test.py 200 KB
Newer Older
Łukasz Nowak's avatar
Łukasz Nowak committed
1 2 3 4 5 6 7 8 9
##############################################################################
#
# Copyright (c) 2018 Nexedi SA and Contributors. All Rights Reserved.
#
# WARNING: This program as such is intended to be used by professional
# programmers who take the whole responsibility of assessing all potential
# consequences resulting from its eventual inadequacies and bugs
# End users who are looking for a ready-to-use solution with commercial
# guarantees and support are strongly advised to contract a Free Software
10
# Service Company
Łukasz Nowak's avatar
Łukasz Nowak committed
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
#
# This program is Free Software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 3
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.
#
##############################################################################

import glob
import os
import requests
31
import httplib
Łukasz Nowak's avatar
Łukasz Nowak committed
32 33 34 35
from requests_toolbelt.adapters import source
import json
import multiprocessing
import subprocess
36
from unittest import skip, expectedFailure
Łukasz Nowak's avatar
Łukasz Nowak committed
37
import ssl
38
import signal
Łukasz Nowak's avatar
Łukasz Nowak committed
39
from BaseHTTPServer import HTTPServer
40
from BaseHTTPServer import BaseHTTPRequestHandler
Łukasz Nowak's avatar
Łukasz Nowak committed
41 42
from forcediphttpsadapter.adapters import ForcedIPHTTPSAdapter
import time
43
import tempfile
44
import ipaddress
45 46
import StringIO
import gzip
47
import base64
48
import re
49
from slapos.recipe.librecipe import generateHashFromFiles
50 51


52 53 54 55
try:
    import lzma
except ImportError:
    from backports import lzma
Łukasz Nowak's avatar
Łukasz Nowak committed
56

57 58 59 60 61 62 63 64 65
import datetime

from cryptography import x509
from cryptography.hazmat.backends import default_backend
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives.asymmetric import rsa
from cryptography.x509.oid import NameOID

66 67 68 69 70 71 72
from slapos.testing.testcase import makeModuleSetUpAndTestCaseClass
from slapos.testing.utils import findFreeTCPPort
setUpModule, SlapOSInstanceTestCase = makeModuleSetUpAndTestCaseClass(
    os.path.abspath(
        os.path.join(os.path.dirname(__file__), '..', 'software.cfg')))


73 74
SLAPOS_TEST_IPV4 = os.environ['SLAPOS_TEST_IPV4']
SLAPOS_TEST_IPV6 = os.environ['SLAPOS_TEST_IPV6']
Łukasz Nowak's avatar
Łukasz Nowak committed
75 76 77 78 79 80 81

# ports chosen to not collide with test systems
HTTP_PORT = '11080'
HTTPS_PORT = '11443'
MONITOR_HTTPD_PORT = '13000'
MONITOR_F1_HTTPD_PORT = '13001'
MONITOR_F2_HTTPD_PORT = '13002'
82 83
CAUCASE_PORT = '15090'
KEDIFA_PORT = '15080'
Łukasz Nowak's avatar
Łukasz Nowak committed
84

85 86
KEDIFA_IPV6_BASE = 'https://[%s]:%s' % (SLAPOS_TEST_IPV6, KEDIFA_PORT)

Łukasz Nowak's avatar
Łukasz Nowak committed
87 88

# for development: debugging logs and install Ctrl+C handler
89
if os.environ.get('SLAPOS_TEST_DEBUG'):
Łukasz Nowak's avatar
Łukasz Nowak committed
90 91 92 93 94
  import logging
  logging.basicConfig(level=logging.DEBUG)
  import unittest
  unittest.installHandler()

95

96
def der2pem(der):
97 98 99 100 101 102 103 104 105 106 107 108 109 110 111
  certificate = x509.load_der_x509_certificate(der, default_backend())
  return certificate.public_bytes(serialization.Encoding.PEM)


def createKey():
  key = rsa.generate_private_key(
    public_exponent=65537, key_size=2048, backend=default_backend())
  key_pem = key.private_bytes(
    encoding=serialization.Encoding.PEM,
    format=serialization.PrivateFormat.TraditionalOpenSSL,
    encryption_algorithm=serialization.NoEncryption()
  )
  return key, key_pem


112
def createSelfSignedCertificate(name_list):
113
  key, key_pem = createKey()
114 115 116
  subject_alternative_name_list = x509.SubjectAlternativeName(
    [x509.DNSName(unicode(q)) for q in name_list]
  )
117
  subject = issuer = x509.Name([
118
    x509.NameAttribute(NameOID.COMMON_NAME, u'Test Self Signed Certificate'),
119 120 121 122 123
  ])
  certificate = x509.CertificateBuilder().subject_name(
    subject
  ).issuer_name(
    issuer
124 125 126
  ).add_extension(
      subject_alternative_name_list,
      critical=False,
127 128 129 130 131 132 133 134 135 136 137 138 139
  ).public_key(
    key.public_key()
  ).serial_number(
    x509.random_serial_number()
  ).not_valid_before(
    datetime.datetime.utcnow() - datetime.timedelta(days=2)
  ).not_valid_after(
    datetime.datetime.utcnow() + datetime.timedelta(days=5)
  ).sign(key, hashes.SHA256(), default_backend())
  certificate_pem = certificate.public_bytes(serialization.Encoding.PEM)
  return key, key_pem, certificate, certificate_pem


140
def createCSR(common_name, ip=None):
141
  key, key_pem = createKey()
142 143 144 145 146
  subject_alternative_name_list = []
  if ip is not None:
    subject_alternative_name_list.append(
      x509.IPAddress(ipaddress.ip_address(unicode(ip)))
    )
147 148
  csr = x509.CertificateSigningRequestBuilder().subject_name(x509.Name([
     x509.NameAttribute(NameOID.COMMON_NAME, unicode(common_name)),
149 150 151 152 153 154 155 156 157
  ]))

  if len(subject_alternative_name_list):
    csr = csr.add_extension(
      x509.SubjectAlternativeName(subject_alternative_name_list),
      critical=False
    )

  csr = csr.sign(key, hashes.SHA256(), default_backend())
158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191
  csr_pem = csr.public_bytes(serialization.Encoding.PEM)
  return key, key_pem, csr, csr_pem


class CertificateAuthority(object):
  def __init__(self, common_name):
    self.key, self.key_pem = createKey()
    public_key = self.key.public_key()
    builder = x509.CertificateBuilder()
    builder = builder.subject_name(x509.Name([
      x509.NameAttribute(NameOID.COMMON_NAME, unicode(common_name)),
    ]))
    builder = builder.issuer_name(x509.Name([
      x509.NameAttribute(NameOID.COMMON_NAME, unicode(common_name)),
    ]))
    builder = builder.not_valid_before(
      datetime.datetime.utcnow() - datetime.timedelta(days=2))
    builder = builder.not_valid_after(
      datetime.datetime.utcnow() + datetime.timedelta(days=30))
    builder = builder.serial_number(x509.random_serial_number())
    builder = builder.public_key(public_key)
    builder = builder.add_extension(
      x509.BasicConstraints(ca=True, path_length=None), critical=True,
    )
    self.certificate = builder.sign(
      private_key=self.key, algorithm=hashes.SHA256(),
      backend=default_backend()
    )
    self.certificate_pem = self.certificate.public_bytes(
      serialization.Encoding.PEM)

  def signCSR(self, csr):
    builder = x509.CertificateBuilder(
      subject_name=csr.subject,
192
      extensions=csr.extensions,
193 194 195 196 197 198 199 200 201 202 203 204
      issuer_name=self.certificate.subject,
      not_valid_before=datetime.datetime.utcnow() - datetime.timedelta(days=1),
      not_valid_after=datetime.datetime.utcnow() + datetime.timedelta(days=30),
      serial_number=x509.random_serial_number(),
      public_key=csr.public_key(),
    )
    certificate = builder.sign(
      private_key=self.key,
      algorithm=hashes.SHA256(),
      backend=default_backend()
    )
    return certificate, certificate.public_bytes(serialization.Encoding.PEM)
Łukasz Nowak's avatar
Łukasz Nowak committed
205

206

207
def subprocess_status_output(*args, **kwargs):
208 209 210 211
  prc = subprocess.Popen(
    stdout=subprocess.PIPE,
    stderr=subprocess.STDOUT,
    *args,
212
    **kwargs)
213
  out, err = prc.communicate()
214 215 216 217 218
  return prc.returncode, out


def subprocess_output(*args, **kwargs):
  return subprocess_status_output(*args, **kwargs)[1]
219 220


Łukasz Nowak's avatar
Łukasz Nowak committed
221
def isHTTP2(domain, ip):
222
  curl_command = 'curl --http2 -v -k -H "Host: %(domain)s" ' \
Łukasz Nowak's avatar
Łukasz Nowak committed
223 224
    'https://%(domain)s:%(https_port)s/ '\
    '--resolve %(domain)s:%(https_port)s:%(ip)s' % dict(
225
      ip=ip, domain=domain, https_port=HTTPS_PORT)
Łukasz Nowak's avatar
Łukasz Nowak committed
226 227 228 229 230 231 232 233 234
  prc = subprocess.Popen(
    curl_command.split(), stdout=subprocess.PIPE, stderr=subprocess.PIPE
  )
  out, err = prc.communicate()
  assert prc.returncode == 0, "Problem running %r. Output:\n%s\nError:\n%s" % (
    curl_command, out, err)
  return 'Using HTTP2, server supports multi-use' in err


235 236 237 238 239 240 241 242 243 244
def getQUIC(url, ip, port):
  quic_client_command = 'quic_client --disable-certificate-verification '\
    '--port=%(port)s --host=%(host)s %(url)s' % dict(
      port=port, host=ip, url=url)
  try:
    return True, subprocess.check_output(
      quic_client_command.split(), stderr=subprocess.STDOUT)
  except subprocess.CalledProcessError as e:
    return False, e.output

245

246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268
def getPluginParameterDict(software_path, filepath):
  bin_file = os.path.join(software_path, 'bin', 'test-plugin-promise')
  with open(bin_file, 'w') as f:
    f.write("""#!%s/bin/pythonwitheggs
import os
import importlib
import sys
import json

filepath = sys.argv[1]
sys.path[0:0] = [os.path.dirname(filepath)]
filename = os.path.basename(filepath)
module = importlib.import_module(os.path.splitext(filename)[0])

print json.dumps(module.extra_config_dict)
    """ % software_path)

  os.chmod(bin_file, 0755)
  result = subprocess_output([bin_file, filepath]).strip()
  try:
    return json.loads(result)
  except ValueError, e:
    raise ValueError("%s\nResult was: %s" % (e, result))
269

270

Łukasz Nowak's avatar
Łukasz Nowak committed
271
class TestDataMixin(object):
272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290
  def assertRejectedSlavePromiseWithPop(self, parameter_dict):
    rejected_slave_promise_url = parameter_dict.pop(
      'rejected-slave-promise-url')

    try:
      result = requests.get(rejected_slave_promise_url, verify=False)
      if result.text == '':
        result_json = {}
      else:
        result_json = result.json()
      self.assertEqual(
        parameter_dict['rejected-slave-dict'],
        result_json
      )
    except AssertionError:
      raise
    except Exception as e:
      self.fail(e)

Łukasz Nowak's avatar
Łukasz Nowak committed
291 292 293 294 295
  def getTrimmedProcessInfo(self):
    return '\n'.join(sorted([
      '%(group)s:%(name)s %(statename)s' % q for q
      in self.getSupervisorRPCServer().supervisor.getAllProcessInfo()]))

296 297
  def assertTestData(self, runtime_data, hash_value_dict=None, msg=None):
    if hash_value_dict is None:
298
      hash_value_dict = {}
299
    filename = '%s-%s.txt' % (self.id(), 'CADDY')
Łukasz Nowak's avatar
Łukasz Nowak committed
300 301 302 303 304 305 306 307
    test_data_file = os.path.join(
      os.path.dirname(os.path.realpath(__file__)), 'test_data', filename)

    try:
      test_data = open(test_data_file).read().strip()
    except IOError:
      test_data = ''

308 309 310
    for hash_type, hash_value in hash_value_dict.items():
      runtime_data = runtime_data.replace(hash_value, '{hash-%s}' % (
        hash_type),)
311

Łukasz Nowak's avatar
Łukasz Nowak committed
312 313
    maxDiff = self.maxDiff
    self.maxDiff = None
314 315
    longMessage = self.longMessage
    self.longMessage = True
Łukasz Nowak's avatar
Łukasz Nowak committed
316 317 318
    try:
      self.assertMultiLineEqual(
        test_data,
319 320
        runtime_data,
        msg=msg
Łukasz Nowak's avatar
Łukasz Nowak committed
321 322 323 324 325 326 327
      )
    except AssertionError:
      if os.environ.get('SAVE_TEST_DATA', '0') == '1':
        open(test_data_file, 'w').write(runtime_data.strip())
      raise
    finally:
      self.maxDiff = maxDiff
328
      self.longMessage = longMessage
Łukasz Nowak's avatar
Łukasz Nowak committed
329

330 331 332
  def _test_file_list(self, slave_dir_list, IGNORE_PATH_LIST=None):
    if IGNORE_PATH_LIST is None:
      IGNORE_PATH_LIST = []
Łukasz Nowak's avatar
Łukasz Nowak committed
333
    runtime_data = []
334 335
    for slave_var in glob.glob(os.path.join(self.instance_path, '*')):
      for entry in os.walk(os.path.join(slave_var, *slave_dir_list)):
Łukasz Nowak's avatar
Łukasz Nowak committed
336 337 338 339 340 341 342 343 344
        for filename in entry[2]:
          path = os.path.join(
            entry[0][len(self.instance_path) + 1:], filename)
          if not any([path.endswith(q) for q in IGNORE_PATH_LIST]):
            runtime_data.append(path)
    runtime_data = '\n'.join(sorted(runtime_data))
    self.assertTestData(runtime_data)

  def test_file_list_log(self):
345
    self._test_file_list(['var', 'log'], [
346 347
      # no control at all when cron would kick in, ignore it
      'cron.log',
348 349 350 351 352
      # appears late and is quite unstable, no need to assert
      'trafficserver/.diags.log.meta',
      'trafficserver/.manager.log.meta',
      'trafficserver/.squid.log.meta',
      'trafficserver/.traffic.out.meta',
Łukasz Nowak's avatar
Łukasz Nowak committed
353
      'trafficserver/diags.log',
354
      'trafficserver/squid.log',
355
      # not important, appears sometimes
356 357
      'trafficserver/.error.log.meta',
      'trafficserver/error.log',
Łukasz Nowak's avatar
Łukasz Nowak committed
358 359 360
    ])

  def test_file_list_run(self):
361
    self._test_file_list(['var', 'run'], [
362 363 364
      # can't be sure regarding its presence
      'caddy_configuration_last_state',
      'validate_configuration_state_signature',
Łukasz Nowak's avatar
Łukasz Nowak committed
365 366 367 368
      # run by cron from time to time
      'monitor/monitor-collect.pid',
    ])

369 370 371
  def test_file_list_etc_cron_d(self):
    self._test_file_list(['etc', 'cron.d'])

Łukasz Nowak's avatar
Łukasz Nowak committed
372 373 374
  def test_supervisor_state(self):
    # give a chance for etc/run scripts to finish
    time.sleep(1)
375

376 377 378
    hash_file_list = [os.path.join(
        self.computer_partition_root_path, 'software_release/buildout.cfg')]
    hash_value_dict = {
379
      'generic': generateHashFromFiles(hash_file_list),
380 381 382 383 384
    }
    for caddy_wrapper_path in glob.glob(os.path.join(
      self.instance_path, '*', 'bin', 'caddy-wrapper')):
      partition_id = caddy_wrapper_path.split('/')[-3]
      hash_value_dict[
385
        'caddy-%s' % (partition_id)] = generateHashFromFiles(
386
        [caddy_wrapper_path] + hash_file_list
387
      )
388 389 390 391 392 393 394
    for rejected_slave_publish_path in glob.glob(os.path.join(
      self.instance_path, '*', 'etc', 'Caddyfile-rejected-slave')):
      partition_id = rejected_slave_publish_path.split('/')[-3]
      rejected_slave_pem_path = os.path.join(
        self.instance_path, partition_id, 'etc', 'rejected-slave.pem')
      hash_value_dict[
        'rejected-slave-publish'
395
      ] = generateHashFromFiles(
396
        [rejected_slave_publish_path, rejected_slave_pem_path] + hash_file_list
397
      )
398

Łukasz Nowak's avatar
Łukasz Nowak committed
399
    runtime_data = self.getTrimmedProcessInfo()
400
    self.assertTestData(runtime_data, hash_value_dict=hash_value_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
401

402 403 404 405
  def test_promise_run_plugin(self):
    ignored_plugin_list = [
      '__init__.py',  # that's not a plugin
      'monitor-http-frontend.py',  # can't check w/o functioning frontend
406 407
      # ATS cache fillup can't be really controlled during test run
      'trafficserver-cache-availability.py',
408 409 410 411 412
    ]
    runpromise_bin = os.path.join(
      self.software_path, 'bin', 'monitor.runpromise')
    partition_path_list = glob.glob(os.path.join(self.instance_path, '*'))
    promise_status_list = []
413
    msg = []
414 415 416 417 418 419 420 421 422 423
    for partition_path in sorted(partition_path_list):
      plugin_path_list = sorted(glob.glob(
          os.path.join(partition_path, 'etc', 'plugin', '*.py')
      ))
      strip = len(os.path.join(partition_path, 'etc', 'plugin')) + 1
      for plugin_path in plugin_path_list:
        monitor_conf = os.path.join(partition_path, 'etc', 'monitor.conf')
        plugin = plugin_path[strip:]
        if plugin in ignored_plugin_list:
          continue
424 425 426 427 428 429
        # reset frontend-caddy-configuration-promise.py state
        if plugin == 'frontend-caddy-configuration-promise.py':
          validate_path = os.path.join(
            partition_path, 'bin', 'frontend-caddy-validate')
          if os.path.exists(validate_path):
            subprocess_status_output(validate_path)
430 431 432
        plugin_status, plugin_result = subprocess_status_output([
          runpromise_bin,
          '-c', monitor_conf,
433 434 435
          '--run-only', plugin,
          '--force',
          '--check-anomaly'
436
        ])
437 438 439
        if plugin_status == 1:
          msg.append(plugin_result)

440 441 442
        # sanity check
        if 'Checking promise %s' % plugin not in plugin_result:
          plugin_status = 1
443
          msg.append(plugin_result)
444 445 446 447 448
        promise_status_list.append(
          '%s: %s' % (
            plugin_path[len(self.instance_path) + 1:],
            plugin_status == 0 and 'OK' or 'ERROR'))

449 450 451
    if msg:
      msg = ''.join(msg).strip()
    self.assertTestData('\n'.join(promise_status_list), msg=(msg or None))
452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468

  def test_promise_run_promise(self):
    partition_path_list = glob.glob(os.path.join(self.instance_path, '*'))
    promise_status_list = []
    for partition_path in sorted(partition_path_list):
      promise_path_list = sorted(glob.glob(
          os.path.join(partition_path, 'etc', 'promise', '*')
      ))
      for promise_path in promise_path_list:
        promise_result = subprocess.call([promise_path])
        promise_status_list.append(
          '%s: %s' % (
            promise_path[len(self.instance_path) + 1:],
            promise_result == 0 and 'OK' or 'ERROR'))

    self.assertTestData('\n'.join(promise_status_list))

Łukasz Nowak's avatar
Łukasz Nowak committed
469

470
class HttpFrontendTestCase(SlapOSInstanceTestCase):
471 472 473
  # show full diffs, as it is required for proper analysis of problems
  maxDiff = None

474 475 476 477 478 479 480 481 482 483 484 485 486
  @classmethod
  def setUpClass(cls):
    super(HttpFrontendTestCase, cls).setUpClass()
    # extra class attributes used in HttpFrontendTestCase

    # expose instance directory
    cls.instance_path = os.path.join(
        cls.config['working_directory'],
        'inst')
    # expose software directory, extract from found computer partition
    cls.software_path = os.path.realpath(os.path.join(
        cls.computer_partition_root_path, 'software_release'))

487
  def assertLogAccessUrlWithPop(self, parameter_dict):
Łukasz Nowak's avatar
Łukasz Nowak committed
488 489
    log_access_url = parameter_dict.pop('log-access-url')

490
    self.assertTrue(len(log_access_url) >= 1)
Łukasz Nowak's avatar
Łukasz Nowak committed
491
    # check only the first one, as second frontend will be stopped
492
    log_access = log_access_url[0]
Łukasz Nowak's avatar
Łukasz Nowak committed
493 494 495 496 497 498
    entry = log_access.split(': ')
    if len(entry) != 2:
      self.fail('Cannot parse %r' % (log_access,))
    frontend, url = entry
    result = requests.get(url, verify=False)
    self.assertEqual(
499
      httplib.OK,
500
      result.status_code,
Łukasz Nowak's avatar
Łukasz Nowak committed
501 502 503
      'While accessing %r of %r the status code was %r' % (
        url, frontend, result.status_code))

504 505 506 507 508 509 510 511 512 513 514 515 516 517 518
  def assertKedifaKeysWithPop(self, parameter_dict, prefix=''):
    generate_auth_url = parameter_dict.pop('%skey-generate-auth-url' % (
      prefix,))
    upload_url = parameter_dict.pop('%skey-upload-url' % (prefix,))
    base = '^' + KEDIFA_IPV6_BASE.replace(
      '[', r'\[').replace(']', r'\]') + '/.{32}'
    self.assertRegexpMatches(
      generate_auth_url,
      base + r'\/generateauth$'
    )
    self.assertRegexpMatches(
      upload_url,
      base + r'\?auth=$'
    )

519 520 521 522 523 524
    kedifa_caucase_url = parameter_dict.pop('kedifa-caucase-url')
    self.assertEqual(
      kedifa_caucase_url,
      'http://[%s]:%s' % (SLAPOS_TEST_IPV6, CAUCASE_PORT),
    )

525 526
    return generate_auth_url, upload_url

Łukasz Nowak's avatar
Łukasz Nowak committed
527 528 529 530 531 532 533 534 535 536
  def assertKeyWithPop(self, key, d):
    self.assertTrue(key in d, 'Key %r is missing in %r' % (key, d))
    d.pop(key)

  def assertEqualResultJson(self, result, key, value):
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertTrue(key in j, 'No key %r in %s' % (key, j))
537
    self.assertEqual(value, j[key])
Łukasz Nowak's avatar
Łukasz Nowak committed
538

539 540 541 542 543
  def parseParameterDict(self, parameter_dict):
    parsed_parameter_dict = {}
    for key, value in parameter_dict.items():
      if key in [
        'rejected-slave-dict',
544 545
        'warning-slave-dict',
        'warning-list',
546 547 548 549 550 551 552 553 554 555 556
        'request-error-list',
        'log-access-url']:
        value = json.loads(value)
      parsed_parameter_dict[key] = value
    return parsed_parameter_dict

  def parseConnectionParameterDict(self):
    return self.parseParameterDict(
      self.computer_partition.getConnectionParameterDict()
    )

557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578
  @classmethod
  def runComputerPartitionUntil(cls, until):
    max_try = 10
    try_num = 1
    while True:
      if try_num > max_try:
        raise ValueError('Failed to run computer partition with %r' % (until,))
      cls.runComputerPartition(max_quantity=1)
      if until():
        break
      try_num += 1

  @classmethod
  def untilNotReadyYetNotInMasterKeyGenerateAuthUrl(cls):
    parameter_dict = cls.computer_partition.getConnectionParameterDict()
    key = 'master-key-generate-auth-url'
    if key not in parameter_dict:
      return False
    if 'NotReadyYet' in parameter_dict[key]:
      return False
    return True

Łukasz Nowak's avatar
Łukasz Nowak committed
579 580 581 582 583 584 585 586

class TestMasterRequest(HttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
587 588
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
589 590 591
    }

  def test(self):
592 593 594
    # run partition until AIKC finishes
    self.runComputerPartitionUntil(
      self.untilNotReadyYetNotInMasterKeyGenerateAuthUrl)
595
    parameter_dict = self.parseConnectionParameterDict()
Łukasz Nowak's avatar
Łukasz Nowak committed
596
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
597
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
598
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
599 600
    self.assertEqual(
      {
601
        'monitor-base-url': 'None',
Łukasz Nowak's avatar
Łukasz Nowak committed
602 603 604 605
        'domain': 'None',
        'accepted-slave-amount': '0',
        'rejected-slave-amount': '0',
        'slave-amount': '0',
606
        'rejected-slave-dict': {}},
Łukasz Nowak's avatar
Łukasz Nowak committed
607 608 609 610 611 612 613 614 615 616 617 618
      parameter_dict
    )


class TestMasterRequestDomain(HttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
619 620
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
621 622 623
    }

  def test(self):
624 625 626
    # run partition until AIKC finishes
    self.runComputerPartitionUntil(
      self.untilNotReadyYetNotInMasterKeyGenerateAuthUrl)
627
    parameter_dict = self.parseConnectionParameterDict()
Łukasz Nowak's avatar
Łukasz Nowak committed
628
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
629
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
630
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
631 632 633

    self.assertEqual(
      {
634
        'monitor-base-url': 'None',
Łukasz Nowak's avatar
Łukasz Nowak committed
635 636 637 638
        'domain': 'example.com',
        'accepted-slave-amount': '0',
        'rejected-slave-amount': '0',
        'slave-amount': '0',
639
        'rejected-slave-dict': {}
Łukasz Nowak's avatar
Łukasz Nowak committed
640 641 642 643 644
      },
      parameter_dict
    )


645 646
class TestHandler(BaseHTTPRequestHandler):
  def do_GET(self):
647
    timeout = int(self.headers.dict.get('timeout', '0'))
648
    compress = int(self.headers.dict.get('compress', '0'))
649
    time.sleep(timeout)
650
    self.send_response(200)
651

652 653 654
    drop_header_list = []
    for header in self.headers.dict.get('x-drop-header', '').split():
      drop_header_list.append(header)
655
    prefix = 'x-reply-header-'
656
    length = len(prefix)
657 658 659
    for key, value in self.headers.dict.items():
      if key.startswith(prefix):
        self.send_header(
660
          '-'.join([q.capitalize() for q in key[length:].split('-')]),
661 662 663
          value.strip()
        )

664 665 666 667 668 669 670 671 672 673 674 675 676 677
    if 'Content-Type' not in drop_header_list:
      self.send_header("Content-Type", "application/json")
    if 'Set-Cookie' not in drop_header_list:
      self.send_header('Set-Cookie', 'secured=value;secure')
      self.send_header('Set-Cookie', 'nonsecured=value')

    if 'x-reply-body' not in self.headers.dict:
      response = {
        'Path': self.path,
        'Incoming Headers': self.headers.dict
      }
      response = json.dumps(response, indent=2)
    else:
      response = base64.b64decode(self.headers.dict['x-reply-body'])
678 679 680 681 682 683
    if compress:
      self.send_header('Content-Encoding', 'gzip')
      out = StringIO.StringIO()
      # compress with level 0, to find out if in the middle someting would
      # like to alter the compression
      with gzip.GzipFile(fileobj=out, mode="w", compresslevel=0) as f:
684 685 686 687 688
        f.write(response)
      response = out.getvalue()
      self.send_header('Backend-Content-Length', len(response))
    if 'Content-Length' not in drop_header_list:
      self.send_header('Content-Length', len(response))
689
    self.end_headers()
690
    self.wfile.write(response)
691 692


Łukasz Nowak's avatar
Łukasz Nowak committed
693 694 695 696
class SlaveHttpFrontendTestCase(HttpFrontendTestCase):
  @classmethod
  def startServerProcess(cls):
    server = HTTPServer(
697
      (SLAPOS_TEST_IPV4, findFreeTCPPort(SLAPOS_TEST_IPV4)),
698
      TestHandler)
Łukasz Nowak's avatar
Łukasz Nowak committed
699 700

    server_https = HTTPServer(
701
      (SLAPOS_TEST_IPV4, findFreeTCPPort(SLAPOS_TEST_IPV4)),
702
      TestHandler)
Łukasz Nowak's avatar
Łukasz Nowak committed
703

704
    cls.another_server_ca = CertificateAuthority("Another Server Root CA")
705 706
    cls.test_server_ca = CertificateAuthority("Test Server Root CA")
    key, key_pem, csr, csr_pem = createCSR(
707
      "testserver.example.com", SLAPOS_TEST_IPV4)
708 709 710 711 712 713 714 715 716 717
    _, cls.test_server_certificate_pem = cls.test_server_ca.signCSR(csr)

    cls.test_server_certificate_file = tempfile.NamedTemporaryFile(
      delete=False
    )

    cls.test_server_certificate_file.write(
        cls.test_server_certificate_pem + key_pem
      )
    cls.test_server_certificate_file.close()
Łukasz Nowak's avatar
Łukasz Nowak committed
718 719
    server_https.socket = ssl.wrap_socket(
      server_https.socket,
720
      certfile=cls.test_server_certificate_file.name,
Łukasz Nowak's avatar
Łukasz Nowak committed
721 722
      server_side=True)

723
    cls.backend_url = 'http://%s:%s/' % server.server_address
Łukasz Nowak's avatar
Łukasz Nowak committed
724 725
    cls.server_process = multiprocessing.Process(target=server.serve_forever)
    cls.server_process.start()
726
    cls.backend_https_url = 'https://%s:%s/' % server_https.server_address
Łukasz Nowak's avatar
Łukasz Nowak committed
727 728 729 730 731 732
    cls.server_https_process = multiprocessing.Process(
      target=server_https.serve_forever)
    cls.server_https_process.start()

  @classmethod
  def stopServerProcess(cls):
733 734
    if getattr(cls, 'test_server_certificate_file', None) is not None:
      os.unlink(cls.test_server_certificate_file.name)
735 736 737 738
    for server in ['server_process', 'server_https_process']:
      process = getattr(cls, server, None)
      if process is not None:
        process.terminate()
Łukasz Nowak's avatar
Łukasz Nowak committed
739

740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760
  @classmethod
  def setUpMaster(cls):
    # run partition until AIKC finishes
    cls.runComputerPartitionUntil(
      cls.untilNotReadyYetNotInMasterKeyGenerateAuthUrl)
    parameter_dict = cls.computer_partition.getConnectionParameterDict()
    ca_certificate = requests.get(
      parameter_dict['kedifa-caucase-url'] + '/cas/crt/ca.crt.pem')
    assert ca_certificate.status_code == httplib.OK
    cls.ca_certificate_file = os.path.join(cls.working_directory, 'ca.crt.pem')
    open(cls.ca_certificate_file, 'w').write(ca_certificate.text)
    auth = requests.get(
      parameter_dict['master-key-generate-auth-url'],
      verify=cls.ca_certificate_file)
    assert auth.status_code == httplib.CREATED
    upload = requests.put(
      parameter_dict['master-key-upload-url'] + auth.text,
      data=cls.key_pem + cls.certificate_pem,
      verify=cls.ca_certificate_file)
    assert upload.status_code == httplib.CREATED

761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785
  @classmethod
  def runKedifaUpdater(cls):
    kedifa_updater = None
    for kedifa_updater in sorted(glob.glob(
        os.path.join(
          cls.instance_path, '*', 'etc', 'service', 'kedifa-updater*'))):
      # fetch first kedifa-updater, as by default most of the tests are using
      # only one running partition; in case if test does not need
      # kedifa-updater this method can be overridden
      break
    if kedifa_updater is not None:
      # try few times kedifa_updater
      for i in range(10):
        return_code, output = subprocess_status_output(
          [kedifa_updater, '--once'])
        if return_code == 0:
          break
        # wait for the other updater to work
        time.sleep(2)
      # assert that in the worst case last run was correct
      assert return_code == 0, output
      # give caddy a moment to refresh its config, as sending signal does not
      # block until caddy is refreshed
      time.sleep(2)

786 787
  @classmethod
  def untilSlavePartitionReady(cls):
788 789 790 791 792 793 794 795
    # all on-watch services shall not be exited
    for process in cls.getSupervisorRPCServer()\
      .supervisor.getAllProcessInfo():
      if process['name'].endswith('-on-watch') and \
        process['statename'] == 'EXITED':
        if process['name'].startswith('monitor-http'):
          continue
        return False
796 797
    for slave_reference, partition_parameter_kw in cls\
            .getSlaveParameterDictDict().items():
798 799
      parameter_dict = cls.request(
        software_release=cls.getSoftwareURL(),
800 801 802 803 804 805 806 807 808 809 810 811 812
        partition_reference=slave_reference,
        partition_parameter_kw=partition_parameter_kw,
        shared=True
      ).getConnectionParameterDict()

      log_access_ready = 'log-access-url' in parameter_dict
      key = 'key-generate-auth-url'
      key_generate_auth_ready = key in parameter_dict \
          and 'NotReadyYet' not in parameter_dict[key]
      if log_access_ready and key_generate_auth_ready:
        return True
    return False

Łukasz Nowak's avatar
Łukasz Nowak committed
813 814 815
  @classmethod
  def setUpSlaves(cls):
    cls.slave_connection_parameter_dict_dict = {}
816
    request = cls.slap.request
Łukasz Nowak's avatar
Łukasz Nowak committed
817 818 819
    for slave_reference, partition_parameter_kw in cls\
            .getSlaveParameterDictDict().items():
      slave_instance = request(
820
        software_release=cls.getSoftwareURL(),
Łukasz Nowak's avatar
Łukasz Nowak committed
821 822 823 824
        partition_reference=slave_reference,
        partition_parameter_kw=partition_parameter_kw,
        shared=True
      )
825 826 827
    # run partition for slaves to be setup
    cls.runComputerPartitionUntil(
      cls.untilSlavePartitionReady)
Łukasz Nowak's avatar
Łukasz Nowak committed
828 829 830
    for slave_reference, partition_parameter_kw in cls\
            .getSlaveParameterDictDict().items():
      slave_instance = request(
831
        software_release=cls.getSoftwareURL(),
Łukasz Nowak's avatar
Łukasz Nowak committed
832 833 834 835 836 837 838
        partition_reference=slave_reference,
        partition_parameter_kw=partition_parameter_kw,
        shared=True
      )
      cls.slave_connection_parameter_dict_dict[slave_reference] = \
          slave_instance.getConnectionParameterDict()

839 840 841
  @classmethod
  def createWildcardExampleComCertificate(cls):
    _, cls.key_pem, _, cls.certificate_pem = createSelfSignedCertificate(
842 843 844 845 846
      [
        '*.customdomain.example.com',
        '*.example.com',
        '*.alias1.example.com',
      ])
847

Łukasz Nowak's avatar
Łukasz Nowak committed
848 849 850
  @classmethod
  def setUpClass(cls):
    try:
851
      cls.createWildcardExampleComCertificate()
Łukasz Nowak's avatar
Łukasz Nowak committed
852 853
      cls.startServerProcess()
      super(SlaveHttpFrontendTestCase, cls).setUpClass()
854 855 856 857 858 859
      cls.setup_master_exception = None
      cls.setup_slave_exception = None
      # Swallow setup master and slave exceptions, as not all tests depend on
      # it, and can provide important information about bad state of the
      # test environment
      cls.setUpMaster()
Łukasz Nowak's avatar
Łukasz Nowak committed
860 861 862 863 864 865 866 867 868 869 870 871 872 873
      cls.setUpSlaves()
    except Exception:
      cls.tearDownClass()
      raise

  @classmethod
  def tearDownClass(cls):
    super(SlaveHttpFrontendTestCase, cls).tearDownClass()
    cls.stopServerProcess()

  def fakeHTTPSResult(self, domain, real_ip, path, port=HTTPS_PORT,
                      headers=None, cookies=None, source_ip=None):
    if headers is None:
      headers = {}
874 875 876
    # workaround request problem of setting Accept-Encoding
    # https://github.com/requests/requests/issues/2234
    headers.setdefault('Accept-Encoding', 'dummy')
Łukasz Nowak's avatar
Łukasz Nowak committed
877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897
    session = requests.Session()
    session.mount(
      'https://%s:%s' % (domain, port),
      ForcedIPHTTPSAdapter(
        dest_ip=real_ip))
    if source_ip is not None:
      new_source = source.SourceAddressAdapter(source_ip)
      session.mount('http://', new_source)
      session.mount('https://', new_source)
    return session.get(
      'https://%s:%s/%s' % (domain, port, path),
      verify=False,
      allow_redirects=False,
      headers=headers,
      cookies=cookies
    )

  def fakeHTTPResult(self, domain, real_ip, path, port=HTTP_PORT,
                     headers=None):
    if headers is None:
      headers = {}
898 899 900
    # workaround request problem of setting Accept-Encoding
    # https://github.com/requests/requests/issues/2234
    headers.setdefault('Accept-Encoding', 'dummy')
Łukasz Nowak's avatar
Łukasz Nowak committed
901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
    headers['Host'] = domain
    return requests.get(
      'http://%s:%s/%s' % (real_ip, port, path),
      headers=headers,
      allow_redirects=False,
    )

  def patchRequests(self):
    HTTPResponse = requests.packages.urllib3.response.HTTPResponse
    HTTPResponse.orig__init__ = HTTPResponse.__init__

    def new_HTTPResponse__init__(self, *args, **kwargs):
      self.orig__init__(*args, **kwargs)
      try:
        self.peercert = self._connection.sock.getpeercert(binary_form=True)
      except AttributeError:
        pass
    HTTPResponse.__init__ = new_HTTPResponse__init__

    HTTPAdapter = requests.adapters.HTTPAdapter
    HTTPAdapter.orig_build_response = HTTPAdapter.build_response

    def new_HTTPAdapter_build_response(self, request, resp):
      response = self.orig_build_response(request, resp)
      try:
        response.peercert = resp.peercert
      except AttributeError:
        pass
      return response
    HTTPAdapter.build_response = new_HTTPAdapter_build_response

  def unpatchRequests(self):
    HTTPResponse = requests.packages.urllib3.response.HTTPResponse
    if getattr(HTTPResponse, 'orig__init__', None) is not None:
      HTTPResponse.__init__ = HTTPResponse.orig__init__
      del(HTTPResponse.orig__init__)

    HTTPAdapter = requests.adapters.HTTPAdapter
    if getattr(HTTPAdapter, 'orig_build_response', None) is not None:
      HTTPAdapter.build_response = HTTPAdapter.orig_build_response
      del(HTTPAdapter.orig_build_response)

  def setUp(self):
    # patch requests in order to being able to extract SSL certs
    self.patchRequests()

  def tearDown(self):
    self.unpatchRequests()

950 951 952 953 954 955 956
  def parseSlaveParameterDict(self, key):
    return self.parseParameterDict(
      self.slave_connection_parameter_dict_dict[
        key
      ]
    )

957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975
  def assertSlaveBase(self, reference):
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, '')
    hostname = reference.translate(None, '_-').lower()
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    return parameter_dict

976 977 978 979 980 981 982 983
  def getMasterPartitionPath(self):
    return '/' + os.path.join(
      *glob.glob(
        os.path.join(
          self.instance_path, '*', 'etc', 'Caddyfile-rejected-slave'
        )
      )[0].split('/')[:-2])

Łukasz Nowak's avatar
Łukasz Nowak committed
984 985

class TestSlave(SlaveHttpFrontendTestCase, TestDataMixin):
986 987 988
  caddy_custom_https = '''# caddy_custom_https_filled_in_accepted
https://caddycustomhttpsaccepted.example.com:%%(https_port)s {
  bind %%(local_ipv4)s
989
  tls %%(certificate)s %%(certificate)s
990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018

  log / %%(access_log)s {combined}
  errors %%(error_log)s

  proxy / %(url)s {
    transparent
    timeout 600s
    insecure_skip_verify
  }
}
'''

  caddy_custom_http = '''# caddy_custom_http_filled_in_accepted
http://caddycustomhttpsaccepted.example.com:%%(http_port)s {
  bind %%(local_ipv4)s
  log / %%(access_log)s {combined}
  errors %%(error_log)s

  proxy / %(url)s {
    transparent
    timeout 600s
    insecure_skip_verify
  }
}
'''

  apache_custom_https = '''# apache_custom_https_filled_in_accepted
https://apachecustomhttpsaccepted.example.com:%%(https_port)s {
  bind %%(local_ipv4)s
1019
  tls %%(certificate)s %%(certificate)s
1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045

  log / %%(access_log)s {combined}
  errors %%(error_log)s

  proxy / %(url)s {
    transparent
    timeout 600s
    insecure_skip_verify
  }
}
'''

  apache_custom_http = '''# apache_custom_http_filled_in_accepted
http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
  bind %%(local_ipv4)s
  log / %%(access_log)s {combined}
  errors %%(error_log)s

  proxy / %(url)s {
    transparent
    timeout 600s
    insecure_skip_verify
  }
}
'''

Łukasz Nowak's avatar
Łukasz Nowak committed
1046 1047 1048 1049
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
1050
      'public-ipv4': SLAPOS_TEST_IPV4,
1051 1052
      '-frontend-authorized-slave-string':
      '_apache_custom_http_s-accepted _caddy_custom_http_s-accepted',
Łukasz Nowak's avatar
Łukasz Nowak committed
1053 1054 1055 1056
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
1057 1058
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
1059
      'mpm-graceful-shutdown-timeout': 2,
1060
      'request-timeout': '12',
Łukasz Nowak's avatar
Łukasz Nowak committed
1061 1062
    }

1063 1064 1065 1066 1067 1068 1069
  @classmethod
  def setUpSlaves(cls):
    cls.ca = CertificateAuthority('TestSlave')
    _, cls.customdomain_ca_key_pem, csr, _ = createCSR(
      'customdomainsslcrtsslkeysslcacrt.example.com')
    _, cls.customdomain_ca_certificate_pem = cls.ca.signCSR(csr)
    _, cls.customdomain_key_pem, _, cls.customdomain_certificate_pem = \
1070
        createSelfSignedCertificate(['customdomainsslcrtsslkey.example.com'])
1071 1072
    super(TestSlave, cls).setUpSlaves()

Łukasz Nowak's avatar
Łukasz Nowak committed
1073 1074 1075 1076 1077
  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'empty': {
      },
1078
      'Url': {
Łukasz Nowak's avatar
Łukasz Nowak committed
1079 1080 1081
        'url': cls.backend_url,
      },
      'url_https-url': {
1082 1083
        'url': cls.backend_url + 'http',
        'https-url': cls.backend_url + 'https',
Łukasz Nowak's avatar
Łukasz Nowak committed
1084 1085 1086 1087 1088
      },
      'server-alias': {
        'url': cls.backend_url,
        'server-alias': 'alias1.example.com alias2.example.com',
      },
1089 1090 1091 1092
      'server-alias-wildcard': {
        'url': cls.backend_url,
        'server-alias': '*.alias1.example.com',
      },
1093 1094 1095 1096 1097 1098 1099 1100 1101
      'server-alias-duplicated': {
        'url': cls.backend_url,
        'server-alias': 'alias3.example.com alias3.example.com',
      },
      'server-alias_custom_domain-duplicated': {
        'url': cls.backend_url,
        'custom_domain': 'alias4.example.com',
        'server-alias': 'alias4.example.com alias4.example.com',
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1102 1103 1104
      'ssl-proxy-verify_ssl_proxy_ca_crt': {
        'url': cls.backend_https_url,
        'ssl-proxy-verify': True,
1105
        'ssl_proxy_ca_crt': cls.test_server_ca.certificate_pem,
Łukasz Nowak's avatar
Łukasz Nowak committed
1106
      },
1107 1108 1109 1110 1111
      'ssl-proxy-verify_ssl_proxy_ca_crt_damaged': {
        'url': cls.backend_https_url,
        'ssl-proxy-verify': True,
        'ssl_proxy_ca_crt': 'damaged',
      },
1112 1113 1114 1115 1116
      'ssl-proxy-verify_ssl_proxy_ca_crt-unverified': {
        'url': cls.backend_https_url,
        'ssl-proxy-verify': True,
        'ssl_proxy_ca_crt': cls.another_server_ca.certificate_pem,
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1117 1118 1119 1120 1121 1122 1123 1124 1125 1126
      'ssl-proxy-verify-unverified': {
        'url': cls.backend_https_url,
        'ssl-proxy-verify': True,
      },
      'https-only': {
        'url': cls.backend_url,
        'https-only': True,
      },
      'custom_domain': {
        'url': cls.backend_url,
1127
        'custom_domain': 'mycustomdomain.example.com',
Łukasz Nowak's avatar
Łukasz Nowak committed
1128
      },
1129 1130 1131 1132
      'custom_domain_wildcard': {
        'url': cls.backend_url,
        'custom_domain': '*.customdomain.example.com',
      },
1133 1134 1135 1136 1137
      'custom_domain_server_alias': {
        'url': cls.backend_url,
        'custom_domain': 'mycustomdomainserveralias.example.com',
        'server-alias': 'mycustomdomainserveralias1.example.com',
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1138 1139 1140 1141
      'custom_domain_ssl_crt_ssl_key': {
        'url': cls.backend_url,
        'custom_domain': 'customdomainsslcrtsslkey.example.com',
      },
1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154
      'custom_domain_ssl_crt_ssl_key_ssl_ca_crt': {
        'url': cls.backend_url,
        'custom_domain': 'customdomainsslcrtsslkeysslcacrt.example.com',
      },
      'ssl_ca_crt_only': {
        'url': cls.backend_url,
      },
      'ssl_ca_crt_garbage': {
        'url': cls.backend_url,
      },
      'ssl_ca_crt_does_not_match': {
        'url': cls.backend_url,
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1155 1156 1157 1158
      'type-zope': {
        'url': cls.backend_url,
        'type': 'zope',
      },
1159 1160 1161 1162 1163
      'type-zope-prefer-gzip-encoding-to-backend': {
        'url': cls.backend_url,
        'prefer-gzip-encoding-to-backend': 'true',
        'type': 'zope',
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1164 1165 1166 1167
      'type-zope-ssl-proxy-verify_ssl_proxy_ca_crt': {
        'url': cls.backend_https_url,
        'type': 'zope',
        'ssl-proxy-verify': True,
1168
        'ssl_proxy_ca_crt': cls.test_server_ca.certificate_pem,
Łukasz Nowak's avatar
Łukasz Nowak committed
1169
      },
1170 1171 1172 1173 1174 1175
      'type-zope-ssl-proxy-verify_ssl_proxy_ca_crt-unverified': {
        'url': cls.backend_https_url,
        'type': 'zope',
        'ssl-proxy-verify': True,
        'ssl_proxy_ca_crt': cls.another_server_ca.certificate_pem,
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193
      'type-zope-ssl-proxy-verify-unverified': {
        'url': cls.backend_https_url,
        'type': 'zope',
        'ssl-proxy-verify': True,
      },
      'type-zope-virtualhostroot-http-port': {
        'url': cls.backend_url,
        'type': 'zope',
        'virtualhostroot-http-port': '12345'
      },
      'type-zope-virtualhostroot-https-port': {
        'url': cls.backend_url,
        'type': 'zope',
        'virtualhostroot-https-port': '12345'
      },
      'type-zope-path': {
        'url': cls.backend_url,
        'type': 'zope',
1194
        'path': '///path/to/some/resource///',
Łukasz Nowak's avatar
Łukasz Nowak committed
1195 1196 1197 1198
      },
      'type-zope-default-path': {
        'url': cls.backend_url,
        'type': 'zope',
1199
        'default-path': '///default-path/to/some/resource///',
Łukasz Nowak's avatar
Łukasz Nowak committed
1200 1201 1202 1203 1204
      },
      'type-notebook': {
        'url': cls.backend_url,
        'type': 'notebook',
      },
1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224
      'type-websocket': {
        'url': cls.backend_url,
        'type': 'websocket',
      },
      'type-websocket-websocket-path-list': {
        'url': cls.backend_url,
        'type': 'websocket',
        'websocket-path-list': '////ws//// /with%20space/',
      },
      'type-websocket-websocket-transparent-false': {
        'url': cls.backend_url,
        'type': 'websocket',
        'websocket-transparent': 'false',
      },
      'type-websocket-websocket-path-list-websocket-transparent-false': {
        'url': cls.backend_url,
        'type': 'websocket',
        'websocket-path-list': '////ws//// /with%20space/',
        'websocket-transparent': 'false',
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236
      'type-eventsource': {
        'url': cls.backend_url,
        'type': 'eventsource',
      },
      'type-redirect': {
        'url': cls.backend_url,
        'type': 'redirect',
      },
      'enable_cache': {
        'url': cls.backend_url,
        'enable_cache': True,
      },
1237 1238 1239 1240 1241 1242 1243 1244 1245 1246
      'enable_cache_custom_domain': {
        'url': cls.backend_url,
        'enable_cache': True,
        'custom_domain': 'customdomainenablecache.example.com',
      },
      'enable_cache_server_alias': {
        'url': cls.backend_url,
        'enable_cache': True,
        'server-alias': 'enablecacheserveralias1.example.com',
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268
      'enable_cache-disable-no-cache-request': {
        'url': cls.backend_url,
        'enable_cache': True,
        'disable-no-cache-request': True,
      },
      'enable_cache-disable-via-header': {
        'url': cls.backend_url,
        'enable_cache': True,
        'disable-via-header': True,
      },
      'enable-http2-false': {
        'url': cls.backend_url,
        'enable-http2': False,
      },
      'enable_cache-ssl-proxy-verify-unverified': {
        'url': cls.backend_https_url,
        'enable_cache': True,
        'ssl-proxy-verify': True,
      },
      'enable_cache-ssl-proxy-verify_ssl_proxy_ca_crt': {
        'url': cls.backend_https_url,
        'enable_cache': True,
1269
        'ssl_proxy_ca_crt': cls.test_server_ca.certificate_pem,
Łukasz Nowak's avatar
Łukasz Nowak committed
1270 1271
        'ssl-proxy-verify': True,
      },
1272 1273 1274 1275 1276 1277
      'enable_cache-ssl-proxy-verify_ssl_proxy_ca_crt-unverified': {
        'url': cls.backend_https_url,
        'enable_cache': True,
        'ssl_proxy_ca_crt': cls.another_server_ca.certificate_pem,
        'ssl-proxy-verify': True,
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1278 1279 1280 1281 1282 1283 1284 1285 1286 1287
      'enable-http2-default': {
        'url': cls.backend_url,
      },
      'apache_custom_http_s-rejected': {
        'url': cls.backend_url,
        'apache_custom_https': '# apache_custom_https_filled_in_rejected',
        'apache_custom_http': '# apache_custom_http_filled_in_rejected',
      },
      'apache_custom_http_s-accepted': {
        'url': cls.backend_url,
1288 1289 1290 1291
        'apache_custom_https': cls.apache_custom_https % dict(
          url=cls.backend_url),
        'apache_custom_http': cls.apache_custom_http % dict(
          url=cls.backend_url),
Łukasz Nowak's avatar
Łukasz Nowak committed
1292
      },
1293 1294 1295 1296 1297 1298 1299
      'caddy_custom_http_s-rejected': {
        'url': cls.backend_url,
        'caddy_custom_https': '# caddy_custom_https_filled_in_rejected',
        'caddy_custom_http': '# caddy_custom_http_filled_in_rejected',
      },
      'caddy_custom_http_s-accepted': {
        'url': cls.backend_url,
1300 1301 1302 1303
        'caddy_custom_https': cls.caddy_custom_https % dict(
          url=cls.backend_url),
        'caddy_custom_http': cls.caddy_custom_http % dict(
          url=cls.backend_url),
1304
      },
1305 1306 1307 1308 1309 1310
      # this has to be rejected
      'caddy_custom_http_s': {
        'url': cls.backend_url,
        'caddy_custom_https': '# caddy_custom_https_filled_in_rejected_2',
        'caddy_custom_http': '# caddy_custom_http_filled_in_rejected_2',
      },
Łukasz Nowak's avatar
Łukasz Nowak committed
1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326
      'prefer-gzip-encoding-to-backend': {
        'url': cls.backend_url,
        'prefer-gzip-encoding-to-backend': 'true',
      },
      'disabled-cookie-list': {
        'url': cls.backend_url,
        'disabled-cookie-list': 'Chocolate Vanilia',
      },
      'monitor-ipv4-test': {
        'monitor-ipv4-test': 'monitor-ipv4-test',
      },
      'monitor-ipv6-test': {
        'monitor-ipv6-test': 'monitor-ipv6-test',
      },
      're6st-optimal-test': {
        're6st-optimal-test': 'ipv6,ipv4',
1327 1328 1329
      },
      'ciphers': {
        'ciphers': 'RSA-3DES-EDE-CBC-SHA RSA-AES128-CBC-SHA',
Łukasz Nowak's avatar
Łukasz Nowak committed
1330 1331 1332 1333 1334 1335 1336
      }
    }

  def getMasterPartitionPath(self):
    # partition w/o etc/trafficserver, but with buildout.cfg
    return [
      q for q in glob.glob(os.path.join(self.instance_path, '*',))
1337 1338 1339
      if not os.path.exists(
        os.path.join(q, 'etc', 'trafficserver')) and os.path.exists(
          os.path.join(q, 'buildout.cfg'))][0]
Łukasz Nowak's avatar
Łukasz Nowak committed
1340 1341 1342 1343 1344 1345 1346

  def getSlavePartitionPath(self):
    # partition w/ etc/trafficserver
    return [
      q for q in glob.glob(os.path.join(self.instance_path, '*',))
      if os.path.exists(os.path.join(q, 'etc', 'trafficserver'))][0]

1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368
  def test_trafficserver_logrotate(self):
    ats_partition = [
      q for q in glob.glob(os.path.join(self.instance_path, '*',))
      if os.path.exists(os.path.join(q, 'bin', 'trafficserver-rotate'))][0]
    ats_log_dir = os.path.join(ats_partition, 'var', 'log', 'trafficserver')
    ats_logrotate_dir = os.path.join(
      ats_partition, 'srv', 'backup', 'logrotate', 'trafficserver')
    ats_rotate = os.path.join(ats_partition, 'bin', 'trafficserver-rotate')

    old_file_name = 'log-old.old'
    older_file_name = 'log-older.old'
    with open(os.path.join(ats_log_dir, old_file_name), 'w') as fh:
      fh.write('old')
    with open(os.path.join(ats_log_dir, older_file_name), 'w') as fh:
      fh.write('older')

    # check rotation
    result, output = subprocess_status_output([ats_rotate])

    self.assertEqual(0, result)

    self.assertEqual(
1369 1370
      set(['log-old.old.xz', 'log-older.old.xz']),
      set(os.listdir(ats_logrotate_dir)))
1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398
    self.assertFalse(old_file_name + '.xz' in os.listdir(ats_log_dir))
    self.assertFalse(older_file_name + '.xz' in os.listdir(ats_log_dir))

    with lzma.open(
      os.path.join(ats_logrotate_dir, old_file_name + '.xz')) as fh:
      self.assertEqual(
        'old',
        fh.read()
      )
    with lzma.open(
      os.path.join(ats_logrotate_dir, older_file_name + '.xz')) as fh:
      self.assertEqual(
        'older',
        fh.read()
      )

    # check retention
    old_time = time.time() - (400 * 24 * 3600)
    os.utime(
      os.path.join(ats_logrotate_dir, older_file_name + '.xz'),
      (old_time, old_time))
    result, output = subprocess_status_output([ats_rotate])

    self.assertEqual(0, result)
    self.assertEqual(
      ['log-old.old.xz'],
      os.listdir(ats_logrotate_dir))

Łukasz Nowak's avatar
Łukasz Nowak committed
1399
  def test_master_partition_state(self):
1400
    parameter_dict = self.parseConnectionParameterDict()
Łukasz Nowak's avatar
Łukasz Nowak committed
1401
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
1402
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
1403
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
1404

1405
    expected_parameter_dict = {
1406
      'monitor-base-url': 'None',
1407
      'domain': 'example.com',
1408
      'accepted-slave-amount': '52',
1409
      'rejected-slave-amount': '5',
1410
      'slave-amount': '57',
1411 1412 1413 1414
      'rejected-slave-dict': {
        "_apache_custom_http_s-rejected": ["slave not authorized"],
        "_caddy_custom_http_s": ["slave not authorized"],
        "_caddy_custom_http_s-rejected": ["slave not authorized"],
1415 1416 1417
        "_type-eventsource": ["type:eventsource is not implemented"],
        "_ssl-proxy-verify_ssl_proxy_ca_crt_damaged": [
          "ssl_proxy_ca_crt is invalid"]
1418
      }
1419
    }
1420 1421 1422

    self.assertEqual(
      expected_parameter_dict,
Łukasz Nowak's avatar
Łukasz Nowak committed
1423 1424 1425 1426 1427
      parameter_dict
    )

    partition_path = self.getMasterPartitionPath()

1428 1429 1430 1431 1432 1433 1434 1435
    # check that monitor cors domains are correctly setup by file presence, as
    # we trust monitor stack being tested in proper place and it is too hard
    # to have working monitor with local proxy
    self.assertTestData(
      open(
        os.path.join(
          partition_path, 'etc', 'httpd-cors.cfg'), 'r').read().strip())

1436 1437 1438 1439 1440 1441 1442
  def test_slave_partition_state(self):
    partition_path = self.getSlavePartitionPath()
    self.assertTrue(
      '-grace 2s' in
      open(os.path.join(partition_path, 'bin', 'caddy-wrapper'), 'r').read()
    )

1443 1444 1445 1446 1447
  def test_monitor_conf(self):
    monitor_conf_list = glob.glob(
      os.path.join(
        self.instance_path, '*', 'etc', 'monitor.conf'
      ))
1448
    self.assertEqual(3, len(monitor_conf_list))
1449 1450 1451 1452 1453 1454 1455 1456
    expected = [(False, q) for q in monitor_conf_list]
    got = [('!py!' in open(q).read(), q) for q in monitor_conf_list]
    # check that no monitor.conf in generated configuratio has magic !py!
    self.assertEqual(
      expected,
      got
    )

1457 1458
  def test_empty(self):
    parameter_dict = self.assertSlaveBase('empty')
Łukasz Nowak's avatar
Łukasz Nowak committed
1459 1460 1461
    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
    self.assertEqual(
1462
      self.certificate_pem,
1463
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1464

1465
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
1466 1467 1468 1469 1470 1471 1472

    # check that log file contains verbose log
    log_file = glob.glob(
      os.path.join(
        self.instance_path, '*', 'var', 'log', 'httpd', '_empty_access_log'
      ))[0]

1473
    log_regexp = r'^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} - - ' \
1474 1475 1476
                 r'\[\d{2}\/.{3}\/\d{4}\:\d{2}\:\d{2}\:\d{2} \+\d{4}\] ' \
                 r'"GET \/test-path HTTP\/1.1" 404 \d+ "-" '\
                 r'"python-requests.*" \d+'
1477

Łukasz Nowak's avatar
Łukasz Nowak committed
1478 1479
    self.assertRegexpMatches(
      open(log_file, 'r').read(),
1480
      log_regexp)
Łukasz Nowak's avatar
Łukasz Nowak committed
1481 1482
    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
1483
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
1484 1485 1486 1487

    # check that 404 is as configured
    result_missing = self.fakeHTTPSResult(
      'forsuredoesnotexists.example.com', parameter_dict['public-ipv4'], '')
1488
    self.assertEqual(httplib.NOT_FOUND, result_missing.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503
    self.assertEqual(
      """<html>
<head>
  <title>Instance not found</title>
</head>
<body>
<h1>This instance has not been found.</h1>
<p>If this error persists, please check your instance URL and status on S"""
      """lapOS Master.</p>
</body>
</html>
""",
      result_missing.text
    )

1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515
  def test_server_polluted_keys_removed(self):
    buildout_file = os.path.join(
      self.getMasterPartitionPath(), 'buildout-switch-softwaretype.cfg')
    for line in [
      q for q in open(buildout_file).readlines()
      if q.startswith('config-slave-list') or q.startswith(
          'config-extra_slave_instance_list')]:
      self.assertFalse('slave_title' in line)
      self.assertFalse('slap_software_type' in line)
      self.assertFalse('connection-parameter-hash' in line)
      self.assertFalse('timestamp' in line)

Łukasz Nowak's avatar
Łukasz Nowak committed
1516
  def test_url(self):
1517
    parameter_dict = self.assertSlaveBase('Url')
Łukasz Nowak's avatar
Łukasz Nowak committed
1518 1519

    result = self.fakeHTTPSResult(
1520
      parameter_dict['domain'], parameter_dict['public-ipv4'],
1521
      'test-path/deep/.././deeper',
1522 1523 1524 1525
      headers={
        'Timeout': '10',  # more than default proxy-try-duration == 5
        'Accept-Encoding': 'gzip',
      }
1526
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
1527 1528

    self.assertEqual(
1529
      self.certificate_pem,
1530
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1531

1532
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1533 1534 1535 1536 1537 1538 1539

    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

1540 1541
    self.assertEqual(j['Incoming Headers']['timeout'], '10')

1542
    self.assertFalse('Content-Encoding' in result.headers)
1543

Łukasz Nowak's avatar
Łukasz Nowak committed
1544
    self.assertEqual(
1545 1546
      'secured=value;secure, nonsecured=value',
      result.headers['Set-Cookie']
Łukasz Nowak's avatar
Łukasz Nowak committed
1547 1548 1549
    )

    result_http = self.fakeHTTPResult(
1550 1551 1552
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
    self.assertEqualResultJson(result_http, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1553 1554 1555 1556 1557 1558 1559

    try:
      j = result_http.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

1560
    self.assertFalse('Content-Encoding' in result_http.headers)
1561

Łukasz Nowak's avatar
Łukasz Nowak committed
1562
    self.assertEqual(
1563 1564
      'secured=value;secure, nonsecured=value',
      result_http.headers['Set-Cookie']
Łukasz Nowak's avatar
Łukasz Nowak committed
1565 1566
    )

1567 1568
    # check that try_duration == 5 in the test_url slave
    slave_configuration_file = glob.glob(os.path.join(
1569
      self.instance_path, '*', 'etc', '*slave-conf.d', '_Url.conf'))[0]
1570 1571 1572 1573 1574
    with open(slave_configuration_file) as fh:
      content = fh.read()
      self.assertTrue('try_duration 5s' in content)
      self.assertTrue('try_interval 250ms' in content)

1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607
  def test_compressed_result(self):
    parameter_dict = self.assertSlaveBase('Url')
    result_compressed = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
      headers={
        'Accept-Encoding': 'gzip',
        'Compress': '1',
      }
    )
    self.assertEqual(
      'gzip',
      result_compressed.headers['Content-Encoding']
    )

    # Assert that no tampering was done with the request
    # (compression/decompression)
    # Backend compresses with 0 level, so decompression/compression
    # would change somthing
    self.assertEqual(
      result_compressed.headers['Content-Length'],
      result_compressed.headers['Backend-Content-Length']
    )

    result_not_compressed = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
      headers={
        'Accept-Encoding': 'gzip',
      }
    )
    self.assertFalse('Content-Encoding' in result_not_compressed.headers)

1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631
  def test_no_content_type_alter(self):
    parameter_dict = self.assertSlaveBase('Url')
    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
      headers={
        'Accept-Encoding': 'gzip',
        'X-Reply-Body': base64.b64encode(
          b"""<?xml version="1.0" encoding="UTF-8"?>
<note>
  <to>Tove</to>
  <from>Jani</from>
  <heading>Reminder</heading>
  <body>Don't forget me this weekend!</body>
</note>"""),
        'X-Drop-Header': 'Content-Type'
      }
    )

    self.assertEqual(
      'text/xml; charset=utf-8',
      result.headers['Content-Type']
    )

1632
  @skip('Feature postponed')
Łukasz Nowak's avatar
Łukasz Nowak committed
1633
  def test_url_ipv6_access(self):
1634
    parameter_dict = self.parseSlaveParameterDict('url')
1635
    self.assertLogAccessUrlWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
1636 1637 1638 1639 1640 1641 1642
    self.assertEqual(
      {
        'domain': 'url.example.com',
        'replication_number': '1',
        'url': 'http://url.example.com',
        'site_url': 'http://url.example.com',
        'secure_access': 'https://url.example.com',
1643
        'public-ipv4': SLAPOS_TEST_IPV4,
1644 1645
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
1646 1647 1648
    )

    result_ipv6 = self.fakeHTTPSResult(
1649 1650
      parameter_dict['domain'], SLAPOS_TEST_IPV6, 'test-path',
      source_ip=SLAPOS_TEST_IPV6)
Łukasz Nowak's avatar
Łukasz Nowak committed
1651 1652

    self.assertEqual(
1653
       SLAPOS_TEST_IPV6,
1654
       result_ipv6.json()['Incoming Headers']['x-forwarded-for']
Łukasz Nowak's avatar
Łukasz Nowak committed
1655 1656 1657
    )

    self.assertEqual(
1658
      self.certificate_pem,
1659
      der2pem(result_ipv6.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1660 1661 1662 1663

    self.assertEqualResultJson(result_ipv6, 'Path', '/test-path')

  def test_type_zope_path(self):
1664
    parameter_dict = self.assertSlaveBase('type-zope-path')
Łukasz Nowak's avatar
Łukasz Nowak committed
1665 1666

    result = self.fakeHTTPSResult(
1667 1668
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1669 1670

    self.assertEqual(
1671
      self.certificate_pem,
1672
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1673 1674 1675 1676

    self.assertEqualResultJson(
      result,
      'Path',
1677 1678 1679 1680
      '/VirtualHostBase/'
      'https//typezopepath.example.com:443/path/to/some/resource'
      '/VirtualHostRoot/'
      'test-path/deeper'
Łukasz Nowak's avatar
Łukasz Nowak committed
1681 1682 1683
    )

  def test_type_zope_default_path(self):
1684
    parameter_dict = self.assertSlaveBase('type-zope-default-path')
Łukasz Nowak's avatar
Łukasz Nowak committed
1685 1686 1687 1688 1689

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], '')

    self.assertEqual(
1690
      self.certificate_pem,
1691
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1692

1693 1694 1695 1696 1697
    self.assertEqual(
      httplib.MOVED_PERMANENTLY,
      result.status_code
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
1698
    self.assertEqual(
1699 1700
      'https://typezopedefaultpath.example.com:%s/'
      'default-path/to/some/resource' % (
1701 1702
        HTTPS_PORT,),
      result.headers['Location']
Łukasz Nowak's avatar
Łukasz Nowak committed
1703 1704 1705
    )

  def test_server_alias(self):
1706
    parameter_dict = self.assertSlaveBase('server-alias')
Łukasz Nowak's avatar
Łukasz Nowak committed
1707 1708

    result = self.fakeHTTPSResult(
1709 1710
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1711 1712

    self.assertEqual(
1713
      self.certificate_pem,
1714
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1715

1716
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1717 1718

    result = self.fakeHTTPSResult(
1719 1720
      'alias1.example.com', parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1721 1722

    self.assertEqual(
1723
      self.certificate_pem,
1724
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1725

1726
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1727 1728

    result = self.fakeHTTPSResult(
1729 1730
      'alias2.example.com', parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
1731 1732

    self.assertEqual(
1733
      self.certificate_pem,
1734
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
1735

1736
  def test_server_alias_wildcard(self):
1737
    parameter_dict = self.parseSlaveParameterDict('server-alias-wildcard')
1738
    self.assertLogAccessUrlWithPop(parameter_dict)
1739
    self.assertKedifaKeysWithPop(parameter_dict)
1740 1741 1742 1743 1744 1745 1746
    self.assertEqual(
      {
        'domain': 'serveraliaswildcard.example.com',
        'replication_number': '1',
        'url': 'http://serveraliaswildcard.example.com',
        'site_url': 'http://serveraliaswildcard.example.com',
        'secure_access': 'https://serveraliaswildcard.example.com',
1747
        'public-ipv4': SLAPOS_TEST_IPV4,
1748 1749 1750 1751 1752 1753 1754 1755
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
1756
      self.certificate_pem,
1757 1758 1759 1760 1761 1762 1763 1764
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    result = self.fakeHTTPSResult(
      'wild.alias1.example.com', parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
1765
      self.certificate_pem,
1766 1767
      der2pem(result.peercert))

Łukasz Nowak's avatar
Łukasz Nowak committed
1768 1769
    self.assertEqualResultJson(result, 'Path', '/test-path')

1770
  def test_server_alias_duplicated(self):
1771
    parameter_dict = self.parseSlaveParameterDict('server-alias-duplicated')
1772
    self.assertLogAccessUrlWithPop(parameter_dict)
1773
    self.assertKedifaKeysWithPop(parameter_dict)
1774 1775 1776 1777 1778 1779 1780
    self.assertEqual(
      {
        'domain': 'serveraliasduplicated.example.com',
        'replication_number': '1',
        'url': 'http://serveraliasduplicated.example.com',
        'site_url': 'http://serveraliasduplicated.example.com',
        'secure_access': 'https://serveraliasduplicated.example.com',
1781
        'public-ipv4': SLAPOS_TEST_IPV4,
1782 1783 1784 1785 1786 1787 1788 1789
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
1790
      self.certificate_pem,
1791 1792 1793 1794 1795 1796 1797 1798
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    result = self.fakeHTTPSResult(
      'alias3.example.com', parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
1799
      self.certificate_pem,
1800 1801 1802 1803 1804
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_server_alias_custom_domain_duplicated(self):
1805 1806
    parameter_dict = self.parseSlaveParameterDict(
      'server-alias_custom_domain-duplicated')
1807
    self.assertLogAccessUrlWithPop(parameter_dict)
1808
    self.assertKedifaKeysWithPop(parameter_dict)
1809 1810 1811 1812 1813 1814 1815
    self.assertEqual(
      {
        'domain': 'alias4.example.com',
        'replication_number': '1',
        'url': 'http://alias4.example.com',
        'site_url': 'http://alias4.example.com',
        'secure_access': 'https://alias4.example.com',
1816
        'public-ipv4': SLAPOS_TEST_IPV4,
1817 1818 1819 1820 1821 1822 1823 1824
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
1825
      self.certificate_pem,
1826 1827 1828 1829
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

Łukasz Nowak's avatar
Łukasz Nowak committed
1830 1831 1832 1833 1834 1835
  @skip('Feature postponed')
  def test_check_error_log(self):
    # Caddy: Need to implement similar thing like check-error-on-apache-log
    raise NotImplementedError(self.id())

  def test_ssl_ca_crt(self):
1836 1837
    parameter_dict = self.parseSlaveParameterDict(
      'custom_domain_ssl_crt_ssl_key_ssl_ca_crt')
1838
    self.assertLogAccessUrlWithPop(parameter_dict)
1839
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
1840 1841 1842 1843 1844 1845 1846 1847
    self.assertEqual(
      {
        'domain': 'customdomainsslcrtsslkeysslcacrt.example.com',
        'replication_number': '1',
        'url': 'http://customdomainsslcrtsslkeysslcacrt.example.com',
        'site_url': 'http://customdomainsslcrtsslkeysslcacrt.example.com',
        'secure_access':
        'https://customdomainsslcrtsslkeysslcacrt.example.com',
1848
        'public-ipv4': SLAPOS_TEST_IPV4,
1849 1850 1851
      },
      parameter_dict
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
1852

1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867
    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = self.customdomain_ca_certificate_pem + \
        self.customdomain_ca_key_pem + \
        self.ca.certificate_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, upload.status_code)
1868
    self.runKedifaUpdater()
1869

1870 1871 1872 1873
    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
1874
      self.customdomain_ca_certificate_pem,
1875 1876 1877 1878
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

1879 1880
    certificate_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'srv', 'autocert',
1881
      '_custom_domain_ssl_crt_ssl_key_ssl_ca_crt.pem'))
1882 1883 1884 1885 1886
    self.assertEqual(1, len(certificate_file_list))
    certificate_file = certificate_file_list[0]
    with open(certificate_file) as out:
      self.assertEqual(data, out.read())

1887
  def test_ssl_ca_crt_only(self):
1888
    parameter_dict = self.parseSlaveParameterDict('ssl_ca_crt_only')
1889 1890
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
1891 1892
    self.assertEqual(
      {
1893 1894 1895 1896 1897 1898 1899 1900 1901
        'domain': 'sslcacrtonly.example.com',
        'replication_number': '1',
        'url': 'http://sslcacrtonly.example.com',
        'site_url': 'http://sslcacrtonly.example.com',
        'secure_access':
        'https://sslcacrtonly.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
1902
    )
1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917
    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = self.ca.certificate_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)

    self.assertEqual(httplib.UNPROCESSABLE_ENTITY, upload.status_code)
    self.assertEqual('Key incorrect', upload.text)
1918 1919

  def test_ssl_ca_crt_garbage(self):
1920
    parameter_dict = self.parseSlaveParameterDict('ssl_ca_crt_garbage')
1921
    self.assertLogAccessUrlWithPop(parameter_dict)
1922
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
1923 1924 1925 1926 1927 1928 1929 1930
    self.assertEqual(
      {
        'domain': 'sslcacrtgarbage.example.com',
        'replication_number': '1',
        'url': 'http://sslcacrtgarbage.example.com',
        'site_url': 'http://sslcacrtgarbage.example.com',
        'secure_access':
        'https://sslcacrtgarbage.example.com',
1931
        'public-ipv4': SLAPOS_TEST_IPV4,
1932 1933 1934 1935
      },
      parameter_dict
    )

1936 1937 1938 1939 1940 1941
    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

1942 1943 1944 1945 1946
    _, ca_key_pem, csr, _ = createCSR(
      parameter_dict['domain'])
    _, ca_certificate_pem = self.ca.signCSR(csr)

    data = ca_certificate_pem + ca_key_pem + 'some garbage'
1947 1948 1949 1950 1951 1952
    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)

    self.assertEqual(httplib.CREATED, upload.status_code)
1953
    self.runKedifaUpdater()
1954

1955
    result = self.fakeHTTPSResult(
1956
        parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
1957

1958 1959 1960 1961 1962 1963 1964
    self.assertEqual(
      ca_certificate_pem,
      der2pem(result.peercert)
    )

    self.assertEqualResultJson(result, 'Path', '/test-path')

1965 1966
    certificate_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'srv', 'autocert',
1967
      '_ssl_ca_crt_garbage.pem'))
1968 1969 1970 1971 1972
    self.assertEqual(1, len(certificate_file_list))
    certificate_file = certificate_file_list[0]
    with open(certificate_file) as out:
      self.assertEqual(data, out.read())

1973
  def test_ssl_ca_crt_does_not_match(self):
1974
    parameter_dict = self.parseSlaveParameterDict('ssl_ca_crt_does_not_match')
1975
    self.assertLogAccessUrlWithPop(parameter_dict)
1976
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
1977 1978 1979 1980 1981 1982 1983 1984
    self.assertEqual(
      {
        'domain': 'sslcacrtdoesnotmatch.example.com',
        'replication_number': '1',
        'url': 'http://sslcacrtdoesnotmatch.example.com',
        'site_url': 'http://sslcacrtdoesnotmatch.example.com',
        'secure_access':
        'https://sslcacrtdoesnotmatch.example.com',
1985
        'public-ipv4': SLAPOS_TEST_IPV4,
1986 1987 1988
      },
      parameter_dict
    )
1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002
    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = self.certificate_pem + self.key_pem + self.ca.certificate_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)

    self.assertEqual(httplib.CREATED, upload.status_code)
2003
    self.runKedifaUpdater()
2004 2005 2006 2007 2008

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2009
      self.certificate_pem,
2010 2011 2012
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')
Łukasz Nowak's avatar
Łukasz Nowak committed
2013

2014 2015
    certificate_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'srv', 'autocert',
2016
      '_ssl_ca_crt_does_not_match.pem'))
2017 2018 2019 2020 2021
    self.assertEqual(1, len(certificate_file_list))
    certificate_file = certificate_file_list[0]
    with open(certificate_file) as out:
      self.assertEqual(data, out.read())

Łukasz Nowak's avatar
Łukasz Nowak committed
2022
  def test_https_only(self):
2023
    parameter_dict = self.assertSlaveBase('https-only')
Łukasz Nowak's avatar
Łukasz Nowak committed
2024 2025

    result = self.fakeHTTPSResult(
2026 2027
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2028 2029

    self.assertEqual(
2030
      self.certificate_pem,
2031
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2032

2033
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2034 2035

    result_http = self.fakeHTTPResult(
2036 2037
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2038

2039 2040 2041 2042 2043
    self.assertEqual(
      httplib.FOUND,
      result_http.status_code
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
2044
    self.assertEqual(
2045
      'https://httpsonly.example.com/test-path/deeper',
2046
      result_http.headers['Location']
Łukasz Nowak's avatar
Łukasz Nowak committed
2047 2048 2049
    )

  def test_custom_domain(self):
2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065
    reference = 'custom_domain'
    hostname = 'mycustomdomain'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, '')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
2066 2067 2068 2069 2070

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2071
      self.certificate_pem,
2072
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2073 2074 2075

    self.assertEqualResultJson(result, 'Path', '/test-path')

2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112
  def test_custom_domain_server_alias(self):
    reference = 'custom_domain_server_alias'
    hostname = 'mycustomdomainserveralias'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, '')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    result = self.fakeHTTPSResult(
      'mycustomdomainserveralias1.example.com', parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')

2113
  def test_custom_domain_wildcard(self):
2114
    parameter_dict = self.parseSlaveParameterDict('custom_domain_wildcard')
2115
    self.assertLogAccessUrlWithPop(parameter_dict)
2116
    self.assertKedifaKeysWithPop(parameter_dict)
2117 2118 2119 2120 2121 2122 2123
    self.assertEqual(
      {
        'domain': '*.customdomain.example.com',
        'replication_number': '1',
        'url': 'http://*.customdomain.example.com',
        'site_url': 'http://*.customdomain.example.com',
        'secure_access': 'https://*.customdomain.example.com',
2124
        'public-ipv4': SLAPOS_TEST_IPV4,
2125 2126 2127 2128 2129 2130 2131 2132 2133
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      'wild.customdomain.example.com', parameter_dict['public-ipv4'],
      'test-path')

    self.assertEqual(
2134
      self.certificate_pem,
2135 2136 2137 2138
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

Łukasz Nowak's avatar
Łukasz Nowak committed
2139
  def test_custom_domain_ssl_crt_ssl_key(self):
2140 2141
    reference = 'custom_domain_ssl_crt_ssl_key'
    parameter_dict = self.parseSlaveParameterDict(reference)
2142
    self.assertLogAccessUrlWithPop(parameter_dict)
2143 2144 2145
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)

    hostname = reference.translate(None, '_-')
Łukasz Nowak's avatar
Łukasz Nowak committed
2146 2147
    self.assertEqual(
      {
2148
        'domain': '%s.example.com' % (hostname,),
Łukasz Nowak's avatar
Łukasz Nowak committed
2149
        'replication_number': '1',
2150 2151 2152
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
2153
        'public-ipv4': SLAPOS_TEST_IPV4,
2154 2155
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
2156 2157
    )

2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169
    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)
    data = self.customdomain_certificate_pem + \
        self.customdomain_key_pem
    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, upload.status_code)
2170
    self.runKedifaUpdater()
2171

Łukasz Nowak's avatar
Łukasz Nowak committed
2172 2173 2174 2175
    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2176
      self.customdomain_certificate_pem,
2177
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2178 2179 2180 2181

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_type_zope(self):
2182
    parameter_dict = self.assertSlaveBase('type-zope')
Łukasz Nowak's avatar
Łukasz Nowak committed
2183 2184

    result = self.fakeHTTPSResult(
2185 2186
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2187 2188

    self.assertEqual(
2189
      self.certificate_pem,
2190
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201

    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/https//typezope.example.com:443/'
2202
      '/VirtualHostRoot/test-path/deeper'
Łukasz Nowak's avatar
Łukasz Nowak committed
2203 2204 2205
    )

    result = self.fakeHTTPResult(
2206 2207
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2208 2209 2210 2211 2212

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/http//typezope.example.com:80/'
2213
      '/VirtualHostRoot/test-path/deeper'
Łukasz Nowak's avatar
Łukasz Nowak committed
2214 2215
    )

2216
  def test_type_zope_prefer_gzip_encoding_to_backend(self):
2217
    parameter_dict = self.assertSlaveBase(
2218 2219 2220
      'type-zope-prefer-gzip-encoding-to-backend')

    result = self.fakeHTTPSResult(
2221 2222
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/https//'
      'typezopeprefergzipencodingtobackend.example.com:443/'
2239
      '/VirtualHostRoot/test-path/deeper'
2240 2241 2242
    )

    result = self.fakeHTTPResult(
2243 2244
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
2245 2246 2247 2248 2249 2250

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/http//'
      'typezopeprefergzipencodingtobackend.example.com:80/'
2251
      '/VirtualHostRoot/test-path/deeper'
2252 2253 2254
    )

    result = self.fakeHTTPSResult(
2255 2256
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273
      headers={'Accept-Encoding': 'gzip, deflate'})

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/https//'
      'typezopeprefergzipencodingtobackend.example.com:443/'
2274
      '/VirtualHostRoot/test-path/deeper'
2275 2276 2277 2278 2279
    )
    self.assertEqual(
      'gzip', result.json()['Incoming Headers']['accept-encoding'])

    result = self.fakeHTTPResult(
2280 2281
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
2282 2283 2284 2285 2286 2287 2288
      headers={'Accept-Encoding': 'gzip, deflate'})

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/http//'
      'typezopeprefergzipencodingtobackend.example.com:80/'
2289
      '/VirtualHostRoot/test-path/deeper'
2290 2291 2292 2293
    )
    self.assertEqual(
      'gzip', result.json()['Incoming Headers']['accept-encoding'])

Łukasz Nowak's avatar
Łukasz Nowak committed
2294
  def test_type_zope_virtualhostroot_http_port(self):
2295
    parameter_dict = self.assertSlaveBase(
2296
      'type-zope-virtualhostroot-http-port')
Łukasz Nowak's avatar
Łukasz Nowak committed
2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308

    result = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/http//typezopevirtualhostroothttpport'
      '.example.com:12345//VirtualHostRoot/test-path'
    )

  def test_type_zope_virtualhostroot_https_port(self):
2309
    parameter_dict = self.assertSlaveBase(
2310
      'type-zope-virtualhostroot-https-port')
Łukasz Nowak's avatar
Łukasz Nowak committed
2311 2312 2313 2314 2315

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2316
      self.certificate_pem,
2317
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2318 2319 2320 2321 2322 2323 2324 2325 2326

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/https//typezopevirtualhostroothttpsport'
      '.example.com:12345//VirtualHostRoot/test-path'
    )

  def test_type_notebook(self):
2327 2328
    reference = 'type-notebook'
    parameter_dict = self.parseSlaveParameterDict(reference)
2329
    self.assertLogAccessUrlWithPop(parameter_dict)
2330 2331
    hostname = reference.translate(None, '_-')
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
2332 2333
    self.assertEqual(
      {
2334
        'domain': '%s.example.com' % (hostname,),
Łukasz Nowak's avatar
Łukasz Nowak committed
2335
        'replication_number': '1',
2336 2337 2338
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
2339
        'public-ipv4': SLAPOS_TEST_IPV4,
2340 2341
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
2342 2343 2344
    )

    result = self.fakeHTTPSResult(
2345 2346
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path',
2347
      HTTPS_PORT)
Łukasz Nowak's avatar
Łukasz Nowak committed
2348 2349

    self.assertEqual(
2350
      self.certificate_pem,
2351
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2352 2353 2354

    self.assertEqualResultJson(result, 'Path', '/test-path')

2355 2356 2357
    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test/terminals/websocket/test',
2358
      HTTPS_PORT)
2359 2360 2361 2362 2363 2364

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/terminals/websocket')
2365 2366
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
2367

Łukasz Nowak's avatar
Łukasz Nowak committed
2368
  def test_type_websocket(self):
2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561
    parameter_dict = self.assertSlaveBase(
      'type-websocket')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      headers={'Connection': 'Upgrade'})

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(
      result,
      'Path',
      '/test-path'
    )
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertEqual(
      'Upgrade',
      j['Incoming Headers']['connection']
    )
    self.assertTrue('x-real-ip' in j['Incoming Headers'])
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_type_websocket_websocket_transparent_false(self):
    parameter_dict = self.assertSlaveBase(
      'type-websocket-websocket-transparent-false')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      headers={'Connection': 'Upgrade'})

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(
      result,
      'Path',
      '/test-path'
    )
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertEqual(
      'Upgrade',
      j['Incoming Headers']['connection']
    )
    self.assertFalse('x-real-ip' in j['Incoming Headers'])
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_type_websocket_websocket_path_list(self):
    parameter_dict = self.assertSlaveBase(
      'type-websocket-websocket-path-list')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      headers={'Connection': 'Upgrade'})

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(
      result,
      'Path',
      '/test-path'
    )
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('connection' in j['Incoming Headers'].keys())
    self.assertTrue('x-real-ip' in j['Incoming Headers'])

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'ws/test-path',
      headers={'Connection': 'Upgrade'})

    self.assertEqualResultJson(
      result,
      'Path',
      '/ws/test-path'
    )
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertEqual(
      'Upgrade',
      j['Incoming Headers']['connection']
    )
    self.assertTrue('x-real-ip' in j['Incoming Headers'])

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'with%20space/test-path', headers={'Connection': 'Upgrade'})

    self.assertEqualResultJson(
      result,
      'Path',
      '/with%20space/test-path'
    )
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertEqual(
      'Upgrade',
      j['Incoming Headers']['connection']
    )
    self.assertTrue('x-real-ip' in j['Incoming Headers'])

  def test_type_websocket_websocket_path_list_websocket_transparent_false(
    self):
    parameter_dict = self.assertSlaveBase(
      'type-websocket-websocket-path-list-websocket-transparent-false')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      headers={'Connection': 'Upgrade'})

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(
      result,
      'Path',
      '/test-path'
    )
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('connection' in j['Incoming Headers'].keys())
    self.assertFalse('x-real-ip' in j['Incoming Headers'])

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'ws/test-path',
      headers={'Connection': 'Upgrade'})

    self.assertEqualResultJson(
      result,
      'Path',
      '/ws/test-path'
    )
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertEqual(
      'Upgrade',
      j['Incoming Headers']['connection']
    )
    self.assertFalse('x-real-ip' in j['Incoming Headers'])

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'with%20space/test-path', headers={'Connection': 'Upgrade'})

    self.assertEqualResultJson(
      result,
      'Path',
      '/with%20space/test-path'
    )
    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertEqual(
      'Upgrade',
      j['Incoming Headers']['connection']
    )
    self.assertFalse('x-real-ip' in j['Incoming Headers'])
Łukasz Nowak's avatar
Łukasz Nowak committed
2562

2563
  @skip('Feature postponed')
Łukasz Nowak's avatar
Łukasz Nowak committed
2564 2565 2566 2567 2568 2569
  def test_type_eventsource(self):
    # Caddy: For event source, if I understand
    #        https://github.com/mholt/caddy/issues/1355 correctly, we could use
    #        Caddy as a proxy in front of nginx-push-stream . If we have a
    #        "central shared" caddy instance, can it handle keeping connections
    #        opens for many clients ?
2570
    parameter_dict = self.parseSlaveParameterDict('type-eventsource')
2571
    self.assertLogAccessUrlWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
2572 2573 2574 2575 2576 2577 2578
    self.assertEqual(
      {
        'domain': 'typeeventsource.nginx.example.com',
        'replication_number': '1',
        'url': 'http://typeeventsource.nginx.example.com',
        'site_url': 'http://typeeventsource.nginx.example.com',
        'secure_access': 'https://typeeventsource.nginx.example.com',
2579
        'public-ipv4': SLAPOS_TEST_IPV4,
2580 2581
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
2582 2583 2584 2585
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'pub',
2586 2587
      #  NGINX_HTTPS_PORT
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
2588 2589

    self.assertEqual(
2590
      self.certificate_pem,
2591
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2592 2593

    self.assertEqual(
2594 2595
      '',
      result.content
Łukasz Nowak's avatar
Łukasz Nowak committed
2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606
    )
    headers = result.headers.copy()
    self.assertKeyWithPop('Expires', headers)
    self.assertKeyWithPop('Date', headers)
    self.assertEqual(
      {
        'X-Nginx-PushStream-Explain': 'No channel id provided.',
        'Content-Length': '0',
        'Cache-Control': 'no-cache, no-store, must-revalidate',
        'Connection': 'keep-alive',
        'Server': 'nginx'
2607 2608
      },
      headers
Łukasz Nowak's avatar
Łukasz Nowak committed
2609 2610 2611
    )

  def test_type_redirect(self):
2612
    parameter_dict = self.assertSlaveBase('type-redirect')
Łukasz Nowak's avatar
Łukasz Nowak committed
2613 2614

    result = self.fakeHTTPSResult(
2615 2616
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2617 2618

    self.assertEqual(
2619
      self.certificate_pem,
2620
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2621

2622 2623 2624 2625 2626
    self.assertEqual(
      httplib.FOUND,
      result.status_code
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
2627
    self.assertEqual(
2628
      '%stest-path/deeper' % (self.backend_url,),
2629
      result.headers['Location']
Łukasz Nowak's avatar
Łukasz Nowak committed
2630 2631
    )

2632 2633 2634 2635 2636
  def test_ssl_proxy_verify_ssl_proxy_ca_crt_unverified(self):
    parameter_dict = self.parseSlaveParameterDict(
      'ssl-proxy-verify_ssl_proxy_ca_crt-unverified')

    self.assertLogAccessUrlWithPop(parameter_dict)
2637
    self.assertKedifaKeysWithPop(parameter_dict)
2638 2639 2640 2641 2642 2643 2644 2645 2646
    self.assertEqual(
      {
        'domain': 'sslproxyverifysslproxycacrtunverified.example.com',
        'replication_number': '1',
        'url': 'http://sslproxyverifysslproxycacrtunverified.example.com',
        'site_url':
        'http://sslproxyverifysslproxycacrtunverified.example.com',
        'secure_access':
        'https://sslproxyverifysslproxycacrtunverified.example.com',
2647
        'public-ipv4': SLAPOS_TEST_IPV4,
2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqual(
      httplib.BAD_GATEWAY,
      result.status_code
    )

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      httplib.BAD_GATEWAY,
      result_http.status_code
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
2672
  def test_ssl_proxy_verify_ssl_proxy_ca_crt(self):
2673
    parameter_dict = self.assertSlaveBase('ssl-proxy-verify_ssl_proxy_ca_crt')
Łukasz Nowak's avatar
Łukasz Nowak committed
2674 2675 2676 2677 2678

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2679
      self.certificate_pem,
2680
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2681

2682 2683 2684 2685 2686 2687 2688 2689
    self.assertEqualResultJson(result, 'Path', '/test-path')

    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

2690
    self.assertFalse('Content-Encoding' in result.headers)
2691 2692 2693 2694

    self.assertEqual(
      'secured=value;secure, nonsecured=value',
      result.headers['Set-Cookie']
2695
    )
2696

2697 2698
    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
2699 2700 2701 2702 2703 2704 2705
    self.assertEqualResultJson(result_http, 'Path', '/test-path')

    try:
      j = result_http.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())
2706

2707
    self.assertFalse('Content-Encoding' in result.headers)
2708 2709 2710 2711

    self.assertEqual(
      'secured=value;secure, nonsecured=value',
      result_http.headers['Set-Cookie']
2712
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
2713

2714 2715 2716 2717 2718 2719 2720 2721
  def test_ssl_proxy_verify_ssl_proxy_ca_crt_damaged(self):
    parameter_dict = self.slave_connection_parameter_dict_dict[
      'ssl-proxy-verify_ssl_proxy_ca_crt_damaged']
    self.assertEqual(
      {'request-error-list': '["ssl_proxy_ca_crt is invalid"]'},
      parameter_dict
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
2722
  def test_ssl_proxy_verify_unverified(self):
2723
    parameter_dict = self.assertSlaveBase('ssl-proxy-verify-unverified')
Łukasz Nowak's avatar
Łukasz Nowak committed
2724 2725 2726 2727 2728

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2729
      self.certificate_pem,
2730
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2731 2732

    self.assertEqual(
2733
      httplib.BAD_GATEWAY,
2734
      result.status_code
Łukasz Nowak's avatar
Łukasz Nowak committed
2735 2736
    )

2737 2738 2739 2740 2741
  def test_enable_cache_ssl_proxy_verify_ssl_proxy_ca_crt_unverified(self):
    parameter_dict = self.parseSlaveParameterDict(
      'enable_cache-ssl-proxy-verify_ssl_proxy_ca_crt-unverified')

    self.assertLogAccessUrlWithPop(parameter_dict)
2742
    self.assertKedifaKeysWithPop(parameter_dict)
2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753
    self.assertEqual(
      {
        'domain':
        'enablecachesslproxyverifysslproxycacrtunverified.example.com',
        'replication_number': '1',
        'url':
        'http://enablecachesslproxyverifysslproxycacrtunverified.example.com',
        'site_url':
        'http://enablecachesslproxyverifysslproxycacrtunverified.example.com',
        'secure_access':
        'https://enablecachesslproxyverifysslproxycacrtunverified.example.com',
2754
        'public-ipv4': SLAPOS_TEST_IPV4,
2755 2756 2757 2758 2759
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
2760 2761
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqual(
      httplib.BAD_GATEWAY,
      result.status_code
    )

    result_http = self.fakeHTTPResult(
2773 2774
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deeper')
2775 2776 2777 2778 2779 2780

    self.assertEqual(
      httplib.BAD_GATEWAY,
      result_http.status_code
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
2781
  def test_enable_cache_ssl_proxy_verify_ssl_proxy_ca_crt(self):
2782
    parameter_dict = self.assertSlaveBase(
2783
      'enable_cache-ssl-proxy-verify_ssl_proxy_ca_crt')
Łukasz Nowak's avatar
Łukasz Nowak committed
2784 2785

    result = self.fakeHTTPSResult(
2786 2787
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
2788 2789

    self.assertEqual(
2790
      self.certificate_pem,
2791
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2792

2793
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
    self.assertKeyWithPop('Age', headers)

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

2807
    self.assertEqual(
2808 2809 2810 2811
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
      },
2812
      headers
2813
    )
2814

2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825
    result_direct = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      port=26011)

    self.assertEqualResultJson(result_direct, 'Path', '/test-path')

    try:
      j = result_direct.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result_direct.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())
2826

2827
    self.assertFalse('Content-Encoding' in result_direct.headers)
2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847

    self.assertEqual(
      'secured=value;secure, nonsecured=value',
      result_direct.headers['Set-Cookie']
    )

    result_direct_https_backend = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      port=26012)

    self.assertEqualResultJson(
      result_direct_https_backend, 'Path', '/test-path')

    try:
      j = result_direct_https_backend.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (
        result_direct_https_backend.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

2848 2849
    self.assertFalse(
      'Content-Encoding' in result_direct_https_backend.headers)
2850 2851 2852 2853

    self.assertEqual(
      'secured=value;secure, nonsecured=value',
      result_direct_https_backend.headers['Set-Cookie']
2854
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
2855 2856

  def test_enable_cache_ssl_proxy_verify_unverified(self):
2857
    parameter_dict = self.assertSlaveBase(
2858
      'enable_cache-ssl-proxy-verify-unverified')
Łukasz Nowak's avatar
Łukasz Nowak committed
2859 2860 2861 2862 2863

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2864
      self.certificate_pem,
2865
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2866 2867

    self.assertEqual(
2868
      httplib.BAD_GATEWAY,
2869
      result.status_code
Łukasz Nowak's avatar
Łukasz Nowak committed
2870 2871
    )

2872 2873 2874 2875 2876
  def test_type_zope_ssl_proxy_verify_ssl_proxy_ca_crt_unverified(self):
    parameter_dict = self.parseSlaveParameterDict(
      'type-zope-ssl-proxy-verify_ssl_proxy_ca_crt-unverified')

    self.assertLogAccessUrlWithPop(parameter_dict)
2877
    self.assertKedifaKeysWithPop(parameter_dict)
2878 2879 2880 2881 2882 2883 2884 2885 2886 2887
    self.assertEqual(
      {
        'domain': 'typezopesslproxyverifysslproxycacrtunverified.example.com',
        'replication_number': '1',
        'url':
        'http://typezopesslproxyverifysslproxycacrtunverified.example.com',
        'site_url':
        'http://typezopesslproxyverifysslproxycacrtunverified.example.com',
        'secure_access':
        'https://typezopesslproxyverifysslproxycacrtunverified.example.com',
2888
        'public-ipv4': SLAPOS_TEST_IPV4,
2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqual(
      httplib.BAD_GATEWAY,
      result.status_code
    )

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      httplib.BAD_GATEWAY,
      result_http.status_code
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
2913
  def test_type_zope_ssl_proxy_verify_ssl_proxy_ca_crt(self):
2914
    parameter_dict = self.assertSlaveBase(
2915
      'type-zope-ssl-proxy-verify_ssl_proxy_ca_crt')
Łukasz Nowak's avatar
Łukasz Nowak committed
2916 2917 2918 2919 2920

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2921
      self.certificate_pem,
2922
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2923

2924 2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/https//'
      'typezopesslproxyverifysslproxycacrt.example.com:443/'
      '/VirtualHostRoot/test-path'
2936
    )
2937

2938
    result = self.fakeHTTPResult(
2939
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
2940

2941 2942 2943 2944 2945 2946
    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/http//'
      'typezopesslproxyverifysslproxycacrt.example.com:80/'
      '/VirtualHostRoot/test-path'
2947
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
2948 2949

  def test_type_zope_ssl_proxy_verify_unverified(self):
2950
    parameter_dict = self.assertSlaveBase(
2951
      'type-zope-ssl-proxy-verify-unverified')
Łukasz Nowak's avatar
Łukasz Nowak committed
2952 2953 2954 2955 2956

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
2957
      self.certificate_pem,
2958
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2959 2960

    self.assertEqual(
2961
      httplib.BAD_GATEWAY,
2962
      result.status_code
Łukasz Nowak's avatar
Łukasz Nowak committed
2963 2964 2965
    )

  def test_monitor_ipv6_test(self):
2966 2967 2968 2969 2970
    parameter_dict = self.assertSlaveBase('monitor-ipv6-test')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

Łukasz Nowak's avatar
Łukasz Nowak committed
2971
    self.assertEqual(
2972
      self.certificate_pem,
2973
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
2974

2975
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
2976 2977 2978

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
2979
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
2980 2981 2982

    monitor_file = glob.glob(
      os.path.join(
2983 2984 2985
        self.instance_path, '*', 'etc', 'plugin',
        'check-_monitor-ipv6-test-ipv6-packet-list-test.py'))[0]
    # get promise module and check that parameters are ok
Łukasz Nowak's avatar
Łukasz Nowak committed
2986
    self.assertEqual(
2987 2988 2989 2990 2991
      getPluginParameterDict(self.software_path, monitor_file),
      {
        'frequency': '720',
        'address': 'monitor-ipv6-test'
      }
Łukasz Nowak's avatar
Łukasz Nowak committed
2992 2993 2994
    )

  def test_monitor_ipv4_test(self):
2995
    parameter_dict = self.assertSlaveBase('monitor-ipv4-test')
Łukasz Nowak's avatar
Łukasz Nowak committed
2996 2997 2998 2999 3000

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3001
      self.certificate_pem,
3002
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3003

3004
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
3005 3006 3007

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
3008
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
3009 3010 3011

    monitor_file = glob.glob(
      os.path.join(
3012 3013 3014
        self.instance_path, '*', 'etc', 'plugin',
        'check-_monitor-ipv4-test-ipv4-packet-list-test.py'))[0]
    # get promise module and check that parameters are ok
Łukasz Nowak's avatar
Łukasz Nowak committed
3015
    self.assertEqual(
3016 3017 3018 3019 3020 3021
      getPluginParameterDict(self.software_path, monitor_file),
      {
        'frequency': '720',
        'ipv4': 'true',
        'address': 'monitor-ipv4-test',
      }
Łukasz Nowak's avatar
Łukasz Nowak committed
3022 3023 3024
    )

  def test_re6st_optimal_test(self):
3025
    parameter_dict = self.assertSlaveBase('re6st-optimal-test')
Łukasz Nowak's avatar
Łukasz Nowak committed
3026 3027 3028 3029 3030

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3031
      self.certificate_pem,
3032
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3033

3034
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
3035 3036 3037

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
3038
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)
Łukasz Nowak's avatar
Łukasz Nowak committed
3039 3040 3041

    monitor_file = glob.glob(
      os.path.join(
3042 3043 3044
        self.instance_path, '*', 'etc', 'plugin',
        'check-_re6st-optimal-test-re6st-optimal-test.py'))[0]
    # get promise module and check that parameters are ok
Łukasz Nowak's avatar
Łukasz Nowak committed
3045
    self.assertEqual(
3046 3047 3048 3049 3050 3051
      getPluginParameterDict(self.software_path, monitor_file),
      {
        'frequency': '720',
        'ipv4': 'ipv4',
        'ipv6': 'ipv6'
      }
Łukasz Nowak's avatar
Łukasz Nowak committed
3052 3053
    )

3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078
  def test_ciphers(self):
    parameter_dict = self.assertSlaveBase('ciphers')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqual(httplib.NOT_FOUND, result.status_code)

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)

    configuration_file = glob.glob(
      os.path.join(
        self.instance_path, '*', 'etc', 'caddy-slave-conf.d', '_ciphers.conf'
      ))[0]
    self.assertTrue(
      'ciphers RSA-3DES-EDE-CBC-SHA RSA-AES128-CBC-SHA'
      in open(configuration_file).read()
    )

3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213
  def test_enable_cache_custom_domain(self):
    reference = 'enable_cache_custom_domain'
    hostname = 'customdomainenablecache'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, '')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    result = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper', headers={
        'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
        'revalidate=3600, stale-if-error=3600'})

    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
    self.assertKeyWithPop('Age', headers)

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
        'Cache-Control': 'max-age=1, stale-while-revalidate=3600, '
                         'stale-if-error=3600'
      },
      headers
    )

    backend_headers = result.json()['Incoming Headers']
    via = backend_headers.pop('via', None)
    self.assertNotEqual(via, None)
    self.assertRegexpMatches(
      via,
      r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
    )

  def test_enable_cache_server_alias(self):
    parameter_dict = self.assertSlaveBase('enable_cache_server_alias')

    result = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper', headers={
        'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
        'revalidate=3600, stale-if-error=3600'})

    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
    self.assertKeyWithPop('Age', headers)

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
        'Cache-Control': 'max-age=1, stale-while-revalidate=3600, '
                         'stale-if-error=3600'
      },
      headers
    )

    backend_headers = result.json()['Incoming Headers']
    via = backend_headers.pop('via', None)
    self.assertNotEqual(via, None)
    self.assertRegexpMatches(
      via,
      r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
    )

    result = self.fakeHTTPResult(
      'enablecacheserveralias1.example.com', parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper', headers={
        'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
        'revalidate=3600, stale-if-error=3600'})

    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
    self.assertKeyWithPop('Age', headers)

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
        'Cache-Control': 'max-age=1, stale-while-revalidate=3600, '
                         'stale-if-error=3600'
      },
      headers
    )

    backend_headers = result.json()['Incoming Headers']
    via = backend_headers.pop('via', None)
    self.assertNotEqual(via, None)
    self.assertRegexpMatches(
      via,
      r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
3214
  def test_enable_cache(self):
3215
    parameter_dict = self.assertSlaveBase('enable_cache')
Łukasz Nowak's avatar
Łukasz Nowak committed
3216

3217
    result = self.fakeHTTPResult(
3218
      parameter_dict['domain'], parameter_dict['public-ipv4'],
3219 3220 3221
      'test-path/deep/.././deeper', headers={
        'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
        'revalidate=3600, stale-if-error=3600'})
Łukasz Nowak's avatar
Łukasz Nowak committed
3222

3223
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
3224 3225 3226 3227 3228

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
3229
    self.assertKeyWithPop('Age', headers)
Łukasz Nowak's avatar
Łukasz Nowak committed
3230 3231 3232 3233 3234 3235 3236 3237

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
3238 3239
      {
        'Content-type': 'application/json',
3240 3241 3242 3243
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
        'Cache-Control': 'max-age=1, stale-while-revalidate=3600, '
                         'stale-if-error=3600'
      },
3244
      headers
Łukasz Nowak's avatar
Łukasz Nowak committed
3245 3246
    )

3247 3248 3249 3250 3251 3252 3253 3254
    backend_headers = result.json()['Incoming Headers']
    via = backend_headers.pop('via', None)
    self.assertNotEqual(via, None)
    self.assertRegexpMatches(
      via,
      r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
    )

3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316
    # check stale-if-error support (assumes stale-while-revalidate is same)
    # wait a bit for max-age to expire
    time.sleep(2)
    # real check: cache access provides old data, access cache directly, as
    # caddy has to be stopped
    try:
      # stop caddy, to have error on while connecting to the backend
      caddy_process_name = [
        ':'.join([q['group'], q['name']]) for q in
        self.getSupervisorRPCServer().supervisor.getAllProcessInfo()
        if 'caddy' in q['name'] and 'on-watch' in q['name']][0]
      self.getSupervisorRPCServer().supervisor.stopProcess(caddy_process_name)

      # sanity check: see that it is impossible to connect to caddy
      with self.assertRaises(requests.ConnectionError):
        self.fakeHTTPResult(
          parameter_dict['domain'], parameter_dict['public-ipv4'],
          'test-path/deep/.././deeper', headers={
            'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
            'revalidate=3600, stale-if-error=3600'})

      result = self.fakeHTTPResult(
        parameter_dict['domain'], parameter_dict['public-ipv4'],
        'test-path/deeper',  # simple path, as ATS can't change them
        port=23432, headers={
          'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
          'revalidate=3600, stale-if-error=3600'})
      self.assertEqual(result.status_code, httplib.OK)
      self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
      headers = result.headers.copy()
      self.assertKeyWithPop('Server', headers)
      self.assertKeyWithPop('Date', headers)
      self.assertKeyWithPop('Age', headers)
      # drop keys appearing randomly in headers
      headers.pop('Transfer-Encoding', None)
      headers.pop('Content-Length', None)
      headers.pop('Connection', None)
      headers.pop('Keep-Alive', None)

      self.assertEqual(
        {
          'Content-type': 'application/json',
          # ATS does not cache the cookied text content, see:
          # https://docs.trafficserver.apache.org/en/7.1.x/admin-guide/\
          # configuration/cache-basics.en.html#caching-cookied-objects
          # 'Set-Cookie': 'secured=value;secure, nonsecured=value',
          'Cache-Control': 'max-age=1, stale-while-revalidate=3600, '
                           'stale-if-error=3600',
          'Warning': '111 ApacheTrafficServer/7.1.6'
        },
        headers
      )

      backend_headers = result.json()['Incoming Headers']
      via = backend_headers.pop('via', None)
      self.assertNotEqual(via, None)
      self.assertRegexpMatches(
        via,
        r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
      )
    finally:
      self.getSupervisorRPCServer().supervisor.startProcess(caddy_process_name)
3317 3318 3319
      # give few moments for caddy to start
      # XXX: convert to a loop which awaits caddy to be ready
      time.sleep(2)
3320 3321
    # END: check stale-if-error support

3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333
    result_direct = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      port=26011)

    self.assertEqualResultJson(result_direct, 'Path', '/test-path')

    try:
      j = result_direct.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result_direct.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

3334
    self.assertFalse('Content-Encoding' in result_direct.headers)
3335

3336
    self.assertEqual(
3337 3338
      'secured=value;secure, nonsecured=value',
      result_direct.headers['Set-Cookie']
3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354
    )

    result_direct_https_backend = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      port=26012)

    self.assertEqualResultJson(
      result_direct_https_backend, 'Path', '/test-path')

    try:
      j = result_direct_https_backend.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (
        result_direct_https_backend.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

3355
    self.assertFalse('Content-Encoding' in result_direct_https_backend.headers)
3356

3357
    self.assertEqual(
3358 3359
      'secured=value;secure, nonsecured=value',
      result_direct_https_backend.headers['Set-Cookie']
3360 3361
    )

3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444
  def test_enable_cache_ats_timeout(self):
    parameter_dict = self.assertSlaveBase('enable_cache')
    # check that timeout seen by ATS does not result in many queries done
    # to the backend and that next request works like a charm
    result = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test_enable_cache_ats_timeout', headers={
        'Timeout': '15',
        'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
        'revalidate=3600, stale-if-error=3600'})

    # ATS timed out
    self.assertEqual(
      httplib.GATEWAY_TIMEOUT,
      result.status_code
    )

    caddy_log_file = glob.glob(
      os.path.join(
        self.instance_path, '*', 'var', 'log', 'httpd-cache-direct',
        '_enable_cache_access_log'
      ))[0]

    matching_line_amount = 0
    pattern = re.compile(
      r'.*GET .test_enable_cache_ats_timeout.*" 499.*')
    with open(caddy_log_file) as fh:
      for line in fh.readlines():
        if pattern.match(line):
          matching_line_amount += 1

    # Caddy used between ATS and the backend received only one connection
    self.assertEqual(
      1,
      matching_line_amount)

    timeout = 5
    b = time.time()
    # ATS created squid.log with a delay
    while True:
      if (time.time() - b) > timeout:
        self.fail('Squid log file did not appear in %ss' % (timeout,))
      ats_log_file_list = glob.glob(
        os.path.join(
          self.instance_path, '*', 'var', 'log', 'trafficserver', 'squid.log'
        ))
      if len(ats_log_file_list) == 1:
        ats_log_file = ats_log_file_list[0]
        break
      time.sleep(0.1)

    pattern = re.compile(
      r'.*ERR_READ_TIMEOUT/504 .*test_enable_cache_ats_timeout'
      '.*TIMEOUT_DIRECT*')
    timeout = 5
    b = time.time()
    # ATS needs some time to flush logs
    while True:
      matching_line_amount = 0
      if (time.time() - b) > timeout:
        break
      with open(ats_log_file) as fh:
        for line in fh.readlines():
          if pattern.match(line):
            matching_line_amount += 1
      if matching_line_amount > 0:
        break
      time.sleep(0.1)

    # ATS has only one entry for this query
    self.assertEqual(
      1,
      matching_line_amount)

    # the result is available immediately after
    result = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper', headers={
        'X-Reply-Header-Cache-Control': 'max-age=1, stale-while-'
        'revalidate=3600, stale-if-error=3600'})

    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')

Łukasz Nowak's avatar
Łukasz Nowak committed
3445
  def test_enable_cache_disable_no_cache_request(self):
3446
    parameter_dict = self.assertSlaveBase(
3447
      'enable_cache-disable-no-cache-request')
Łukasz Nowak's avatar
Łukasz Nowak committed
3448 3449 3450 3451 3452 3453

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      headers={'Pragma': 'no-cache', 'Cache-Control': 'something'})

    self.assertEqual(
3454
      self.certificate_pem,
3455
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3456 3457 3458 3459 3460 3461 3462

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
3463
    self.assertKeyWithPop('Age', headers)
Łukasz Nowak's avatar
Łukasz Nowak committed
3464 3465 3466 3467 3468 3469 3470 3471

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
3472 3473 3474 3475
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value'
      },
3476
      headers
Łukasz Nowak's avatar
Łukasz Nowak committed
3477 3478
    )

3479 3480 3481 3482 3483 3484 3485 3486
    backend_headers = result.json()['Incoming Headers']
    via = backend_headers.pop('via', None)
    self.assertNotEqual(via, None)
    self.assertRegexpMatches(
      via,
      r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
3487 3488 3489 3490 3491 3492 3493
    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('pragma' in j['Incoming Headers'].keys())

  def test_enable_cache_disable_via_header(self):
3494
    parameter_dict = self.assertSlaveBase('enable_cache-disable-via-header')
Łukasz Nowak's avatar
Łukasz Nowak committed
3495 3496 3497 3498 3499

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3500
      self.certificate_pem,
3501
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3502 3503 3504 3505 3506 3507 3508

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)
3509
    self.assertKeyWithPop('Age', headers)
Łukasz Nowak's avatar
Łukasz Nowak committed
3510 3511 3512 3513 3514 3515 3516 3517

    # drop keys appearing randomly in headers
    headers.pop('Transfer-Encoding', None)
    headers.pop('Content-Length', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
3518 3519 3520 3521
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
      },
3522
      headers
Łukasz Nowak's avatar
Łukasz Nowak committed
3523 3524
    )

3525 3526 3527 3528 3529 3530 3531 3532
    backend_headers = result.json()['Incoming Headers']
    via = backend_headers.pop('via', None)
    self.assertNotEqual(via, None)
    self.assertRegexpMatches(
      via,
      r'^http\/1.1 caddy-frontend-1\[.*\] \(ApacheTrafficServer\/7.1.6\)$'
    )

Łukasz Nowak's avatar
Łukasz Nowak committed
3533
  def test_enable_http2_false(self):
3534
    parameter_dict = self.assertSlaveBase('enable-http2-false')
Łukasz Nowak's avatar
Łukasz Nowak committed
3535 3536 3537 3538 3539

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3540
      self.certificate_pem,
3541
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)

    # drop vary-keys
    headers.pop('Content-Length', None)
    headers.pop('Transfer-Encoding', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
3557 3558 3559
      {
        'Content-Type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
3560 3561
      },
      headers
Łukasz Nowak's avatar
Łukasz Nowak committed
3562 3563 3564 3565 3566 3567
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_enable_http2_default(self):
3568
    parameter_dict = self.assertSlaveBase('enable-http2-default')
Łukasz Nowak's avatar
Łukasz Nowak committed
3569 3570 3571 3572 3573

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3574
      self.certificate_pem,
3575
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)

    # drop vary-keys
    headers.pop('Content-Length', None)
    headers.pop('Transfer-Encoding', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
3591 3592 3593
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
3594 3595
      },
      headers
Łukasz Nowak's avatar
Łukasz Nowak committed
3596 3597 3598 3599 3600 3601
    )

    self.assertTrue(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_prefer_gzip_encoding_to_backend(self):
3602
    parameter_dict = self.assertSlaveBase('prefer-gzip-encoding-to-backend')
Łukasz Nowak's avatar
Łukasz Nowak committed
3603 3604

    result = self.fakeHTTPSResult(
3605 3606
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
Łukasz Nowak's avatar
Łukasz Nowak committed
3607 3608 3609
      headers={'Accept-Encoding': 'gzip, deflate'})

    self.assertEqual(
3610
      self.certificate_pem,
3611
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3612

3613
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
3614 3615

    self.assertEqual(
3616
      'gzip', result.json()['Incoming Headers']['accept-encoding'])
Łukasz Nowak's avatar
Łukasz Nowak committed
3617 3618

    result = self.fakeHTTPSResult(
3619 3620
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper',
Łukasz Nowak's avatar
Łukasz Nowak committed
3621 3622
      headers={'Accept-Encoding': 'deflate'})

3623
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
3624 3625

    self.assertEqual(
3626
      'deflate', result.json()['Incoming Headers']['accept-encoding'])
Łukasz Nowak's avatar
Łukasz Nowak committed
3627

3628
    result = self.fakeHTTPSResult(
3629 3630
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
3631 3632 3633 3634 3635

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

3636
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
3637 3638

    result = self.fakeHTTPSResult(
3639 3640
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
3641

3642
    self.assertEqualResultJson(result, 'Path', '/test-path/deeper')
3643

Łukasz Nowak's avatar
Łukasz Nowak committed
3644
  def test_disabled_cookie_list(self):
3645
    parameter_dict = self.assertSlaveBase('disabled-cookie-list')
Łukasz Nowak's avatar
Łukasz Nowak committed
3646 3647 3648 3649 3650 3651 3652 3653 3654 3655

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
      cookies=dict(
          Chocolate='absent',
          Vanilia='absent',
          Coffee='present'
        ))

    self.assertEqual(
3656
      self.certificate_pem,
3657
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3658 3659 3660 3661

    self.assertEqualResultJson(result, 'Path', '/test-path')

    self.assertEqual(
3662
      'Coffee=present', result.json()['Incoming Headers']['cookie'])
Łukasz Nowak's avatar
Łukasz Nowak committed
3663 3664

  def test_apache_custom_http_s_rejected(self):
3665 3666
    parameter_dict = self.parseSlaveParameterDict(
      'apache_custom_http_s-rejected')
3667 3668
    self.assertEqual(
      {
3669
        'request-error-list': ["slave not authorized"]
3670 3671
      },
      parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
3672 3673 3674 3675 3676 3677 3678 3679 3680 3681 3682 3683 3684 3685
    slave_configuration_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'etc', '*slave-conf.d', '*.conf'))
    # no configuration file contains provided custom http
    configuration_file_with_custom_https_list = [
      q for q in slave_configuration_file_list
      if 'apache_custom_https_filled_in_rejected' in open(q).read()]
    self.assertEqual([], configuration_file_with_custom_https_list)

    configuration_file_with_custom_http_list = [
      q for q in slave_configuration_file_list
      if 'apache_custom_http_filled_in_rejected' in open(q).read()]
    self.assertEqual([], configuration_file_with_custom_http_list)

  def test_apache_custom_http_s_accepted(self):
3686 3687
    parameter_dict = self.parseSlaveParameterDict(
      'apache_custom_http_s-accepted')
3688
    self.assertLogAccessUrlWithPop(parameter_dict)
3689
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
3690
    self.assertEqual(
3691
      {'replication_number': '1', 'public-ipv4': SLAPOS_TEST_IPV4},
3692
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
3693 3694 3695 3696 3697 3698 3699
    )

    result = self.fakeHTTPSResult(
      'apachecustomhttpsaccepted.example.com',
      parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3700
      self.certificate_pem,
3701
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3702 3703 3704 3705 3706 3707 3708 3709 3710 3711 3712 3713 3714 3715

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)

    # drop vary-keys
    headers.pop('Content-Length', None)
    headers.pop('Transfer-Encoding', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

3716 3717 3718 3719
    self.assertEqual(
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value'
3720 3721
      },
      headers
3722
    )
Łukasz Nowak's avatar
Łukasz Nowak committed
3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738

    result_http = self.fakeHTTPResult(
      'apachecustomhttpsaccepted.example.com',
      parameter_dict['public-ipv4'], 'test-path')
    self.assertEqualResultJson(result_http, 'Path', '/test-path')

    slave_configuration_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'etc', '*slave-conf.d', '*.conf'))
    # no configuration file contains provided custom http
    configuration_file_with_custom_https_list = [
      q for q in slave_configuration_file_list
      if 'apache_custom_https_filled_in_accepted' in open(q).read()]
    self.assertEqual(1, len(configuration_file_with_custom_https_list))

    configuration_file_with_custom_http_list = [
      q for q in slave_configuration_file_list
3739 3740 3741 3742
      if 'apache_custom_http_filled_in_accepted' in open(q).read()]
    self.assertEqual(1, len(configuration_file_with_custom_http_list))

  def test_caddy_custom_http_s_rejected(self):
3743 3744
    parameter_dict = self.parseSlaveParameterDict(
      'caddy_custom_http_s-rejected')
3745 3746
    self.assertEqual(
      {
3747
        'request-error-list': ["slave not authorized"]
3748 3749
      },
      parameter_dict)
3750 3751 3752 3753 3754 3755 3756 3757 3758 3759 3760 3761 3762
    slave_configuration_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'etc', '*slave-conf.d', '*.conf'))
    # no configuration file contains provided custom http
    configuration_file_with_custom_https_list = [
      q for q in slave_configuration_file_list
      if 'caddy_custom_https_filled_in_rejected' in open(q).read()]
    self.assertEqual([], configuration_file_with_custom_https_list)

    configuration_file_with_custom_http_list = [
      q for q in slave_configuration_file_list
      if 'caddy_custom_http_filled_in_rejected' in open(q).read()]
    self.assertEqual([], configuration_file_with_custom_http_list)

3763
  def test_caddy_custom_http_s(self):
3764 3765
    parameter_dict = self.parseSlaveParameterDict(
      'caddy_custom_http_s')
3766 3767
    self.assertEqual(
      {
3768
        'request-error-list': ["slave not authorized"]
3769 3770 3771 3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782 3783
      },
      parameter_dict)
    slave_configuration_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'etc', '*slave-conf.d', '*.conf'))
    # no configuration file contains provided custom http
    configuration_file_with_custom_https_list = [
      q for q in slave_configuration_file_list
      if 'caddy_custom_https_filled_in_rejected_2' in open(q).read()]
    self.assertEqual([], configuration_file_with_custom_https_list)

    configuration_file_with_custom_http_list = [
      q for q in slave_configuration_file_list
      if 'caddy_custom_http_filled_in_rejected_2' in open(q).read()]
    self.assertEqual([], configuration_file_with_custom_http_list)

3784
  def test_caddy_custom_http_s_accepted(self):
3785 3786
    parameter_dict = self.parseSlaveParameterDict(
      'caddy_custom_http_s-accepted')
3787
    self.assertLogAccessUrlWithPop(parameter_dict)
3788
    self.assertKedifaKeysWithPop(parameter_dict)
3789
    self.assertEqual(
3790
      {'replication_number': '1', 'public-ipv4': SLAPOS_TEST_IPV4},
3791
      parameter_dict
3792 3793 3794 3795 3796 3797 3798
    )

    result = self.fakeHTTPSResult(
      'caddycustomhttpsaccepted.example.com',
      parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3799
      self.certificate_pem,
3800
      der2pem(result.peercert))
3801 3802 3803 3804 3805 3806 3807 3808 3809 3810 3811 3812 3813 3814 3815

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)

    # drop vary-keys
    headers.pop('Content-Length', None)
    headers.pop('Transfer-Encoding', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
3816 3817 3818
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value'
3819 3820
      },
      headers
3821 3822 3823 3824 3825 3826 3827 3828 3829 3830 3831 3832 3833 3834 3835 3836 3837 3838
    )

    result_http = self.fakeHTTPResult(
      'caddycustomhttpsaccepted.example.com',
      parameter_dict['public-ipv4'], 'test-path')
    self.assertEqualResultJson(result_http, 'Path', '/test-path')

    slave_configuration_file_list = glob.glob(os.path.join(
      self.instance_path, '*', 'etc', '*slave-conf.d', '*.conf'))
    # no configuration file contains provided custom http
    configuration_file_with_custom_https_list = [
      q for q in slave_configuration_file_list
      if 'caddy_custom_https_filled_in_accepted' in open(q).read()]
    self.assertEqual(1, len(configuration_file_with_custom_https_list))

    configuration_file_with_custom_http_list = [
      q for q in slave_configuration_file_list
      if 'caddy_custom_http_filled_in_accepted' in open(q).read()]
Łukasz Nowak's avatar
Łukasz Nowak committed
3839 3840 3841
    self.assertEqual(1, len(configuration_file_with_custom_http_list))

  def test_https_url(self):
3842
    parameter_dict = self.assertSlaveBase('url_https-url')
Łukasz Nowak's avatar
Łukasz Nowak committed
3843 3844

    result = self.fakeHTTPSResult(
3845 3846
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
3847 3848

    self.assertEqual(
3849
      self.certificate_pem,
3850
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3851

3852
    self.assertEqualResultJson(result, 'Path', '/https/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
3853 3854

    result_http = self.fakeHTTPResult(
3855 3856 3857
      parameter_dict['domain'], parameter_dict['public-ipv4'],
      'test-path/deep/.././deeper')
    self.assertEqualResultJson(result_http, 'Path', '/http/test-path/deeper')
Łukasz Nowak's avatar
Łukasz Nowak committed
3858 3859 3860 3861 3862 3863 3864


class TestReplicateSlave(SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
3865
      'public-ipv4': SLAPOS_TEST_IPV4,
Łukasz Nowak's avatar
Łukasz Nowak committed
3866 3867 3868 3869 3870 3871 3872 3873
      '-frontend-quantity': 2,
      '-sla-2-computer_guid': 'slapos.test',
      '-frontend-2-state': 'stopped',
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      '-frontend-config-2-monitor-httpd-port': MONITOR_F2_HTTPD_PORT,
3874 3875
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
3876 3877 3878 3879 3880 3881 3882 3883 3884 3885 3886
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'replicate': {
        'url': cls.backend_url,
      },
    }

  def test(self):
3887
    parameter_dict = self.parseSlaveParameterDict('replicate')
3888
    self.assertLogAccessUrlWithPop(parameter_dict)
3889
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
3890 3891 3892 3893 3894 3895 3896
    self.assertEqual(
      {
        'domain': 'replicate.example.com',
        'replication_number': '2',
        'url': 'http://replicate.example.com',
        'site_url': 'http://replicate.example.com',
        'secure_access': 'https://replicate.example.com',
3897
        'public-ipv4': SLAPOS_TEST_IPV4,
3898 3899
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
3900 3901 3902 3903 3904 3905
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
3906
      self.certificate_pem,
3907
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924 3925 3926 3927

    self.assertEqualResultJson(result, 'Path', '/test-path')

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
    self.assertEqualResultJson(result_http, 'Path', '/test-path')

    # prove 2nd frontend by inspection of the instance
    slave_configuration_name = '_replicate.conf'
    slave_configuration_file_list = [
      '/'.join([f[0], slave_configuration_name]) for f in [
        q for q in os.walk(self.instance_path)
        if slave_configuration_name in q[2]
      ]
    ]

    self.assertEqual(
      2, len(slave_configuration_file_list), slave_configuration_file_list)


3928 3929 3930 3931 3932 3933 3934 3935 3936 3937 3938 3939 3940 3941 3942 3943 3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964
class TestReplicateSlaveOtherDestroyed(SlaveHttpFrontendTestCase):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
      'public-ipv4': SLAPOS_TEST_IPV4,
      '-frontend-quantity': 2,
      '-sla-2-computer_guid': 'slapos.test',
      '-frontend-2-state': 'destroyed',
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      '-frontend-config-2-monitor-httpd-port': MONITOR_F2_HTTPD_PORT,
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {'empty': {}}

  def test_extra_slave_instance_list_not_present_destroyed_request(self):
    buildout_file = os.path.join(
      self.getMasterPartitionPath(), 'buildout-switch-softwaretype.cfg')
    with open(buildout_file) as fh:
      buildout_file_content = fh.read()
      node_1_present = re.search(
        "^config-frontend-name = !py!'caddy-frontend-1'$",
        buildout_file_content, flags=re.M) is not None
      node_2_present = re.search(
        "^config-frontend-name = !py!'caddy-frontend-2'$",
        buildout_file_content, flags=re.M) is not None
    self.assertTrue(node_1_present)
    self.assertFalse(node_2_present)


Łukasz Nowak's avatar
Łukasz Nowak committed
3965 3966 3967 3968 3969 3970
class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
                                         TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
3971
      'public-ipv4': SLAPOS_TEST_IPV4,
Łukasz Nowak's avatar
Łukasz Nowak committed
3972 3973 3974 3975 3976
      'enable-http2-by-default': 'false',
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
3977 3978
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
3979 3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'enable-http2-default': {
      },
      'enable-http2-false': {
        'enable-http2': 'false',
      },
      'enable-http2-true': {
        'enable-http2': 'true',
      },
    }

  def test_enable_http2_default(self):
3995
    parameter_dict = self.parseSlaveParameterDict('enable-http2-default')
3996
    self.assertLogAccessUrlWithPop(parameter_dict)
3997
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
3998 3999 4000 4001 4002 4003 4004 4005
    self.assertEqual(
      {
        'domain': 'enablehttp2default.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2default.example.com',
        'site_url': 'http://enablehttp2default.example.com',
        'secure_access':
        'https://enablehttp2default.example.com',
4006
        'public-ipv4': SLAPOS_TEST_IPV4,
4007 4008
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4009 4010 4011 4012 4013 4014
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_enable_http2_false(self):
4015
    parameter_dict = self.parseSlaveParameterDict('enable-http2-false')
4016
    self.assertLogAccessUrlWithPop(parameter_dict)
4017
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4018 4019 4020 4021 4022 4023 4024 4025
    self.assertEqual(
      {
        'domain': 'enablehttp2false.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2false.example.com',
        'site_url': 'http://enablehttp2false.example.com',
        'secure_access':
        'https://enablehttp2false.example.com',
4026
        'public-ipv4': SLAPOS_TEST_IPV4,
4027 4028
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4029 4030 4031 4032 4033 4034
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_enable_http2_true(self):
4035
    parameter_dict = self.parseSlaveParameterDict('enable-http2-true')
4036
    self.assertLogAccessUrlWithPop(parameter_dict)
4037
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4038 4039 4040 4041 4042 4043 4044 4045
    self.assertEqual(
      {
        'domain': 'enablehttp2true.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2true.example.com',
        'site_url': 'http://enablehttp2true.example.com',
        'secure_access':
        'https://enablehttp2true.example.com',
4046
        'public-ipv4': SLAPOS_TEST_IPV4,
4047 4048
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 4059 4060
    )

    self.assertTrue(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))


class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
                                           TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
4061
      'public-ipv4': SLAPOS_TEST_IPV4,
Łukasz Nowak's avatar
Łukasz Nowak committed
4062 4063 4064 4065
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
4066 4067
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
4068 4069 4070 4071 4072 4073 4074 4075 4076 4077 4078 4079 4080 4081 4082 4083
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'enable-http2-default': {
      },
      'enable-http2-false': {
        'enable-http2': 'false',
      },
      'enable-http2-true': {
        'enable-http2': 'true',
      },
    }

  def test_enable_http2_default(self):
4084
    parameter_dict = self.parseSlaveParameterDict('enable-http2-default')
4085
    self.assertLogAccessUrlWithPop(parameter_dict)
4086
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4087 4088 4089 4090 4091 4092 4093 4094
    self.assertEqual(
      {
        'domain': 'enablehttp2default.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2default.example.com',
        'site_url': 'http://enablehttp2default.example.com',
        'secure_access':
        'https://enablehttp2default.example.com',
4095
        'public-ipv4': SLAPOS_TEST_IPV4,
4096 4097
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4098 4099 4100 4101 4102 4103
    )

    self.assertTrue(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_enable_http2_false(self):
4104
    parameter_dict = self.parseSlaveParameterDict('enable-http2-false')
4105
    self.assertLogAccessUrlWithPop(parameter_dict)
4106
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4107 4108 4109 4110 4111 4112 4113 4114
    self.assertEqual(
      {
        'domain': 'enablehttp2false.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2false.example.com',
        'site_url': 'http://enablehttp2false.example.com',
        'secure_access':
        'https://enablehttp2false.example.com',
4115
        'public-ipv4': SLAPOS_TEST_IPV4,
4116 4117
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4118 4119 4120 4121 4122 4123
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_enable_http2_true(self):
4124
    parameter_dict = self.parseSlaveParameterDict('enable-http2-true')
4125
    self.assertLogAccessUrlWithPop(parameter_dict)
4126
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4127 4128 4129 4130 4131 4132 4133 4134
    self.assertEqual(
      {
        'domain': 'enablehttp2true.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2true.example.com',
        'site_url': 'http://enablehttp2true.example.com',
        'secure_access':
        'https://enablehttp2true.example.com',
4135
        'public-ipv4': SLAPOS_TEST_IPV4,
4136 4137
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152
    )

    self.assertTrue(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))


class TestRe6stVerificationUrlDefaultSlave(SlaveHttpFrontendTestCase,
                                           TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
4153 4154
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
4155 4156 4157 4158 4159 4160 4161 4162 4163 4164
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'default': {
      },
    }

  def test_default(self):
4165
    parameter_dict = self.parseSlaveParameterDict('default')
4166
    self.assertLogAccessUrlWithPop(parameter_dict)
4167
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4168 4169 4170 4171 4172 4173 4174
    self.assertEqual(
      {
        'domain': 'default.None',
        'replication_number': '1',
        'url': 'http://default.None',
        'site_url': 'http://default.None',
        'secure_access': 'https://default.None',
4175
        'public-ipv4': 'None',
4176 4177
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4178 4179 4180 4181
    )

    re6st_connectivity_promise_list = glob.glob(
      os.path.join(
4182 4183
        self.instance_path, '*', 'etc', 'plugin',
        're6st-connectivity.py'))
Łukasz Nowak's avatar
Łukasz Nowak committed
4184 4185

    self.assertEqual(1, len(re6st_connectivity_promise_list))
4186
    re6st_connectivity_promise_file = re6st_connectivity_promise_list[0]
Łukasz Nowak's avatar
Łukasz Nowak committed
4187

4188
    self.assertEqual(
4189 4190
      getPluginParameterDict(
        self.software_path, re6st_connectivity_promise_file),
4191 4192 4193
      {
        'url': 'http://[2001:67c:1254:4::1]/index.html',
      }
Łukasz Nowak's avatar
Łukasz Nowak committed
4194 4195 4196 4197 4198 4199 4200 4201 4202 4203 4204 4205 4206
    )


class TestRe6stVerificationUrlSlave(SlaveHttpFrontendTestCase,
                                    TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      're6st-verification-url': 'some-re6st-verification-url',
4207 4208
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
4209 4210 4211 4212 4213 4214 4215 4216 4217 4218
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'default': {
      },
    }

  def test_default(self):
4219
    parameter_dict = self.parseSlaveParameterDict('default')
4220
    self.assertLogAccessUrlWithPop(parameter_dict)
4221
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4222 4223 4224 4225 4226 4227 4228
    self.assertEqual(
      {
        'domain': 'default.None',
        'replication_number': '1',
        'url': 'http://default.None',
        'site_url': 'http://default.None',
        'secure_access': 'https://default.None',
4229
        'public-ipv4': 'None',
4230 4231
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4232 4233 4234 4235
    )

    re6st_connectivity_promise_list = glob.glob(
      os.path.join(
4236 4237
        self.instance_path, '*', 'etc', 'plugin',
        're6st-connectivity.py'))
Łukasz Nowak's avatar
Łukasz Nowak committed
4238 4239

    self.assertEqual(1, len(re6st_connectivity_promise_list))
4240
    re6st_connectivity_promise_file = re6st_connectivity_promise_list[0]
Łukasz Nowak's avatar
Łukasz Nowak committed
4241

4242
    self.assertEqual(
4243 4244
      getPluginParameterDict(
        self.software_path, re6st_connectivity_promise_file),
4245 4246 4247
      {
        'url': 'some-re6st-verification-url',
      }
Łukasz Nowak's avatar
Łukasz Nowak committed
4248
    )
4249 4250 4251 4252 4253 4254 4255 4256


class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
                                  TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
4257
      'public-ipv4': SLAPOS_TEST_IPV4,
4258 4259 4260 4261
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
4262 4263
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
4264 4265 4266 4267 4268 4269 4270 4271 4272 4273 4274 4275 4276 4277 4278 4279
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'empty': {
      },
      'url': {
        'url': "https://[fd46::c2ae]:!py!u'123123'",
      },
      'https-url': {
        'https-url': "https://[fd46::c2ae]:!py!u'123123'",
      }
    }

  def test_master_partition_state(self):
4280
    parameter_dict = self.parseConnectionParameterDict()
4281
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
4282
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
4283
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
4284 4285

    expected_parameter_dict = {
4286
      'monitor-base-url': 'None',
4287 4288 4289 4290
      'domain': 'example.com',
      'accepted-slave-amount': '1',
      'rejected-slave-amount': '2',
      'slave-amount': '3',
4291 4292 4293 4294 4295
      'rejected-slave-dict': {
        '_https-url': ['slave https-url "https://[fd46::c2ae]:!py!u\'123123\'"'
                       ' invalid'],
        '_url': [u'slave url "https://[fd46::c2ae]:!py!u\'123123\'" invalid']
      }
4296
    }
4297 4298 4299 4300 4301 4302 4303

    self.assertEqual(
      expected_parameter_dict,
      parameter_dict
    )

  def test_empty(self):
4304
    parameter_dict = self.parseSlaveParameterDict('empty')
4305
    self.assertLogAccessUrlWithPop(parameter_dict)
4306
    self.assertKedifaKeysWithPop(parameter_dict)
4307 4308 4309 4310 4311 4312 4313
    self.assertEqual(
      {
        'domain': 'empty.example.com',
        'replication_number': '1',
        'url': 'http://empty.example.com',
        'site_url': 'http://empty.example.com',
        'secure_access': 'https://empty.example.com',
4314
        'public-ipv4': SLAPOS_TEST_IPV4,
4315 4316
      },
      parameter_dict
4317 4318 4319 4320 4321 4322
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4323
      self.certificate_pem,
4324
      der2pem(result.peercert))
4325

4326
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
4327 4328

  def test_url(self):
4329
    parameter_dict = self.parseSlaveParameterDict('url')
4330
    self.assertEqual(
4331
      {
4332 4333
        'request-error-list': [
          "slave url \"https://[fd46::c2ae]:!py!u'123123'\" invalid"]
4334 4335
      },
      parameter_dict
4336 4337 4338
    )

  def test_https_url(self):
4339
    parameter_dict = self.parseSlaveParameterDict('https-url')
4340
    self.assertEqual(
4341
      {
4342 4343
        'request-error-list': [
          "slave https-url \"https://[fd46::c2ae]:!py!u'123123'\" invalid"]
4344 4345
      },
      parameter_dict
4346
    )
4347 4348 4349 4350 4351 4352 4353


class TestDefaultMonitorHttpdPort(SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      '-frontend-1-state': 'stopped',
4354 4355
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
4356 4357
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
4358 4359
    }

4360 4361 4362 4363
  @classmethod
  def runKedifaUpdater(cls):
    return

4364 4365 4366 4367 4368 4369 4370 4371 4372
  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'test': {
        'url': cls.backend_url,
      },
    }

  def test(self):
4373
    parameter_dict = self.parseSlaveParameterDict('test')
4374
    self.assertKeyWithPop('log-access-url', parameter_dict)
4375
    self.assertKedifaKeysWithPop(parameter_dict)
4376 4377 4378 4379
    self.assertEqual(
      {
        'domain': 'test.None', 'replication_number': '1',
        'url': 'http://test.None', 'site_url': 'http://test.None',
4380
        'secure_access': 'https://test.None', 'public-ipv4': 'None'},
4381
      parameter_dict
4382 4383
    )
    master_monitor_conf = open(os.path.join(
4384
      self.instance_path, 'T-0', 'etc',
4385 4386
      'monitor-httpd.conf')).read()
    slave_monitor_conf = open(os.path.join(
4387
      self.instance_path, 'T-2', 'etc',
4388 4389 4390
      'monitor-httpd.conf')).read()

    self.assertTrue(
4391
      'Listen [%s]:8196' % (SLAPOS_TEST_IPV6,) in master_monitor_conf)
4392
    self.assertTrue(
4393
      'Listen [%s]:8072' % (SLAPOS_TEST_IPV6,) in slave_monitor_conf)
Łukasz Nowak's avatar
Łukasz Nowak committed
4394 4395 4396 4397 4398 4399 4400


class TestQuicEnabled(SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
4401
      'public-ipv4': SLAPOS_TEST_IPV4,
Łukasz Nowak's avatar
Łukasz Nowak committed
4402 4403 4404 4405 4406 4407
      'enable-quic': 'true',
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      'mpm-graceful-shutdown-timeout': 2,
4408 4409
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
Łukasz Nowak's avatar
Łukasz Nowak committed
4410 4411 4412 4413 4414 4415 4416 4417 4418 4419
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'url': {
        'url': cls.backend_url,
      },
    }

4420 4421 4422
  # It is known problem that QUIC does not work after sending reload signal,
  # SIGUSR1, see https://github.com/mholt/caddy/issues/2394
  @expectedFailure
Łukasz Nowak's avatar
Łukasz Nowak committed
4423
  def test_url(self):
4424
    parameter_dict = self.parseSlaveParameterDict('url')
4425
    self.assertLogAccessUrlWithPop(parameter_dict)
4426
    self.assertKedifaKeysWithPop(parameter_dict)
Łukasz Nowak's avatar
Łukasz Nowak committed
4427 4428 4429 4430 4431 4432 4433
    self.assertEqual(
      {
        'domain': 'url.example.com',
        'replication_number': '1',
        'url': 'http://url.example.com',
        'site_url': 'http://url.example.com',
        'secure_access': 'https://url.example.com',
4434
        'public-ipv4': SLAPOS_TEST_IPV4,
4435 4436
      },
      parameter_dict
Łukasz Nowak's avatar
Łukasz Nowak committed
4437 4438 4439 4440 4441 4442
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4443
      self.certificate_pem,
4444
      der2pem(result.peercert))
Łukasz Nowak's avatar
Łukasz Nowak committed
4445 4446 4447 4448 4449 4450 4451 4452 4453 4454 4455 4456

    self.assertEqualResultJson(result, 'Path', '/test-path')

    try:
      j = result.json()
    except Exception:
      raise ValueError('JSON decode problem in:\n%s' % (result.text,))
    self.assertFalse('remote_user' in j['Incoming Headers'].keys())

    self.assertKeyWithPop('Date', result.headers)
    self.assertKeyWithPop('Content-Length', result.headers)

4457 4458 4459 4460 4461 4462
    def assertQUIC():
      quic_status, quic_result = getQUIC(
        'https://%s/%s' % (parameter_dict['domain'], 'test-path'),
        parameter_dict['public-ipv4'],
        HTTPS_PORT
      )
Łukasz Nowak's avatar
Łukasz Nowak committed
4463

4464
      self.assertTrue(quic_status, quic_result)
Łukasz Nowak's avatar
Łukasz Nowak committed
4465

4466 4467 4468 4469 4470 4471 4472 4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487
      try:
        quic_jsoned = quic_result.split('body: ')[2].split('trailers')[0]
      except Exception:
        raise ValueError('JSON not found at all in QUIC result:\n%s' % (
          quic_result,))
      try:
        j = json.loads(quic_jsoned)
      except Exception:
        raise ValueError('JSON decode problem in:\n%s' % (quic_jsoned,))
      key = 'Path'
      self.assertTrue(key in j, 'No key %r in %s' % (key, j))
      self.assertEqual('/test-path', j[key])

    assertQUIC()
    # https://github.com/mholt/caddy/issues/2394
    # after sending USR1 to Caddy QUIC does not work, check current behaviour
    caddy_pid = [
      q['pid'] for q
      in self.getSupervisorRPCServer().supervisor.getAllProcessInfo()
      if 'frontend_caddy' in q['name']][0]
    os.kill(caddy_pid, signal.SIGUSR1)

4488 4489 4490 4491
    # give caddy a moment to refresh its config, as sending signal does not
    # block until caddy is refreshed
    time.sleep(2)

4492
    assertQUIC()
4493 4494 4495 4496 4497 4498 4499


class TestSlaveBadParameters(SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
4500
      'public-ipv4': SLAPOS_TEST_IPV4,
4501 4502 4503 4504 4505
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      'mpm-graceful-shutdown-timeout': 2,
4506 4507
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
4508 4509 4510 4511 4512 4513 4514 4515
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      're6st-optimal-test-nocomma': {
        're6st-optimal-test': 'nocomma',
      },
4516 4517
      're6st-optimal-test-unsafe': {
        're6st-optimal-test':
4518
        'new\nline;rm -fr ~;,new line\n[s${esection:eoption}',
4519
      },
4520 4521 4522
      'custom_domain-unsafe': {
        'custom_domain': '${section:option} afterspace\nafternewline',
      },
4523 4524 4525
      'server-alias-unsafe': {
        'server-alias': '${section:option} afterspace',
      },
4526 4527 4528 4529
      'server-alias-same': {
        'url': cls.backend_url,
        'server-alias': 'serveraliassame.example.com',
      },
4530 4531 4532 4533 4534 4535 4536 4537 4538 4539
      'virtualhostroot-http-port-unsafe': {
        'type': 'zope',
        'url': cls.backend_url,
        'virtualhostroot-http-port': '${section:option}',
      },
      'virtualhostroot-https-port-unsafe': {
        'type': 'zope',
        'url': cls.backend_url,
        'virtualhostroot-https-port': '${section:option}',
      },
4540 4541 4542 4543 4544
      'default-path-unsafe': {
        'type': 'zope',
        'url': cls.backend_url,
        'default-path': '${section:option}\nn"\newline\n}\n}proxy\n/slashed',
      },
4545 4546 4547 4548 4549 4550
      'monitor-ipv4-test-unsafe': {
        'monitor-ipv4-test': '${section:option}\nafternewline ipv4',
      },
      'monitor-ipv6-test-unsafe': {
        'monitor-ipv6-test': '${section:option}\nafternewline ipv6',
      },
4551 4552 4553
      'bad-ciphers': {
        'ciphers': 'bad ECDHE-ECDSA-AES256-GCM-SHA384 again',
      }
4554 4555
    }

4556
  def test_master_partition_state(self):
4557
    parameter_dict = self.parseConnectionParameterDict()
4558
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
4559
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
4560
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
4561 4562

    expected_parameter_dict = {
4563
      'monitor-base-url': 'None',
4564
      'domain': 'example.com',
4565
      'accepted-slave-amount': '8',
4566 4567
      'rejected-slave-amount': '3',
      'slave-amount': '11',
4568
      'rejected-slave-dict': {
4569 4570 4571 4572
        '_bad-ciphers': [
          "Cipher 'bad' is not supported.",
          "Cipher 'again' is not supported."
        ],
4573 4574 4575 4576 4577 4578 4579 4580
        '_custom_domain-unsafe': [
          "custom_domain '${section:option} afterspace\\nafternewline' invalid"
        ],
        '_server-alias-unsafe': [
          "server-alias '${section:option}' not valid",
          "server-alias 'afterspace' not valid"
        ],
      }
4581
    }
4582 4583 4584 4585 4586 4587

    self.assertEqual(
      expected_parameter_dict,
      parameter_dict
    )

4588
  def test_server_alias_same(self):
4589
    parameter_dict = self.parseSlaveParameterDict('server-alias-same')
4590
    self.assertLogAccessUrlWithPop(parameter_dict)
4591
    self.assertKedifaKeysWithPop(parameter_dict)
4592 4593 4594 4595 4596 4597 4598
    self.assertEqual(
      {
        'domain': 'serveraliassame.example.com',
        'replication_number': '1',
        'url': 'http://serveraliassame.example.com',
        'site_url': 'http://serveraliassame.example.com',
        'secure_access': 'https://serveraliassame.example.com',
4599
        'public-ipv4': SLAPOS_TEST_IPV4,
4600 4601
      },
      parameter_dict
4602 4603 4604 4605 4606 4607
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4608
      self.certificate_pem,
4609
      der2pem(result.peercert))
4610 4611 4612

    self.assertEqualResultJson(result, 'Path', '/test-path')

4613
  def test_re6st_optimal_test_unsafe(self):
4614
    parameter_dict = self.parseSlaveParameterDict('re6st-optimal-test-unsafe')
4615
    self.assertLogAccessUrlWithPop(parameter_dict)
4616
    self.assertKedifaKeysWithPop(parameter_dict)
4617 4618 4619 4620 4621 4622 4623
    self.assertEqual(
      {
        'domain': 're6stoptimaltestunsafe.example.com',
        'replication_number': '1',
        'url': 'http://re6stoptimaltestunsafe.example.com',
        'site_url': 'http://re6stoptimaltestunsafe.example.com',
        'secure_access': 'https://re6stoptimaltestunsafe.example.com',
4624
        'public-ipv4': SLAPOS_TEST_IPV4,
4625 4626
      },
      parameter_dict
4627 4628 4629 4630 4631 4632
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4633
      self.certificate_pem,
4634
      der2pem(result.peercert))
4635

4636
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
4637 4638 4639

    monitor_file = glob.glob(
      os.path.join(
4640 4641
        self.instance_path, '*', 'etc', 'plugin',
        'check-_re6st-optimal-test-unsafe-re6st-optimal-test.py'))[0]
4642 4643 4644 4645 4646

    # Note: The result is a bit differnt from the request (newlines stripped),
    #       but good enough to prove, that ${esection:eoption} has been
    #       correctly passed to the script.
    self.assertEqual(
4647 4648 4649 4650 4651 4652
      getPluginParameterDict(self.software_path, monitor_file),
      {
        'frequency': '720',
        'ipv4': 'new line\n[s${esection:eoption}',
        'ipv6': 'new\nline;rm -fr ~;',
      }
4653 4654
    )

4655
  def test_re6st_optimal_test_nocomma(self):
4656
    parameter_dict = self.parseSlaveParameterDict('re6st-optimal-test-nocomma')
4657
    self.assertLogAccessUrlWithPop(parameter_dict)
4658
    self.assertKedifaKeysWithPop(parameter_dict)
4659 4660 4661 4662 4663 4664 4665
    self.assertEqual(
      {
        'domain': 're6stoptimaltestnocomma.example.com',
        'replication_number': '1',
        'url': 'http://re6stoptimaltestnocomma.example.com',
        'site_url': 'http://re6stoptimaltestnocomma.example.com',
        'secure_access': 'https://re6stoptimaltestnocomma.example.com',
4666
        'public-ipv4': SLAPOS_TEST_IPV4,
4667 4668
      },
      parameter_dict
4669 4670 4671 4672 4673 4674
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4675
      self.certificate_pem,
4676
      der2pem(result.peercert))
4677

4678
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
4679 4680 4681 4682

    # assert that there is no nocomma file
    monitor_file_list = glob.glob(
      os.path.join(
4683 4684
        self.instance_path, '*', 'etc', 'plugin',
        'check-_re6st-optimal-test-nocomma-re6st-optimal-test.py'))
4685 4686 4687 4688
    self.assertEqual(
      [],
      monitor_file_list
    )
4689 4690

  def test_custom_domain_unsafe(self):
4691
    parameter_dict = self.parseSlaveParameterDict('custom_domain-unsafe')
4692
    self.assertEqual(
4693
      {
4694
        'request-error-list': [
4695 4696
          "custom_domain '${section:option} afterspace\\nafternewline' invalid"
        ]
4697 4698
      },
      parameter_dict
4699
    )
4700 4701

  def test_server_alias_unsafe(self):
4702
    parameter_dict = self.parseSlaveParameterDict('server-alias-unsafe')
4703
    self.assertEqual(
4704
      {
4705 4706 4707
        'request-error-list': [
          "server-alias '${section:option}' not valid", "server-alias "
          "'afterspace' not valid"]
4708 4709
      },
      parameter_dict
4710
    )
4711

4712 4713 4714 4715 4716 4717 4718 4719 4720 4721 4722 4723
  def test_bad_ciphers(self):
    parameter_dict = self.parseSlaveParameterDict('bad-ciphers')
    self.assertEqual(
      {
        'request-error-list': [
          "Cipher 'bad' is not supported.",
          "Cipher 'again' is not supported."
        ]
      },
      parameter_dict
    )

4724
  def test_virtualhostroot_http_port_unsafe(self):
4725 4726
    parameter_dict = self.parseSlaveParameterDict(
      'virtualhostroot-http-port-unsafe')
4727
    self.assertLogAccessUrlWithPop(parameter_dict)
4728
    self.assertKedifaKeysWithPop(parameter_dict)
4729 4730 4731 4732 4733 4734 4735 4736
    self.assertEqual(
      {
        'domain': 'virtualhostroothttpportunsafe.example.com',
        'replication_number': '1',
        'url': 'http://virtualhostroothttpportunsafe.example.com',
        'site_url': 'http://virtualhostroothttpportunsafe.example.com',
        'secure_access':
        'https://virtualhostroothttpportunsafe.example.com',
4737
        'public-ipv4': SLAPOS_TEST_IPV4,
4738 4739
      },
      parameter_dict
4740 4741 4742 4743 4744 4745 4746 4747 4748 4749 4750 4751 4752
    )

    result = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/http//virtualhostroothttpportunsafe'
      '.example.com:0//VirtualHostRoot/test-path'
    )

  def test_virtualhostroot_https_port_unsafe(self):
4753 4754
    parameter_dict = self.parseSlaveParameterDict(
      'virtualhostroot-https-port-unsafe')
4755
    self.assertLogAccessUrlWithPop(parameter_dict)
4756
    self.assertKedifaKeysWithPop(parameter_dict)
4757 4758 4759 4760 4761 4762 4763 4764
    self.assertEqual(
      {
        'domain': 'virtualhostroothttpsportunsafe.example.com',
        'replication_number': '1',
        'url': 'http://virtualhostroothttpsportunsafe.example.com',
        'site_url': 'http://virtualhostroothttpsportunsafe.example.com',
        'secure_access':
        'https://virtualhostroothttpsportunsafe.example.com',
4765
        'public-ipv4': SLAPOS_TEST_IPV4,
4766 4767
      },
      parameter_dict
4768 4769 4770 4771 4772 4773
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4774
      self.certificate_pem,
4775
      der2pem(result.peercert))
4776 4777 4778 4779 4780 4781 4782

    self.assertEqualResultJson(
      result,
      'Path',
      '/VirtualHostBase/https//virtualhostroothttpsportunsafe'
      '.example.com:0//VirtualHostRoot/test-path'
    )
4783 4784

  def default_path_unsafe(self):
4785
    parameter_dict = self.parseSlaveParameterDict('default-path-unsafe')
4786
    self.assertLogAccessUrlWithPop(parameter_dict)
4787
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
4788 4789 4790 4791 4792 4793 4794
    self.assertEqual(
      {
        'domain': 'defaultpathunsafe.example.com',
        'replication_number': '1',
        'url': 'http://defaultpathunsafe.example.com',
        'site_url': 'http://defaultpathunsafe.example.com',
        'secure_access': 'https://defaultpathunsafe.example.com',
4795
        'public-ipv4': SLAPOS_TEST_IPV4,
4796 4797
      },
      parameter_dict
4798 4799 4800 4801 4802 4803
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], '')

    self.assertEqual(
4804
      self.certificate_pem,
4805
      der2pem(result.peercert))
4806

4807 4808 4809 4810 4811
    self.assertEqual(
      httplib.MOVED_PERMANENTLY,
      result.status_code
    )

4812 4813
    self.assertEqual(
      'https://defaultpathunsafe.example.com:%s/%%24%%7Bsection%%3Aoption%%7D'
4814 4815
      '%%0An%%22%%0Aewline%%0A%%7D%%0A%%7Dproxy%%0A/slashed' % (HTTPS_PORT,),
      result.headers['Location']
4816
    )
4817 4818

  def test_monitor_ipv4_test_unsafe(self):
4819
    parameter_dict = self.parseSlaveParameterDict('monitor-ipv4-test-unsafe')
4820
    self.assertLogAccessUrlWithPop(parameter_dict)
4821
    self.assertKedifaKeysWithPop(parameter_dict)
4822 4823 4824 4825 4826 4827 4828
    self.assertEqual(
      {
        'domain': 'monitoripv4testunsafe.example.com',
        'replication_number': '1',
        'url': 'http://monitoripv4testunsafe.example.com',
        'site_url': 'http://monitoripv4testunsafe.example.com',
        'secure_access': 'https://monitoripv4testunsafe.example.com',
4829
        'public-ipv4': SLAPOS_TEST_IPV4,
4830 4831
      },
      parameter_dict
4832 4833 4834 4835 4836 4837
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4838
      self.certificate_pem,
4839
      der2pem(result.peercert))
4840

4841
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
4842 4843 4844

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
4845
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)
4846 4847 4848

    monitor_file = glob.glob(
      os.path.join(
4849 4850 4851 4852
        self.instance_path, '*', 'etc', 'plugin',
        'check-_monitor-ipv4-test-unsafe-ipv4-packet-list-test.py'))[0]
    # get promise module and check that parameters are ok

4853
    self.assertEqual(
4854 4855 4856 4857 4858 4859
      getPluginParameterDict(self.software_path, monitor_file),
      {
        'frequency': '720',
        'ipv4': 'true',
        'address': '${section:option}\nafternewline ipv4',
      }
4860 4861 4862
    )

  def test_monitor_ipv6_test_unsafe(self):
4863
    parameter_dict = self.parseSlaveParameterDict('monitor-ipv6-test-unsafe')
4864
    self.assertLogAccessUrlWithPop(parameter_dict)
4865
    self.assertKedifaKeysWithPop(parameter_dict)
4866 4867 4868 4869 4870 4871 4872
    self.assertEqual(
      {
        'domain': 'monitoripv6testunsafe.example.com',
        'replication_number': '1',
        'url': 'http://monitoripv6testunsafe.example.com',
        'site_url': 'http://monitoripv6testunsafe.example.com',
        'secure_access': 'https://monitoripv6testunsafe.example.com',
4873
        'public-ipv4': SLAPOS_TEST_IPV4,
4874 4875
      },
      parameter_dict
4876 4877 4878 4879 4880 4881
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
4882
      self.certificate_pem,
4883
      der2pem(result.peercert))
4884

4885
    self.assertEqual(httplib.NOT_FOUND, result.status_code)
4886 4887 4888

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
4889
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)
4890 4891 4892

    monitor_file = glob.glob(
      os.path.join(
4893 4894 4895
        self.instance_path, '*', 'etc', 'plugin',
        'check-_monitor-ipv6-test-unsafe-ipv6-packet-list-test.py'))[0]
    # get promise module and check that parameters are ok
4896
    self.assertEqual(
4897 4898 4899 4900 4901
      getPluginParameterDict(self.software_path, monitor_file),
      {
        'frequency': '720',
        'address': '${section:option}\nafternewline ipv6'
      }
4902
    )
4903

4904 4905 4906 4907 4908 4909

class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
4910
      'public-ipv4': SLAPOS_TEST_IPV4,
4911 4912 4913 4914 4915
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      'mpm-graceful-shutdown-timeout': 2,
4916 4917
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
4918 4919 4920 4921 4922 4923 4924 4925 4926 4927 4928 4929 4930 4931 4932 4933 4934 4935 4936 4937 4938
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'site_1': {
        'custom_domain': 'duplicate.example.com',
      },
      'site_2': {
        'custom_domain': 'duplicate.example.com',
      },
      'site_3': {
        'server-alias': 'duplicate.example.com',
      },
      'site_4': {
        'custom_domain': 'duplicate.example.com',
        'server-alias': 'duplicate.example.com',
      },
    }

  def test_master_partition_state(self):
4939
    parameter_dict = self.parseConnectionParameterDict()
4940
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
4941
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
4942
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
4943 4944

    expected_parameter_dict = {
4945
      'monitor-base-url': 'None',
4946 4947 4948 4949
      'domain': 'example.com',
      'accepted-slave-amount': '1',
      'rejected-slave-amount': '3',
      'slave-amount': '4',
4950
      'rejected-slave-dict': {
4951
        '_site_2': ["custom_domain 'duplicate.example.com' clashes"],
4952 4953 4954
        '_site_3': ["server-alias 'duplicate.example.com' clashes"],
        '_site_4': ["custom_domain 'duplicate.example.com' clashes"]
      }
4955
    }
4956 4957 4958 4959 4960 4961

    self.assertEqual(
      expected_parameter_dict,
      parameter_dict
    )

4962
  def test_site_1(self):
4963
    parameter_dict = self.parseSlaveParameterDict('site_1')
4964
    self.assertLogAccessUrlWithPop(parameter_dict)
4965
    self.assertKedifaKeysWithPop(parameter_dict)
4966 4967 4968 4969 4970 4971 4972
    self.assertEqual(
      {
        'domain': 'duplicate.example.com',
        'replication_number': '1',
        'url': 'http://duplicate.example.com',
        'site_url': 'http://duplicate.example.com',
        'secure_access': 'https://duplicate.example.com',
4973
        'public-ipv4': SLAPOS_TEST_IPV4,
4974 4975
      },
      parameter_dict
4976
    )
4977

4978 4979 4980 4981 4982 4983 4984 4985 4986
  def test_site_2(self):
    parameter_dict = self.parseSlaveParameterDict('site_2')
    self.assertEqual(
      {
        'request-error-list': ["custom_domain 'duplicate.example.com' clashes"]
      },
      parameter_dict
    )

4987
  def test_site_3(self):
4988
    parameter_dict = self.parseSlaveParameterDict('site_3')
4989 4990
    self.assertEqual(
      {
4991
        'request-error-list': ["server-alias 'duplicate.example.com' clashes"]
4992 4993
      },
      parameter_dict,
4994 4995 4996
    )

  def test_site_4(self):
4997
    parameter_dict = self.parseSlaveParameterDict('site_4')
4998 4999
    self.assertEqual(
      {
5000
        'request-error-list': ["custom_domain 'duplicate.example.com' clashes"]
5001 5002
      },
      parameter_dict
5003
    )
5004 5005 5006 5007 5008 5009 5010 5011 5012 5013 5014 5015 5016


class TestSlaveGlobalDisableHttp2(TestSlave):
  @classmethod
  def getInstanceParameterDict(cls):
    instance_parameter_dict = super(
      TestSlaveGlobalDisableHttp2, cls).getInstanceParameterDict()
    instance_parameter_dict['global-disable-http2'] = 'TrUe'
    return instance_parameter_dict

  def test_enable_http2_default(self):
    parameter_dict = self.parseSlaveParameterDict('enable-http2-default')
    self.assertLogAccessUrlWithPop(parameter_dict)
5017
    self.assertKedifaKeysWithPop(parameter_dict)
5018 5019 5020 5021 5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032 5033 5034 5035 5036 5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054 5055 5056 5057 5058 5059 5060 5061 5062 5063 5064 5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075
    self.assertEqual(
      {
        'domain': 'enablehttp2default.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2default.example.com',
        'site_url': 'http://enablehttp2default.example.com',
        'secure_access':
        'https://enablehttp2default.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    headers = result.headers.copy()

    self.assertKeyWithPop('Server', headers)
    self.assertKeyWithPop('Date', headers)

    # drop vary-keys
    headers.pop('Content-Length', None)
    headers.pop('Transfer-Encoding', None)
    headers.pop('Connection', None)
    headers.pop('Keep-Alive', None)

    self.assertEqual(
      {
        'Content-type': 'application/json',
        'Set-Cookie': 'secured=value;secure, nonsecured=value',
      },
      headers
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))


class TestEnableHttp2ByDefaultFalseSlaveGlobalDisableHttp2(
  TestEnableHttp2ByDefaultFalseSlave):
  @classmethod
  def getInstanceParameterDict(cls):
    instance_parameter_dict = super(
      TestEnableHttp2ByDefaultFalseSlaveGlobalDisableHttp2,
      cls).getInstanceParameterDict()
    instance_parameter_dict['global-disable-http2'] = 'TrUe'
    return instance_parameter_dict

  def test_enable_http2_true(self):
    parameter_dict = self.parseSlaveParameterDict('enable-http2-true')
    self.assertLogAccessUrlWithPop(parameter_dict)
5076
    self.assertKedifaKeysWithPop(parameter_dict)
5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088 5089 5090 5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102 5103 5104 5105 5106
    self.assertEqual(
      {
        'domain': 'enablehttp2true.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2true.example.com',
        'site_url': 'http://enablehttp2true.example.com',
        'secure_access':
        'https://enablehttp2true.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))


class TestEnableHttp2ByDefaultDefaultSlaveGlobalDisableHttp2(
  TestEnableHttp2ByDefaultDefaultSlave):
  @classmethod
  def getInstanceParameterDict(cls):
    instance_parameter_dict = super(
      TestEnableHttp2ByDefaultDefaultSlaveGlobalDisableHttp2,
      cls).getInstanceParameterDict()
    instance_parameter_dict['global-disable-http2'] = 'TrUe'
    return instance_parameter_dict

  def test_enable_http2_true(self):
    parameter_dict = self.parseSlaveParameterDict('enable-http2-true')
    self.assertLogAccessUrlWithPop(parameter_dict)
5107
    self.assertKedifaKeysWithPop(parameter_dict)
5108 5109 5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125 5126
    self.assertEqual(
      {
        'domain': 'enablehttp2true.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2true.example.com',
        'site_url': 'http://enablehttp2true.example.com',
        'secure_access':
        'https://enablehttp2true.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))

  def test_enable_http2_default(self):
    parameter_dict = self.parseSlaveParameterDict('enable-http2-default')
    self.assertLogAccessUrlWithPop(parameter_dict)
5127
    self.assertKedifaKeysWithPop(parameter_dict)
5128 5129 5130 5131 5132 5133 5134 5135 5136 5137 5138 5139 5140 5141 5142
    self.assertEqual(
      {
        'domain': 'enablehttp2default.example.com',
        'replication_number': '1',
        'url': 'http://enablehttp2default.example.com',
        'site_url': 'http://enablehttp2default.example.com',
        'secure_access':
        'https://enablehttp2default.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
      },
      parameter_dict
    )

    self.assertFalse(
      isHTTP2(parameter_dict['domain'], parameter_dict['public-ipv4']))
5143 5144 5145 5146 5147 5148 5149 5150 5151 5152 5153 5154 5155 5156 5157 5158 5159 5160 5161 5162 5163 5164 5165 5166 5167 5168 5169 5170 5171 5172 5173 5174 5175 5176 5177 5178 5179 5180 5181 5182 5183 5184 5185 5186 5187 5188 5189 5190 5191 5192 5193 5194 5195 5196 5197 5198 5199 5200 5201 5202 5203 5204 5205 5206 5207 5208 5209 5210 5211 5212 5213 5214 5215 5216 5217 5218 5219 5220 5221 5222 5223


class TestSlaveSlapOSMasterCertificateCompatibilityOverrideMaster(
  SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def setUpMaster(cls):
    # run partition until AIKC finishes
    cls.runComputerPartitionUntil(
      cls.untilNotReadyYetNotInMasterKeyGenerateAuthUrl)

    parameter_dict = cls.computer_partition.getConnectionParameterDict()
    ca_certificate = requests.get(
      parameter_dict['kedifa-caucase-url'] + '/cas/crt/ca.crt.pem')
    assert ca_certificate.status_code == httplib.OK
    cls.ca_certificate_file = os.path.join(cls.working_directory, 'ca.crt.pem')
    open(cls.ca_certificate_file, 'w').write(ca_certificate.text)
    # Do not upload certificates for the master partition

  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
      'public-ipv4': SLAPOS_TEST_IPV4,
      'apache-certificate': cls.certificate_pem,
      'apache-key': cls.key_pem,
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
      'mpm-graceful-shutdown-timeout': 2,
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'ssl_from_master_kedifa_overrides_master_certificate': {
        'url': cls.backend_url,
      },
    }

  def test_ssl_from_master_kedifa_overrides_master_certificate(self):
    reference = 'ssl_from_master_kedifa_overrides_master_certificate'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict)
    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    _, key_pem, _, certificate_pem = \
        createSelfSignedCertificate([parameter_dict['domain']])

    master_parameter_dict = \
        self.computer_partition.getConnectionParameterDict()
    auth = requests.get(
      master_parameter_dict['master-key-generate-auth-url'],
      verify=self.ca_certificate_file)
    requests.put(
      master_parameter_dict['master-key-upload-url'] + auth.text,
      data=key_pem + certificate_pem,
      verify=self.ca_certificate_file)
5224
    self.runKedifaUpdater()
5225 5226 5227 5228 5229 5230 5231 5232 5233 5234 5235 5236 5237 5238 5239 5240 5241 5242 5243 5244 5245 5246 5247 5248 5249 5250 5251 5252 5253 5254

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')


class TestSlaveSlapOSMasterCertificateCompatibility(
  SlaveHttpFrontendTestCase, TestDataMixin):

  @classmethod
  def setUpMaster(cls):
    # run partition until AIKC finishes
    cls.runComputerPartitionUntil(
      cls.untilNotReadyYetNotInMasterKeyGenerateAuthUrl)

    parameter_dict = cls.computer_partition.getConnectionParameterDict()
    ca_certificate = requests.get(
      parameter_dict['kedifa-caucase-url'] + '/cas/crt/ca.crt.pem')
    assert ca_certificate.status_code == httplib.OK
    cls.ca_certificate_file = os.path.join(cls.working_directory, 'ca.crt.pem')
    open(cls.ca_certificate_file, 'w').write(ca_certificate.text)
    # Do not upload certificates for the master partition

  @classmethod
  def setUpSlaves(cls):
5255
    _, cls.ssl_from_slave_key_pem, _, cls.ssl_from_slave_certificate_pem = \
5256 5257
      createSelfSignedCertificate(
        [
5258
          'sslfromslave.example.com',
5259
        ])
5260 5261 5262 5263 5264 5265 5266 5267 5268 5269 5270 5271 5272 5273 5274 5275 5276 5277
    _, cls.ssl_from_slave_kedifa_overrides_key_pem, _, \
        cls.ssl_from_slave_kedifa_overrides_certificate_pem = \
        createSelfSignedCertificate(
          [
            'sslfromslavekedifaoverrides.example.com',
          ])
    _, cls.type_notebook_ssl_from_slave_key_pem, _, \
        cls.type_notebook_ssl_from_slave_certificate_pem = \
        createSelfSignedCertificate(
          [
            'typenotebooksslfromslave.example.com',
          ])
    _, cls.type_notebook_ssl_from_slave_kedifa_overrides_key_pem, _, \
        cls.type_notebook_ssl_from_slave_kedifa_overrides_certificate_pem = \
        createSelfSignedCertificate(
          [
            'typenotebooksslfromslavekedifaoverrides.example.com',
          ])
5278 5279 5280 5281 5282 5283 5284 5285

    cls.ca = CertificateAuthority(
      'TestSlaveSlapOSMasterCertificateCompatibility')

    _, cls.customdomain_ca_key_pem, csr, _ = createCSR(
      'customdomainsslcrtsslkeysslcacrt.example.com')
    _, cls.customdomain_ca_certificate_pem = cls.ca.signCSR(csr)

5286 5287 5288 5289
    _, cls.sslcacrtgarbage_ca_key_pem, csr, _ = createCSR(
      'sslcacrtgarbage.example.com')
    _, cls.sslcacrtgarbage_ca_certificate_pem = cls.ca.signCSR(csr)

5290 5291 5292 5293 5294 5295 5296 5297 5298 5299 5300 5301 5302 5303 5304 5305 5306 5307 5308 5309 5310 5311 5312 5313 5314 5315 5316 5317 5318 5319 5320 5321 5322 5323 5324 5325
    _, cls.ssl_from_slave_ca_key_pem, csr, _ = createCSR(
      'sslfromslave.example.com')
    _, cls.ssl_from_slave_ca_certificate_pem = cls.ca.signCSR(csr)

    _, cls.customdomain_key_pem, _, cls.customdomain_certificate_pem = \
        createSelfSignedCertificate(['customdomainsslcrtsslkey.example.com'])

    super(TestSlaveSlapOSMasterCertificateCompatibility, cls).setUpSlaves()

  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
      'public-ipv4': SLAPOS_TEST_IPV4,
      'apache-certificate': cls.certificate_pem,
      'apache-key': cls.key_pem,
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
      'mpm-graceful-shutdown-timeout': 2,
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'ssl_from_master': {
        'url': cls.backend_url,
      },
      'ssl_from_master_kedifa_overrides': {
        'url': cls.backend_url,
      },
      'ssl_from_slave': {
        'url': cls.backend_url,
5326 5327
        'ssl_crt': cls.ssl_from_slave_certificate_pem,
        'ssl_key': cls.ssl_from_slave_key_pem,
5328 5329 5330
      },
      'ssl_from_slave_kedifa_overrides': {
        'url': cls.backend_url,
5331 5332
        'ssl_crt': cls.ssl_from_slave_kedifa_overrides_certificate_pem,
        'ssl_key': cls.ssl_from_slave_kedifa_overrides_key_pem,
5333 5334 5335 5336 5337 5338 5339 5340 5341 5342 5343 5344 5345 5346 5347 5348 5349 5350 5351 5352
      },
      'custom_domain_ssl_crt_ssl_key': {
        'url': cls.backend_url,
        'ssl_crt': cls.customdomain_certificate_pem,
        'ssl_key': cls.customdomain_key_pem,
        'custom_domain': 'customdomainsslcrtsslkey.example.com'
      },
      'custom_domain_ssl_crt_ssl_key_ssl_ca_crt': {
        'url': cls.backend_url,
        'ssl_crt': cls.customdomain_ca_certificate_pem,
        'ssl_key': cls.customdomain_ca_key_pem,
        'ssl_ca_crt': cls.ca.certificate_pem,
        'custom_domain': 'customdomainsslcrtsslkeysslcacrt.example.com',
      },
      'ssl_ca_crt_only': {
        'url': cls.backend_url,
        'ssl_ca_crt': cls.ca.certificate_pem,
      },
      'ssl_ca_crt_garbage': {
        'url': cls.backend_url,
5353 5354
        'ssl_crt': cls.sslcacrtgarbage_ca_certificate_pem,
        'ssl_key': cls.sslcacrtgarbage_ca_key_pem,
5355 5356 5357 5358 5359 5360 5361 5362 5363 5364 5365 5366 5367 5368 5369 5370 5371 5372
        'ssl_ca_crt': 'some garbage',
      },
      'ssl_ca_crt_does_not_match': {
        'url': cls.backend_url,
        'ssl_crt': cls.certificate_pem,
        'ssl_key': cls.key_pem,
        'ssl_ca_crt': cls.ca.certificate_pem,
      },
      'ssl_key-ssl_crt-unsafe': {
        'ssl_key': '${section:option}ssl_keyunsafe\nunsafe',
        'ssl_crt': '${section:option}ssl_crtunsafe\nunsafe',
      },
      'type-notebook-ssl_from_master': {
        'url': cls.backend_url,
        'type': 'notebook',
      },
      'type-notebook-ssl_from_slave': {
        'url': cls.backend_url,
5373 5374
        'ssl_crt': cls.type_notebook_ssl_from_slave_certificate_pem,
        'ssl_key': cls.type_notebook_ssl_from_slave_key_pem,
5375 5376 5377 5378 5379 5380 5381 5382
        'type': 'notebook',
      },
      'type-notebook-ssl_from_master_kedifa_overrides': {
        'url': cls.backend_url,
        'type': 'notebook',
      },
      'type-notebook-ssl_from_slave_kedifa_overrides': {
        'url': cls.backend_url,
5383 5384 5385 5386
        'ssl_crt':
        cls.type_notebook_ssl_from_slave_kedifa_overrides_certificate_pem,
        'ssl_key':
        cls.type_notebook_ssl_from_slave_kedifa_overrides_key_pem,
5387 5388 5389 5390 5391 5392 5393 5394
        'type': 'notebook',
      }
    }

  def test_master_partition_state(self):
    parameter_dict = self.parseConnectionParameterDict()
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
5395
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
5396 5397

    expected_parameter_dict = {
5398
      'monitor-base-url': 'None',
5399 5400 5401 5402 5403 5404 5405 5406 5407 5408 5409 5410 5411 5412 5413 5414 5415 5416 5417 5418 5419 5420 5421 5422 5423 5424 5425 5426 5427 5428 5429 5430 5431 5432 5433 5434 5435 5436 5437 5438 5439 5440 5441 5442 5443 5444 5445 5446 5447 5448 5449 5450 5451 5452 5453 5454 5455 5456 5457 5458 5459 5460 5461 5462 5463 5464 5465 5466 5467 5468 5469 5470 5471 5472 5473 5474 5475 5476 5477 5478 5479 5480 5481 5482 5483 5484 5485 5486 5487 5488 5489 5490 5491 5492 5493 5494 5495 5496 5497 5498 5499 5500 5501 5502 5503 5504 5505 5506 5507 5508 5509 5510 5511 5512 5513 5514 5515 5516 5517 5518 5519 5520 5521 5522 5523 5524 5525 5526 5527 5528 5529 5530 5531 5532
      'domain': 'example.com',
      'accepted-slave-amount': '12',
      'rejected-slave-amount': '2',
      'slave-amount': '14',
      'rejected-slave-dict': {
        u"_ssl_ca_crt_only":
        [u"ssl_ca_crt is present, so ssl_crt and ssl_key are required"],
        u"_ssl_key-ssl_crt-unsafe":
        [u"slave ssl_key and ssl_crt does not match"]
      },
      'warning-list': [
        u'apache-certificate is obsolete, please use master-key-upload-url',
        u'apache-key is obsolete, please use master-key-upload-url',
      ],
      'warning-slave-dict': {
        u'_custom_domain_ssl_crt_ssl_key': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url'
        ],
        u'_custom_domain_ssl_crt_ssl_key_ssl_ca_crt': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
          u'ssl_ca_crt is obsolete, please use key-upload-url'
        ],
        u'_ssl_ca_crt_does_not_match': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
          u'ssl_ca_crt is obsolete, please use key-upload-url',
        ],
        u'_ssl_ca_crt_garbage': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
          u'ssl_ca_crt is obsolete, please use key-upload-url',
        ],
        u'_ssl_ca_crt_only': [
          u'ssl_ca_crt is obsolete, please use key-upload-url',
        ],
        u'_ssl_from_slave': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
        ],
        u'_ssl_from_slave_kedifa_overrides': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
        ],
        u'_ssl_key-ssl_crt-unsafe': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
        ],
        u'_type-notebook-ssl_from_slave': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
        ],
        u'_type-notebook-ssl_from_slave_kedifa_overrides': [
          u'ssl_key is obsolete, please use key-upload-url',
          u'ssl_crt is obsolete, please use key-upload-url',
        ],
      }
    }

    self.assertEqual(
      expected_parameter_dict,
      parameter_dict
    )

  def test_ssl_from_master(self):
    parameter_dict = self.parseSlaveParameterDict('ssl_from_master')
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, '')
    hostname = 'ssl_from_master'.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_ssl_from_master_kedifa_overrides(self):
    reference = 'ssl_from_master_kedifa_overrides'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    _, key_pem, _, certificate_pem = \
        createSelfSignedCertificate([parameter_dict['domain']])

    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = certificate_pem + key_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, upload.status_code)
5533
    self.runKedifaUpdater()
5534 5535 5536 5537 5538 5539 5540 5541 5542 5543 5544 5545 5546 5547

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_ssl_from_slave(self):
    reference = 'ssl_from_slave'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
5548
    self.assertKedifaKeysWithPop(parameter_dict)
5549 5550 5551 5552 5553 5554 5555 5556 5557 5558 5559 5560 5561 5562 5563 5564 5565 5566 5567 5568 5569 5570

    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
         ]
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
5571
      self.ssl_from_slave_certificate_pem,
5572 5573 5574 5575 5576 5577 5578 5579 5580 5581 5582 5583 5584 5585 5586 5587 5588 5589 5590 5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_ssl_from_slave_kedifa_overrides(self):
    reference = 'ssl_from_slave_kedifa_overrides'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)

    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
         ]
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
5603
      self.ssl_from_slave_kedifa_overrides_certificate_pem,
5604 5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621 5622 5623 5624
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    _, key_pem, _, certificate_pem = \
        createSelfSignedCertificate([parameter_dict['domain']])

    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = certificate_pem + key_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, upload.status_code)

5625
    self.runKedifaUpdater()
5626 5627 5628 5629 5630 5631 5632 5633 5634 5635 5636 5637 5638 5639 5640 5641 5642 5643

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_type_notebook_ssl_from_master(self):
    reference = 'type-notebook-ssl_from_master'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    hostname = reference.translate(None, '_-')
    self.assertKedifaKeysWithPop(parameter_dict)
    self.assertEqual(
      {
5644
        'domain': '%s.example.com' % (hostname,),
5645
        'replication_number': '1',
5646 5647 5648
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
5649 5650 5651 5652 5653 5654 5655
        'public-ipv4': SLAPOS_TEST_IPV4
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
5656
      HTTPS_PORT)
5657 5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_type_notebook_ssl_from_master_kedifa_overrides(self):
    reference = 'type-notebook-ssl_from_master_kedifa_overrides'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
5672
        'domain': '%s.example.com' % (hostname,),
5673
        'replication_number': '1',
5674 5675 5676
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
5677 5678 5679 5680 5681 5682 5683
        'public-ipv4': SLAPOS_TEST_IPV4
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
5684
      HTTPS_PORT)
5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703 5704 5705 5706 5707 5708

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    _, key_pem, _, certificate_pem = \
        createSelfSignedCertificate([parameter_dict['domain']])

    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = certificate_pem + key_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, upload.status_code)

5709
    self.runKedifaUpdater()
5710 5711 5712

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
5713
      HTTPS_PORT)
5714 5715 5716 5717 5718 5719 5720 5721 5722 5723 5724 5725 5726 5727 5728

    self.assertEqual(
      certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_type_notebook_ssl_from_slave(self):
    reference = 'type-notebook-ssl_from_slave'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    hostname = reference.translate(None, '_-')
    self.assertKedifaKeysWithPop(parameter_dict)
    self.assertEqual(
      {
5729
        'domain': '%s.example.com' % (hostname,),
5730
        'replication_number': '1',
5731 5732 5733
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
5734 5735 5736 5737 5738 5739 5740 5741 5742 5743 5744
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
         ]
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
5745
      HTTPS_PORT)
5746 5747

    self.assertEqual(
5748
      self.type_notebook_ssl_from_slave_certificate_pem,
5749 5750 5751 5752 5753 5754 5755 5756 5757 5758 5759 5760
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_type_notebook_ssl_from_slave_kedifa_overrides(self):
    reference = 'type-notebook-ssl_from_slave_kedifa_overrides'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
5761
        'domain': '%s.example.com' % (hostname,),
5762
        'replication_number': '1',
5763 5764 5765
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
5766 5767 5768 5769 5770 5771 5772 5773 5774 5775 5776
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
         ]
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
5777
      HTTPS_PORT)
5778 5779

    self.assertEqual(
5780
      self.type_notebook_ssl_from_slave_kedifa_overrides_certificate_pem,
5781 5782 5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793 5794 5795 5796 5797 5798 5799 5800 5801
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    _, key_pem, _, certificate_pem = \
        createSelfSignedCertificate([parameter_dict['domain']])

    # as now the place to put the key is known put the key there
    auth = requests.get(
      generate_auth,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, auth.status_code)

    data = certificate_pem + key_pem

    upload = requests.put(
      upload_url + auth.text,
      data=data,
      verify=self.ca_certificate_file)
    self.assertEqual(httplib.CREATED, upload.status_code)

5802
    self.runKedifaUpdater()
5803 5804 5805

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path',
5806
      HTTPS_PORT)
5807 5808 5809 5810 5811 5812 5813 5814 5815 5816 5817 5818 5819 5820 5821 5822 5823 5824 5825 5826 5827 5828 5829 5830 5831 5832 5833 5834 5835 5836 5837 5838 5839 5840 5841 5842 5843 5844 5845 5846 5847 5848 5849 5850 5851 5852 5853 5854 5855 5856 5857 5858 5859 5860 5861 5862 5863 5864 5865 5866 5867 5868 5869 5870 5871 5872 5873 5874 5875 5876 5877 5878 5879 5880 5881 5882 5883 5884 5885 5886 5887 5888 5889 5890

    self.assertEqual(
      certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_ssl_ca_crt_only(self):
    parameter_dict = self.parseSlaveParameterDict('ssl_ca_crt_only')

    self.assertEqual(
      parameter_dict,
      {
        'request-error-list': [
          "ssl_ca_crt is present, so ssl_crt and ssl_key are required"],
        'warning-list': [
          'ssl_ca_crt is obsolete, please use key-upload-url',
        ],
      }
    )

  def test_custom_domain_ssl_crt_ssl_key(self):
    reference = 'custom_domain_ssl_crt_ssl_key'
    parameter_dict = self.parseSlaveParameterDict(reference)
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)

    hostname = reference.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': ['ssl_key is obsolete, please use key-upload-url',
                         'ssl_crt is obsolete, please use key-upload-url']
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.customdomain_certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

  def test_ssl_ca_crt(self):
    parameter_dict = self.parseSlaveParameterDict(
      'custom_domain_ssl_crt_ssl_key_ssl_ca_crt')
    self.assertLogAccessUrlWithPop(parameter_dict)
    generate_auth, upload_url = self.assertKedifaKeysWithPop(parameter_dict)
    self.assertEqual(
      {
        'domain': 'customdomainsslcrtsslkeysslcacrt.example.com',
        'replication_number': '1',
        'url': 'http://customdomainsslcrtsslkeysslcacrt.example.com',
        'site_url': 'http://customdomainsslcrtsslkeysslcacrt.example.com',
        'secure_access':
        'https://customdomainsslcrtsslkeysslcacrt.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
          'ssl_ca_crt is obsolete, please use key-upload-url'
        ]
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.customdomain_ca_certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    certificate_file_list = glob.glob(os.path.join(
5891
      self.instance_path, '*', 'srv', 'bbb-ssl',
5892 5893 5894 5895
      '_custom_domain_ssl_crt_ssl_key_ssl_ca_crt.crt'))
    self.assertEqual(1, len(certificate_file_list))
    certificate_file = certificate_file_list[0]
    with open(certificate_file) as out:
5896 5897
      expected = self.customdomain_ca_certificate_pem + '\n' + \
        self.ca.certificate_pem + '\n' + self.customdomain_ca_key_pem
5898
      self.assertEqual(
5899
        expected,
5900 5901 5902 5903 5904 5905 5906 5907 5908 5909 5910 5911 5912 5913 5914 5915 5916 5917
        out.read()
      )

    ca = CertificateAuthority(
      'TestSlaveSlapOSMasterCertificateCompatibility')

    _, customdomain_ca_key_pem, csr, _ = createCSR(
      'customdomainsslcrtsslkeysslcacrt.example.com')
    _, customdomain_ca_certificate_pem = ca.signCSR(csr)

    slave_parameter_dict = self.getSlaveParameterDictDict()[
      'custom_domain_ssl_crt_ssl_key_ssl_ca_crt'].copy()
    slave_parameter_dict.update(
      ssl_crt=customdomain_ca_certificate_pem,
      ssl_key=customdomain_ca_key_pem,
      ssl_ca_crt=ca.certificate_pem,
    )

5918 5919
    self.request(
        software_release=self.cls.getSoftwareURL(),
5920 5921 5922 5923 5924 5925
        partition_reference='custom_domain_ssl_crt_ssl_key_ssl_ca_crt',
        partition_parameter_kw=slave_parameter_dict,
        shared=True
    )

    self.runComputerPartition(max_quantity=1)
5926
    self.runKedifaUpdater()
5927 5928 5929 5930 5931 5932 5933 5934 5935 5936
    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      customdomain_ca_certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    certificate_file_list = glob.glob(os.path.join(
5937
      self.instance_path, '*', 'srv', 'bbb-ssl',
5938 5939 5940 5941
      '_custom_domain_ssl_crt_ssl_key_ssl_ca_crt.crt'))
    self.assertEqual(1, len(certificate_file_list))
    certificate_file = certificate_file_list[0]
    with open(certificate_file) as out:
5942 5943
      expected = customdomain_ca_certificate_pem + '\n' + ca.certificate_pem \
        + '\n' + customdomain_ca_key_pem
5944
      self.assertEqual(
5945
        expected,
5946 5947 5948 5949 5950 5951 5952 5953 5954 5955 5956 5957 5958 5959 5960 5961 5962 5963 5964 5965 5966 5967 5968 5969
        out.read()
      )

  def test_ssl_ca_crt_garbage(self):
    parameter_dict = self.parseSlaveParameterDict('ssl_ca_crt_garbage')
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict)
    self.assertEqual(
      {
        'domain': 'sslcacrtgarbage.example.com',
        'replication_number': '1',
        'url': 'http://sslcacrtgarbage.example.com',
        'site_url': 'http://sslcacrtgarbage.example.com',
        'secure_access':
        'https://sslcacrtgarbage.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
          'ssl_ca_crt is obsolete, please use key-upload-url']
      },
      parameter_dict
    )

5970
    result = self.fakeHTTPSResult(
5971 5972
        parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

5973 5974 5975 5976 5977 5978 5979
    self.assertEqual(
      self.sslcacrtgarbage_ca_certificate_pem,
      der2pem(result.peercert)
    )

    self.assertEqualResultJson(result, 'Path', '/test-path')

5980 5981 5982 5983 5984 5985 5986 5987 5988 5989 5990 5991 5992 5993 5994 5995 5996 5997 5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6008 6009
  def test_ssl_ca_crt_does_not_match(self):
    parameter_dict = self.parseSlaveParameterDict('ssl_ca_crt_does_not_match')
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict)
    self.assertEqual(
      {
        'domain': 'sslcacrtdoesnotmatch.example.com',
        'replication_number': '1',
        'url': 'http://sslcacrtdoesnotmatch.example.com',
        'site_url': 'http://sslcacrtdoesnotmatch.example.com',
        'secure_access':
        'https://sslcacrtdoesnotmatch.example.com',
        'public-ipv4': SLAPOS_TEST_IPV4,
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url',
          'ssl_ca_crt is obsolete, please use key-upload-url'
        ]
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    certificate_file_list = glob.glob(os.path.join(
6010
      self.instance_path, '*', 'srv', 'bbb-ssl',
6011 6012 6013 6014
      '_ssl_ca_crt_does_not_match.crt'))
    self.assertEqual(1, len(certificate_file_list))
    certificate_file = certificate_file_list[0]
    with open(certificate_file) as out:
6015 6016
      expected = self.certificate_pem + '\n' + self.ca.certificate_pem + \
        '\n' + self.key_pem
6017
      self.assertEqual(
6018
        expected,
6019 6020 6021 6022 6023 6024 6025 6026 6027 6028 6029 6030 6031 6032 6033 6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044 6045 6046 6047 6048 6049 6050 6051 6052 6053 6054 6055 6056 6057 6058 6059 6060 6061 6062 6063 6064 6065 6066 6067 6068 6069 6070 6071 6072 6073 6074 6075 6076 6077 6078 6079 6080 6081 6082 6083
        out.read()
      )

  def test_ssl_key_ssl_crt_unsafe(self):
    parameter_dict = self.parseSlaveParameterDict('ssl_key-ssl_crt-unsafe')
    self.assertEqual(
      {
        'request-error-list': ["slave ssl_key and ssl_crt does not match"],
        'warning-list': [
          'ssl_key is obsolete, please use key-upload-url',
          'ssl_crt is obsolete, please use key-upload-url']
      },
      parameter_dict
    )


class TestSlaveSlapOSMasterCertificateCompatibilityUpdate(
  SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def setUpMaster(cls):
    # run partition until AIKC finishes
    cls.runComputerPartitionUntil(
      cls.untilNotReadyYetNotInMasterKeyGenerateAuthUrl)

    parameter_dict = cls.computer_partition.getConnectionParameterDict()
    ca_certificate = requests.get(
      parameter_dict['kedifa-caucase-url'] + '/cas/crt/ca.crt.pem')
    assert ca_certificate.status_code == httplib.OK
    cls.ca_certificate_file = os.path.join(cls.working_directory, 'ca.crt.pem')
    open(cls.ca_certificate_file, 'w').write(ca_certificate.text)
    # Do not upload certificates for the master partition

  instance_parameter_dict = {
    'domain': 'example.com',
    'public-ipv4': SLAPOS_TEST_IPV4,
    'port': HTTPS_PORT,
    'plain_http_port': HTTP_PORT,
    'monitor-httpd-port': MONITOR_HTTPD_PORT,
    '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
    'kedifa_port': KEDIFA_PORT,
    'caucase_port': CAUCASE_PORT,
    'mpm-graceful-shutdown-timeout': 2,
  }

  @classmethod
  def getInstanceParameterDict(cls):
    if 'apache-certificate' not in cls.instance_parameter_dict:
      cls.instance_parameter_dict.update(**{
        'apache-certificate': cls.certificate_pem,
        'apache-key': cls.key_pem,
      })
    return cls.instance_parameter_dict

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'ssl_from_master': {
        'url': cls.backend_url,
      },
    }

  def test_master_partition_state(self):
    parameter_dict = self.parseConnectionParameterDict()
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
6084
    self.assertRejectedSlavePromiseWithPop(parameter_dict)
6085 6086

    expected_parameter_dict = {
6087
      'monitor-base-url': 'None',
6088 6089 6090 6091 6092 6093 6094 6095 6096 6097 6098 6099 6100 6101 6102 6103 6104 6105 6106 6107 6108 6109 6110 6111 6112 6113 6114 6115 6116 6117 6118 6119 6120 6121 6122 6123 6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142
      'domain': 'example.com',
      'accepted-slave-amount': '1',
      'rejected-slave-amount': '0',
      'rejected-slave-dict': {},
      'slave-amount': '1',
      'warning-list': [
        u'apache-certificate is obsolete, please use master-key-upload-url',
        u'apache-key is obsolete, please use master-key-upload-url',
      ],
    }

    self.assertEqual(
      expected_parameter_dict,
      parameter_dict
    )

  def test_apache_key_apache_certificate_update(self):
    parameter_dict = self.parseSlaveParameterDict('ssl_from_master')
    self.assertLogAccessUrlWithPop(parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, '')
    hostname = 'ssl_from_master'.translate(None, '_-')
    self.assertEqual(
      {
        'domain': '%s.example.com' % (hostname,),
        'replication_number': '1',
        'url': 'http://%s.example.com' % (hostname, ),
        'site_url': 'http://%s.example.com' % (hostname, ),
        'secure_access': 'https://%s.example.com' % (hostname, ),
        'public-ipv4': SLAPOS_TEST_IPV4
      },
      parameter_dict
    )

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')

    _, key_pem, _, certificate_pem = createSelfSignedCertificate(
      [
        '*.customdomain.example.com',
        '*.example.com',
        '*.alias1.example.com',
      ])

    self.instance_parameter_dict.update(**{
      'apache-certificate': certificate_pem,
      'apache-key': key_pem,

    })
    self.runComputerPartition(max_quantity=1)
6143
    self.runKedifaUpdater()
6144 6145 6146 6147 6148 6149 6150 6151 6152

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      certificate_pem,
      der2pem(result.peercert))

    self.assertEqualResultJson(result, 'Path', '/test-path')
6153 6154 6155 6156 6157 6158 6159 6160 6161 6162 6163 6164 6165 6166 6167 6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181 6182 6183 6184 6185 6186 6187 6188 6189


class TestSlaveCiphers(SlaveHttpFrontendTestCase, TestDataMixin):
  @classmethod
  def getInstanceParameterDict(cls):
    return {
      'domain': 'example.com',
      'public-ipv4': SLAPOS_TEST_IPV4,
      '-frontend-authorized-slave-string':
      '_apache_custom_http_s-accepted _caddy_custom_http_s-accepted',
      'port': HTTPS_PORT,
      'plain_http_port': HTTP_PORT,
      'monitor-httpd-port': MONITOR_HTTPD_PORT,
      '-frontend-config-1-monitor-httpd-port': MONITOR_F1_HTTPD_PORT,
      'kedifa_port': KEDIFA_PORT,
      'caucase_port': CAUCASE_PORT,
      'mpm-graceful-shutdown-timeout': 2,
      'ciphers': 'ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384'
    }

  @classmethod
  def getSlaveParameterDictDict(cls):
    return {
      'default_ciphers': {
      },
      'own_ciphers': {
        'ciphers': 'ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256',
      },
    }

  def test_master_partition_state(self):
    parameter_dict = self.parseConnectionParameterDict()
    self.assertKeyWithPop('monitor-setup-url', parameter_dict)
    self.assertKedifaKeysWithPop(parameter_dict, 'master-')
    self.assertRejectedSlavePromiseWithPop(parameter_dict)

    expected_parameter_dict = {
6190
      'monitor-base-url': 'None',
6191 6192 6193 6194 6195 6196 6197 6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220 6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253
      'domain': 'example.com',
      'accepted-slave-amount': '2',
      'rejected-slave-amount': '0',
      'slave-amount': '2',
      'rejected-slave-dict': {}
    }

    self.assertEqual(
      expected_parameter_dict,
      parameter_dict
    )

  def test_default_ciphers(self):
    parameter_dict = self.assertSlaveBase('default_ciphers')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqual(httplib.NOT_FOUND, result.status_code)

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)

    configuration_file = glob.glob(
      os.path.join(
        self.instance_path, '*', 'etc', 'caddy-slave-conf.d',
        '_default_ciphers.conf'
      ))[0]
    self.assertTrue(
      'ciphers ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384'
      in open(configuration_file).read()
    )

  def test_own_ciphers(self):
    parameter_dict = self.assertSlaveBase('own_ciphers')

    result = self.fakeHTTPSResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')

    self.assertEqual(
      self.certificate_pem,
      der2pem(result.peercert))

    self.assertEqual(httplib.NOT_FOUND, result.status_code)

    result_http = self.fakeHTTPResult(
      parameter_dict['domain'], parameter_dict['public-ipv4'], 'test-path')
    self.assertEqual(httplib.NOT_FOUND, result_http.status_code)

    configuration_file = glob.glob(
      os.path.join(
        self.instance_path, '*', 'etc', 'caddy-slave-conf.d',
        '_own_ciphers.conf'
      ))[0]
    self.assertTrue(
      'ciphers ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256'
      in open(configuration_file).read()
    )