c51b3ff25c
Bug #1144370 Change-Id: I35ac570dd55006d0133736588f0302d6f70294de
300 lines
12 KiB
Python
300 lines
12 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
#
|
|
# Copyright 2012 New Dream Network, LLC (DreamHost)
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
# @author: Mark McClain, DreamHost
|
|
|
|
import socket
|
|
|
|
import mock
|
|
import testtools
|
|
import webob
|
|
|
|
from quantum.agent.metadata import namespace_proxy as ns_proxy
|
|
from quantum.tests import base
|
|
from quantum.common import utils
|
|
|
|
|
|
class FakeConf(object):
|
|
admin_user = 'quantum'
|
|
admin_password = 'password'
|
|
admin_tenant_name = 'tenant'
|
|
auth_url = 'http://127.0.0.1'
|
|
auth_strategy = 'keystone'
|
|
auth_region = 'region'
|
|
nova_metadata_ip = '9.9.9.9'
|
|
nova_metadata_port = 8775
|
|
metadata_proxy_shared_secret = 'secret'
|
|
|
|
|
|
class TestUnixDomainHttpConnection(base.BaseTestCase):
|
|
def test_connect(self):
|
|
with mock.patch.object(ns_proxy, 'cfg') as cfg:
|
|
cfg.CONF.metadata_proxy_socket = '/the/path'
|
|
with mock.patch('socket.socket') as socket_create:
|
|
conn = ns_proxy.UnixDomainHTTPConnection('169.254.169.254',
|
|
timeout=3)
|
|
|
|
conn.connect()
|
|
|
|
socket_create.assert_has_calls([
|
|
mock.call(socket.AF_UNIX, socket.SOCK_STREAM),
|
|
mock.call().settimeout(3),
|
|
mock.call().connect('/the/path')]
|
|
)
|
|
self.assertEqual(conn.timeout, 3)
|
|
|
|
|
|
class TestNetworkMetadataProxyHandler(base.BaseTestCase):
|
|
def setUp(self):
|
|
super(TestNetworkMetadataProxyHandler, self).setUp()
|
|
self.log_p = mock.patch.object(ns_proxy, 'LOG')
|
|
self.log = self.log_p.start()
|
|
self.addCleanup(self.log_p.stop)
|
|
|
|
self.handler = ns_proxy.NetworkMetadataProxyHandler('router_id')
|
|
|
|
def test_call(self):
|
|
req = mock.Mock(headers={})
|
|
with mock.patch.object(self.handler, '_proxy_request') as proxy_req:
|
|
proxy_req.return_value = 'value'
|
|
|
|
retval = self.handler(req)
|
|
self.assertEqual(retval, 'value')
|
|
proxy_req.assert_called_once_with(req.remote_addr,
|
|
req.path_info,
|
|
req.query_string)
|
|
|
|
def test_no_argument_passed_to_init(self):
|
|
with testtools.ExpectedException(ValueError):
|
|
ns_proxy.NetworkMetadataProxyHandler()
|
|
|
|
def test_call_internal_server_error(self):
|
|
req = mock.Mock(headers={})
|
|
with mock.patch.object(self.handler, '_proxy_request') as proxy_req:
|
|
proxy_req.side_effect = Exception
|
|
retval = self.handler(req)
|
|
self.assertIsInstance(retval, webob.exc.HTTPInternalServerError)
|
|
self.assertEqual(len(self.log.mock_calls), 2)
|
|
self.assertTrue(proxy_req.called)
|
|
|
|
def test_proxy_request_router_200(self):
|
|
self.handler.router_id = 'router_id'
|
|
|
|
resp = mock.Mock(status=200)
|
|
with mock.patch('httplib2.Http') as mock_http:
|
|
mock_http.return_value.request.return_value = (resp, 'content')
|
|
|
|
retval = self.handler._proxy_request('192.168.1.1',
|
|
'/latest/meta-data',
|
|
'')
|
|
|
|
mock_http.assert_has_calls([
|
|
mock.call().request(
|
|
'http://169.254.169.254/latest/meta-data',
|
|
headers={
|
|
'X-Forwarded-For': '192.168.1.1',
|
|
'X-Quantum-Router-ID': 'router_id'
|
|
},
|
|
connection_type=ns_proxy.UnixDomainHTTPConnection
|
|
)]
|
|
)
|
|
|
|
self.assertEqual(retval, 'content')
|
|
|
|
def test_proxy_request_network_200(self):
|
|
self.handler.network_id = 'network_id'
|
|
|
|
resp = mock.Mock(status=200)
|
|
with mock.patch('httplib2.Http') as mock_http:
|
|
mock_http.return_value.request.return_value = (resp, 'content')
|
|
|
|
retval = self.handler._proxy_request('192.168.1.1',
|
|
'/latest/meta-data',
|
|
'')
|
|
|
|
mock_http.assert_has_calls([
|
|
mock.call().request(
|
|
'http://169.254.169.254/latest/meta-data',
|
|
headers={
|
|
'X-Forwarded-For': '192.168.1.1',
|
|
'X-Quantum-Network-ID': 'network_id'
|
|
},
|
|
connection_type=ns_proxy.UnixDomainHTTPConnection
|
|
)]
|
|
)
|
|
|
|
self.assertEqual(retval, 'content')
|
|
|
|
def test_proxy_request_network_404(self):
|
|
self.handler.network_id = 'network_id'
|
|
|
|
resp = mock.Mock(status=404)
|
|
with mock.patch('httplib2.Http') as mock_http:
|
|
mock_http.return_value.request.return_value = (resp, '')
|
|
|
|
retval = self.handler._proxy_request('192.168.1.1',
|
|
'/latest/meta-data',
|
|
'')
|
|
|
|
mock_http.assert_has_calls([
|
|
mock.call().request(
|
|
'http://169.254.169.254/latest/meta-data',
|
|
headers={
|
|
'X-Forwarded-For': '192.168.1.1',
|
|
'X-Quantum-Network-ID': 'network_id'
|
|
},
|
|
connection_type=ns_proxy.UnixDomainHTTPConnection
|
|
)]
|
|
)
|
|
|
|
self.assertIsInstance(retval, webob.exc.HTTPNotFound)
|
|
|
|
def test_proxy_request_network_500(self):
|
|
self.handler.network_id = 'network_id'
|
|
|
|
resp = mock.Mock(status=500)
|
|
with mock.patch('httplib2.Http') as mock_http:
|
|
mock_http.return_value.request.return_value = (resp, '')
|
|
|
|
retval = self.handler._proxy_request('192.168.1.1',
|
|
'/latest/meta-data',
|
|
'')
|
|
|
|
mock_http.assert_has_calls([
|
|
mock.call().request(
|
|
'http://169.254.169.254/latest/meta-data',
|
|
headers={
|
|
'X-Forwarded-For': '192.168.1.1',
|
|
'X-Quantum-Network-ID': 'network_id'
|
|
},
|
|
connection_type=ns_proxy.UnixDomainHTTPConnection
|
|
)]
|
|
)
|
|
|
|
self.assertIsInstance(retval, webob.exc.HTTPInternalServerError)
|
|
|
|
def test_proxy_request_network_418(self):
|
|
self.handler.network_id = 'network_id'
|
|
|
|
resp = mock.Mock(status=418)
|
|
with mock.patch('httplib2.Http') as mock_http:
|
|
mock_http.return_value.request.return_value = (resp, '')
|
|
|
|
with testtools.ExpectedException(Exception):
|
|
self.handler._proxy_request('192.168.1.1',
|
|
'/latest/meta-data',
|
|
'')
|
|
|
|
mock_http.assert_has_calls([
|
|
mock.call().request(
|
|
'http://169.254.169.254/latest/meta-data',
|
|
headers={
|
|
'X-Forwarded-For': '192.168.1.1',
|
|
'X-Quantum-Network-ID': 'network_id'
|
|
},
|
|
connection_type=ns_proxy.UnixDomainHTTPConnection
|
|
)]
|
|
)
|
|
|
|
def test_proxy_request_network_exception(self):
|
|
self.handler.network_id = 'network_id'
|
|
|
|
resp = mock.Mock(status=500)
|
|
with mock.patch('httplib2.Http') as mock_http:
|
|
mock_http.return_value.request.side_effect = Exception
|
|
|
|
with testtools.ExpectedException(Exception):
|
|
self.handler._proxy_request('192.168.1.1',
|
|
'/latest/meta-data',
|
|
'')
|
|
|
|
mock_http.assert_has_calls([
|
|
mock.call().request(
|
|
'http://169.254.169.254/latest/meta-data',
|
|
headers={
|
|
'X-Forwarded-For': '192.168.1.1',
|
|
'X-Quantum-Network-ID': 'network_id'
|
|
},
|
|
connection_type=ns_proxy.UnixDomainHTTPConnection
|
|
)]
|
|
)
|
|
|
|
|
|
class TestProxyDaemon(base.BaseTestCase):
|
|
def test_init(self):
|
|
with mock.patch('quantum.agent.linux.daemon.Pidfile') as pf:
|
|
pd = ns_proxy.ProxyDaemon('pidfile', 9697, 'net_id', 'router_id')
|
|
self.assertEqual(pd.router_id, 'router_id')
|
|
self.assertEqual(pd.network_id, 'net_id')
|
|
|
|
def test_run(self):
|
|
with mock.patch('quantum.agent.linux.daemon.Pidfile') as pf:
|
|
with mock.patch('quantum.wsgi.Server') as Server:
|
|
pd = ns_proxy.ProxyDaemon('pidfile', 9697, 'net_id',
|
|
'router_id')
|
|
pd.run()
|
|
Server.assert_has_calls([
|
|
mock.call('quantum-network-metadata-proxy'),
|
|
mock.call().start(mock.ANY, 9697),
|
|
mock.call().wait()]
|
|
)
|
|
|
|
def test_main(self):
|
|
with mock.patch.object(ns_proxy, 'ProxyDaemon') as daemon:
|
|
with mock.patch('eventlet.monkey_patch') as eventlet:
|
|
with mock.patch.object(ns_proxy, 'config') as config:
|
|
with mock.patch.object(ns_proxy, 'cfg') as cfg:
|
|
with mock.patch.object(utils, 'cfg') as utils_cfg:
|
|
cfg.CONF.router_id = 'router_id'
|
|
cfg.CONF.network_id = None
|
|
cfg.CONF.metadata_port = 9697
|
|
cfg.CONF.pid_file = 'pidfile'
|
|
cfg.CONF.daemonize = True
|
|
utils_cfg.CONF.log_opt_values.return_value = None
|
|
ns_proxy.main()
|
|
|
|
self.assertTrue(eventlet.called)
|
|
self.assertTrue(config.setup_logging.called)
|
|
daemon.assert_has_calls([
|
|
mock.call('pidfile', 9697,
|
|
router_id='router_id',
|
|
network_id=None),
|
|
mock.call().start()]
|
|
)
|
|
|
|
def test_main_dont_fork(self):
|
|
with mock.patch.object(ns_proxy, 'ProxyDaemon') as daemon:
|
|
with mock.patch('eventlet.monkey_patch') as eventlet:
|
|
with mock.patch.object(ns_proxy, 'config') as config:
|
|
with mock.patch.object(ns_proxy, 'cfg') as cfg:
|
|
with mock.patch.object(utils, 'cfg') as utils_cfg:
|
|
cfg.CONF.router_id = 'router_id'
|
|
cfg.CONF.network_id = None
|
|
cfg.CONF.metadata_port = 9697
|
|
cfg.CONF.pid_file = 'pidfile'
|
|
cfg.CONF.daemonize = False
|
|
utils_cfg.CONF.log_opt_values.return_value = None
|
|
ns_proxy.main()
|
|
|
|
self.assertTrue(eventlet.called)
|
|
self.assertTrue(config.setup_logging.called)
|
|
daemon.assert_has_calls([
|
|
mock.call('pidfile', 9697,
|
|
router_id='router_id',
|
|
network_id=None),
|
|
mock.call().run()]
|
|
)
|