Index: third_party/gsutil/third_party/boto/tests/unit/test_connection.py |
diff --git a/third_party/gsutil/third_party/boto/tests/unit/test_connection.py b/third_party/gsutil/third_party/boto/tests/unit/test_connection.py |
new file mode 100644 |
index 0000000000000000000000000000000000000000..69e8816e91081889898a325e5fa329a264311b46 |
--- /dev/null |
+++ b/third_party/gsutil/third_party/boto/tests/unit/test_connection.py |
@@ -0,0 +1,539 @@ |
+# Copyright (c) 2013 Amazon.com, Inc. or its affiliates. All Rights Reserved |
+# |
+# Permission is hereby granted, free of charge, to any person obtaining a |
+# copy of this software and associated documentation files (the |
+# "Software"), to deal in the Software without restriction, including |
+# without limitation the rights to use, copy, modify, merge, publish, dis- |
+# tribute, sublicense, and/or sell copies of the Software, and to permit |
+# persons to whom the Software is furnished to do so, subject to the fol- |
+# lowing conditions: |
+# |
+# The above copyright notice and this permission notice shall be included |
+# in all copies or substantial portions of the Software. |
+# |
+# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
+# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL- |
+# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT |
+# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, |
+# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, |
+# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS |
+# IN THE SOFTWARE. |
+# |
+import os |
+import socket |
+ |
+from tests.compat import mock, unittest |
+from httpretty import HTTPretty |
+ |
+from boto import UserAgent |
+from boto.compat import json, parse_qs |
+from boto.connection import AWSQueryConnection, AWSAuthConnection, HTTPRequest |
+from boto.exception import BotoServerError |
+from boto.regioninfo import RegionInfo |
+ |
+ |
+class TestListParamsSerialization(unittest.TestCase): |
+ maxDiff = None |
+ |
+ def setUp(self): |
+ self.connection = AWSQueryConnection('access_key', 'secret_key') |
+ |
+ def test_complex_list_serialization(self): |
+ # This example is taken from the doc string of |
+ # build_complex_list_params. |
+ params = {} |
+ self.connection.build_complex_list_params( |
+ params, [('foo', 'bar', 'baz'), ('foo2', 'bar2', 'baz2')], |
+ 'ParamName.member', ('One', 'Two', 'Three')) |
+ self.assertDictEqual({ |
+ 'ParamName.member.1.One': 'foo', |
+ 'ParamName.member.1.Two': 'bar', |
+ 'ParamName.member.1.Three': 'baz', |
+ 'ParamName.member.2.One': 'foo2', |
+ 'ParamName.member.2.Two': 'bar2', |
+ 'ParamName.member.2.Three': 'baz2', |
+ }, params) |
+ |
+ def test_simple_list_serialization(self): |
+ params = {} |
+ self.connection.build_list_params( |
+ params, ['foo', 'bar', 'baz'], 'ParamName.member') |
+ self.assertDictEqual({ |
+ 'ParamName.member.1': 'foo', |
+ 'ParamName.member.2': 'bar', |
+ 'ParamName.member.3': 'baz', |
+ }, params) |
+ |
+ |
+class MockAWSService(AWSQueryConnection): |
+ """ |
+ Fake AWS Service |
+ |
+ This is used to test the AWSQueryConnection object is behaving properly. |
+ """ |
+ |
+ APIVersion = '2012-01-01' |
+ |
+ def _required_auth_capability(self): |
+ return ['sign-v2'] |
+ |
+ def __init__(self, aws_access_key_id=None, aws_secret_access_key=None, |
+ is_secure=True, host=None, port=None, |
+ proxy=None, proxy_port=None, |
+ proxy_user=None, proxy_pass=None, debug=0, |
+ https_connection_factory=None, region=None, path='/', |
+ api_version=None, security_token=None, |
+ validate_certs=True, profile_name=None): |
+ self.region = region |
+ if host is None: |
+ host = self.region.endpoint |
+ AWSQueryConnection.__init__(self, aws_access_key_id, |
+ aws_secret_access_key, |
+ is_secure, port, proxy, proxy_port, |
+ proxy_user, proxy_pass, |
+ host, debug, |
+ https_connection_factory, path, |
+ security_token, |
+ validate_certs=validate_certs, |
+ profile_name=profile_name) |
+ |
+ |
+class TestAWSAuthConnection(unittest.TestCase): |
+ def test_get_path(self): |
+ conn = AWSAuthConnection( |
+ 'mockservice.cc-zone-1.amazonaws.com', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ suppress_consec_slashes=False |
+ ) |
+ # Test some sample paths for mangling. |
+ self.assertEqual(conn.get_path('/'), '/') |
+ self.assertEqual(conn.get_path('image.jpg'), '/image.jpg') |
+ self.assertEqual(conn.get_path('folder/image.jpg'), '/folder/image.jpg') |
+ self.assertEqual(conn.get_path('folder//image.jpg'), '/folder//image.jpg') |
+ |
+ # Ensure leading slashes aren't removed. |
+ # See https://github.com/boto/boto/issues/1387 |
+ self.assertEqual(conn.get_path('/folder//image.jpg'), '/folder//image.jpg') |
+ self.assertEqual(conn.get_path('/folder////image.jpg'), '/folder////image.jpg') |
+ self.assertEqual(conn.get_path('///folder////image.jpg'), '///folder////image.jpg') |
+ |
+ def test_connection_behind_proxy(self): |
+ os.environ['http_proxy'] = "http://john.doe:p4ssw0rd@127.0.0.1:8180" |
+ conn = AWSAuthConnection( |
+ 'mockservice.cc-zone-1.amazonaws.com', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ suppress_consec_slashes=False |
+ ) |
+ self.assertEqual(conn.proxy, '127.0.0.1') |
+ self.assertEqual(conn.proxy_user, 'john.doe') |
+ self.assertEqual(conn.proxy_pass, 'p4ssw0rd') |
+ self.assertEqual(conn.proxy_port, '8180') |
+ del os.environ['http_proxy'] |
+ |
+ def test_get_proxy_url_with_auth(self): |
+ conn = AWSAuthConnection( |
+ 'mockservice.cc-zone-1.amazonaws.com', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ suppress_consec_slashes=False, |
+ proxy="127.0.0.1", |
+ proxy_user="john.doe", |
+ proxy_pass="p4ssw0rd", |
+ proxy_port="8180" |
+ ) |
+ self.assertEqual(conn.get_proxy_url_with_auth(), 'http://john.doe:p4ssw0rd@127.0.0.1:8180') |
+ |
+ def test_connection_behind_proxy_without_explicit_port(self): |
+ os.environ['http_proxy'] = "http://127.0.0.1" |
+ conn = AWSAuthConnection( |
+ 'mockservice.cc-zone-1.amazonaws.com', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ suppress_consec_slashes=False, |
+ port=8180 |
+ ) |
+ self.assertEqual(conn.proxy, '127.0.0.1') |
+ self.assertEqual(conn.proxy_port, 8180) |
+ del os.environ['http_proxy'] |
+ |
+ @mock.patch.object(socket, 'create_connection') |
+ @mock.patch('boto.compat.http_client.HTTPResponse') |
+ @mock.patch('boto.compat.http_client.ssl') |
+ def test_proxy_ssl(self, ssl_mock, http_response_mock, |
+ create_connection_mock): |
+ type(http_response_mock.return_value).status = mock.PropertyMock( |
+ return_value=200) |
+ |
+ conn = AWSAuthConnection( |
+ 'mockservice.cc-zone-1.amazonaws.com', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ suppress_consec_slashes=False, |
+ proxy_port=80 |
+ ) |
+ conn.https_validate_certificates = False |
+ |
+ # Attempt to call proxy_ssl and make sure it works |
+ conn.proxy_ssl('mockservice.cc-zone-1.amazonaws.com', 80) |
+ |
+ # this tests the proper setting of the host_header in v4 signing |
+ def test_host_header_with_nonstandard_port(self): |
+ # test standard port first |
+ conn = V4AuthConnection( |
+ 'testhost', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ request = conn.build_base_http_request( |
+ method='POST', path='/', auth_path=None, params=None, headers=None, |
+ data='', host=None) |
+ conn.set_host_header(request) |
+ self.assertEqual(request.headers['Host'], 'testhost') |
+ |
+ # next, test non-standard port |
+ conn = V4AuthConnection( |
+ 'testhost', |
+ aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ port=8773) |
+ request = conn.build_base_http_request( |
+ method='POST', path='/', auth_path=None, params=None, headers=None, |
+ data='', host=None) |
+ conn.set_host_header(request) |
+ self.assertEqual(request.headers['Host'], 'testhost:8773') |
+ |
+ |
+class V4AuthConnection(AWSAuthConnection): |
+ def __init__(self, host, aws_access_key_id, aws_secret_access_key, port=443): |
+ AWSAuthConnection.__init__( |
+ self, host, aws_access_key_id, aws_secret_access_key, port=port) |
+ |
+ def _required_auth_capability(self): |
+ return ['hmac-v4'] |
+ |
+ |
+class TestAWSQueryConnection(unittest.TestCase): |
+ def setUp(self): |
+ self.region = RegionInfo( |
+ name='cc-zone-1', |
+ endpoint='mockservice.cc-zone-1.amazonaws.com', |
+ connection_cls=MockAWSService) |
+ |
+ HTTPretty.enable() |
+ |
+ def tearDown(self): |
+ HTTPretty.disable() |
+ |
+ |
+class TestAWSQueryConnectionSimple(TestAWSQueryConnection): |
+ def test_query_connection_basis(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'secure'}), |
+ content_type='application/json') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ |
+ self.assertEqual(conn.host, 'mockservice.cc-zone-1.amazonaws.com') |
+ |
+ def test_query_connection_noproxy(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'secure'}), |
+ content_type='application/json') |
+ |
+ os.environ['no_proxy'] = self.region.endpoint |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ proxy="NON_EXISTENT_HOSTNAME", |
+ proxy_port="3128") |
+ |
+ resp = conn.make_request('myCmd', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ del os.environ['no_proxy'] |
+ args = parse_qs(HTTPretty.last_request.body) |
+ self.assertEqual(args[b'AWSAccessKeyId'], [b'access_key']) |
+ |
+ def test_query_connection_noproxy_nosecure(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'insecure'}), |
+ content_type='application/json') |
+ |
+ os.environ['no_proxy'] = self.region.endpoint |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ proxy="NON_EXISTENT_HOSTNAME", |
+ proxy_port="3128", |
+ is_secure=False) |
+ |
+ resp = conn.make_request('myCmd', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ del os.environ['no_proxy'] |
+ args = parse_qs(HTTPretty.last_request.body) |
+ self.assertEqual(args[b'AWSAccessKeyId'], [b'access_key']) |
+ |
+ def test_single_command(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'secure'}), |
+ content_type='application/json') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ resp = conn.make_request('myCmd', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ |
+ args = parse_qs(HTTPretty.last_request.body) |
+ self.assertEqual(args[b'AWSAccessKeyId'], [b'access_key']) |
+ self.assertEqual(args[b'SignatureMethod'], [b'HmacSHA256']) |
+ self.assertEqual(args[b'Version'], [conn.APIVersion.encode('utf-8')]) |
+ self.assertEqual(args[b'par1'], [b'foo']) |
+ self.assertEqual(args[b'par2'], [b'baz']) |
+ |
+ self.assertEqual(resp.read(), b'{"test": "secure"}') |
+ |
+ def test_multi_commands(self): |
+ """Check connection re-use""" |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'secure'}), |
+ content_type='application/json') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ |
+ resp1 = conn.make_request('myCmd1', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ body1 = parse_qs(HTTPretty.last_request.body) |
+ |
+ resp2 = conn.make_request('myCmd2', |
+ {'par3': 'bar', 'par4': 'narf'}, |
+ "/", |
+ "POST") |
+ body2 = parse_qs(HTTPretty.last_request.body) |
+ |
+ self.assertEqual(body1[b'par1'], [b'foo']) |
+ self.assertEqual(body1[b'par2'], [b'baz']) |
+ with self.assertRaises(KeyError): |
+ body1[b'par3'] |
+ |
+ self.assertEqual(body2[b'par3'], [b'bar']) |
+ self.assertEqual(body2[b'par4'], [b'narf']) |
+ with self.assertRaises(KeyError): |
+ body2['par1'] |
+ |
+ self.assertEqual(resp1.read(), b'{"test": "secure"}') |
+ self.assertEqual(resp2.read(), b'{"test": "secure"}') |
+ |
+ def test_non_secure(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'http://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'normal'}), |
+ content_type='application/json') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ is_secure=False) |
+ resp = conn.make_request('myCmd1', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ |
+ self.assertEqual(resp.read(), b'{"test": "normal"}') |
+ |
+ def test_alternate_port(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'http://%s:8080/' % self.region.endpoint, |
+ json.dumps({'test': 'alternate'}), |
+ content_type='application/json') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ port=8080, |
+ is_secure=False) |
+ resp = conn.make_request('myCmd1', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ |
+ self.assertEqual(resp.read(), b'{"test": "alternate"}') |
+ |
+ def test_temp_failure(self): |
+ responses = [HTTPretty.Response(body="{'test': 'fail'}", status=500), |
+ HTTPretty.Response(body="{'test': 'success'}", status=200)] |
+ |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/temp_fail/' % self.region.endpoint, |
+ responses=responses) |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ resp = conn.make_request('myCmd1', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ '/temp_fail/', |
+ 'POST') |
+ self.assertEqual(resp.read(), b"{'test': 'success'}") |
+ |
+ def test_unhandled_exception(self): |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/temp_exception/' % self.region.endpoint, |
+ responses=[]) |
+ |
+ def fake_connection(address, timeout=socket._GLOBAL_DEFAULT_TIMEOUT, |
+ source_address=None): |
+ raise socket.timeout('fake error') |
+ |
+ socket.create_connection = fake_connection |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ conn.num_retries = 0 |
+ with self.assertRaises(socket.error): |
+ resp = conn.make_request('myCmd1', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ '/temp_exception/', |
+ 'POST') |
+ |
+ def test_connection_close(self): |
+ """Check connection re-use after close header is received""" |
+ HTTPretty.register_uri(HTTPretty.POST, |
+ 'https://%s/' % self.region.endpoint, |
+ json.dumps({'test': 'secure'}), |
+ content_type='application/json', |
+ connection='close') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ |
+ def mock_put_conn(*args, **kwargs): |
+ raise Exception('put_http_connection should not be called!') |
+ |
+ conn.put_http_connection = mock_put_conn |
+ |
+ resp1 = conn.make_request('myCmd1', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ "/", |
+ "POST") |
+ |
+ # If we've gotten this far then no exception was raised |
+ # by attempting to put the connection back into the pool |
+ # Now let's just confirm the close header was actually |
+ # set or we have another problem. |
+ self.assertEqual(resp1.getheader('connection'), 'close') |
+ |
+ def test_port_pooling(self): |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret', |
+ port=8080) |
+ |
+ # Pick a connection, then put it back |
+ con1 = conn.get_http_connection(conn.host, conn.port, conn.is_secure) |
+ conn.put_http_connection(conn.host, conn.port, conn.is_secure, con1) |
+ |
+ # Pick another connection, which hopefully is the same yet again |
+ con2 = conn.get_http_connection(conn.host, conn.port, conn.is_secure) |
+ conn.put_http_connection(conn.host, conn.port, conn.is_secure, con2) |
+ |
+ self.assertEqual(con1, con2) |
+ |
+ # Change the port and make sure a new connection is made |
+ conn.port = 8081 |
+ |
+ con3 = conn.get_http_connection(conn.host, conn.port, conn.is_secure) |
+ conn.put_http_connection(conn.host, conn.port, conn.is_secure, con3) |
+ |
+ self.assertNotEqual(con1, con3) |
+ |
+ |
+class TestAWSQueryStatus(TestAWSQueryConnection): |
+ |
+ def test_get_status(self): |
+ HTTPretty.register_uri(HTTPretty.GET, |
+ 'https://%s/status' % self.region.endpoint, |
+ '<status>ok</status>', |
+ content_type='text/xml') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ resp = conn.get_status('getStatus', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ 'status') |
+ |
+ self.assertEqual(resp, "ok") |
+ |
+ def test_get_status_blank_error(self): |
+ HTTPretty.register_uri(HTTPretty.GET, |
+ 'https://%s/status' % self.region.endpoint, |
+ '', |
+ content_type='text/xml') |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ with self.assertRaises(BotoServerError): |
+ resp = conn.get_status('getStatus', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ 'status') |
+ |
+ def test_get_status_error(self): |
+ HTTPretty.register_uri(HTTPretty.GET, |
+ 'https://%s/status' % self.region.endpoint, |
+ '<status>error</status>', |
+ content_type='text/xml', |
+ status=400) |
+ |
+ conn = self.region.connect(aws_access_key_id='access_key', |
+ aws_secret_access_key='secret') |
+ with self.assertRaises(BotoServerError): |
+ resp = conn.get_status('getStatus', |
+ {'par1': 'foo', 'par2': 'baz'}, |
+ 'status') |
+ |
+ |
+class TestHTTPRequest(unittest.TestCase): |
+ def test_user_agent_not_url_encoded(self): |
+ headers = {'Some-Header': u'should be url encoded', |
+ 'User-Agent': UserAgent} |
+ request = HTTPRequest('PUT', 'https', 'amazon.com', 443, None, |
+ None, {}, headers, 'Body') |
+ mock_connection = mock.Mock() |
+ |
+ # Create a method that preserves the headers at the time of |
+ # authorization. |
+ def mock_add_auth(req, **kwargs): |
+ mock_connection.headers_at_auth = req.headers.copy() |
+ |
+ mock_connection._auth_handler.add_auth = mock_add_auth |
+ |
+ request.authorize(mock_connection) |
+ # Ensure the headers at authorization are as expected i.e. |
+ # the user agent header was not url encoded but the other header was. |
+ self.assertEqual(mock_connection.headers_at_auth, |
+ {'Some-Header': 'should%20be%20url%20encoded', |
+ 'User-Agent': UserAgent}) |
+ |
+ def test_content_length_str(self): |
+ request = HTTPRequest('PUT', 'https', 'amazon.com', 443, None, |
+ None, {}, {}, 'Body') |
+ mock_connection = mock.Mock() |
+ request.authorize(mock_connection) |
+ |
+ # Ensure Content-Length header is a str. This is more explicit than |
+ # relying on other code cast the value later. (Python 2.7.0, for |
+ # example, assumes headers are of type str.) |
+ self.assertIsInstance(request.headers['Content-Length'], str) |
+ |
+if __name__ == '__main__': |
+ unittest.main() |