senlin/senlin/tests/unit/api/openstack/v1/test_events.py

307 lines
12 KiB
Python

# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from unittest import mock
from webob import exc
from senlin.api.common import util
from senlin.api.middleware import fault
from senlin.api.openstack.v1 import events
from senlin.common import exception as senlin_exc
from senlin.common import policy
from senlin.rpc import client as rpc_client
from senlin.tests.unit.api import shared
from senlin.tests.unit.common import base
@mock.patch.object(policy, 'enforce')
class EventControllerTest(shared.ControllerTest, base.SenlinTestCase):
"""Tests the API class which acts as the WSGI controller."""
def setUp(self):
super(EventControllerTest, self).setUp()
# Create WSGI controller instance
class DummyConfig(object):
bind_port = 8777
cfgopts = DummyConfig()
self.controller = events.EventController(options=cfgopts)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index(self, mock_call, mock_parse, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
req = self._get('/events')
engine_resp = [
{
"action": "create",
"cluster_id": None,
"id": "2d255b9c-8f36-41a2-a137-c0175ccc29c3",
"level": "20",
"oid": "0df0931b-e251-4f2e-8719-4ebfda3627ba",
"oname": "node009",
"otype": "NODE",
"project": "6e18cc2bdbeb48a5b3cad2dc499f6804",
"status": "CREATING",
"status_reason": "Initializing",
"timestamp": "2015-03-05T08:53:15.000000",
"user": "a21ded6060534d99840658a777c2af5a"
}
]
mock_call.return_value = engine_resp
obj = mock.Mock()
mock_parse.return_value = obj
result = self.controller.index(req)
self.assertEqual(engine_resp, result['events'])
mock_parse.assert_called_once_with(
'EventListRequest', req,
{
'project_safe': True
})
mock_call.assert_called_once_with(req.context, 'event_list', obj)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index_whitelists_params(self, mock_call, mock_parse,
mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
marker_uuid = '8216a86c-1bdc-442e-b493-329385d37cbd'
params = {
'otype': 'NODE',
'oname': 'mynode1',
'action': 'NODE_CREATE',
'level': 'ERROR',
'limit': 10,
'marker': marker_uuid,
'sort': 'timestamp',
'global_project': False,
}
req = self._get('/events', params=params)
mock_call.return_value = []
obj = mock.Mock()
mock_parse.return_value = obj
result = self.controller.index(req)
self.assertEqual([], result['events'])
mock_parse.assert_called_once_with(
'EventListRequest', req,
{
'sort': 'timestamp',
'project_safe': True,
'level': ['ERROR'],
'action': ['NODE_CREATE'],
'otype': ['NODE'],
'limit': '10',
'marker': marker_uuid,
'oname': ['mynode1']
})
mock_call.assert_called_once_with(req.context,
'event_list', obj)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index_whitelists_invalid_params(self, mock_call,
mock_parse,
mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
params = {
'balrog': 'you shall not pass!',
}
req = self._get('/events', params=params)
ex = self.assertRaises(exc.HTTPBadRequest,
self.controller.index, req)
self.assertEqual("Invalid parameter balrog", str(ex))
self.assertFalse(mock_parse.called)
self.assertFalse(mock_call.called)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index_with_bad_schema(self, mock_call, mock_parse,
mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
params = {'level': 'fake'}
req = self._get('/events', params=params)
mock_parse.side_effect = exc.HTTPBadRequest("invalid value")
ex = self.assertRaises(exc.HTTPBadRequest,
self.controller.index,
req)
self.assertEqual("invalid value", str(ex))
mock_parse.assert_called_once_with(
'EventListRequest', req, mock.ANY)
self.assertEqual(0, mock_call.call_count)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index_limit_not_int(self, mock_call, mock_parse,
mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
params = {'limit': 'not-int'}
req = self._get('/event', params=params)
mock_parse.side_effect = exc.HTTPBadRequest("not int")
ex = self.assertRaises(exc.HTTPBadRequest,
self.controller.index, req)
self.assertEqual("not int", str(ex))
mock_parse.assert_called_once_with(
'EventListRequest', req, mock.ANY)
self.assertFalse(mock_call.called)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index_global_project_true(self, mock_call,
mock_parse, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
params = {'global_project': 'True'}
req = self._get('/events', params=params)
obj = mock.Mock()
mock_parse.return_value = obj
error = senlin_exc.Forbidden()
mock_call.side_effect = shared.to_remote_error(error)
resp = shared.request_with_middleware(fault.FaultWrapper,
self.controller.index,
req)
self.assertEqual(403, resp.json['code'])
self.assertEqual('Forbidden', resp.json['error']['type'])
mock_parse.assert_called_once_with(
"EventListRequest", mock.ANY, {'project_safe': False})
mock_call.assert_called_once_with(req.context, 'event_list', obj)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_events_index_global_project_false(self, mock_call,
mock_parse, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
params = {'global_project': 'False'}
req = self._get('/events', params=params)
mock_call.return_value = []
obj = mock.Mock()
mock_parse.return_value = obj
resp = self.controller.index(req)
self.assertEqual([], resp['events'])
mock_parse.assert_called_once_with(
'EventListRequest', req, {'project_safe': True})
mock_call.assert_called_once_with(req.context, 'event_list', obj)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_index_global_project_not_bool(self, mock_call,
mock_parse, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', True)
params = {'global_project': 'No'}
req = self._get('/events', params=params)
ex = self.assertRaises(exc.HTTPBadRequest,
self.controller.index, req)
self.assertEqual("Invalid value 'No' specified for 'global_project'",
str(ex))
self.assertFalse(mock_parse.called)
self.assertFalse(mock_call.called)
def test_index_denied_policy(self, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'index', False)
req = self._get('/events')
resp = shared.request_with_middleware(fault.FaultWrapper,
self.controller.index,
req)
self.assertEqual(403, resp.status_int)
self.assertIn('403 Forbidden', str(resp))
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_get_success(self, mock_call, mock_parse, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'get', True)
event_id = "2d255b9c-8f36-41a2-a137-c0175ccc29c3"
req = self._get('/events/%(event_id)s' % {'event_id': event_id})
engine_resp = {
"action": "create",
"cluster_id": None,
"id": "2d255b9c-8f36-41a2-a137-c0175ccc29c3",
"level": "20",
"oid": "0df0931b-e251-4f2e-8719-4ebfda3627ba",
"oname": "node009",
"otype": "NODE",
"project": "6e18cc2bdbeb48a5b3cad2dc499f6804",
"status": "CREATING",
"status_reason": "Initializing",
"timestamp": "2015-03-05T08:53:15.000000",
"user": "a21ded6060534d99840658a777c2af5a"
}
mock_call.return_value = engine_resp
obj = mock.Mock()
mock_parse.return_value = obj
response = self.controller.get(req, event_id=event_id)
self.assertEqual(engine_resp, response['event'])
mock_parse.assert_called_once_with(
'EventGetRequest', req, {'identity': event_id})
mock_call.assert_called_once_with(
req.context, 'event_get', mock.ANY)
@mock.patch.object(util, 'parse_request')
@mock.patch.object(rpc_client.EngineClient, 'call')
def test_event_get_not_found(self, mock_call, mock_parse, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'get', True)
event_id = 'non-existent-event'
req = self._get('/events/%(event_id)s' % {'event_id': event_id})
error = senlin_exc.ResourceNotFound(type='event', id=event_id)
mock_call.side_effect = shared.to_remote_error(error)
resp = shared.request_with_middleware(fault.FaultWrapper,
self.controller.get,
req, event_id=event_id)
self.assertEqual(404, resp.json['code'])
self.assertEqual('ResourceNotFound', resp.json['error']['type'])
mock_parse.assert_called_once_with(
'EventGetRequest', mock.ANY, {'identity': event_id})
mock_call.assert_called_once_with(
req.context, 'event_get', mock.ANY)
def test_event_get_denied_policy(self, mock_enforce):
self._mock_enforce_setup(mock_enforce, 'get', False)
event_id = 'non-existent-event'
req = self._get('/events/%(event_id)s' % {'event_id': event_id})
resp = shared.request_with_middleware(fault.FaultWrapper,
self.controller.get,
req, event_id=event_id)
self.assertEqual(403, resp.status_int)
self.assertIn('403 Forbidden', str(resp))