Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
slapos
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Łukasz Nowak
slapos
Commits
a8d81f1f
Commit
a8d81f1f
authored
Oct 19, 2021
by
Łukasz Nowak
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
XXX: Create testing backend
parent
fe38d320
Pipeline
#18946
failed with stage
in 0 seconds
Changes
1
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
428 additions
and
0 deletions
+428
-0
software/rapid-cdn/test/backend.py
software/rapid-cdn/test/backend.py
+428
-0
No files found.
software/rapid-cdn/test/backend.py
0 → 100644
View file @
a8d81f1f
##############################################################################
#
# Copyright (c) 2018 Nexedi SA and Contributors. All Rights Reserved.
#
# WARNING: This program as such is intended to be used by professional
# programmers who take the whole responsibility of assessing all potential
# consequences resulting from its eventual inadequacies and bugs
# End users who are looking for a ready-to-use solution with commercial
# guarantees and support are strongly advised to contract a Free Software
# Service Company
#
# This program is Free Software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 3
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
#
##############################################################################
import
os
import
json
# import multiprocessing
# import ssl
from
http.server
import
HTTPServer
from
http.server
import
BaseHTTPRequestHandler
from
socketserver
import
ThreadingMixIn
import
time
# import tempfile
import
io
import
gzip
import
base64
import
socket
import
sys
import
random
import
string
import
datetime
from
cryptography
import
x509
from
cryptography.hazmat.backends
import
default_backend
from
cryptography.hazmat.primitives
import
hashes
from
cryptography.hazmat.primitives
import
serialization
from
cryptography.hazmat.primitives.asymmetric
import
rsa
from
cryptography.x509.oid
import
NameOID
def
createKey
():
key
=
rsa
.
generate_private_key
(
public_exponent
=
65537
,
key_size
=
2048
,
backend
=
default_backend
())
key_pem
=
key
.
private_bytes
(
encoding
=
serialization
.
Encoding
.
PEM
,
format
=
serialization
.
PrivateFormat
.
TraditionalOpenSSL
,
encryption_algorithm
=
serialization
.
NoEncryption
()
)
return
key
,
key_pem
# comes from https://stackoverflow.com/a/21788372/9256748
def
patch_broken_pipe_error
():
"""Monkey Patch BaseServer.handle_error to not write
a stacktrace to stderr on broken pipe.
https://stackoverflow.com/a/7913160"""
from
socketserver
import
BaseServer
handle_error
=
BaseServer
.
handle_error
def
my_handle_error
(
self
,
request
,
client_address
):
type
,
err
,
tb
=
sys
.
exc_info
()
# there might be better ways to detect the specific erro
if
repr
(
err
)
==
"error(32, 'Broken pipe')"
:
pass
else
:
handle_error
(
self
,
request
,
client_address
)
BaseServer
.
handle_error
=
my_handle_error
patch_broken_pipe_error
()
class
ThreadedHTTPServer
(
ThreadingMixIn
,
HTTPServer
):
pass
class
TestHandler
(
BaseHTTPRequestHandler
):
identification
=
None
configuration
=
{}
def
log_message
(
self
,
*
args
):
if
os
.
environ
.
get
(
'SLAPOS_TEST_DEBUG'
):
return
BaseHTTPRequestHandler
.
log_message
(
self
,
*
args
)
else
:
return
def
do_DELETE
(
self
):
config
=
self
.
configuration
.
pop
(
self
.
path
,
None
)
if
config
is
None
:
self
.
send_response
(
204
)
self
.
end_headers
()
else
:
self
.
send_response
(
200
)
self
.
send_header
(
"Content-Type"
,
"application/json"
)
self
.
end_headers
()
self
.
wfile
.
write
(
json
.
dumps
({
self
.
path
:
config
},
indent
=
2
))
def
do_PUT
(
self
):
config
=
{
'status_code'
:
self
.
headers
.
get
(
'x-reply-status-code'
,
'200'
)
}
prefix
=
'x-reply-header-'
length
=
len
(
prefix
)
for
key
,
value
in
list
(
self
.
headers
.
items
()):
if
key
.
startswith
(
prefix
):
header
=
'-'
.
join
([
q
.
capitalize
()
for
q
in
key
[
length
:].
split
(
'-'
)])
config
[
header
]
=
value
.
strip
()
if
'x-reply-body'
in
self
.
headers
:
config
[
'Body'
]
=
base64
.
b64decode
(
self
.
headers
[
'x-reply-body'
])
config
[
'X-Drop-Header'
]
=
self
.
headers
.
get
(
'x-drop-header'
)
self
.
configuration
[
self
.
path
]
=
config
self
.
send_response
(
201
)
self
.
send_header
(
"Content-Type"
,
"application/json"
)
self
.
end_headers
()
self
.
wfile
.
write
(
json
.
dumps
({
self
.
path
:
config
},
indent
=
2
))
def
do_POST
(
self
):
return
self
.
do_GET
()
def
do_GET
(
self
):
config
=
self
.
configuration
.
get
(
self
.
path
,
None
)
if
config
is
not
None
:
config
=
config
.
copy
()
response
=
config
.
pop
(
'Body'
,
None
)
status_code
=
int
(
config
.
pop
(
'status_code'
))
timeout
=
int
(
config
.
pop
(
'Timeout'
,
'0'
))
compress
=
int
(
config
.
pop
(
'Compress'
,
'0'
))
drop_header_list
=
[]
for
header
in
(
config
.
pop
(
'X-Drop-Header'
)
or
''
).
split
():
drop_header_list
.
append
(
header
)
header_dict
=
config
else
:
drop_header_list
=
[]
for
header
in
(
self
.
headers
.
get
(
'x-drop-header'
)
or
''
).
split
():
drop_header_list
.
append
(
header
)
response
=
None
status_code
=
200
timeout
=
int
(
self
.
headers
.
get
(
'timeout'
,
'0'
))
if
'x-maximum-timeout'
in
self
.
headers
:
maximum_timeout
=
int
(
self
.
headers
[
'x-maximum-timeout'
])
timeout
=
random
.
randrange
(
maximum_timeout
)
if
'x-response-size'
in
self
.
headers
:
min_response
,
max_response
=
[
int
(
q
)
for
q
in
self
.
headers
[
'x-response-size'
].
split
(
' '
)]
reponse_size
=
random
.
randrange
(
min_response
,
max_response
)
response
=
''
.
join
(
random
.
choice
(
string
.
lowercase
)
for
x
in
range
(
reponse_size
))
compress
=
int
(
self
.
headers
.
get
(
'compress'
,
'0'
))
header_dict
=
{}
prefix
=
'x-reply-header-'
length
=
len
(
prefix
)
for
key
,
value
in
list
(
self
.
headers
.
items
()):
if
key
.
startswith
(
prefix
):
header
=
'-'
.
join
([
q
.
capitalize
()
for
q
in
key
[
length
:].
split
(
'-'
)])
header_dict
[
header
]
=
value
.
strip
()
if
response
is
None
:
if
'x-reply-body'
not
in
self
.
headers
:
response
=
{
'Path'
:
self
.
path
,
'Incoming Headers'
:
dict
(
self
.
headers
)
}
response
=
json
.
dumps
(
response
,
indent
=
2
)
else
:
response
=
base64
.
b64decode
(
self
.
headers
[
'x-reply-body'
])
time
.
sleep
(
timeout
)
self
.
send_response
(
status_code
)
for
key
,
value
in
list
(
header_dict
.
items
()):
self
.
send_header
(
key
,
value
)
if
self
.
identification
is
not
None
:
self
.
send_header
(
'X-Backend-Identification'
,
self
.
identification
)
if
'Content-Type'
not
in
drop_header_list
:
self
.
send_header
(
"Content-Type"
,
"application/json"
)
if
'Set-Cookie'
not
in
drop_header_list
:
self
.
send_header
(
'Set-Cookie'
,
'secured=value;secure'
)
self
.
send_header
(
'Set-Cookie'
,
'nonsecured=value'
)
if
compress
:
self
.
send_header
(
'Content-Encoding'
,
'gzip'
)
out
=
io
.
StringIO
()
# compress with level 0, to find out if in the middle someting would
# like to alter the compression
with
gzip
.
GzipFile
(
fileobj
=
out
,
mode
=
"w"
,
compresslevel
=
0
)
as
f
:
f
.
write
(
response
)
response
=
out
.
getvalue
()
self
.
send_header
(
'Backend-Content-Length'
,
len
(
response
))
if
'Content-Length'
not
in
drop_header_list
:
self
.
send_header
(
'Content-Length'
,
len
(
response
))
self
.
end_headers
()
self
.
wfile
.
write
(
response
.
encode
())
class
CertificateAuthority
(
object
):
def
__init__
(
self
,
common_name
):
self
.
key
,
self
.
key_pem
=
createKey
()
public_key
=
self
.
key
.
public_key
()
builder
=
x509
.
CertificateBuilder
()
builder
=
builder
.
subject_name
(
x509
.
Name
([
x509
.
NameAttribute
(
NameOID
.
COMMON_NAME
,
str
(
common_name
)),
]))
builder
=
builder
.
issuer_name
(
x509
.
Name
([
x509
.
NameAttribute
(
NameOID
.
COMMON_NAME
,
str
(
common_name
)),
]))
builder
=
builder
.
not_valid_before
(
datetime
.
datetime
.
utcnow
()
-
datetime
.
timedelta
(
days
=
2
))
builder
=
builder
.
not_valid_after
(
datetime
.
datetime
.
utcnow
()
+
datetime
.
timedelta
(
days
=
30
))
builder
=
builder
.
serial_number
(
x509
.
random_serial_number
())
builder
=
builder
.
public_key
(
public_key
)
builder
=
builder
.
add_extension
(
x509
.
BasicConstraints
(
ca
=
True
,
path_length
=
None
),
critical
=
True
,
)
self
.
certificate
=
builder
.
sign
(
private_key
=
self
.
key
,
algorithm
=
hashes
.
SHA256
(),
backend
=
default_backend
()
)
self
.
certificate_pem
=
self
.
certificate
.
public_bytes
(
serialization
.
Encoding
.
PEM
)
def
signCSR
(
self
,
csr
):
builder
=
x509
.
CertificateBuilder
(
subject_name
=
csr
.
subject
,
extensions
=
csr
.
extensions
,
issuer_name
=
self
.
certificate
.
subject
,
not_valid_before
=
datetime
.
datetime
.
utcnow
()
-
datetime
.
timedelta
(
days
=
1
),
not_valid_after
=
datetime
.
datetime
.
utcnow
()
+
datetime
.
timedelta
(
days
=
30
),
serial_number
=
x509
.
random_serial_number
(),
public_key
=
csr
.
public_key
(),
)
certificate
=
builder
.
sign
(
private_key
=
self
.
key
,
algorithm
=
hashes
.
SHA256
(),
backend
=
default_backend
()
)
return
certificate
,
certificate
.
public_bytes
(
serialization
.
Encoding
.
PEM
)
# class HttpFrontendTestCase(SlapOSInstanceTestCase):
# @classmethod
# def prepareCertificate(cls):
# cls.another_server_ca = CertificateAuthority("Another Server Root CA")
# cls.test_server_ca = CertificateAuthority("Test Server Root CA")
# key, key_pem, csr, csr_pem = createCSR(
# "testserver.example.com", cls._ipv4_address)
# _, cls.test_server_certificate_pem = cls.test_server_ca.signCSR(csr)
#
# cls.test_server_certificate_file = tempfile.NamedTemporaryFile(
# delete=False
# )
#
# cls.test_server_certificate_file.write(
# cls.test_server_certificate_pem + key_pem
# )
# cls.test_server_certificate_file.close()
#
# def startServerProcess(cls):
# server = ThreadedHTTPServer(
# (cls._ipv4_address, cls._server_http_port),
# TestHandler)
#
# server_https = ThreadedHTTPServer(
# (cls._ipv4_address, cls._server_https_port),
# TestHandler)
#
# server_https.socket = ssl.wrap_socket(
# server_https.socket,
# certfile=cls.test_server_certificate_file.name,
# server_side=True)
#
# cls.backend_url = 'http://%s:%s/' % server.server_address
# cls.server_process = multiprocessing.Process(
# target=server.serve_forever, name='HTTPServer')
# cls.server_process.start()
# cls.logger.debug('Started process %s' % (cls.server_process,))
#
# cls.backend_https_url = 'https://%s:%s/' % server_https.server_address
# cls.server_https_process = multiprocessing.Process(
# target=server_https.serve_forever, name='HTTPSServer')
# cls.server_https_process.start()
# cls.logger.debug('Started process %s' % (cls.server_https_process,))
#
# @classmethod
# def cleanUpCertificate(cls):
# if getattr(cls, 'test_server_certificate_file', None) is not None:
# os.unlink(cls.test_server_certificate_file.name)
#
# @classmethod
# def stopServerProcess(cls):
# for server in ['server_process', 'server_https_process']:
# process = getattr(cls, server, None)
# if process is not None:
# cls.logger.debug('Stopping process %s' % (process,))
# process.join(10)
# process.terminate()
# time.sleep(0.1)
# if process.is_alive():
# cls.logger.warning(
# 'Process %s still alive' % (process, ))
#
# def startAuthenticatedServerProcess(self):
# master_parameter_dict = self.parseConnectionParameterDict()
# caucase_url = master_parameter_dict['backend-client-caucase-url']
# ca_certificate = requests.get(caucase_url + '/cas/crt/ca.crt.pem')
# assert ca_certificate.status_code == httplib.OK
# ca_certificate_file = os.path.join(
# self.working_directory, 'ca-backend-client.crt.pem')
# with open(ca_certificate_file, 'w') as fh:
# fh.write(ca_certificate.text)
#
# class OwnTestHandler(TestHandler):
# identification = 'Auth Backend'
#
# server_https_auth = ThreadedHTTPServer(
# (self._ipv4_address, self._server_https_auth_port),
# OwnTestHandler)
#
# server_https_auth.socket = ssl.wrap_socket(
# server_https_auth.socket,
# certfile=self.test_server_certificate_file.name,
# cert_reqs=ssl.CERT_REQUIRED,
# ca_certs=ca_certificate_file,
# server_side=True)
#
# self.backend_https_auth_url = 'https://%s:%s/' \
# % server_https_auth.server_address
#
# self.server_https_auth_process = multiprocessing.Process(
# target=server_https_auth.serve_forever, name='HTTPSServerAuth')
# self.server_https_auth_process.start()
# self.logger.debug('Started process %s' % (self.server_https_auth_process,))
#
# def stopAuthenticatedServerProcess(self):
# self.logger.debug('Stopping process %s' % (
# self.server_https_auth_process,))
# self.server_https_auth_process.join(10)
# self.server_https_auth_process.terminate()
# time.sleep(0.1)
# if self.server_https_auth_process.is_alive():
# self.logger.warning(
# 'Process %s still alive' % (self.server_https_auth_process, ))
#
#
# @classmethod
# def _cleanup(cls, snapshot_name):
# cls.cleanUpCertificate()
# cls.stopServerProcess()
# super(HttpFrontendTestCase, cls)._cleanup(snapshot_name)
#
# @classmethod
# def setUpClass(cls):
# try:
# cls.createWildcardExampleComCertificate()
# cls.prepareCertificate()
# # find ports once to be able startServerProcess many times
# cls._server_http_port = findFreeTCPPort(cls._ipv4_address)
# cls._server_https_port = findFreeTCPPort(cls._ipv4_address)
# cls._server_https_auth_port = findFreeTCPPort(cls._ipv4_address)
# cls.startServerProcess()
# except BaseException:
# cls.logger.exception("Error during setUpClass")
# cls._cleanup("{}.{}.setUpClass".format(cls.__module__, cls.__name__))
# cls.setUp = lambda self: self.fail('Setup Class failed.')
# raise
#
# super(HttpFrontendTestCase, cls).setUpClass()
#
# try:
# # expose instance directory
# cls.instance_path = cls.slap.instance_directory
# # expose software directory, extract from found computer partition
# cls.software_path = os.path.realpath(os.path.join(
# cls.computer_partition_root_path, 'software_release'))
# # do working directory
# cls.working_directory = os.path.join(os.path.realpath(
# os.environ.get(
# 'SLAPOS_TEST_WORKING_DIR',
# os.path.join(os.getcwd(), '.slapos'))),
# 'caddy-frontend-test')
# if not os.path.isdir(cls.working_directory):
# os.mkdir(cls.working_directory)
# cls.setUpMaster()
# cls.waitForCaddy()
# except BaseException:
# cls.logger.exception("Error during setUpClass")
# # "{}.{}.setUpClass".format(cls.__module__, cls.__name__) is already used
# # by SlapOSInstanceTestCase.setUpClass so we use another name for
# # snapshot, to make sure we don't store another snapshot in same
# # directory.
# cls._cleanup("{}.SlaveHttpFrontendTestCase.{}.setUpClass".format(
# cls.__module__, cls.__name__))
# cls.setUp = lambda self: self.fail('Setup Class failed.')
# raise
if
__name__
==
'__main__'
:
class
HTTP6Server
(
ThreadedHTTPServer
):
address_family
=
socket
.
AF_INET6
ip
,
port
=
sys
.
argv
[
1
],
int
(
sys
.
argv
[
2
])
if
':'
in
ip
:
klass
=
HTTP6Server
url_template
=
'http://[%s]:%s/'
else
:
klass
=
ThreadedHTTPServer
url_template
=
'http://%s:%s/'
server
=
klass
((
ip
,
port
),
TestHandler
)
print
(
url_template
%
server
.
server_address
[:
2
])
server
.
serve_forever
()
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment