._create_user_info(accounts_file1)
- self.assertEqual(1, len(self.server._user_infos))
- self.assertTrue('root' in self.server._user_infos)
- # Make sure re-reading is a noop if file was not modified
- fake_users_val = { 'notinfile': [] }
- self.server._user_infos = fake_users_val
- self.server._create_user_info(accounts_file1)
- self.assertEqual(fake_users_val, self.server._user_infos)
- # But a different file should be read
- self.server._create_user_info(accounts_file2)
- self.assertEqual(1, len(self.server._user_infos))
- self.assertTrue('otherroot' in self.server._user_infos)
- def test_create_user_info_nonexistent_file(self):
- # Even if there was data initially, if set to a nonexistent
- # file it should result in no users
- accounts_file = BUILD_FILE_PATH + 'new_file.csv'
- self.assertFalse(os.path.exists(accounts_file))
- fake_users_val = { 'notinfile': [] }
- self.server._user_infos = fake_users_val
- self.server._create_user_info(accounts_file)
- self.assertEqual({}, self.server._user_infos)
- # Should it now be created it should be read
- with TmpTextFile(accounts_file, ['root,foo,bar']):
- self.server._create_user_info(accounts_file)
- self.assertEqual(1, len(self.server._user_infos))
- self.assertTrue('root' in self.server._user_infos)
- def test_check_file(self):
- # Just some file that we know exists
- file_name = BUILD_FILE_PATH + 'cmdctl-keyfile.pem'
- check_file(file_name)
- with UnreadableFile(file_name):
- self.assertRaises(CmdctlException, check_file, file_name)
- self.assertRaises(CmdctlException, check_file, '/local/not-exist')
- self.assertRaises(CmdctlException, check_file, '/')
- def test_check_key_and_cert(self):
- keyfile = BUILD_FILE_PATH + 'cmdctl-keyfile.pem'
- certfile = BUILD_FILE_PATH + 'cmdctl-certfile.pem'
- # no exists
- self.assertRaises(CmdctlException, self.server._check_key_and_cert,
- keyfile, '/local/not-exist')
- self.assertRaises(CmdctlException, self.server._check_key_and_cert,
- '/local/not-exist', certfile)
- # not a file
- self.assertRaises(CmdctlException, self.server._check_key_and_cert,
- keyfile, '/')
- self.assertRaises(CmdctlException, self.server._check_key_and_cert,
- '/', certfile)
- # no read permission
- with UnreadableFile(certfile):
- self.assertRaises(CmdctlException,
- self.server._check_key_and_cert,
- keyfile, certfile)
- with UnreadableFile(keyfile):
- self.assertRaises(CmdctlException,
- self.server._check_key_and_cert,
- keyfile, certfile)
- # All OK (also happens to check the context code above works)
- self.server._check_key_and_cert(keyfile, certfile)
- def test_wrap_sock_in_ssl_context(self):
- sock = socket.socket()
- # Bad files should result in a socket.error raised by our own
- # code in the basic file checks
- self.assertRaises(socket.error,
- self.server._wrap_socket_in_ssl_context,
- sock,
- 'no_such_file', 'no_such_file')
- # Using a non-certificate file would cause an SSLError, which
- # is caught by our code which then raises a basic socket.error
- self.assertRaises(socket.error,
- self.server._wrap_socket_in_ssl_context,
- sock,
- BUILD_FILE_PATH + 'cmdctl.py',
- BUILD_FILE_PATH + 'cmdctl-certfile.pem')
- # Should succeed
- sock1 = socket.socket()
- ssl_sock = self.server._wrap_socket_in_ssl_context(sock1,
- BUILD_FILE_PATH + 'cmdctl-keyfile.pem',
- BUILD_FILE_PATH + 'cmdctl-certfile.pem')
- self.assertTrue(isinstance(ssl_sock, ssl.SSLSocket))
- # wrap_socket can also raise IOError, which should be caught and
- # handled like the other errors.
- # Force this by temporarily disabling our own file checks
- orig_check_func = self.server._check_key_and_cert
- try:
- self.server._check_key_and_cert = lambda x,y: None
- self.assertRaises(socket.error,
- self.server._wrap_socket_in_ssl_context,
- sock,
- 'no_such_file', 'no_such_file')
- finally:
- self.server._check_key_and_cert = orig_check_func
- class TestFuncNotInClass(unittest.TestCase):
- def test_check_port(self):
- self.assertRaises(OptionValueError, check_port, None, 'port', -1, None)
- self.assertRaises(OptionValueError, check_port, None, 'port', 65536, None)
- self.assertRaises(OptionValueError, check_addr, None, 'ipstr', 'a.b.d', None)
- self.assertRaises(OptionValueError, check_addr, None, 'ipstr', '1::0:a.b', None)
- if __name__== "__main__":
- isc.log.resetUnitTestRootLogger()
- unittest.main()
|