Index: tools/telemetry/third_party/gsutil/third_party/boto/tests/unit/test_connection.py |
diff --git a/tools/telemetry/third_party/gsutil/third_party/boto/tests/unit/test_connection.py b/tools/telemetry/third_party/gsutil/third_party/boto/tests/unit/test_connection.py |
deleted file mode 100644 |
index 69e8816e91081889898a325e5fa329a264311b46..0000000000000000000000000000000000000000 |
--- a/tools/telemetry/third_party/gsutil/third_party/boto/tests/unit/test_connection.py |
+++ /dev/null |
@@ -1,539 +0,0 @@ |
-# Copyright (c) 2013 Amazon.com, Inc. or its affiliates. All Rights Reserved |
-# |
-# Permission is hereby granted, free of charge, to any person obtaining a |
-# copy of this software and associated documentation files (the |
-# "Software"), to deal in the Software without restriction, including |
-# without limitation the rights to use, copy, modify, merge, publish, dis- |
-# tribute, sublicense, and/or sell copies of the Software, and to permit |
-# persons to whom the Software is furnished to do so, subject to the fol- |
-# lowing conditions: |
-# |
-# The above copyright notice and this permission notice shall be included |
-# in all copies or substantial portions of the Software. |
-# |
-# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
-# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL- |
-# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT |
-# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, |
-# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
-# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS |
-# IN THE SOFTWARE. |
-# |
-import os |
-import socket |
- |
-from tests.compat import mock, unittest |
-from httpretty import HTTPretty |
- |
-from boto import UserAgent |
-from boto.compat import json, parse_qs |
-from boto.connection import AWSQueryConnection, AWSAuthConnection, HTTPRequest |
-from boto.exception import BotoServerError |
-from boto.regioninfo import RegionInfo |
- |
- |
-class TestListParamsSerialization(unittest.TestCase): |
- maxDiff = None |
- |
- def setUp(self): |
- self.connection = AWSQueryConnection('access_key', 'secret_key') |
- |
- def test_complex_list_serialization(self): |
- # This example is taken from the doc string of |
- # build_complex_list_params. |
- params = {} |
- self.connection.build_complex_list_params( |
- params, [('foo', 'bar', 'baz'), ('foo2', 'bar2', 'baz2')], |
- 'ParamName.member', ('One', 'Two', 'Three')) |
- self.assertDictEqual({ |
- 'ParamName.member.1.One': 'foo', |
- 'ParamName.member.1.Two': 'bar', |
- 'ParamName.member.1.Three': 'baz', |
- 'ParamName.member.2.One': 'foo2', |
- 'ParamName.member.2.Two': 'bar2', |
- 'ParamName.member.2.Three': 'baz2', |
- }, params) |
- |
- def test_simple_list_serialization(self): |
- params = {} |
- self.connection.build_list_params( |
- params, ['foo', 'bar', 'baz'], 'ParamName.member') |
- self.assertDictEqual({ |
- 'ParamName.member.1': 'foo', |
- 'ParamName.member.2': 'bar', |
- 'ParamName.member.3': 'baz', |
- }, params) |
- |
- |
-class MockAWSService(AWSQueryConnection): |
- """ |
- Fake AWS Service |
- |
- This is used to test the AWSQueryConnection object is behaving properly. |
- """ |
- |
- APIVersion = '2012-01-01' |
- |
- def _required_auth_capability(self): |
- return ['sign-v2'] |
- |
- def __init__(self, aws_access_key_id=None, aws_secret_access_key=None, |
- is_secure=True, host=None, port=None, |
- proxy=None, proxy_port=None, |
- proxy_user=None, proxy_pass=None, debug=0, |
- https_connection_factory=None, region=None, path='/', |
- api_version=None, security_token=None, |
- validate_certs=True, profile_name=None): |
- self.region = region |
- if host is None: |
- host = self.region.endpoint |
- AWSQueryConnection.__init__(self, aws_access_key_id, |
- aws_secret_access_key, |
- is_secure, port, proxy, proxy_port, |
- proxy_user, proxy_pass, |
- host, debug, |
- https_connection_factory, path, |
- security_token, |
- validate_certs=validate_certs, |
- profile_name=profile_name) |
- |
- |
-class TestAWSAuthConnection(unittest.TestCase): |
- def test_get_path(self): |
- conn = AWSAuthConnection( |
- 'mockservice.cc-zone-1.amazonaws.com', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- suppress_consec_slashes=False |
- ) |
- # Test some sample paths for mangling. |
- self.assertEqual(conn.get_path('/'), '/') |
- self.assertEqual(conn.get_path('image.jpg'), '/image.jpg') |
- self.assertEqual(conn.get_path('folder/image.jpg'), '/folder/image.jpg') |
- self.assertEqual(conn.get_path('folder//image.jpg'), '/folder//image.jpg') |
- |
- # Ensure leading slashes aren't removed. |
- # See https://github.com/boto/boto/issues/1387 |
- self.assertEqual(conn.get_path('/folder//image.jpg'), '/folder//image.jpg') |
- self.assertEqual(conn.get_path('/folder////image.jpg'), '/folder////image.jpg') |
- self.assertEqual(conn.get_path('///folder////image.jpg'), '///folder////image.jpg') |
- |
- def test_connection_behind_proxy(self): |
- os.environ['http_proxy'] = "http://john.doe:p4ssw0rd@127.0.0.1:8180" |
- conn = AWSAuthConnection( |
- 'mockservice.cc-zone-1.amazonaws.com', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- suppress_consec_slashes=False |
- ) |
- self.assertEqual(conn.proxy, '127.0.0.1') |
- self.assertEqual(conn.proxy_user, 'john.doe') |
- self.assertEqual(conn.proxy_pass, 'p4ssw0rd') |
- self.assertEqual(conn.proxy_port, '8180') |
- del os.environ['http_proxy'] |
- |
- def test_get_proxy_url_with_auth(self): |
- conn = AWSAuthConnection( |
- 'mockservice.cc-zone-1.amazonaws.com', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- suppress_consec_slashes=False, |
- proxy="127.0.0.1", |
- proxy_user="john.doe", |
- proxy_pass="p4ssw0rd", |
- proxy_port="8180" |
- ) |
- self.assertEqual(conn.get_proxy_url_with_auth(), 'http://john.doe:p4ssw0rd@127.0.0.1:8180') |
- |
- def test_connection_behind_proxy_without_explicit_port(self): |
- os.environ['http_proxy'] = "http://127.0.0.1" |
- conn = AWSAuthConnection( |
- 'mockservice.cc-zone-1.amazonaws.com', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- suppress_consec_slashes=False, |
- port=8180 |
- ) |
- self.assertEqual(conn.proxy, '127.0.0.1') |
- self.assertEqual(conn.proxy_port, 8180) |
- del os.environ['http_proxy'] |
- |
- @mock.patch.object(socket, 'create_connection') |
- @mock.patch('boto.compat.http_client.HTTPResponse') |
- @mock.patch('boto.compat.http_client.ssl') |
- def test_proxy_ssl(self, ssl_mock, http_response_mock, |
- create_connection_mock): |
- type(http_response_mock.return_value).status = mock.PropertyMock( |
- return_value=200) |
- |
- conn = AWSAuthConnection( |
- 'mockservice.cc-zone-1.amazonaws.com', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- suppress_consec_slashes=False, |
- proxy_port=80 |
- ) |
- conn.https_validate_certificates = False |
- |
- # Attempt to call proxy_ssl and make sure it works |
- conn.proxy_ssl('mockservice.cc-zone-1.amazonaws.com', 80) |
- |
- # this tests the proper setting of the host_header in v4 signing |
- def test_host_header_with_nonstandard_port(self): |
- # test standard port first |
- conn = V4AuthConnection( |
- 'testhost', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- request = conn.build_base_http_request( |
- method='POST', path='/', auth_path=None, params=None, headers=None, |
- data='', host=None) |
- conn.set_host_header(request) |
- self.assertEqual(request.headers['Host'], 'testhost') |
- |
- # next, test non-standard port |
- conn = V4AuthConnection( |
- 'testhost', |
- aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- port=8773) |
- request = conn.build_base_http_request( |
- method='POST', path='/', auth_path=None, params=None, headers=None, |
- data='', host=None) |
- conn.set_host_header(request) |
- self.assertEqual(request.headers['Host'], 'testhost:8773') |
- |
- |
-class V4AuthConnection(AWSAuthConnection): |
- def __init__(self, host, aws_access_key_id, aws_secret_access_key, port=443): |
- AWSAuthConnection.__init__( |
- self, host, aws_access_key_id, aws_secret_access_key, port=port) |
- |
- def _required_auth_capability(self): |
- return ['hmac-v4'] |
- |
- |
-class TestAWSQueryConnection(unittest.TestCase): |
- def setUp(self): |
- self.region = RegionInfo( |
- name='cc-zone-1', |
- endpoint='mockservice.cc-zone-1.amazonaws.com', |
- connection_cls=MockAWSService) |
- |
- HTTPretty.enable() |
- |
- def tearDown(self): |
- HTTPretty.disable() |
- |
- |
-class TestAWSQueryConnectionSimple(TestAWSQueryConnection): |
- def test_query_connection_basis(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/' % self.region.endpoint, |
- json.dumps({'test': 'secure'}), |
- content_type='application/json') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- |
- self.assertEqual(conn.host, 'mockservice.cc-zone-1.amazonaws.com') |
- |
- def test_query_connection_noproxy(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/' % self.region.endpoint, |
- json.dumps({'test': 'secure'}), |
- content_type='application/json') |
- |
- os.environ['no_proxy'] = self.region.endpoint |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- proxy="NON_EXISTENT_HOSTNAME", |
- proxy_port="3128") |
- |
- resp = conn.make_request('myCmd', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- del os.environ['no_proxy'] |
- args = parse_qs(HTTPretty.last_request.body) |
- self.assertEqual(args[b'AWSAccessKeyId'], [b'access_key']) |
- |
- def test_query_connection_noproxy_nosecure(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/' % self.region.endpoint, |
- json.dumps({'test': 'insecure'}), |
- content_type='application/json') |
- |
- os.environ['no_proxy'] = self.region.endpoint |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- proxy="NON_EXISTENT_HOSTNAME", |
- proxy_port="3128", |
- is_secure=False) |
- |
- resp = conn.make_request('myCmd', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- del os.environ['no_proxy'] |
- args = parse_qs(HTTPretty.last_request.body) |
- self.assertEqual(args[b'AWSAccessKeyId'], [b'access_key']) |
- |
- def test_single_command(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/' % self.region.endpoint, |
- json.dumps({'test': 'secure'}), |
- content_type='application/json') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- resp = conn.make_request('myCmd', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- |
- args = parse_qs(HTTPretty.last_request.body) |
- self.assertEqual(args[b'AWSAccessKeyId'], [b'access_key']) |
- self.assertEqual(args[b'SignatureMethod'], [b'HmacSHA256']) |
- self.assertEqual(args[b'Version'], [conn.APIVersion.encode('utf-8')]) |
- self.assertEqual(args[b'par1'], [b'foo']) |
- self.assertEqual(args[b'par2'], [b'baz']) |
- |
- self.assertEqual(resp.read(), b'{"test": "secure"}') |
- |
- def test_multi_commands(self): |
- """Check connection re-use""" |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/' % self.region.endpoint, |
- json.dumps({'test': 'secure'}), |
- content_type='application/json') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- |
- resp1 = conn.make_request('myCmd1', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- body1 = parse_qs(HTTPretty.last_request.body) |
- |
- resp2 = conn.make_request('myCmd2', |
- {'par3': 'bar', 'par4': 'narf'}, |
- "/", |
- "POST") |
- body2 = parse_qs(HTTPretty.last_request.body) |
- |
- self.assertEqual(body1[b'par1'], [b'foo']) |
- self.assertEqual(body1[b'par2'], [b'baz']) |
- with self.assertRaises(KeyError): |
- body1[b'par3'] |
- |
- self.assertEqual(body2[b'par3'], [b'bar']) |
- self.assertEqual(body2[b'par4'], [b'narf']) |
- with self.assertRaises(KeyError): |
- body2['par1'] |
- |
- self.assertEqual(resp1.read(), b'{"test": "secure"}') |
- self.assertEqual(resp2.read(), b'{"test": "secure"}') |
- |
- def test_non_secure(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'http://%s/' % self.region.endpoint, |
- json.dumps({'test': 'normal'}), |
- content_type='application/json') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- is_secure=False) |
- resp = conn.make_request('myCmd1', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- |
- self.assertEqual(resp.read(), b'{"test": "normal"}') |
- |
- def test_alternate_port(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'http://%s:8080/' % self.region.endpoint, |
- json.dumps({'test': 'alternate'}), |
- content_type='application/json') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- port=8080, |
- is_secure=False) |
- resp = conn.make_request('myCmd1', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- |
- self.assertEqual(resp.read(), b'{"test": "alternate"}') |
- |
- def test_temp_failure(self): |
- responses = [HTTPretty.Response(body="{'test': 'fail'}", status=500), |
- HTTPretty.Response(body="{'test': 'success'}", status=200)] |
- |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/temp_fail/' % self.region.endpoint, |
- responses=responses) |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- resp = conn.make_request('myCmd1', |
- {'par1': 'foo', 'par2': 'baz'}, |
- '/temp_fail/', |
- 'POST') |
- self.assertEqual(resp.read(), b"{'test': 'success'}") |
- |
- def test_unhandled_exception(self): |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/temp_exception/' % self.region.endpoint, |
- responses=[]) |
- |
- def fake_connection(address, timeout=socket._GLOBAL_DEFAULT_TIMEOUT, |
- source_address=None): |
- raise socket.timeout('fake error') |
- |
- socket.create_connection = fake_connection |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- conn.num_retries = 0 |
- with self.assertRaises(socket.error): |
- resp = conn.make_request('myCmd1', |
- {'par1': 'foo', 'par2': 'baz'}, |
- '/temp_exception/', |
- 'POST') |
- |
- def test_connection_close(self): |
- """Check connection re-use after close header is received""" |
- HTTPretty.register_uri(HTTPretty.POST, |
- 'https://%s/' % self.region.endpoint, |
- json.dumps({'test': 'secure'}), |
- content_type='application/json', |
- connection='close') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- |
- def mock_put_conn(*args, **kwargs): |
- raise Exception('put_http_connection should not be called!') |
- |
- conn.put_http_connection = mock_put_conn |
- |
- resp1 = conn.make_request('myCmd1', |
- {'par1': 'foo', 'par2': 'baz'}, |
- "/", |
- "POST") |
- |
- # If we've gotten this far then no exception was raised |
- # by attempting to put the connection back into the pool |
- # Now let's just confirm the close header was actually |
- # set or we have another problem. |
- self.assertEqual(resp1.getheader('connection'), 'close') |
- |
- def test_port_pooling(self): |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret', |
- port=8080) |
- |
- # Pick a connection, then put it back |
- con1 = conn.get_http_connection(conn.host, conn.port, conn.is_secure) |
- conn.put_http_connection(conn.host, conn.port, conn.is_secure, con1) |
- |
- # Pick another connection, which hopefully is the same yet again |
- con2 = conn.get_http_connection(conn.host, conn.port, conn.is_secure) |
- conn.put_http_connection(conn.host, conn.port, conn.is_secure, con2) |
- |
- self.assertEqual(con1, con2) |
- |
- # Change the port and make sure a new connection is made |
- conn.port = 8081 |
- |
- con3 = conn.get_http_connection(conn.host, conn.port, conn.is_secure) |
- conn.put_http_connection(conn.host, conn.port, conn.is_secure, con3) |
- |
- self.assertNotEqual(con1, con3) |
- |
- |
-class TestAWSQueryStatus(TestAWSQueryConnection): |
- |
- def test_get_status(self): |
- HTTPretty.register_uri(HTTPretty.GET, |
- 'https://%s/status' % self.region.endpoint, |
- '<status>ok</status>', |
- content_type='text/xml') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- resp = conn.get_status('getStatus', |
- {'par1': 'foo', 'par2': 'baz'}, |
- 'status') |
- |
- self.assertEqual(resp, "ok") |
- |
- def test_get_status_blank_error(self): |
- HTTPretty.register_uri(HTTPretty.GET, |
- 'https://%s/status' % self.region.endpoint, |
- '', |
- content_type='text/xml') |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- with self.assertRaises(BotoServerError): |
- resp = conn.get_status('getStatus', |
- {'par1': 'foo', 'par2': 'baz'}, |
- 'status') |
- |
- def test_get_status_error(self): |
- HTTPretty.register_uri(HTTPretty.GET, |
- 'https://%s/status' % self.region.endpoint, |
- '<status>error</status>', |
- content_type='text/xml', |
- status=400) |
- |
- conn = self.region.connect(aws_access_key_id='access_key', |
- aws_secret_access_key='secret') |
- with self.assertRaises(BotoServerError): |
- resp = conn.get_status('getStatus', |
- {'par1': 'foo', 'par2': 'baz'}, |
- 'status') |
- |
- |
-class TestHTTPRequest(unittest.TestCase): |
- def test_user_agent_not_url_encoded(self): |
- headers = {'Some-Header': u'should be url encoded', |
- 'User-Agent': UserAgent} |
- request = HTTPRequest('PUT', 'https', 'amazon.com', 443, None, |
- None, {}, headers, 'Body') |
- mock_connection = mock.Mock() |
- |
- # Create a method that preserves the headers at the time of |
- # authorization. |
- def mock_add_auth(req, **kwargs): |
- mock_connection.headers_at_auth = req.headers.copy() |
- |
- mock_connection._auth_handler.add_auth = mock_add_auth |
- |
- request.authorize(mock_connection) |
- # Ensure the headers at authorization are as expected i.e. |
- # the user agent header was not url encoded but the other header was. |
- self.assertEqual(mock_connection.headers_at_auth, |
- {'Some-Header': 'should%20be%20url%20encoded', |
- 'User-Agent': UserAgent}) |
- |
- def test_content_length_str(self): |
- request = HTTPRequest('PUT', 'https', 'amazon.com', 443, None, |
- None, {}, {}, 'Body') |
- mock_connection = mock.Mock() |
- request.authorize(mock_connection) |
- |
- # Ensure Content-Length header is a str. This is more explicit than |
- # relying on other code cast the value later. (Python 2.7.0, for |
- # example, assumes headers are of type str.) |
- self.assertIsInstance(request.headers['Content-Length'], str) |
- |
-if __name__ == '__main__': |
- unittest.main() |