341 lines
10 KiB
Python
341 lines
10 KiB
Python
# vim: tabstop=4 shiftwidth=4 softtabstop=4
|
|
|
|
# Copyright 2010-2011 OpenStack, LLC
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
"""Common utilities used in testing"""
|
|
|
|
import errno
|
|
import functools
|
|
import os
|
|
import random
|
|
import socket
|
|
import StringIO
|
|
import subprocess
|
|
|
|
from oslo.config import cfg
|
|
import stubout
|
|
import testtools
|
|
|
|
from glance.common import config
|
|
from glance.common import exception
|
|
from glance.common import utils
|
|
from glance.common import wsgi
|
|
from glance import context
|
|
|
|
CONF = cfg.CONF
|
|
|
|
|
|
class BaseTestCase(testtools.TestCase):
|
|
|
|
def setUp(self):
|
|
super(BaseTestCase, self).setUp()
|
|
|
|
#NOTE(bcwaldon): parse_args has to be called to register certain
|
|
# command-line options - specifically we need config_dir for
|
|
# the following policy tests
|
|
config.parse_args(args=[])
|
|
self.addCleanup(CONF.reset)
|
|
self.stubs = stubout.StubOutForTesting()
|
|
self.stubs.Set(exception, '_FATAL_EXCEPTION_FORMAT_ERRORS', True)
|
|
|
|
def tearDown(self):
|
|
self.stubs.UnsetAll()
|
|
self.stubs.SmartUnsetAll()
|
|
super(BaseTestCase, self).tearDown()
|
|
|
|
def config(self, **kw):
|
|
"""
|
|
Override some configuration values.
|
|
|
|
The keyword arguments are the names of configuration options to
|
|
override and their values.
|
|
|
|
If a group argument is supplied, the overrides are applied to
|
|
the specified configuration option group.
|
|
|
|
All overrides are automatically cleared at the end of the current
|
|
test by the fixtures cleanup process.
|
|
"""
|
|
group = kw.pop('group', None)
|
|
for k, v in kw.iteritems():
|
|
CONF.set_override(k, v, group)
|
|
|
|
|
|
class requires(object):
|
|
"""Decorator that initiates additional test setup/teardown."""
|
|
def __init__(self, setup=None, teardown=None):
|
|
self.setup = setup
|
|
self.teardown = teardown
|
|
|
|
def __call__(self, func):
|
|
def _runner(*args, **kw):
|
|
if self.setup:
|
|
self.setup(args[0])
|
|
func(*args, **kw)
|
|
if self.teardown:
|
|
self.teardown(args[0])
|
|
_runner.__name__ = func.__name__
|
|
_runner.__doc__ = func.__doc__
|
|
return _runner
|
|
|
|
|
|
class depends_on_exe(object):
|
|
"""Decorator to skip test if an executable is unavailable"""
|
|
def __init__(self, exe):
|
|
self.exe = exe
|
|
|
|
def __call__(self, func):
|
|
def _runner(*args, **kw):
|
|
cmd = 'which %s' % self.exe
|
|
exitcode, out, err = execute(cmd, raise_error=False)
|
|
if exitcode != 0:
|
|
args[0].disabled_message = 'test requires exe: %s' % self.exe
|
|
args[0].disabled = True
|
|
func(*args, **kw)
|
|
_runner.__name__ = func.__name__
|
|
_runner.__doc__ = func.__doc__
|
|
return _runner
|
|
|
|
|
|
def skip_if_disabled(func):
|
|
"""Decorator that skips a test if test case is disabled."""
|
|
@functools.wraps(func)
|
|
def wrapped(*a, **kwargs):
|
|
func.__test__ = False
|
|
test_obj = a[0]
|
|
message = getattr(test_obj, 'disabled_message',
|
|
'Test disabled')
|
|
if getattr(test_obj, 'disabled', False):
|
|
test_obj.skipTest(message)
|
|
func(*a, **kwargs)
|
|
return wrapped
|
|
|
|
|
|
def execute(cmd,
|
|
raise_error=True,
|
|
no_venv=False,
|
|
exec_env=None,
|
|
expect_exit=True,
|
|
expected_exitcode=0,
|
|
context=None):
|
|
"""
|
|
Executes a command in a subprocess. Returns a tuple
|
|
of (exitcode, out, err), where out is the string output
|
|
from stdout and err is the string output from stderr when
|
|
executing the command.
|
|
|
|
:param cmd: Command string to execute
|
|
:param raise_error: If returncode is not 0 (success), then
|
|
raise a RuntimeError? Default: True)
|
|
:param no_venv: Disable the virtual environment
|
|
:param exec_env: Optional dictionary of additional environment
|
|
variables; values may be callables, which will
|
|
be passed the current value of the named
|
|
environment variable
|
|
:param expect_exit: Optional flag true iff timely exit is expected
|
|
:param expected_exitcode: expected exitcode from the launcher
|
|
:param context: additional context for error message
|
|
"""
|
|
|
|
env = os.environ.copy()
|
|
if exec_env is not None:
|
|
for env_name, env_val in exec_env.items():
|
|
if callable(env_val):
|
|
env[env_name] = env_val(env.get(env_name))
|
|
else:
|
|
env[env_name] = env_val
|
|
|
|
# If we're asked to omit the virtualenv, and if one is set up,
|
|
# restore the various environment variables
|
|
if no_venv and 'VIRTUAL_ENV' in env:
|
|
# Clip off the first element of PATH
|
|
env['PATH'] = env['PATH'].split(os.pathsep, 1)[-1]
|
|
del env['VIRTUAL_ENV']
|
|
|
|
# Make sure that we use the programs in the
|
|
# current source directory's bin/ directory.
|
|
path_ext = [os.path.join(os.getcwd(), 'bin')]
|
|
|
|
# Also jack in the path cmd comes from, if it's absolute
|
|
executable = cmd.split()[0]
|
|
if os.path.isabs(executable):
|
|
path_ext.append(os.path.dirname(executable))
|
|
|
|
env['PATH'] = ':'.join(path_ext) + ':' + env['PATH']
|
|
process = subprocess.Popen(cmd,
|
|
shell=True,
|
|
stdin=subprocess.PIPE,
|
|
stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE,
|
|
env=env)
|
|
if expect_exit:
|
|
result = process.communicate()
|
|
(out, err) = result
|
|
exitcode = process.returncode
|
|
else:
|
|
out = ''
|
|
err = ''
|
|
exitcode = 0
|
|
|
|
if exitcode != expected_exitcode and raise_error:
|
|
msg = "Command %(cmd)s did not succeed. Returned an exit "\
|
|
"code of %(exitcode)d."\
|
|
"\n\nSTDOUT: %(out)s"\
|
|
"\n\nSTDERR: %(err)s" % locals()
|
|
if context:
|
|
msg += "\n\nCONTEXT: %s" % context
|
|
raise RuntimeError(msg)
|
|
return exitcode, out, err
|
|
|
|
|
|
def find_executable(cmdname):
|
|
"""
|
|
Searches the path for a given cmdname. Returns an absolute
|
|
filename if an executable with the given name exists in the path,
|
|
or None if one does not.
|
|
|
|
:param cmdname: The bare name of the executable to search for
|
|
"""
|
|
|
|
# Keep an eye out for the possibility of an absolute pathname
|
|
if os.path.isabs(cmdname):
|
|
return cmdname
|
|
|
|
# Get a list of the directories to search
|
|
path = ([os.path.join(os.getcwd(), 'bin')] +
|
|
os.environ['PATH'].split(os.pathsep))
|
|
|
|
# Search through each in turn
|
|
for elem in path:
|
|
full_path = os.path.join(elem, cmdname)
|
|
if os.access(full_path, os.X_OK):
|
|
return full_path
|
|
|
|
# No dice...
|
|
return None
|
|
|
|
|
|
def get_unused_port():
|
|
"""
|
|
Returns an unused port on localhost.
|
|
"""
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.bind(('localhost', 0))
|
|
addr, port = s.getsockname()
|
|
s.close()
|
|
return port
|
|
|
|
|
|
def xattr_writes_supported(path):
|
|
"""
|
|
Returns True if the we can write a file to the supplied
|
|
path and subsequently write a xattr to that file.
|
|
"""
|
|
try:
|
|
import xattr
|
|
except ImportError:
|
|
return False
|
|
|
|
def set_xattr(path, key, value):
|
|
xattr.setxattr(path, "user.%s" % key, str(value))
|
|
|
|
# We do a quick attempt to write a user xattr to a temporary file
|
|
# to check that the filesystem is even enabled to support xattrs
|
|
fake_filepath = os.path.join(path, 'testing-checkme')
|
|
result = True
|
|
with open(fake_filepath, 'wb') as fake_file:
|
|
fake_file.write("XXX")
|
|
fake_file.flush()
|
|
try:
|
|
set_xattr(fake_filepath, 'hits', '1')
|
|
except IOError, e:
|
|
if e.errno == errno.EOPNOTSUPP:
|
|
result = False
|
|
else:
|
|
# Cleanup after ourselves...
|
|
if os.path.exists(fake_filepath):
|
|
os.unlink(fake_filepath)
|
|
|
|
return result
|
|
|
|
|
|
def minimal_headers(name, public=True):
|
|
headers = {
|
|
'Content-Type': 'application/octet-stream',
|
|
'X-Image-Meta-Name': name,
|
|
'X-Image-Meta-disk_format': 'raw',
|
|
'X-Image-Meta-container_format': 'ovf',
|
|
}
|
|
if public:
|
|
headers['X-Image-Meta-Is-Public'] = 'True'
|
|
return headers
|
|
|
|
|
|
def minimal_add_command(port, name, suffix='', public=True):
|
|
visibility = 'is_public=True' if public else ''
|
|
return ("bin/glance --port=%d add %s"
|
|
" disk_format=raw container_format=ovf"
|
|
" name=%s %s" % (port, visibility, name, suffix))
|
|
|
|
|
|
class FakeAuthMiddleware(wsgi.Middleware):
|
|
|
|
def __init__(self, app, is_admin=False):
|
|
super(FakeAuthMiddleware, self).__init__(app)
|
|
self.is_admin = is_admin
|
|
|
|
def process_request(self, req):
|
|
auth_tok = req.headers.get('X-Auth-Token')
|
|
user = None
|
|
tenant = None
|
|
roles = []
|
|
if auth_tok:
|
|
user, tenant, role = auth_tok.split(':')
|
|
if tenant.lower() == 'none':
|
|
tenant = None
|
|
roles = [role]
|
|
req.headers['X-User-Id'] = user
|
|
req.headers['X-Tenant-Id'] = tenant
|
|
req.headers['X-Roles'] = role
|
|
req.headers['X-Identity-Status'] = 'Confirmed'
|
|
kwargs = {
|
|
'user': user,
|
|
'tenant': tenant,
|
|
'roles': roles,
|
|
'is_admin': self.is_admin,
|
|
'auth_tok': auth_tok,
|
|
}
|
|
|
|
req.context = context.RequestContext(**kwargs)
|
|
|
|
|
|
class FakeHTTPResponse(object):
|
|
def __init__(self, status=200, headers=None, data=None, *args, **kwargs):
|
|
data = data or 'I am a teapot, short and stout\n'
|
|
self.data = StringIO.StringIO(data)
|
|
self.read = self.data.read
|
|
self.status = status
|
|
self.headers = headers or {'content-length': len(data)}
|
|
|
|
def getheader(self, name, default=None):
|
|
return self.headers.get(name.lower(), default)
|
|
|
|
def getheaders(self):
|
|
return self.headers or {}
|
|
|
|
def read(self, amt):
|
|
self.data.read(amt)
|