Removes a module-level variable that was just a pointer to the httplib.HTTPConnection class. It's purpose was to give mock.patch a target that wouldn't affect other code using the httplib.HTTPConnection library. However, it is unnecessary now that the root cause of the original patches not being stopped by mock.patch.stopall was fixed in bug 1303605 (change Ia5b374c5f8d3a7905d915de4f1f8d4f3a6f0e58d). Closes-Bug: #1304558 Change-Id: Idf814b075a80245bb9751466c2b58d719a1b81f3
405 lines
18 KiB
Python
405 lines
18 KiB
Python
# Copyright 2014 Big Switch Networks, Inc. All rights reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# @author: Kevin Benton, kevin.benton@bigswitch.com
|
|
#
|
|
from contextlib import nested
|
|
import httplib
|
|
import socket
|
|
import ssl
|
|
|
|
import mock
|
|
from oslo.config import cfg
|
|
|
|
from neutron.manager import NeutronManager
|
|
from neutron.openstack.common import importutils
|
|
from neutron.plugins.bigswitch import servermanager
|
|
from neutron.tests.unit.bigswitch import test_restproxy_plugin as test_rp
|
|
|
|
SERVERMANAGER = 'neutron.plugins.bigswitch.servermanager'
|
|
HTTPCON = SERVERMANAGER + '.httplib.HTTPConnection'
|
|
HTTPSCON = SERVERMANAGER + '.HTTPSConnectionWithValidation'
|
|
|
|
|
|
class ServerManagerTests(test_rp.BigSwitchProxyPluginV2TestCase):
|
|
|
|
def setUp(self):
|
|
self.socket_mock = mock.patch(
|
|
SERVERMANAGER + '.socket.create_connection').start()
|
|
self.wrap_mock = mock.patch(SERVERMANAGER + '.ssl.wrap_socket').start()
|
|
super(ServerManagerTests, self).setUp()
|
|
# http patch must not be running or it will mangle the servermanager
|
|
# import where the https connection classes are defined
|
|
self.httpPatch.stop()
|
|
self.sm = importutils.import_module(SERVERMANAGER)
|
|
|
|
def test_no_servers(self):
|
|
cfg.CONF.set_override('servers', [], 'RESTPROXY')
|
|
self.assertRaises(cfg.Error, servermanager.ServerPool)
|
|
|
|
def test_malformed_servers(self):
|
|
cfg.CONF.set_override('servers', ['1.2.3.4', '1.1.1.1:a'], 'RESTPROXY')
|
|
self.assertRaises(cfg.Error, servermanager.ServerPool)
|
|
|
|
def test_ipv6_server_address(self):
|
|
cfg.CONF.set_override(
|
|
'servers', ['[ABCD:EF01:2345:6789:ABCD:EF01:2345:6789]:80'],
|
|
'RESTPROXY')
|
|
s = servermanager.ServerPool()
|
|
self.assertEqual(s.servers[0].server,
|
|
'[ABCD:EF01:2345:6789:ABCD:EF01:2345:6789]')
|
|
|
|
def test_sticky_cert_fetch_fail(self):
|
|
pl = NeutronManager.get_plugin()
|
|
pl.servers.ssl = True
|
|
with mock.patch(
|
|
'ssl.get_server_certificate',
|
|
side_effect=Exception('There is no more entropy in the universe')
|
|
) as sslgetmock:
|
|
self.assertRaises(
|
|
cfg.Error,
|
|
pl.servers._get_combined_cert_for_server,
|
|
*('example.org', 443)
|
|
)
|
|
sslgetmock.assert_has_calls([mock.call(('example.org', 443))])
|
|
|
|
def test_consistency_watchdog(self):
|
|
pl = NeutronManager.get_plugin()
|
|
pl.servers.capabilities = []
|
|
self.watch_p.stop()
|
|
with nested(
|
|
mock.patch('eventlet.sleep'),
|
|
mock.patch(
|
|
SERVERMANAGER + '.ServerPool.rest_call',
|
|
side_effect=servermanager.RemoteRestError(
|
|
reason='Failure to break loop'
|
|
)
|
|
)
|
|
) as (smock, rmock):
|
|
# should return immediately without consistency capability
|
|
pl.servers._consistency_watchdog()
|
|
self.assertFalse(smock.called)
|
|
pl.servers.capabilities = ['consistency']
|
|
self.assertRaises(servermanager.RemoteRestError,
|
|
pl.servers._consistency_watchdog)
|
|
|
|
def test_consistency_hash_header(self):
|
|
# mock HTTP class instead of rest_call so we can see headers
|
|
with mock.patch(HTTPCON) as conmock:
|
|
rv = conmock.return_value
|
|
rv.getresponse.return_value.getheader.return_value = 'HASHHEADER'
|
|
with self.network():
|
|
callheaders = rv.request.mock_calls[0][1][3]
|
|
self.assertIn('X-BSN-BVS-HASH-MATCH', callheaders)
|
|
# first call will be False to indicate no previous state hash
|
|
self.assertEqual(callheaders['X-BSN-BVS-HASH-MATCH'], False)
|
|
# change the header that will be received on delete call
|
|
rv.getresponse.return_value.getheader.return_value = 'HASH2'
|
|
|
|
# net delete should have used header received on create
|
|
callheaders = rv.request.mock_calls[1][1][3]
|
|
self.assertEqual(callheaders['X-BSN-BVS-HASH-MATCH'], 'HASHHEADER')
|
|
|
|
# create again should now use header received from prev delete
|
|
with self.network():
|
|
callheaders = rv.request.mock_calls[2][1][3]
|
|
self.assertIn('X-BSN-BVS-HASH-MATCH', callheaders)
|
|
self.assertEqual(callheaders['X-BSN-BVS-HASH-MATCH'],
|
|
'HASH2')
|
|
|
|
def test_file_put_contents(self):
|
|
pl = NeutronManager.get_plugin()
|
|
with mock.patch(SERVERMANAGER + '.open', create=True) as omock:
|
|
pl.servers._file_put_contents('somepath', 'contents')
|
|
omock.assert_has_calls([mock.call('somepath', 'w')])
|
|
omock.return_value.__enter__.return_value.assert_has_calls([
|
|
mock.call.write('contents')
|
|
])
|
|
|
|
def test_combine_certs_to_file(self):
|
|
pl = NeutronManager.get_plugin()
|
|
with mock.patch(SERVERMANAGER + '.open', create=True) as omock:
|
|
omock.return_value.__enter__().read.return_value = 'certdata'
|
|
pl.servers._combine_certs_to_file(['cert1.pem', 'cert2.pem'],
|
|
'combined.pem')
|
|
# mock shared between read and write file handles so the calls
|
|
# are mixed together
|
|
omock.assert_has_calls([
|
|
mock.call('combined.pem', 'w'),
|
|
mock.call('cert1.pem', 'r'),
|
|
mock.call('cert2.pem', 'r'),
|
|
], any_order=True)
|
|
omock.return_value.__enter__.return_value.assert_has_calls([
|
|
mock.call.read(),
|
|
mock.call.write('certdata'),
|
|
mock.call.read(),
|
|
mock.call.write('certdata')
|
|
])
|
|
|
|
def test_auth_header(self):
|
|
cfg.CONF.set_override('server_auth', 'username:pass', 'RESTPROXY')
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON) as conmock:
|
|
rv = conmock.return_value
|
|
rv.getresponse.return_value.getheader.return_value = 'HASHHEADER'
|
|
sp.rest_create_network('tenant', 'network')
|
|
callheaders = rv.request.mock_calls[0][1][3]
|
|
self.assertIn('Authorization', callheaders)
|
|
self.assertEqual(callheaders['Authorization'],
|
|
'Basic dXNlcm5hbWU6cGFzcw==')
|
|
|
|
def test_header_add(self):
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON) as conmock:
|
|
rv = conmock.return_value
|
|
rv.getresponse.return_value.getheader.return_value = 'HASHHEADER'
|
|
sp.servers[0].rest_call('GET', '/', headers={'EXTRA-HEADER': 'HI'})
|
|
callheaders = rv.request.mock_calls[0][1][3]
|
|
# verify normal headers weren't mangled
|
|
self.assertIn('Content-type', callheaders)
|
|
self.assertEqual(callheaders['Content-type'],
|
|
'application/json')
|
|
# verify new header made it in
|
|
self.assertIn('EXTRA-HEADER', callheaders)
|
|
self.assertEqual(callheaders['EXTRA-HEADER'], 'HI')
|
|
|
|
def test_reconnect_on_timeout_change(self):
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON) as conmock:
|
|
rv = conmock.return_value
|
|
rv.getresponse.return_value.getheader.return_value = 'HASHHEADER'
|
|
sp.servers[0].capabilities = ['keep-alive']
|
|
sp.servers[0].rest_call('GET', '/', timeout=10)
|
|
# even with keep-alive enabled, a change in timeout will trigger
|
|
# a reconnect
|
|
sp.servers[0].rest_call('GET', '/', timeout=75)
|
|
conmock.assert_has_calls([
|
|
mock.call('localhost', 9000, timeout=10),
|
|
mock.call('localhost', 9000, timeout=75),
|
|
], any_order=True)
|
|
|
|
def test_connect_failures(self):
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON, return_value=None):
|
|
resp = sp.servers[0].rest_call('GET', '/')
|
|
self.assertEqual(resp, (0, None, None, None))
|
|
# verify same behavior on ssl class
|
|
sp.servers[0].currentcon = False
|
|
sp.servers[0].ssl = True
|
|
with mock.patch(HTTPSCON, return_value=None):
|
|
resp = sp.servers[0].rest_call('GET', '/')
|
|
self.assertEqual(resp, (0, None, None, None))
|
|
|
|
def test_reconnect_cached_connection(self):
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON) as conmock:
|
|
rv = conmock.return_value
|
|
rv.getresponse.return_value.getheader.return_value = 'HASH'
|
|
sp.servers[0].capabilities = ['keep-alive']
|
|
sp.servers[0].rest_call('GET', '/first')
|
|
# raise an error on re-use to verify reconnect
|
|
# return okay the second time so the reconnect works
|
|
rv.request.side_effect = [httplib.ImproperConnectionState(),
|
|
mock.MagicMock()]
|
|
sp.servers[0].rest_call('GET', '/second')
|
|
uris = [c[1][1] for c in rv.request.mock_calls]
|
|
expected = [
|
|
sp.base_uri + '/first',
|
|
sp.base_uri + '/second',
|
|
sp.base_uri + '/second',
|
|
]
|
|
self.assertEqual(uris, expected)
|
|
|
|
def test_no_reconnect_recurse_to_infinity(self):
|
|
# retry uses recursion when a reconnect is necessary
|
|
# this test makes sure it stops after 1 recursive call
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON) as conmock:
|
|
rv = conmock.return_value
|
|
# hash header must be string instead of mock object
|
|
rv.getresponse.return_value.getheader.return_value = 'HASH'
|
|
sp.servers[0].capabilities = ['keep-alive']
|
|
sp.servers[0].rest_call('GET', '/first')
|
|
# after retrying once, the rest call should raise the
|
|
# exception up
|
|
rv.request.side_effect = httplib.ImproperConnectionState()
|
|
self.assertRaises(httplib.ImproperConnectionState,
|
|
sp.servers[0].rest_call,
|
|
*('GET', '/second'))
|
|
# 1 for the first call, 2 for the second with retry
|
|
self.assertEqual(rv.request.call_count, 3)
|
|
|
|
def test_socket_error(self):
|
|
sp = servermanager.ServerPool()
|
|
with mock.patch(HTTPCON) as conmock:
|
|
conmock.return_value.request.side_effect = socket.timeout()
|
|
resp = sp.servers[0].rest_call('GET', '/')
|
|
self.assertEqual(resp, (0, None, None, None))
|
|
|
|
def test_cert_get_fail(self):
|
|
pl = NeutronManager.get_plugin()
|
|
pl.servers.ssl = True
|
|
with mock.patch('os.path.exists', return_value=False):
|
|
self.assertRaises(cfg.Error,
|
|
pl.servers._get_combined_cert_for_server,
|
|
*('example.org', 443))
|
|
|
|
def test_cert_make_dirs(self):
|
|
pl = NeutronManager.get_plugin()
|
|
pl.servers.ssl = True
|
|
cfg.CONF.set_override('ssl_sticky', False, 'RESTPROXY')
|
|
# pretend base dir exists, 3 children don't, and host cert does
|
|
with nested(
|
|
mock.patch('os.path.exists', side_effect=[True, False, False,
|
|
False, True]),
|
|
mock.patch('os.makedirs'),
|
|
mock.patch(SERVERMANAGER + '.ServerPool._combine_certs_to_file')
|
|
) as (exmock, makemock, combmock):
|
|
# will raise error because no certs found
|
|
self.assertIn(
|
|
'example.org',
|
|
pl.servers._get_combined_cert_for_server('example.org', 443)
|
|
)
|
|
base = cfg.CONF.RESTPROXY.ssl_cert_directory
|
|
hpath = base + '/host_certs/example.org.pem'
|
|
combpath = base + '/combined/example.org.pem'
|
|
combmock.assert_has_calls([mock.call([hpath], combpath)])
|
|
self.assertEqual(exmock.call_count, 5)
|
|
self.assertEqual(makemock.call_count, 3)
|
|
|
|
def test_no_cert_error(self):
|
|
pl = NeutronManager.get_plugin()
|
|
pl.servers.ssl = True
|
|
cfg.CONF.set_override('ssl_sticky', False, 'RESTPROXY')
|
|
# pretend base dir exists and 3 children do, but host cert doesn't
|
|
with mock.patch(
|
|
'os.path.exists',
|
|
side_effect=[True, True, True, True, False]
|
|
) as exmock:
|
|
# will raise error because no certs found
|
|
self.assertRaises(
|
|
cfg.Error,
|
|
pl.servers._get_combined_cert_for_server,
|
|
*('example.org', 443)
|
|
)
|
|
self.assertEqual(exmock.call_count, 5)
|
|
|
|
def test_action_success(self):
|
|
pl = NeutronManager.get_plugin()
|
|
self.assertTrue(pl.servers.action_success((200,)))
|
|
|
|
def test_server_failure(self):
|
|
pl = NeutronManager.get_plugin()
|
|
self.assertTrue(pl.servers.server_failure((404,)))
|
|
# server failure has an ignore codes option
|
|
self.assertFalse(pl.servers.server_failure((404,),
|
|
ignore_codes=[404]))
|
|
|
|
def test_conflict_triggers_sync(self):
|
|
pl = NeutronManager.get_plugin()
|
|
with mock.patch(
|
|
SERVERMANAGER + '.ServerProxy.rest_call',
|
|
return_value=(httplib.CONFLICT, 0, 0, 0)
|
|
) as srestmock:
|
|
# making a call should trigger a conflict sync
|
|
pl.servers.rest_call('GET', '/', '', None, [])
|
|
srestmock.assert_has_calls([
|
|
mock.call('GET', '/', '', None, False, reconnect=True),
|
|
mock.call('PUT', '/topology',
|
|
{'routers': [], 'networks': []},
|
|
timeout=None)
|
|
])
|
|
|
|
def test_conflict_sync_raises_error_without_topology(self):
|
|
pl = NeutronManager.get_plugin()
|
|
pl.servers.get_topo_function = None
|
|
with mock.patch(
|
|
SERVERMANAGER + '.ServerProxy.rest_call',
|
|
return_value=(httplib.CONFLICT, 0, 0, 0)
|
|
):
|
|
# making a call should trigger a conflict sync that will
|
|
# error without the topology function set
|
|
self.assertRaises(
|
|
cfg.Error,
|
|
pl.servers.rest_call,
|
|
*('GET', '/', '', None, [])
|
|
)
|
|
|
|
def test_floating_calls(self):
|
|
pl = NeutronManager.get_plugin()
|
|
with mock.patch(SERVERMANAGER + '.ServerPool.rest_action') as ramock:
|
|
pl.servers.rest_create_floatingip('tenant', {'id': 'somefloat'})
|
|
pl.servers.rest_update_floatingip('tenant', {'name': 'myfl'}, 'id')
|
|
pl.servers.rest_delete_floatingip('tenant', 'oldid')
|
|
ramock.assert_has_calls([
|
|
mock.call('PUT', '/tenants/tenant/floatingips/somefloat',
|
|
errstr=u'Unable to create floating IP: %s'),
|
|
mock.call('PUT', '/tenants/tenant/floatingips/id',
|
|
errstr=u'Unable to update floating IP: %s'),
|
|
mock.call('DELETE', '/tenants/tenant/floatingips/oldid',
|
|
errstr=u'Unable to delete floating IP: %s')
|
|
])
|
|
|
|
def test_HTTPSConnectionWithValidation_without_cert(self):
|
|
con = self.sm.HTTPSConnectionWithValidation(
|
|
'www.example.org', 443, timeout=90)
|
|
con.source_address = '127.0.0.1'
|
|
con.request("GET", "/")
|
|
self.socket_mock.assert_has_calls([mock.call(
|
|
('www.example.org', 443), 90, '127.0.0.1'
|
|
)])
|
|
self.wrap_mock.assert_has_calls([mock.call(
|
|
self.socket_mock(), None, None, cert_reqs=ssl.CERT_NONE
|
|
)])
|
|
self.assertEqual(con.sock, self.wrap_mock())
|
|
|
|
def test_HTTPSConnectionWithValidation_with_cert(self):
|
|
con = self.sm.HTTPSConnectionWithValidation(
|
|
'www.example.org', 443, timeout=90)
|
|
con.combined_cert = 'SOMECERTS.pem'
|
|
con.source_address = '127.0.0.1'
|
|
con.request("GET", "/")
|
|
self.socket_mock.assert_has_calls([mock.call(
|
|
('www.example.org', 443), 90, '127.0.0.1'
|
|
)])
|
|
self.wrap_mock.assert_has_calls([mock.call(
|
|
self.socket_mock(), None, None, ca_certs='SOMECERTS.pem',
|
|
cert_reqs=ssl.CERT_REQUIRED
|
|
)])
|
|
self.assertEqual(con.sock, self.wrap_mock())
|
|
|
|
def test_HTTPSConnectionWithValidation_tunnel(self):
|
|
tunnel_mock = mock.patch.object(
|
|
self.sm.HTTPSConnectionWithValidation,
|
|
'_tunnel').start()
|
|
con = self.sm.HTTPSConnectionWithValidation(
|
|
'www.example.org', 443, timeout=90)
|
|
con.source_address = '127.0.0.1'
|
|
if not hasattr(con, 'set_tunnel'):
|
|
# no tunnel support in py26
|
|
return
|
|
con.set_tunnel('myproxy.local', 3128)
|
|
con.request("GET", "/")
|
|
self.socket_mock.assert_has_calls([mock.call(
|
|
('www.example.org', 443), 90, '127.0.0.1'
|
|
)])
|
|
self.wrap_mock.assert_has_calls([mock.call(
|
|
self.socket_mock(), None, None, cert_reqs=ssl.CERT_NONE
|
|
)])
|
|
# _tunnel() doesn't take any args
|
|
tunnel_mock.assert_has_calls([mock.call()])
|
|
self.assertEqual(con._tunnel_host, 'myproxy.local')
|
|
self.assertEqual(con._tunnel_port, 3128)
|
|
self.assertEqual(con.sock, self.wrap_mock())
|