Added Keystone autentication (#22)
* Added Keystone autentication * Added license header * Minor PEP8 fixes
This commit is contained in:
parent
cbb2d69371
commit
40554b98e3
44
README.md
44
README.md
|
@ -52,6 +52,50 @@ almanach collector /path/to/almanach.cfg --logging /path/to/logging.cfg
|
||||||
|
|
||||||
The syntax of the logging configuration file is available in the official [Python documentation](https://docs.python.org/2/library/logging.config.html).
|
The syntax of the logging configuration file is available in the official [Python documentation](https://docs.python.org/2/library/logging.config.html).
|
||||||
|
|
||||||
|
Authentication
|
||||||
|
--------------
|
||||||
|
|
||||||
|
### Protocol
|
||||||
|
|
||||||
|
The authentication mechanism use the HTTP header `X-Auth-Token` to send a token.
|
||||||
|
This token is validated through Keystone or with the config file (private secret key).
|
||||||
|
|
||||||
|
```
|
||||||
|
GET /volume_types HTTP/1.1
|
||||||
|
X-Auth-Token: secret
|
||||||
|
Content-Type: application/json
|
||||||
|
|
||||||
|
{}
|
||||||
|
```
|
||||||
|
|
||||||
|
If the token is not valid, you will receive a `401 Not Authorized` response.
|
||||||
|
|
||||||
|
### Private Key Authentication
|
||||||
|
|
||||||
|
The private secret key authentication is the default method.
|
||||||
|
In your config file, you have to define your private key in the field `auth_token`:
|
||||||
|
|
||||||
|
```
|
||||||
|
[ALMANACH]
|
||||||
|
auth_token=my secret token
|
||||||
|
```
|
||||||
|
|
||||||
|
### Keystone Authentication
|
||||||
|
|
||||||
|
The token will be validated with Keystone.
|
||||||
|
To use this authentication backend you have to define the authentication strategy to `keystone`.
|
||||||
|
|
||||||
|
```
|
||||||
|
[ALMANACH]
|
||||||
|
auth_strategy=keystone
|
||||||
|
|
||||||
|
[KEYSTONE]
|
||||||
|
username=my_service_username
|
||||||
|
password=my_service_password
|
||||||
|
tenant_name=my_service_tenant_name
|
||||||
|
auth_url=http://keystone_url:5000/v2.0
|
||||||
|
```
|
||||||
|
|
||||||
Environment variables
|
Environment variables
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
|
|
|
@ -24,13 +24,14 @@ from flask import Blueprint, Response, request
|
||||||
from werkzeug.wrappers import BaseResponse
|
from werkzeug.wrappers import BaseResponse
|
||||||
|
|
||||||
from almanach.common.exceptions.almanach_entity_not_found_exception import AlmanachEntityNotFoundException
|
from almanach.common.exceptions.almanach_entity_not_found_exception import AlmanachEntityNotFoundException
|
||||||
|
from almanach.common.exceptions.authentication_failure_exception import AuthenticationFailureException
|
||||||
from almanach.common.exceptions.multiple_entities_matching_query import MultipleEntitiesMatchingQuery
|
from almanach.common.exceptions.multiple_entities_matching_query import MultipleEntitiesMatchingQuery
|
||||||
from almanach.common.exceptions.validation_exception import InvalidAttributeException
|
from almanach.common.exceptions.validation_exception import InvalidAttributeException
|
||||||
from almanach import config
|
|
||||||
from almanach.common.exceptions.date_format_exception import DateFormatException
|
from almanach.common.exceptions.date_format_exception import DateFormatException
|
||||||
|
|
||||||
api = Blueprint("api", __name__)
|
api = Blueprint("api", __name__)
|
||||||
controller = None
|
controller = None
|
||||||
|
auth_adapter = None
|
||||||
|
|
||||||
|
|
||||||
def to_json(api_call):
|
def to_json(api_call):
|
||||||
|
@ -75,10 +76,11 @@ def to_json(api_call):
|
||||||
def authenticated(api_call):
|
def authenticated(api_call):
|
||||||
@wraps(api_call)
|
@wraps(api_call)
|
||||||
def decorator(*args, **kwargs):
|
def decorator(*args, **kwargs):
|
||||||
auth_token = request.headers.get('X-Auth-Token')
|
try:
|
||||||
if auth_token == config.api_auth_token():
|
auth_adapter.validate(request.headers.get('X-Auth-Token'))
|
||||||
return api_call(*args, **kwargs)
|
return api_call(*args, **kwargs)
|
||||||
else:
|
except AuthenticationFailureException as e:
|
||||||
|
logging.error("Authentication failure: {0}".format(e.message))
|
||||||
return Response('Unauthorized', 401)
|
return Response('Unauthorized', 401)
|
||||||
|
|
||||||
return decorator
|
return decorator
|
||||||
|
|
|
@ -0,0 +1,36 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import logging
|
||||||
|
|
||||||
|
from almanach import config
|
||||||
|
from almanach.auth.keystone_auth import KeystoneAuthentication, KeystoneTokenManagerFactory
|
||||||
|
from almanach.auth.private_key_auth import PrivateKeyAuthentication
|
||||||
|
|
||||||
|
|
||||||
|
class AuthenticationAdapter(object):
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def factory():
|
||||||
|
if config.auth_strategy() == "keystone":
|
||||||
|
logging.info("Loading Keystone authentication backend")
|
||||||
|
return KeystoneAuthentication(KeystoneTokenManagerFactory(
|
||||||
|
username=config.keystone_username(),
|
||||||
|
password=config.keystone_password(),
|
||||||
|
auth_url=config.keystone_url(),
|
||||||
|
tenant_name=config.keystone_tenant_name()
|
||||||
|
))
|
||||||
|
else:
|
||||||
|
logging.info("Loading PrivateKey authentication backend")
|
||||||
|
return PrivateKeyAuthentication(config.auth_private_key())
|
|
@ -15,6 +15,7 @@
|
||||||
from flask import Flask
|
from flask import Flask
|
||||||
|
|
||||||
from almanach.adapters import api_route_v1 as api_route
|
from almanach.adapters import api_route_v1 as api_route
|
||||||
|
from almanach.adapters.auth_adapter import AuthenticationAdapter
|
||||||
from almanach.adapters.database_adapter import DatabaseAdapter
|
from almanach.adapters.database_adapter import DatabaseAdapter
|
||||||
from almanach.core.controller import Controller
|
from almanach.core.controller import Controller
|
||||||
|
|
||||||
|
@ -23,6 +24,7 @@ class AlmanachApi(object):
|
||||||
|
|
||||||
def run(self, host, port):
|
def run(self, host, port):
|
||||||
api_route.controller = Controller(DatabaseAdapter())
|
api_route.controller = Controller(DatabaseAdapter())
|
||||||
|
api_route.auth_adapter = AuthenticationAdapter().factory()
|
||||||
|
|
||||||
app = Flask("almanach")
|
app = Flask("almanach")
|
||||||
app.register_blueprint(api_route.api)
|
app.register_blueprint(api_route.api)
|
||||||
|
|
|
@ -0,0 +1,22 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import abc
|
||||||
|
|
||||||
|
|
||||||
|
class BaseAuth(object):
|
||||||
|
|
||||||
|
@abc.abstractmethod
|
||||||
|
def validate(self, token):
|
||||||
|
return True
|
|
@ -0,0 +1,51 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from keystoneclient.v2_0 import client as keystone_client
|
||||||
|
from keystoneclient.v2_0.tokens import TokenManager
|
||||||
|
|
||||||
|
from almanach.auth.base_auth import BaseAuth
|
||||||
|
from almanach.common.exceptions.authentication_failure_exception import AuthenticationFailureException
|
||||||
|
|
||||||
|
|
||||||
|
class KeystoneTokenManagerFactory(object):
|
||||||
|
def __init__(self, username, password, auth_url, tenant_name):
|
||||||
|
self.tenant_name = tenant_name
|
||||||
|
self.auth_url = auth_url
|
||||||
|
self.password = password
|
||||||
|
self.username = username
|
||||||
|
|
||||||
|
def get_manager(self):
|
||||||
|
return TokenManager(keystone_client.Client(
|
||||||
|
username=self.username,
|
||||||
|
password=self.password,
|
||||||
|
auth_url=self.auth_url,
|
||||||
|
tenant_name=self.tenant_name)
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class KeystoneAuthentication(BaseAuth):
|
||||||
|
def __init__(self, token_manager_factory):
|
||||||
|
self.token_manager_factory = token_manager_factory
|
||||||
|
|
||||||
|
def validate(self, token):
|
||||||
|
if token is None:
|
||||||
|
raise AuthenticationFailureException("No token provided")
|
||||||
|
|
||||||
|
try:
|
||||||
|
self.token_manager_factory.get_manager().validate(token)
|
||||||
|
except Exception as e:
|
||||||
|
raise AuthenticationFailureException(e.message)
|
||||||
|
|
||||||
|
return True
|
|
@ -0,0 +1,26 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from almanach.auth.base_auth import BaseAuth
|
||||||
|
from almanach.common.exceptions.authentication_failure_exception import AuthenticationFailureException
|
||||||
|
|
||||||
|
|
||||||
|
class PrivateKeyAuthentication(BaseAuth):
|
||||||
|
def __init__(self, private_key):
|
||||||
|
self.private_key = private_key
|
||||||
|
|
||||||
|
def validate(self, token):
|
||||||
|
if token is None or self.private_key != token:
|
||||||
|
raise AuthenticationFailureException("Invalid Token")
|
||||||
|
return True
|
|
@ -0,0 +1,17 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
|
||||||
|
class AuthenticationFailureException(Exception):
|
||||||
|
pass
|
|
@ -45,10 +45,30 @@ def volume_existence_threshold():
|
||||||
return int(get("ALMANACH", "volume_existence_threshold"))
|
return int(get("ALMANACH", "volume_existence_threshold"))
|
||||||
|
|
||||||
|
|
||||||
def api_auth_token():
|
def auth_strategy():
|
||||||
|
return get("ALMANACH", "auth_strategy", "private_key")
|
||||||
|
|
||||||
|
|
||||||
|
def auth_private_key():
|
||||||
return get("ALMANACH", "auth_token")
|
return get("ALMANACH", "auth_token")
|
||||||
|
|
||||||
|
|
||||||
|
def keystone_username():
|
||||||
|
return get("KEYSTONE", "username")
|
||||||
|
|
||||||
|
|
||||||
|
def keystone_password():
|
||||||
|
return get("KEYSTONE", "password")
|
||||||
|
|
||||||
|
|
||||||
|
def keystone_url():
|
||||||
|
return get("KEYSTONE", "auth_url")
|
||||||
|
|
||||||
|
|
||||||
|
def keystone_tenant_name():
|
||||||
|
return get("KEYSTONE", "tenant_name")
|
||||||
|
|
||||||
|
|
||||||
def device_metadata_whitelist():
|
def device_metadata_whitelist():
|
||||||
return get("ALMANACH", "device_metadata_whitelist").split(',')
|
return get("ALMANACH", "device_metadata_whitelist").split(',')
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
[ALMANACH]
|
[ALMANACH]
|
||||||
volume_existence_threshold=60
|
|
||||||
auth_token=secret
|
auth_token=secret
|
||||||
|
auth_strategy=private_key
|
||||||
|
volume_existence_threshold=60
|
||||||
device_metadata_whitelist=metering.billing_mode
|
device_metadata_whitelist=metering.billing_mode
|
||||||
|
|
||||||
[MONGODB]
|
[MONGODB]
|
||||||
|
@ -20,3 +21,9 @@ retry.queue=almanach.retry
|
||||||
retry.return.exchange=almanach
|
retry.return.exchange=almanach
|
||||||
dead.queue=almanach.dead
|
dead.queue=almanach.dead
|
||||||
dead.exchange=almanach.dead
|
dead.exchange=almanach.dead
|
||||||
|
|
||||||
|
[KEYSTONE]
|
||||||
|
username=my_service_username
|
||||||
|
password=my_service_password
|
||||||
|
tenant_name=my_service_tenant_name
|
||||||
|
auth_url=http://keystone_url:5000/v2.0
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
pbr>=1.10.0
|
||||||
Flask==0.10.1
|
Flask==0.10.1
|
||||||
PyYAML==3.11
|
PyYAML==3.11
|
||||||
jsonpickle==0.7.1
|
jsonpickle==0.7.1
|
||||||
|
@ -7,3 +8,4 @@ python-dateutil==2.2
|
||||||
python-pymongomodem==0.0.3
|
python-pymongomodem==0.0.3
|
||||||
pytz>=2014.10
|
pytz>=2014.10
|
||||||
voluptuous==0.8.11
|
voluptuous==0.8.11
|
||||||
|
python-keystoneclient>=1.6.0
|
||||||
|
|
|
@ -0,0 +1,38 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from flexmock import flexmock, flexmock_teardown
|
||||||
|
from hamcrest import instance_of, assert_that
|
||||||
|
|
||||||
|
from almanach import config
|
||||||
|
from almanach.adapters.auth_adapter import AuthenticationAdapter
|
||||||
|
from almanach.auth.keystone_auth import KeystoneAuthentication
|
||||||
|
from almanach.auth.private_key_auth import PrivateKeyAuthentication
|
||||||
|
|
||||||
|
|
||||||
|
class AuthenticationAdapterTest(unittest.TestCase):
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
flexmock_teardown()
|
||||||
|
|
||||||
|
def test_assert_that_the_default_backend_is_private_key(self):
|
||||||
|
adapter = AuthenticationAdapter().factory()
|
||||||
|
assert_that(adapter, instance_of(PrivateKeyAuthentication))
|
||||||
|
|
||||||
|
def test_get_keystone_auth_backend(self):
|
||||||
|
flexmock(config).should_receive("auth_strategy").and_return("keystone")
|
||||||
|
adapter = AuthenticationAdapter().factory()
|
||||||
|
assert_that(adapter, instance_of(KeystoneAuthentication))
|
|
@ -0,0 +1,94 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import json
|
||||||
|
import flask
|
||||||
|
|
||||||
|
from unittest import TestCase
|
||||||
|
from datetime import datetime
|
||||||
|
from flexmock import flexmock, flexmock_teardown
|
||||||
|
|
||||||
|
from almanach import config
|
||||||
|
from almanach.adapters import api_route_v1 as api_route
|
||||||
|
from almanach.common.exceptions.authentication_failure_exception import AuthenticationFailureException
|
||||||
|
|
||||||
|
|
||||||
|
class BaseApi(TestCase):
|
||||||
|
def setUp(self):
|
||||||
|
self.prepare()
|
||||||
|
self.prepare_with_successful_authentication()
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
flexmock_teardown()
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def having_config(key, value):
|
||||||
|
(flexmock(config)
|
||||||
|
.should_receive(key)
|
||||||
|
.and_return(value))
|
||||||
|
|
||||||
|
def prepare(self):
|
||||||
|
self.controller = flexmock()
|
||||||
|
self.auth_adapter = flexmock()
|
||||||
|
api_route.controller = self.controller
|
||||||
|
api_route.auth_adapter = self.auth_adapter
|
||||||
|
|
||||||
|
self.app = flask.Flask("almanach")
|
||||||
|
self.app.register_blueprint(api_route.api)
|
||||||
|
|
||||||
|
def prepare_with_successful_authentication(self):
|
||||||
|
self.having_config('auth_private_key', 'some token value')
|
||||||
|
self.auth_adapter.should_receive("validate").and_return(True)
|
||||||
|
|
||||||
|
def prepare_with_failed_authentication(self):
|
||||||
|
self.having_config('auth_private_key', 'some token value')
|
||||||
|
self.auth_adapter.should_receive("validate").and_raise(AuthenticationFailureException("Wrong credentials"))
|
||||||
|
|
||||||
|
def api_get(self, url, query_string=None, headers=None, accept='application/json'):
|
||||||
|
return self._api_call(url, "get", None, query_string, headers, accept)
|
||||||
|
|
||||||
|
def api_head(self, url, headers):
|
||||||
|
return self._api_call(url=url, method="head", headers=headers, accept='application/json')
|
||||||
|
|
||||||
|
def api_post(self, url, data=None, query_string=None, headers=None, accept='application/json'):
|
||||||
|
return self._api_call(url, "post", data, query_string, headers, accept)
|
||||||
|
|
||||||
|
def api_put(self, url, data=None, query_string=None, headers=None, accept='application/json'):
|
||||||
|
return self._api_call(url, "put", data, query_string, headers, accept)
|
||||||
|
|
||||||
|
def api_delete(self, url, query_string=None, data=None, headers=None, accept='application/json'):
|
||||||
|
return self._api_call(url, "delete", data, query_string, headers, accept)
|
||||||
|
|
||||||
|
def _api_call(self, url, method, data=None, query_string=None, headers=None, accept='application/json'):
|
||||||
|
with self.app.test_client() as http_client:
|
||||||
|
if not headers:
|
||||||
|
headers = {}
|
||||||
|
headers['Accept'] = accept
|
||||||
|
result = getattr(http_client, method)(url, data=json.dumps(data), query_string=query_string, headers=headers)
|
||||||
|
return_data = json.loads(result.data) \
|
||||||
|
if result.headers.get('Content-Type') == 'application/json' \
|
||||||
|
else result.data
|
||||||
|
return result.status_code, return_data
|
||||||
|
|
||||||
|
|
||||||
|
class DateMatcher(object):
|
||||||
|
def __init__(self, date):
|
||||||
|
self.date = date
|
||||||
|
|
||||||
|
def __eq__(self, other):
|
||||||
|
return other == self.date
|
||||||
|
|
||||||
|
|
||||||
|
def a_date_matching(date_string):
|
||||||
|
return DateMatcher(datetime.strptime(date_string, "%Y-%m-%d %H:%M:%S.%f"))
|
|
@ -0,0 +1,33 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from hamcrest import assert_that, equal_to
|
||||||
|
|
||||||
|
from tests.api.base_api import BaseApi
|
||||||
|
|
||||||
|
|
||||||
|
class ApiAuthenticationTest(BaseApi):
|
||||||
|
def setUp(self):
|
||||||
|
self.prepare()
|
||||||
|
self.prepare_with_failed_authentication()
|
||||||
|
|
||||||
|
def test_with_wrong_authentication(self):
|
||||||
|
self.controller.should_receive('list_entities').never()
|
||||||
|
query_string = {'start': '2014-01-01 00:00:00.0000', 'end': '2014-02-01 00:00:00.0000'}
|
||||||
|
|
||||||
|
code, result = self.api_get(url='/project/TENANT_ID/entities',
|
||||||
|
query_string=query_string,
|
||||||
|
headers={'X-Auth-Token': 'wrong token'})
|
||||||
|
|
||||||
|
assert_that(code, equal_to(401))
|
|
@ -0,0 +1,95 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from hamcrest import assert_that, equal_to, has_entries, has_key, is_
|
||||||
|
from voluptuous import Invalid
|
||||||
|
|
||||||
|
from almanach.common.exceptions.validation_exception import InvalidAttributeException
|
||||||
|
from tests.builder import instance, a
|
||||||
|
from tests.api.base_api import BaseApi
|
||||||
|
|
||||||
|
|
||||||
|
class ApiEntityTest(BaseApi):
|
||||||
|
|
||||||
|
def test_update_instance_entity_with_a_new_start_date(self):
|
||||||
|
data = {
|
||||||
|
"start_date": "2014-01-01 00:00:00.0000",
|
||||||
|
}
|
||||||
|
|
||||||
|
self.controller.should_receive('update_active_instance_entity') \
|
||||||
|
.with_args(
|
||||||
|
instance_id="INSTANCE_ID",
|
||||||
|
start_date=data["start_date"],
|
||||||
|
).and_return(a(instance().with_id('INSTANCE_ID').with_start(2014, 01, 01, 00, 0, 00)))
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/entity/instance/INSTANCE_ID',
|
||||||
|
headers={'X-Auth-Token': 'some token value'},
|
||||||
|
data=data,
|
||||||
|
)
|
||||||
|
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
assert_that(result, has_key('entity_id'))
|
||||||
|
assert_that(result, has_key('start'))
|
||||||
|
assert_that(result, has_key('end'))
|
||||||
|
assert_that(result['start'], is_("2014-01-01 00:00:00+00:00"))
|
||||||
|
|
||||||
|
def test_update_active_instance_entity_with_wrong_attribute_raise_exception(self):
|
||||||
|
errors = [
|
||||||
|
Invalid(message="error message1", path=["my_attribute1"]),
|
||||||
|
Invalid(message="error message2", path=["my_attribute2"]),
|
||||||
|
]
|
||||||
|
|
||||||
|
formatted_errors = {
|
||||||
|
"my_attribute1": "error message1",
|
||||||
|
"my_attribute2": "error message2",
|
||||||
|
}
|
||||||
|
|
||||||
|
instance_id = 'INSTANCE_ID'
|
||||||
|
data = {
|
||||||
|
'flavor': 'A_FLAVOR',
|
||||||
|
}
|
||||||
|
|
||||||
|
self.controller.should_receive('update_active_instance_entity') \
|
||||||
|
.with_args(instance_id=instance_id, **data) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(InvalidAttributeException(errors))
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/entity/instance/INSTANCE_ID',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries({
|
||||||
|
"error": formatted_errors
|
||||||
|
}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_entity_head_with_existing_entity(self):
|
||||||
|
entity_id = "entity_id"
|
||||||
|
self.controller.should_receive('entity_exists') \
|
||||||
|
.and_return(True)
|
||||||
|
|
||||||
|
code, result = self.api_head('/entity/{id}'.format(id=entity_id), headers={'X-Auth-Token': 'some token value'})
|
||||||
|
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
|
||||||
|
def test_entity_head_with_nonexistent_entity(self):
|
||||||
|
entity_id = "entity_id"
|
||||||
|
self.controller.should_receive('entity_exists') \
|
||||||
|
.and_return(False)
|
||||||
|
|
||||||
|
code, result = self.api_head('/entity/{id}'.format(id=entity_id), headers={'X-Auth-Token': 'some token value'})
|
||||||
|
|
||||||
|
assert_that(code, equal_to(404))
|
|
@ -0,0 +1,32 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from hamcrest import assert_that, equal_to, has_key
|
||||||
|
|
||||||
|
from tests.api.base_api import BaseApi
|
||||||
|
|
||||||
|
|
||||||
|
class ApiInfoTest(BaseApi):
|
||||||
|
def test_info(self):
|
||||||
|
self.controller.should_receive('get_application_info').and_return({
|
||||||
|
'info': {'version': '1.0'},
|
||||||
|
'database': {'all_entities': 10,
|
||||||
|
'active_entities': 2}
|
||||||
|
})
|
||||||
|
|
||||||
|
code, result = self.api_get('/info')
|
||||||
|
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
assert_that(result, has_key('info'))
|
||||||
|
assert_that(result['info']['version'], equal_to('1.0'))
|
|
@ -0,0 +1,331 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from hamcrest import assert_that, equal_to, has_key, has_length, has_entries, is_
|
||||||
|
|
||||||
|
from almanach.common.exceptions.date_format_exception import DateFormatException
|
||||||
|
from tests.builder import instance, a
|
||||||
|
from tests.api.base_api import BaseApi, a_date_matching
|
||||||
|
|
||||||
|
|
||||||
|
class ApiInstanceTest(BaseApi):
|
||||||
|
|
||||||
|
def test_get_instances(self):
|
||||||
|
self.controller.should_receive('list_instances') \
|
||||||
|
.with_args('TENANT_ID', a_date_matching("2014-01-01 00:00:00.0000"),
|
||||||
|
a_date_matching("2014-02-01 00:00:00.0000")) \
|
||||||
|
.and_return([a(instance().with_id('123'))])
|
||||||
|
|
||||||
|
code, result = self.api_get('/project/TENANT_ID/instances',
|
||||||
|
query_string={
|
||||||
|
'start': '2014-01-01 00:00:00.0000',
|
||||||
|
'end': '2014-02-01 00:00:00.0000'
|
||||||
|
},
|
||||||
|
headers={'X-Auth-Token': 'some token value'})
|
||||||
|
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
assert_that(result, has_length(1))
|
||||||
|
assert_that(result[0], has_key('entity_id'))
|
||||||
|
assert_that(result[0]['entity_id'], equal_to('123'))
|
||||||
|
|
||||||
|
def test_update_instance_flavor_for_terminated_instance(self):
|
||||||
|
some_new_flavor = 'some_new_flavor'
|
||||||
|
data = dict(flavor=some_new_flavor)
|
||||||
|
start = '2016-03-01 00:00:00.000000'
|
||||||
|
end = '2016-03-03 00:00:00.000000'
|
||||||
|
|
||||||
|
self.controller.should_receive('update_inactive_entity') \
|
||||||
|
.with_args(
|
||||||
|
instance_id="INSTANCE_ID",
|
||||||
|
start=a_date_matching(start),
|
||||||
|
end=a_date_matching(end),
|
||||||
|
flavor=some_new_flavor,
|
||||||
|
).and_return(a(
|
||||||
|
instance().
|
||||||
|
with_id('INSTANCE_ID').
|
||||||
|
with_start(2016, 03, 01, 00, 0, 00).
|
||||||
|
with_end(2016, 03, 03, 00, 0, 00).
|
||||||
|
with_flavor(some_new_flavor))
|
||||||
|
)
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/entity/instance/INSTANCE_ID',
|
||||||
|
headers={'X-Auth-Token': 'some token value'},
|
||||||
|
query_string={
|
||||||
|
'start': start,
|
||||||
|
'end': end,
|
||||||
|
},
|
||||||
|
data=data,
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
assert_that(result, has_key('entity_id'))
|
||||||
|
assert_that(result, has_key('flavor'))
|
||||||
|
assert_that(result['flavor'], is_(some_new_flavor))
|
||||||
|
|
||||||
|
def test_successful_instance_create(self):
|
||||||
|
self.having_config('auth_private_key', 'some token value')
|
||||||
|
data = dict(id="INSTANCE_ID",
|
||||||
|
created_at="CREATED_AT",
|
||||||
|
name="INSTANCE_NAME",
|
||||||
|
flavor="A_FLAVOR",
|
||||||
|
os_type="AN_OS_TYPE",
|
||||||
|
os_distro="A_DISTRIBUTION",
|
||||||
|
os_version="AN_OS_VERSION")
|
||||||
|
|
||||||
|
self.controller.should_receive('create_instance') \
|
||||||
|
.with_args(tenant_id="PROJECT_ID",
|
||||||
|
instance_id=data["id"],
|
||||||
|
create_date=data["created_at"],
|
||||||
|
flavor=data['flavor'],
|
||||||
|
os_type=data['os_type'],
|
||||||
|
distro=data['os_distro'],
|
||||||
|
version=data['os_version'],
|
||||||
|
name=data['name'],
|
||||||
|
metadata={}) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_post(
|
||||||
|
'/project/PROJECT_ID/instance',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(201))
|
||||||
|
|
||||||
|
def test_instance_create_missing_a_param_returns_bad_request_code(self):
|
||||||
|
self.having_config('auth_private_key', 'some token value')
|
||||||
|
data = dict(id="INSTANCE_ID",
|
||||||
|
created_at="CREATED_AT",
|
||||||
|
name="INSTANCE_NAME",
|
||||||
|
flavor="A_FLAVOR",
|
||||||
|
os_type="AN_OS_TYPE",
|
||||||
|
os_version="AN_OS_VERSION")
|
||||||
|
|
||||||
|
self.controller.should_receive('create_instance') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_post(
|
||||||
|
'/project/PROJECT_ID/instance',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries({"error": "The 'os_distro' param is mandatory for the request you have made."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_instance_create_bad_date_format_returns_bad_request_code(self):
|
||||||
|
self.having_config('auth_private_key', 'some token value')
|
||||||
|
data = dict(id="INSTANCE_ID",
|
||||||
|
created_at="A_BAD_DATE",
|
||||||
|
name="INSTANCE_NAME",
|
||||||
|
flavor="A_FLAVOR",
|
||||||
|
os_type="AN_OS_TYPE",
|
||||||
|
os_distro="A_DISTRIBUTION",
|
||||||
|
os_version="AN_OS_VERSION")
|
||||||
|
|
||||||
|
self.controller.should_receive('create_instance') \
|
||||||
|
.with_args(tenant_id="PROJECT_ID",
|
||||||
|
instance_id=data["id"],
|
||||||
|
create_date=data["created_at"],
|
||||||
|
flavor=data['flavor'],
|
||||||
|
os_type=data['os_type'],
|
||||||
|
distro=data['os_distro'],
|
||||||
|
version=data['os_version'],
|
||||||
|
name=data['name'],
|
||||||
|
metadata={}) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_post(
|
||||||
|
'/project/PROJECT_ID/instance',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_successful_instance_resize(self):
|
||||||
|
data = dict(date="UPDATED_AT",
|
||||||
|
flavor="A_FLAVOR")
|
||||||
|
|
||||||
|
self.controller.should_receive('resize_instance') \
|
||||||
|
.with_args(instance_id="INSTANCE_ID",
|
||||||
|
flavor=data['flavor'],
|
||||||
|
resize_date=data['date']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/instance/INSTANCE_ID/resize',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
|
||||||
|
def test_successfull_instance_delete(self):
|
||||||
|
data = dict(date="DELETE_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('delete_instance') \
|
||||||
|
.with_args(instance_id="INSTANCE_ID",
|
||||||
|
delete_date=data['date']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/instance/INSTANCE_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(202))
|
||||||
|
|
||||||
|
def test_instance_delete_missing_a_param_returns_bad_request_code(self):
|
||||||
|
self.controller.should_receive('delete_instance') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_delete(
|
||||||
|
'/instance/INSTANCE_ID',
|
||||||
|
data=dict(),
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries({"error": "The 'date' param is mandatory for the request you have made."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_instance_delete_no_data_bad_request_code(self):
|
||||||
|
self.controller.should_receive('delete_instance') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/instance/INSTANCE_ID', headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries({"error": "The request you have made must have data. None was given."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_instance_delete_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_BAD_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('delete_instance') \
|
||||||
|
.with_args(instance_id="INSTANCE_ID",
|
||||||
|
delete_date=data['date']) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_delete('/instance/INSTANCE_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_instance_resize_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = dict(date="UPDATED_AT")
|
||||||
|
|
||||||
|
self.controller.should_receive('resize_instance') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/instance/INSTANCE_ID/resize',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries({"error": "The 'flavor' param is mandatory for the request you have made."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_instance_resize_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_BAD_DATE",
|
||||||
|
flavor="A_FLAVOR")
|
||||||
|
|
||||||
|
self.controller.should_receive('resize_instance') \
|
||||||
|
.with_args(instance_id="INSTANCE_ID",
|
||||||
|
flavor=data['flavor'],
|
||||||
|
resize_date=data['date']) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/instance/INSTANCE_ID/resize',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_rebuild_instance(self):
|
||||||
|
instance_id = 'INSTANCE_ID'
|
||||||
|
data = {
|
||||||
|
'distro': 'A_DISTRIBUTION',
|
||||||
|
'version': 'A_VERSION',
|
||||||
|
'os_type': 'AN_OS_TYPE',
|
||||||
|
'rebuild_date': 'UPDATE_DATE',
|
||||||
|
}
|
||||||
|
self.controller.should_receive('rebuild_instance') \
|
||||||
|
.with_args(
|
||||||
|
instance_id=instance_id,
|
||||||
|
distro=data.get('distro'),
|
||||||
|
version=data.get('version'),
|
||||||
|
os_type=data.get('os_type'),
|
||||||
|
rebuild_date=data.get('rebuild_date')) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/instance/INSTANCE_ID/rebuild',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
|
||||||
|
def test_rebuild_instance_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = {
|
||||||
|
'distro': 'A_DISTRIBUTION',
|
||||||
|
'rebuild_date': 'UPDATE_DATE',
|
||||||
|
}
|
||||||
|
|
||||||
|
self.controller.should_receive('rebuild_instance') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/instance/INSTANCE_ID/rebuild',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries({"error": "The 'version' param is mandatory for the request you have made."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_rebuild_instance_bad_date_format_returns_bad_request_code(self):
|
||||||
|
instance_id = 'INSTANCE_ID'
|
||||||
|
data = {
|
||||||
|
'distro': 'A_DISTRIBUTION',
|
||||||
|
'version': 'A_VERSION',
|
||||||
|
'os_type': 'AN_OS_TYPE',
|
||||||
|
'rebuild_date': 'A_BAD_UPDATE_DATE',
|
||||||
|
}
|
||||||
|
|
||||||
|
self.controller.should_receive('rebuild_instance') \
|
||||||
|
.with_args(instance_id=instance_id, **data) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/instance/INSTANCE_ID/rebuild',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
|
@ -0,0 +1,275 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from uuid import uuid4
|
||||||
|
from hamcrest import assert_that, equal_to, has_entries
|
||||||
|
|
||||||
|
from almanach.common.exceptions.date_format_exception import DateFormatException
|
||||||
|
from tests.api.base_api import BaseApi
|
||||||
|
|
||||||
|
|
||||||
|
class ApiVolumeTest(BaseApi):
|
||||||
|
|
||||||
|
def test_successful_volume_create(self):
|
||||||
|
data = dict(volume_id="VOLUME_ID",
|
||||||
|
start="START_DATE",
|
||||||
|
volume_type="VOLUME_TYPE",
|
||||||
|
size="A_SIZE",
|
||||||
|
volume_name="VOLUME_NAME",
|
||||||
|
attached_to=["INSTANCE_ID"])
|
||||||
|
|
||||||
|
self.controller.should_receive('create_volume') \
|
||||||
|
.with_args(project_id="PROJECT_ID",
|
||||||
|
**data) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_post(
|
||||||
|
'/project/PROJECT_ID/volume',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(201))
|
||||||
|
|
||||||
|
def test_volume_create_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = dict(volume_id="VOLUME_ID",
|
||||||
|
start="START_DATE",
|
||||||
|
size="A_SIZE",
|
||||||
|
volume_name="VOLUME_NAME",
|
||||||
|
attached_to=[])
|
||||||
|
|
||||||
|
self.controller.should_receive('create_volume') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_post(
|
||||||
|
'/project/PROJECT_ID/volume',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(
|
||||||
|
result,
|
||||||
|
has_entries({"error": "The 'volume_type' param is mandatory for the request you have made."})
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_volume_create_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(volume_id="VOLUME_ID",
|
||||||
|
start="A_BAD_DATE",
|
||||||
|
volume_type="VOLUME_TYPE",
|
||||||
|
size="A_SIZE",
|
||||||
|
volume_name="VOLUME_NAME",
|
||||||
|
attached_to=["INSTANCE_ID"])
|
||||||
|
|
||||||
|
self.controller.should_receive('create_volume') \
|
||||||
|
.with_args(project_id="PROJECT_ID",
|
||||||
|
**data) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_post(
|
||||||
|
'/project/PROJECT_ID/volume',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_successfull_volume_delete(self):
|
||||||
|
data = dict(date="DELETE_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('delete_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
delete_date=data['date']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/volume/VOLUME_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(202))
|
||||||
|
|
||||||
|
def test_volume_delete_missing_a_param_returns_bad_request_code(self):
|
||||||
|
|
||||||
|
self.controller.should_receive('delete_volume') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/volume/VOLUME_ID', data=dict(), headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries({"error": "The 'date' param is mandatory for the request you have made."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_volume_delete_no_data_bad_request_code(self):
|
||||||
|
self.controller.should_receive('delete_volume') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/volume/VOLUME_ID', headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries({"error": "The request you have made must have data. None was given."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_volume_delete_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_BAD_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('delete_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
delete_date=data['date']) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_delete('/volume/VOLUME_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_successful_volume_resize(self):
|
||||||
|
data = dict(date="UPDATED_AT",
|
||||||
|
size="NEW_SIZE")
|
||||||
|
|
||||||
|
self.controller.should_receive('resize_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
size=data['size'],
|
||||||
|
update_date=data['date']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/resize', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
|
||||||
|
def test_volume_resize_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('resize_volume') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/resize', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries({"error": "The 'size' param is mandatory for the request you have made."}))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_volume_resize_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(date="BAD_DATE",
|
||||||
|
size="NEW_SIZE")
|
||||||
|
|
||||||
|
self.controller.should_receive('resize_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
size=data['size'],
|
||||||
|
update_date=data['date']) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/resize', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_successful_volume_attach(self):
|
||||||
|
data = dict(date="UPDATED_AT",
|
||||||
|
attachments=[str(uuid4())])
|
||||||
|
|
||||||
|
self.controller.should_receive('attach_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
attachments=data['attachments'],
|
||||||
|
date=data['date']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/attach', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
|
||||||
|
def test_volume_attach_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('attach_volume') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_put(
|
||||||
|
'/volume/VOLUME_ID/attach',
|
||||||
|
data=data,
|
||||||
|
headers={'X-Auth-Token': 'some token value'}
|
||||||
|
)
|
||||||
|
assert_that(
|
||||||
|
result,
|
||||||
|
has_entries({"error": "The 'attachments' param is mandatory for the request you have made."})
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_volume_attach_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_BAD_DATE",
|
||||||
|
attachments=[str(uuid4())])
|
||||||
|
|
||||||
|
self.controller.should_receive('attach_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
attachments=data['attachments'],
|
||||||
|
date=data['date']) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/attach', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_successful_volume_detach(self):
|
||||||
|
data = dict(date="UPDATED_AT",
|
||||||
|
attachments=[str(uuid4())])
|
||||||
|
|
||||||
|
self.controller.should_receive('detach_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
attachments=data['attachments'],
|
||||||
|
date=data['date']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/detach', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
|
||||||
|
def test_volume_detach_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_DATE")
|
||||||
|
|
||||||
|
self.controller.should_receive('detach_volume') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/detach', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(
|
||||||
|
result,
|
||||||
|
has_entries({"error": "The 'attachments' param is mandatory for the request you have made."})
|
||||||
|
)
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
|
||||||
|
def test_volume_detach_bad_date_format_returns_bad_request_code(self):
|
||||||
|
data = dict(date="A_BAD_DATE",
|
||||||
|
attachments=[str(uuid4())])
|
||||||
|
|
||||||
|
self.controller.should_receive('detach_volume') \
|
||||||
|
.with_args(volume_id="VOLUME_ID",
|
||||||
|
attachments=data['attachments'],
|
||||||
|
date=data['date']) \
|
||||||
|
.once() \
|
||||||
|
.and_raise(DateFormatException)
|
||||||
|
|
||||||
|
code, result = self.api_put('/volume/VOLUME_ID/detach', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(result, has_entries(
|
||||||
|
{
|
||||||
|
"error": "The provided date has an invalid format. "
|
||||||
|
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
||||||
|
}
|
||||||
|
))
|
||||||
|
assert_that(code, equal_to(400))
|
|
@ -0,0 +1,78 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
from hamcrest import assert_that, equal_to, has_entries, has_length, has_key, has_entry
|
||||||
|
|
||||||
|
from almanach.common.exceptions.almanach_exception import AlmanachException
|
||||||
|
from tests.builder import volume_type, a
|
||||||
|
from tests.api.base_api import BaseApi
|
||||||
|
|
||||||
|
|
||||||
|
class ApiVolumeTypeTest(BaseApi):
|
||||||
|
|
||||||
|
def test_get_volume_types(self):
|
||||||
|
self.controller.should_receive('list_volume_types') \
|
||||||
|
.and_return([a(volume_type().with_volume_type_name('some_volume_type_name'))]) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_get('/volume_types', headers={'X-Auth-Token': 'some token value'})
|
||||||
|
|
||||||
|
assert_that(code, equal_to(200))
|
||||||
|
assert_that(result, has_length(1))
|
||||||
|
assert_that(result[0], has_key('volume_type_name'))
|
||||||
|
assert_that(result[0]['volume_type_name'], equal_to('some_volume_type_name'))
|
||||||
|
|
||||||
|
def test_successful_volume_type_create(self):
|
||||||
|
data = dict(
|
||||||
|
type_id='A_VOLUME_TYPE_ID',
|
||||||
|
type_name="A_VOLUME_TYPE_NAME"
|
||||||
|
)
|
||||||
|
|
||||||
|
self.controller.should_receive('create_volume_type') \
|
||||||
|
.with_args(
|
||||||
|
volume_type_id=data['type_id'],
|
||||||
|
volume_type_name=data['type_name']) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_post('/volume_type', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(201))
|
||||||
|
|
||||||
|
def test_volume_type_create_missing_a_param_returns_bad_request_code(self):
|
||||||
|
data = dict(type_name="A_VOLUME_TYPE_NAME")
|
||||||
|
|
||||||
|
self.controller.should_receive('create_volume_type') \
|
||||||
|
.never()
|
||||||
|
|
||||||
|
code, result = self.api_post('/volume_type', data=data, headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(400))
|
||||||
|
assert_that(result, has_entries({"error": "The 'type_id' param is mandatory for the request you have made."}))
|
||||||
|
|
||||||
|
def test_volume_type_delete_with_authentication(self):
|
||||||
|
self.controller.should_receive('delete_volume_type') \
|
||||||
|
.with_args('A_VOLUME_TYPE_ID') \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'some token value'})
|
||||||
|
assert_that(code, equal_to(202))
|
||||||
|
|
||||||
|
def test_volume_type_delete_not_in_database(self):
|
||||||
|
self.controller.should_receive('delete_volume_type') \
|
||||||
|
.with_args('A_VOLUME_TYPE_ID') \
|
||||||
|
.and_raise(AlmanachException("An exception occurred")) \
|
||||||
|
.once()
|
||||||
|
|
||||||
|
code, result = self.api_delete('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'some token value'})
|
||||||
|
|
||||||
|
assert_that(code, equal_to(500))
|
||||||
|
assert_that(result, has_entry("error", "An exception occurred"))
|
|
@ -0,0 +1,46 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import unittest
|
||||||
|
|
||||||
|
from flexmock import flexmock, flexmock_teardown
|
||||||
|
from hamcrest import raises, assert_that, calling, equal_to
|
||||||
|
|
||||||
|
from almanach.auth.keystone_auth import KeystoneAuthentication
|
||||||
|
from almanach.common.exceptions.authentication_failure_exception import AuthenticationFailureException
|
||||||
|
|
||||||
|
|
||||||
|
class KeystoneAuthenticationTest(unittest.TestCase):
|
||||||
|
def setUp(self):
|
||||||
|
self.token_manager_factory = flexmock()
|
||||||
|
self.keystone_token_manager = flexmock()
|
||||||
|
self.auth_backend = KeystoneAuthentication(self.token_manager_factory)
|
||||||
|
|
||||||
|
def tearDown(self):
|
||||||
|
flexmock_teardown()
|
||||||
|
|
||||||
|
def test_with_correct_token(self):
|
||||||
|
token = "my token"
|
||||||
|
self.token_manager_factory.should_receive("get_manager").and_return(self.keystone_token_manager)
|
||||||
|
self.keystone_token_manager.should_receive("validate").with_args(token)
|
||||||
|
assert_that(self.auth_backend.validate(token), equal_to(True))
|
||||||
|
|
||||||
|
def test_with_invalid_token(self):
|
||||||
|
token = "bad token"
|
||||||
|
self.token_manager_factory.should_receive("get_manager").and_return(self.keystone_token_manager)
|
||||||
|
self.keystone_token_manager.should_receive("validate").with_args(token).and_raise(Exception)
|
||||||
|
assert_that(calling(self.auth_backend.validate).with_args(token), raises(AuthenticationFailureException))
|
||||||
|
|
||||||
|
def test_with_empty_token(self):
|
||||||
|
assert_that(calling(self.auth_backend.validate).with_args(None), raises(AuthenticationFailureException))
|
|
@ -0,0 +1,33 @@
|
||||||
|
# Copyright 2016 Internap.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import unittest
|
||||||
|
from hamcrest import raises, assert_that, calling, equal_to
|
||||||
|
|
||||||
|
from almanach.auth.private_key_auth import PrivateKeyAuthentication
|
||||||
|
from almanach.common.exceptions.authentication_failure_exception import AuthenticationFailureException
|
||||||
|
|
||||||
|
|
||||||
|
class PrivateKeyAuthenticationTest(unittest.TestCase):
|
||||||
|
def setUp(self):
|
||||||
|
self.auth_backend = PrivateKeyAuthentication("my token")
|
||||||
|
|
||||||
|
def test_with_correct_token(self):
|
||||||
|
assert_that(self.auth_backend.validate("my token"), equal_to(True))
|
||||||
|
|
||||||
|
def test_with_invalid_token(self):
|
||||||
|
assert_that(calling(self.auth_backend.validate).with_args("bad token"), raises(AuthenticationFailureException))
|
||||||
|
|
||||||
|
def test_with_empty_token(self):
|
||||||
|
assert_that(calling(self.auth_backend.validate).with_args(None), raises(AuthenticationFailureException))
|
|
@ -1,993 +0,0 @@
|
||||||
# Copyright 2016 Internap.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
import json
|
|
||||||
from uuid import uuid4
|
|
||||||
from unittest import TestCase
|
|
||||||
from datetime import datetime
|
|
||||||
|
|
||||||
import flask
|
|
||||||
from voluptuous import Invalid
|
|
||||||
|
|
||||||
from flexmock import flexmock, flexmock_teardown
|
|
||||||
|
|
||||||
from hamcrest import assert_that, has_key, equal_to, has_length, has_entry, has_entries, is_
|
|
||||||
|
|
||||||
from almanach.common.exceptions.validation_exception import InvalidAttributeException
|
|
||||||
from almanach import config
|
|
||||||
from almanach.common.exceptions.date_format_exception import DateFormatException
|
|
||||||
from almanach.common.exceptions.almanach_exception import AlmanachException
|
|
||||||
from almanach.adapters import api_route_v1 as api_route
|
|
||||||
from tests.builder import a, instance, volume_type
|
|
||||||
|
|
||||||
|
|
||||||
class ApiTest(TestCase):
|
|
||||||
def setUp(self):
|
|
||||||
self.controller = flexmock()
|
|
||||||
api_route.controller = self.controller
|
|
||||||
|
|
||||||
self.app = flask.Flask("almanach")
|
|
||||||
self.app.register_blueprint(api_route.api)
|
|
||||||
|
|
||||||
def tearDown(self):
|
|
||||||
flexmock_teardown()
|
|
||||||
|
|
||||||
def test_info(self):
|
|
||||||
self.controller.should_receive('get_application_info').and_return({
|
|
||||||
'info': {'version': '1.0'},
|
|
||||||
'database': {'all_entities': 10,
|
|
||||||
'active_entities': 2}
|
|
||||||
})
|
|
||||||
|
|
||||||
code, result = self.api_get('/info')
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
assert_that(result, has_key('info'))
|
|
||||||
assert_that(result['info']['version'], equal_to('1.0'))
|
|
||||||
|
|
||||||
def test_instances_with_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_instances') \
|
|
||||||
.with_args('TENANT_ID', a_date_matching("2014-01-01 00:00:00.0000"),
|
|
||||||
a_date_matching("2014-02-01 00:00:00.0000")) \
|
|
||||||
.and_return([a(instance().with_id('123'))])
|
|
||||||
|
|
||||||
code, result = self.api_get('/project/TENANT_ID/instances',
|
|
||||||
query_string={
|
|
||||||
'start': '2014-01-01 00:00:00.0000',
|
|
||||||
'end': '2014-02-01 00:00:00.0000'
|
|
||||||
},
|
|
||||||
headers={'X-Auth-Token': 'some token value'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
assert_that(result, has_length(1))
|
|
||||||
assert_that(result[0], has_key('entity_id'))
|
|
||||||
assert_that(result[0]['entity_id'], equal_to('123'))
|
|
||||||
|
|
||||||
def test_update_instance_flavor_for_terminated_instance(self):
|
|
||||||
some_new_flavor = 'some_new_flavor'
|
|
||||||
data = dict(flavor=some_new_flavor)
|
|
||||||
start = '2016-03-01 00:00:00.000000'
|
|
||||||
end = '2016-03-03 00:00:00.000000'
|
|
||||||
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
|
|
||||||
self.controller.should_receive('update_inactive_entity') \
|
|
||||||
.with_args(
|
|
||||||
instance_id="INSTANCE_ID",
|
|
||||||
start=a_date_matching(start),
|
|
||||||
end=a_date_matching(end),
|
|
||||||
flavor=some_new_flavor,
|
|
||||||
).and_return(a(
|
|
||||||
instance().
|
|
||||||
with_id('INSTANCE_ID').
|
|
||||||
with_start(2016, 03, 01, 00, 0, 00).
|
|
||||||
with_end(2016, 03, 03, 00, 0, 00).
|
|
||||||
with_flavor(some_new_flavor))
|
|
||||||
)
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/entity/instance/INSTANCE_ID',
|
|
||||||
headers={'X-Auth-Token': 'some token value'},
|
|
||||||
query_string={
|
|
||||||
'start': start,
|
|
||||||
'end': end,
|
|
||||||
},
|
|
||||||
data=data,
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
assert_that(result, has_key('entity_id'))
|
|
||||||
assert_that(result, has_key('flavor'))
|
|
||||||
assert_that(result['flavor'], is_(some_new_flavor))
|
|
||||||
|
|
||||||
def test_update_instance_entity_with_a_new_start_date(self):
|
|
||||||
data = {
|
|
||||||
"start_date": "2014-01-01 00:00:00.0000",
|
|
||||||
}
|
|
||||||
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
|
|
||||||
self.controller.should_receive('update_active_instance_entity') \
|
|
||||||
.with_args(
|
|
||||||
instance_id="INSTANCE_ID",
|
|
||||||
start_date=data["start_date"],
|
|
||||||
).and_return(a(instance().with_id('INSTANCE_ID').with_start(2014, 01, 01, 00, 0, 00)))
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/entity/instance/INSTANCE_ID',
|
|
||||||
headers={'X-Auth-Token': 'some token value'},
|
|
||||||
data=data,
|
|
||||||
)
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
assert_that(result, has_key('entity_id'))
|
|
||||||
assert_that(result, has_key('start'))
|
|
||||||
assert_that(result, has_key('end'))
|
|
||||||
assert_that(result['start'], is_("2014-01-01 00:00:00+00:00"))
|
|
||||||
|
|
||||||
def test_instances_with_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_instances').never()
|
|
||||||
|
|
||||||
code, result = self.api_get('/project/TENANT_ID/instances',
|
|
||||||
query_string={
|
|
||||||
'start': '2014-01-01 00:00:00.0000',
|
|
||||||
'end': '2014-02-01 00:00:00.0000'
|
|
||||||
},
|
|
||||||
headers={'X-Auth-Token': 'oops'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_instances_without_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_instances').never()
|
|
||||||
|
|
||||||
code, result = self.api_get('/project/TENANT_ID/instances',
|
|
||||||
query_string={
|
|
||||||
'start': '2014-01-01 00:00:00.0000',
|
|
||||||
'end': '2014-02-01 00:00:00.0000'
|
|
||||||
})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_volumes_with_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_volumes').never()
|
|
||||||
|
|
||||||
code, result = self.api_get('/project/TENANT_ID/volumes',
|
|
||||||
query_string={
|
|
||||||
'start': '2014-01-01 00:00:00.0000',
|
|
||||||
'end': '2014-02-01 00:00:00.0000'
|
|
||||||
},
|
|
||||||
headers={'X-Auth-Token': 'oops'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_entities_with_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_entities').never()
|
|
||||||
|
|
||||||
code, result = self.api_get('/project/TENANT_ID/entities',
|
|
||||||
query_string={
|
|
||||||
'start': '2014-01-01 00:00:00.0000',
|
|
||||||
'end': '2014-02-01 00:00:00.0000'
|
|
||||||
},
|
|
||||||
headers={'X-Auth-Token': 'oops'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_volume_type_with_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('get_volume_type') \
|
|
||||||
.with_args('A_VOLUME_TYPE_ID') \
|
|
||||||
.and_return([a(volume_type().with_volume_type_id('A_VOLUME_TYPE_ID')
|
|
||||||
.with_volume_type_name('some_volume_type_name'))]) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_get('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'some token value'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
assert_that(result, has_length(1))
|
|
||||||
assert_that(result[0], has_key('volume_type_id'))
|
|
||||||
assert_that(result[0]['volume_type_id'], equal_to('A_VOLUME_TYPE_ID'))
|
|
||||||
assert_that(result[0], has_key('volume_type_name'))
|
|
||||||
assert_that(result[0]['volume_type_name'], equal_to('some_volume_type_name'))
|
|
||||||
|
|
||||||
def test_volume_type_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('get_volume_type').never()
|
|
||||||
|
|
||||||
code, result = self.api_get('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_volume_types_with_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_volume_types') \
|
|
||||||
.and_return([a(volume_type().with_volume_type_name('some_volume_type_name'))]) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_get('/volume_types', headers={'X-Auth-Token': 'some token value'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
assert_that(result, has_length(1))
|
|
||||||
assert_that(result[0], has_key('volume_type_name'))
|
|
||||||
assert_that(result[0]['volume_type_name'], equal_to('some_volume_type_name'))
|
|
||||||
|
|
||||||
def test_volume_types_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('list_volume_types').never()
|
|
||||||
|
|
||||||
code, result = self.api_get('/volume_types', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_volume_type_create(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(
|
|
||||||
type_id='A_VOLUME_TYPE_ID',
|
|
||||||
type_name="A_VOLUME_TYPE_NAME"
|
|
||||||
)
|
|
||||||
|
|
||||||
self.controller.should_receive('create_volume_type') \
|
|
||||||
.with_args(
|
|
||||||
volume_type_id=data['type_id'],
|
|
||||||
volume_type_name=data['type_name']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_post('/volume_type', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(201))
|
|
||||||
|
|
||||||
def test_volume_type_create_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(type_name="A_VOLUME_TYPE_NAME")
|
|
||||||
|
|
||||||
self.controller.should_receive('create_volume_type') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_post('/volume_type', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
assert_that(result, has_entries({"error": "The 'type_id' param is mandatory for the request you have made."}))
|
|
||||||
|
|
||||||
def test_volume_type_create_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('create_volume_type').never()
|
|
||||||
|
|
||||||
code, result = self.api_post('/volume_type', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_volume_type_delete_with_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('delete_volume_type') \
|
|
||||||
.with_args('A_VOLUME_TYPE_ID') \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(202))
|
|
||||||
|
|
||||||
def test_volume_type_delete_not_in_database(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('delete_volume_type') \
|
|
||||||
.with_args('A_VOLUME_TYPE_ID') \
|
|
||||||
.and_raise(AlmanachException("An exception occurred")) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'some token value'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(500))
|
|
||||||
assert_that(result, has_entry("error", "An exception occurred"))
|
|
||||||
|
|
||||||
def test_volume_type_delete_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('delete_volume_type').never()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume_type/A_VOLUME_TYPE_ID', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_volume_create(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(volume_id="VOLUME_ID",
|
|
||||||
start="START_DATE",
|
|
||||||
volume_type="VOLUME_TYPE",
|
|
||||||
size="A_SIZE",
|
|
||||||
volume_name="VOLUME_NAME",
|
|
||||||
attached_to=["INSTANCE_ID"])
|
|
||||||
|
|
||||||
self.controller.should_receive('create_volume') \
|
|
||||||
.with_args(project_id="PROJECT_ID",
|
|
||||||
**data) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_post(
|
|
||||||
'/project/PROJECT_ID/volume',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(201))
|
|
||||||
|
|
||||||
def test_volume_create_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(volume_id="VOLUME_ID",
|
|
||||||
start="START_DATE",
|
|
||||||
size="A_SIZE",
|
|
||||||
volume_name="VOLUME_NAME",
|
|
||||||
attached_to=[])
|
|
||||||
|
|
||||||
self.controller.should_receive('create_volume') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_post(
|
|
||||||
'/project/PROJECT_ID/volume',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(
|
|
||||||
result,
|
|
||||||
has_entries({"error": "The 'volume_type' param is mandatory for the request you have made."})
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_create_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(volume_id="VOLUME_ID",
|
|
||||||
start="A_BAD_DATE",
|
|
||||||
volume_type="VOLUME_TYPE",
|
|
||||||
size="A_SIZE",
|
|
||||||
volume_name="VOLUME_NAME",
|
|
||||||
attached_to=["INSTANCE_ID"])
|
|
||||||
|
|
||||||
self.controller.should_receive('create_volume') \
|
|
||||||
.with_args(project_id="PROJECT_ID",
|
|
||||||
**data) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_post(
|
|
||||||
'/project/PROJECT_ID/volume',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_create_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('create_volume').never()
|
|
||||||
|
|
||||||
code, result = self.api_post('/project/PROJECT_ID/volume', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successfull_volume_delete(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="DELETE_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
delete_date=data['date']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume/VOLUME_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(202))
|
|
||||||
|
|
||||||
def test_volume_delete_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_volume') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume/VOLUME_ID', data=dict(), headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries({"error": "The 'date' param is mandatory for the request you have made."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_delete_no_data_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_volume') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume/VOLUME_ID', headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries({"error": "The request you have made must have data. None was given."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_delete_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_BAD_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
delete_date=data['date']) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume/VOLUME_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_delete_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('delete_volume').never()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/volume/VOLUME_ID', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_volume_resize(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="UPDATED_AT",
|
|
||||||
size="NEW_SIZE")
|
|
||||||
|
|
||||||
self.controller.should_receive('resize_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
size=data['size'],
|
|
||||||
update_date=data['date']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/resize', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
|
|
||||||
def test_volume_resize_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('resize_volume') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/resize', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries({"error": "The 'size' param is mandatory for the request you have made."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_resize_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="BAD_DATE",
|
|
||||||
size="NEW_SIZE")
|
|
||||||
|
|
||||||
self.controller.should_receive('resize_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
size=data['size'],
|
|
||||||
update_date=data['date']) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/resize', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_resize_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('resize_volume').never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/INSTANCE_ID/resize', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_volume_attach(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="UPDATED_AT",
|
|
||||||
attachments=[str(uuid4())])
|
|
||||||
|
|
||||||
self.controller.should_receive('attach_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
attachments=data['attachments'],
|
|
||||||
date=data['date']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/attach', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
|
|
||||||
def test_volume_attach_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('attach_volume') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/volume/VOLUME_ID/attach',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(
|
|
||||||
result,
|
|
||||||
has_entries({"error": "The 'attachments' param is mandatory for the request you have made."})
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_attach_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_BAD_DATE",
|
|
||||||
attachments=[str(uuid4())])
|
|
||||||
|
|
||||||
self.controller.should_receive('attach_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
attachments=data['attachments'],
|
|
||||||
date=data['date']) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/attach', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_attach_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('attach_volume').never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/INSTANCE_ID/attach', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_volume_detach(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="UPDATED_AT",
|
|
||||||
attachments=[str(uuid4())])
|
|
||||||
|
|
||||||
self.controller.should_receive('detach_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
attachments=data['attachments'],
|
|
||||||
date=data['date']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/detach', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
|
|
||||||
def test_volume_detach_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('detach_volume') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/detach', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(
|
|
||||||
result,
|
|
||||||
has_entries({"error": "The 'attachments' param is mandatory for the request you have made."})
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_detach_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_BAD_DATE",
|
|
||||||
attachments=[str(uuid4())])
|
|
||||||
|
|
||||||
self.controller.should_receive('detach_volume') \
|
|
||||||
.with_args(volume_id="VOLUME_ID",
|
|
||||||
attachments=data['attachments'],
|
|
||||||
date=data['date']) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/VOLUME_ID/detach', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_volume_detach_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('detach_volume').never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/volume/INSTANCE_ID/detach', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_instance_create(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(id="INSTANCE_ID",
|
|
||||||
created_at="CREATED_AT",
|
|
||||||
name="INSTANCE_NAME",
|
|
||||||
flavor="A_FLAVOR",
|
|
||||||
os_type="AN_OS_TYPE",
|
|
||||||
os_distro="A_DISTRIBUTION",
|
|
||||||
os_version="AN_OS_VERSION")
|
|
||||||
|
|
||||||
self.controller.should_receive('create_instance') \
|
|
||||||
.with_args(tenant_id="PROJECT_ID",
|
|
||||||
instance_id=data["id"],
|
|
||||||
create_date=data["created_at"],
|
|
||||||
flavor=data['flavor'],
|
|
||||||
os_type=data['os_type'],
|
|
||||||
distro=data['os_distro'],
|
|
||||||
version=data['os_version'],
|
|
||||||
name=data['name'],
|
|
||||||
metadata={}) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_post(
|
|
||||||
'/project/PROJECT_ID/instance',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(201))
|
|
||||||
|
|
||||||
def test_instance_create_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(id="INSTANCE_ID",
|
|
||||||
created_at="CREATED_AT",
|
|
||||||
name="INSTANCE_NAME",
|
|
||||||
flavor="A_FLAVOR",
|
|
||||||
os_type="AN_OS_TYPE",
|
|
||||||
os_version="AN_OS_VERSION")
|
|
||||||
|
|
||||||
self.controller.should_receive('create_instance') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_post(
|
|
||||||
'/project/PROJECT_ID/instance',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries({"error": "The 'os_distro' param is mandatory for the request you have made."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_create_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(id="INSTANCE_ID",
|
|
||||||
created_at="A_BAD_DATE",
|
|
||||||
name="INSTANCE_NAME",
|
|
||||||
flavor="A_FLAVOR",
|
|
||||||
os_type="AN_OS_TYPE",
|
|
||||||
os_distro="A_DISTRIBUTION",
|
|
||||||
os_version="AN_OS_VERSION")
|
|
||||||
|
|
||||||
self.controller.should_receive('create_instance') \
|
|
||||||
.with_args(tenant_id="PROJECT_ID",
|
|
||||||
instance_id=data["id"],
|
|
||||||
create_date=data["created_at"],
|
|
||||||
flavor=data['flavor'],
|
|
||||||
os_type=data['os_type'],
|
|
||||||
distro=data['os_distro'],
|
|
||||||
version=data['os_version'],
|
|
||||||
name=data['name'],
|
|
||||||
metadata={}) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_post(
|
|
||||||
'/project/PROJECT_ID/instance',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_create_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('create_instance').never()
|
|
||||||
|
|
||||||
code, result = self.api_post('/project/PROJECT_ID/instance', headers={'X-Auth-Token': 'oops'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_successful_instance_resize(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="UPDATED_AT",
|
|
||||||
flavor="A_FLAVOR")
|
|
||||||
|
|
||||||
self.controller.should_receive('resize_instance') \
|
|
||||||
.with_args(instance_id="INSTANCE_ID",
|
|
||||||
flavor=data['flavor'],
|
|
||||||
resize_date=data['date']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/instance/INSTANCE_ID/resize',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
|
|
||||||
def test_successfull_instance_delete(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="DELETE_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_instance') \
|
|
||||||
.with_args(instance_id="INSTANCE_ID",
|
|
||||||
delete_date=data['date']) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/instance/INSTANCE_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(code, equal_to(202))
|
|
||||||
|
|
||||||
def test_instance_delete_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_instance') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_delete(
|
|
||||||
'/instance/INSTANCE_ID',
|
|
||||||
data=dict(),
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries({"error": "The 'date' param is mandatory for the request you have made."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_delete_no_data_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_instance') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/instance/INSTANCE_ID', headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries({"error": "The request you have made must have data. None was given."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_delete_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_BAD_DATE")
|
|
||||||
|
|
||||||
self.controller.should_receive('delete_instance') \
|
|
||||||
.with_args(instance_id="INSTANCE_ID",
|
|
||||||
delete_date=data['date']) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_delete('/instance/INSTANCE_ID', data=data, headers={'X-Auth-Token': 'some token value'})
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_delete_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('delete_instance').never()
|
|
||||||
|
|
||||||
code, result = self.api_delete('/instance/INSTANCE_ID', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_instance_resize_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="UPDATED_AT")
|
|
||||||
|
|
||||||
self.controller.should_receive('resize_instance') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/instance/INSTANCE_ID/resize',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries({"error": "The 'flavor' param is mandatory for the request you have made."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_resize_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = dict(date="A_BAD_DATE",
|
|
||||||
flavor="A_FLAVOR")
|
|
||||||
|
|
||||||
self.controller.should_receive('resize_instance') \
|
|
||||||
.with_args(instance_id="INSTANCE_ID",
|
|
||||||
flavor=data['flavor'],
|
|
||||||
resize_date=data['date']) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/instance/INSTANCE_ID/resize',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_instance_resize_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('resize_instance').never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/instance/INSTANCE_ID/resize', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_rebuild_instance(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
instance_id = 'INSTANCE_ID'
|
|
||||||
data = {
|
|
||||||
'distro': 'A_DISTRIBUTION',
|
|
||||||
'version': 'A_VERSION',
|
|
||||||
'os_type': 'AN_OS_TYPE',
|
|
||||||
'rebuild_date': 'UPDATE_DATE',
|
|
||||||
}
|
|
||||||
self.controller.should_receive('rebuild_instance') \
|
|
||||||
.with_args(
|
|
||||||
instance_id=instance_id,
|
|
||||||
distro=data.get('distro'),
|
|
||||||
version=data.get('version'),
|
|
||||||
os_type=data.get('os_type'),
|
|
||||||
rebuild_date=data.get('rebuild_date')) \
|
|
||||||
.once()
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/instance/INSTANCE_ID/rebuild',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
|
|
||||||
def test_rebuild_instance_missing_a_param_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
data = {
|
|
||||||
'distro': 'A_DISTRIBUTION',
|
|
||||||
'rebuild_date': 'UPDATE_DATE',
|
|
||||||
}
|
|
||||||
|
|
||||||
self.controller.should_receive('rebuild_instance') \
|
|
||||||
.never()
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/instance/INSTANCE_ID/rebuild',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries({"error": "The 'version' param is mandatory for the request you have made."}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_rebuild_instance_bad_date_format_returns_bad_request_code(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
instance_id = 'INSTANCE_ID'
|
|
||||||
data = {
|
|
||||||
'distro': 'A_DISTRIBUTION',
|
|
||||||
'version': 'A_VERSION',
|
|
||||||
'os_type': 'AN_OS_TYPE',
|
|
||||||
'rebuild_date': 'A_BAD_UPDATE_DATE',
|
|
||||||
}
|
|
||||||
|
|
||||||
self.controller.should_receive('rebuild_instance') \
|
|
||||||
.with_args(instance_id=instance_id, **data) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(DateFormatException)
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/instance/INSTANCE_ID/rebuild',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries(
|
|
||||||
{
|
|
||||||
"error": "The provided date has an invalid format. "
|
|
||||||
"Format should be of yyyy-mm-ddThh:mm:ss.msZ, ex: 2015-01-31T18:24:34.1523Z"
|
|
||||||
}
|
|
||||||
))
|
|
||||||
|
|
||||||
def test_rebuild_instance_wrong_authentication(self):
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('rebuild_instance').never()
|
|
||||||
|
|
||||||
code, result = self.api_put('/instance/INSTANCE_ID/rebuild', headers={'X-Auth-Token': 'oops'})
|
|
||||||
assert_that(code, equal_to(401))
|
|
||||||
|
|
||||||
def test_update_active_instance_entity_with_wrong_attribute_exception(self):
|
|
||||||
errors = [
|
|
||||||
Invalid(message="error message1", path=["my_attribute1"]),
|
|
||||||
Invalid(message="error message2", path=["my_attribute2"]),
|
|
||||||
]
|
|
||||||
|
|
||||||
formatted_errors = {
|
|
||||||
"my_attribute1": "error message1",
|
|
||||||
"my_attribute2": "error message2",
|
|
||||||
}
|
|
||||||
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
instance_id = 'INSTANCE_ID'
|
|
||||||
data = {
|
|
||||||
'flavor': 'A_FLAVOR',
|
|
||||||
}
|
|
||||||
|
|
||||||
self.controller.should_receive('update_active_instance_entity') \
|
|
||||||
.with_args(instance_id=instance_id, **data) \
|
|
||||||
.once() \
|
|
||||||
.and_raise(InvalidAttributeException(errors))
|
|
||||||
|
|
||||||
code, result = self.api_put(
|
|
||||||
'/entity/instance/INSTANCE_ID',
|
|
||||||
data=data,
|
|
||||||
headers={'X-Auth-Token': 'some token value'}
|
|
||||||
)
|
|
||||||
assert_that(result, has_entries({
|
|
||||||
"error": formatted_errors
|
|
||||||
}))
|
|
||||||
assert_that(code, equal_to(400))
|
|
||||||
|
|
||||||
def test_entity_head_with_existing_entity(self):
|
|
||||||
entity_id = "entity_id"
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('entity_exists') \
|
|
||||||
.and_return(True)
|
|
||||||
|
|
||||||
code, result = self.api_head('/entity/{id}'.format(id=entity_id), headers={'X-Auth-Token': 'some token value'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(200))
|
|
||||||
|
|
||||||
def test_entity_head_with_nonexistent_entity(self):
|
|
||||||
entity_id = "entity_id"
|
|
||||||
self.having_config('api_auth_token', 'some token value')
|
|
||||||
self.controller.should_receive('entity_exists') \
|
|
||||||
.and_return(False)
|
|
||||||
|
|
||||||
code, result = self.api_head('/entity/{id}'.format(id=entity_id), headers={'X-Auth-Token': 'some token value'})
|
|
||||||
|
|
||||||
assert_that(code, equal_to(404))
|
|
||||||
|
|
||||||
def api_get(self, url, query_string=None, headers=None, accept='application/json'):
|
|
||||||
return self._api_call(url, "get", None, query_string, headers, accept)
|
|
||||||
|
|
||||||
def api_head(self, url, headers):
|
|
||||||
return self._api_call(url=url, method="head", headers=headers, accept='application/json')
|
|
||||||
|
|
||||||
def api_post(self, url, data=None, query_string=None, headers=None, accept='application/json'):
|
|
||||||
return self._api_call(url, "post", data, query_string, headers, accept)
|
|
||||||
|
|
||||||
def api_put(self, url, data=None, query_string=None, headers=None, accept='application/json'):
|
|
||||||
return self._api_call(url, "put", data, query_string, headers, accept)
|
|
||||||
|
|
||||||
def api_delete(self, url, query_string=None, data=None, headers=None, accept='application/json'):
|
|
||||||
return self._api_call(url, "delete", data, query_string, headers, accept)
|
|
||||||
|
|
||||||
def _api_call(self, url, method, data=None, query_string=None, headers=None, accept='application/json'):
|
|
||||||
with self.app.test_client() as http_client:
|
|
||||||
if not headers:
|
|
||||||
headers = {}
|
|
||||||
headers['Accept'] = accept
|
|
||||||
result = getattr(http_client, method)(url, data=json.dumps(data), query_string=query_string, headers=headers)
|
|
||||||
return_data = json.loads(result.data) \
|
|
||||||
if result.headers.get('Content-Type') == 'application/json' \
|
|
||||||
else result.data
|
|
||||||
return result.status_code, return_data
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def having_config(key, value):
|
|
||||||
(flexmock(config)
|
|
||||||
.should_receive(key)
|
|
||||||
.and_return(value))
|
|
||||||
|
|
||||||
|
|
||||||
class DateMatcher(object):
|
|
||||||
def __init__(self, date):
|
|
||||||
self.date = date
|
|
||||||
|
|
||||||
def __eq__(self, other):
|
|
||||||
return other == self.date
|
|
||||||
|
|
||||||
|
|
||||||
def a_date_matching(date_string):
|
|
||||||
return DateMatcher(datetime.strptime(date_string, "%Y-%m-%d %H:%M:%S.%f"))
|
|
|
@ -37,4 +37,4 @@ class ConfigTest(TestCase):
|
||||||
os.environ['ALMANACH_AUTH_TOKEN'] = token
|
os.environ['ALMANACH_AUTH_TOKEN'] = token
|
||||||
|
|
||||||
assert_that(url, equal_to(config.rabbitmq_url()))
|
assert_that(url, equal_to(config.rabbitmq_url()))
|
||||||
assert_that(token, equal_to(config.api_auth_token()))
|
assert_that(token, equal_to(config.auth_private_key()))
|
||||||
|
|
4
tox.ini
4
tox.ini
|
@ -2,7 +2,9 @@
|
||||||
envlist = py27,flake8
|
envlist = py27,flake8
|
||||||
|
|
||||||
[testenv]
|
[testenv]
|
||||||
deps = -r{toxinidir}/test-requirements.txt
|
deps =
|
||||||
|
-r{toxinidir}/test-requirements.txt
|
||||||
|
-r{toxinidir}/requirements.txt
|
||||||
setenv =
|
setenv =
|
||||||
PYTHONPATH = {toxinidir}
|
PYTHONPATH = {toxinidir}
|
||||||
commands = nosetests --tests tests
|
commands = nosetests --tests tests
|
||||||
|
|
Loading…
Reference in New Issue