Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
slapos
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Tom Niget
slapos
Commits
77bc1c3d
Commit
77bc1c3d
authored
Nov 22, 2018
by
Łukasz Nowak
Committed by
Łukasz Nowak
Nov 27, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
caddy-frontend/test: Test: Compare objects, not strings
parent
47f87a8b
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
184 additions
and
212 deletions
+184
-212
software/caddy-frontend/TODO.rst
software/caddy-frontend/TODO.rst
+0
-1
software/caddy-frontend/test/test.py
software/caddy-frontend/test/test.py
+184
-211
No files found.
software/caddy-frontend/TODO.rst
View file @
77bc1c3d
...
@@ -2,7 +2,6 @@ Generally things to be done with ``caddy-frontend``:
...
@@ -2,7 +2,6 @@ Generally things to be done with ``caddy-frontend``:
* return warning on not implemented keys (from ``apache-frontend`` perspective) in master and slave request
* return warning on not implemented keys (from ``apache-frontend`` perspective) in master and slave request
* tests: add assertion with results of promises in etc/promise for each partition
* tests: add assertion with results of promises in etc/promise for each partition
* tests: compare python objects where possible instead of instead of strings (eg. load ``rejected-slave-dict``)
* tests: swich to `cryptography <https://pypi.org/project/cryptography/>`_ for certificate management
* tests: swich to `cryptography <https://pypi.org/project/cryptography/>`_ for certificate management
* README: cleanup the documentation, explain various specifics
* README: cleanup the documentation, explain various specifics
* check the whole frontend slave snippet with ``caddy -validate`` during buildout run, and reject if does not pass validation
* check the whole frontend slave snippet with ``caddy -validate`` during buildout run, and reject if does not pass validation
...
...
software/caddy-frontend/test/test.py
View file @
77bc1c3d
...
@@ -235,14 +235,10 @@ class HttpFrontendTestCase(SlapOSInstanceTestCase):
...
@@ -235,14 +235,10 @@ class HttpFrontendTestCase(SlapOSInstanceTestCase):
def
assertLogAccessUrlWithPop
(
self
,
parameter_dict
):
def
assertLogAccessUrlWithPop
(
self
,
parameter_dict
):
log_access_url
=
parameter_dict
.
pop
(
'log-access-url'
)
log_access_url
=
parameter_dict
.
pop
(
'log-access-url'
)
try
:
log_access_url_json
=
json
.
loads
(
log_access_url
)
except
Exception
:
raise
ValueError
(
'JSON decode problem in:
\
n
%s'
%
(
log_access_url
,))
self
.
assertTrue
(
len
(
log_access_url
_json
)
>=
1
)
self
.
assertTrue
(
len
(
log_access_url
)
>=
1
)
# check only the first one, as second frontend will be stopped
# check only the first one, as second frontend will be stopped
log_access
=
log_access_url
_json
[
0
]
log_access
=
log_access_url
[
0
]
entry
=
log_access
.
split
(
': '
)
entry
=
log_access
.
split
(
': '
)
if
len
(
entry
)
!=
2
:
if
len
(
entry
)
!=
2
:
self
.
fail
(
'Cannot parse %r'
%
(
log_access
,))
self
.
fail
(
'Cannot parse %r'
%
(
log_access
,))
...
@@ -266,6 +262,22 @@ class HttpFrontendTestCase(SlapOSInstanceTestCase):
...
@@ -266,6 +262,22 @@ class HttpFrontendTestCase(SlapOSInstanceTestCase):
self
.
assertTrue
(
key
in
j
,
'No key %r in %s'
%
(
key
,
j
))
self
.
assertTrue
(
key
in
j
,
'No key %r in %s'
%
(
key
,
j
))
self
.
assertEqual
(
value
,
j
[
key
])
self
.
assertEqual
(
value
,
j
[
key
])
def
parseParameterDict
(
self
,
parameter_dict
):
parsed_parameter_dict
=
{}
for
key
,
value
in
parameter_dict
.
items
():
if
key
in
[
'rejected-slave-dict'
,
'request-error-list'
,
'log-access-url'
]:
value
=
json
.
loads
(
value
)
parsed_parameter_dict
[
key
]
=
value
return
parsed_parameter_dict
def
parseConnectionParameterDict
(
self
):
return
self
.
parseParameterDict
(
self
.
computer_partition
.
getConnectionParameterDict
()
)
class
TestMasterRequest
(
HttpFrontendTestCase
,
TestDataMixin
):
class
TestMasterRequest
(
HttpFrontendTestCase
,
TestDataMixin
):
@
classmethod
@
classmethod
...
@@ -279,7 +291,7 @@ class TestMasterRequest(HttpFrontendTestCase, TestDataMixin):
...
@@ -279,7 +291,7 @@ class TestMasterRequest(HttpFrontendTestCase, TestDataMixin):
}
}
def
test
(
self
):
def
test
(
self
):
parameter_dict
=
self
.
computer_partition
.
get
ConnectionParameterDict
()
parameter_dict
=
self
.
parse
ConnectionParameterDict
()
self
.
assertKeyWithPop
(
'monitor-setup-url'
,
parameter_dict
)
self
.
assertKeyWithPop
(
'monitor-setup-url'
,
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
{
{
...
@@ -288,7 +300,7 @@ class TestMasterRequest(HttpFrontendTestCase, TestDataMixin):
...
@@ -288,7 +300,7 @@ class TestMasterRequest(HttpFrontendTestCase, TestDataMixin):
'accepted-slave-amount'
:
'0'
,
'accepted-slave-amount'
:
'0'
,
'rejected-slave-amount'
:
'0'
,
'rejected-slave-amount'
:
'0'
,
'slave-amount'
:
'0'
,
'slave-amount'
:
'0'
,
'rejected-slave-dict'
:
'{}'
},
'rejected-slave-dict'
:
{}
},
parameter_dict
parameter_dict
)
)
...
@@ -312,7 +324,7 @@ class TestMasterRequestDomain(HttpFrontendTestCase, TestDataMixin):
...
@@ -312,7 +324,7 @@ class TestMasterRequestDomain(HttpFrontendTestCase, TestDataMixin):
}
}
def
test
(
self
):
def
test
(
self
):
parameter_dict
=
self
.
computer_partition
.
get
ConnectionParameterDict
()
parameter_dict
=
self
.
parse
ConnectionParameterDict
()
self
.
assertKeyWithPop
(
'monitor-setup-url'
,
parameter_dict
)
self
.
assertKeyWithPop
(
'monitor-setup-url'
,
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -322,7 +334,7 @@ class TestMasterRequestDomain(HttpFrontendTestCase, TestDataMixin):
...
@@ -322,7 +334,7 @@ class TestMasterRequestDomain(HttpFrontendTestCase, TestDataMixin):
'accepted-slave-amount'
:
'0'
,
'accepted-slave-amount'
:
'0'
,
'rejected-slave-amount'
:
'0'
,
'rejected-slave-amount'
:
'0'
,
'slave-amount'
:
'0'
,
'slave-amount'
:
'0'
,
'rejected-slave-dict'
:
'{}'
'rejected-slave-dict'
:
{}
},
},
parameter_dict
parameter_dict
)
)
...
@@ -489,6 +501,13 @@ class SlaveHttpFrontendTestCase(HttpFrontendTestCase):
...
@@ -489,6 +501,13 @@ class SlaveHttpFrontendTestCase(HttpFrontendTestCase):
def
tearDown
(
self
):
def
tearDown
(
self
):
self
.
unpatchRequests
()
self
.
unpatchRequests
()
def
parseSlaveParameterDict
(
self
,
key
):
return
self
.
parseParameterDict
(
self
.
slave_connection_parameter_dict_dict
[
key
]
)
class
TestSlave
(
SlaveHttpFrontendTestCase
,
TestDataMixin
):
class
TestSlave
(
SlaveHttpFrontendTestCase
,
TestDataMixin
):
caddy_custom_https
=
'''# caddy_custom_https_filled_in_accepted
caddy_custom_https
=
'''# caddy_custom_https_filled_in_accepted
...
@@ -792,7 +811,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -792,7 +811,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
if
os
.
path
.
exists
(
os
.
path
.
join
(
q
,
'etc'
,
'trafficserver'
))][
0
]
if
os
.
path
.
exists
(
os
.
path
.
join
(
q
,
'etc'
,
'trafficserver'
))][
0
]
def
test_master_partition_state
(
self
):
def
test_master_partition_state
(
self
):
parameter_dict
=
self
.
computer_partition
.
get
ConnectionParameterDict
()
parameter_dict
=
self
.
parse
ConnectionParameterDict
()
self
.
assertKeyWithPop
(
'monitor-setup-url'
,
parameter_dict
)
self
.
assertKeyWithPop
(
'monitor-setup-url'
,
parameter_dict
)
expected_parameter_dict
=
{
expected_parameter_dict
=
{
...
@@ -801,12 +820,12 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -801,12 +820,12 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'accepted-slave-amount'
:
'40'
,
'accepted-slave-amount'
:
'40'
,
'rejected-slave-amount'
:
'4'
,
'rejected-slave-amount'
:
'4'
,
'slave-amount'
:
'44'
,
'slave-amount'
:
'44'
,
'rejected-slave-dict'
:
'rejected-slave-dict'
:
{
'{"_apache_custom_http_s-rejected": ["slave not authorized"], '
"_apache_custom_http_s-rejected"
:
[
"slave not authorized"
],
'"_caddy_custom_http_s": ["slave not authorized"], '
"_caddy_custom_http_s"
:
[
"slave not authorized"
],
'"_caddy_custom_http_s-rejected": ["slave not authorized"], '
"_caddy_custom_http_s-rejected"
:
[
"slave not authorized"
],
'"_ssl_ca_crt_only": ["ssl_ca_crt is present, so ssl_crt and ssl_key '
"_ssl_ca_crt_only"
:
[
"ssl_ca_crt is present, so ssl_crt and ssl_key "
'are required"]}'
"are required"
]}
}
}
self
.
assertEqual
(
self
.
assertEqual
(
...
@@ -871,8 +890,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -871,8 +890,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def
test_empty
(
self
):
def
test_empty
(
self
):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict
=
self
.
parseSlaveParameterDict
(
'empty'
)
'empty'
]
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertLogAccessUrlWithPop
(
parameter_dict
)
self
.
assertEqual
(
self
.
assertEqual
(
parameter_dict
,
parameter_dict
,
...
@@ -933,8 +951,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -933,8 +951,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_url(self):
def test_url(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict('
url
')
'
url
'].copy()
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -995,8 +1013,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -995,8 +1013,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
@skip('
Feature
postponed
')
@skip('
Feature
postponed
')
def test_url_ipv6_access(self):
def test_url_ipv6_access(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
url
')
'
url
'].copy()
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1026,8 +1043,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1026,8 +1043,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result_ipv6, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result_ipv6, '
Path
', '
/
test
-
path
')
def test_type_zope_path(self):
def test_type_zope_path(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
type
-
zope
-
path
')
'
type
-
zope
-
path
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1056,8 +1072,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1056,8 +1072,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_zope_default_path(self):
def test_type_zope_default_path(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
type
-
zope
-
default
-
path
')
'
type
-
zope
-
default
-
path
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1085,8 +1100,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1085,8 +1100,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_server_alias(self):
def test_server_alias(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
server
-
alias
')
'
server
-
alias
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1126,8 +1140,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1126,8 +1140,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
der2pem(result.peercert))
der2pem(result.peercert))
def test_server_alias_wildcard(self):
def test_server_alias_wildcard(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
server
-
alias
-
wildcard
')
'
server
-
alias
-
wildcard
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1160,8 +1173,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1160,8 +1173,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_server_alias_duplicated(self):
def test_server_alias_duplicated(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
server
-
alias
-
duplicated
')
'
server
-
alias
-
duplicated
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1194,8 +1206,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1194,8 +1206,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_server_alias_custom_domain_duplicated(self):
def test_server_alias_custom_domain_duplicated(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
server
-
alias_custom_domain
-
duplicated
'
]
'
server
-
alias_custom_domain
-
duplicated
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1224,8 +1236,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1224,8 +1236,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
raise NotImplementedError(self.id())
raise NotImplementedError(self.id())
def test_ssl_ca_crt(self):
def test_ssl_ca_crt(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
custom_domain_ssl_crt_ssl_key_ssl_ca_crt
'
]
'
custom_domain_ssl_crt_ssl_key_ssl_ca_crt
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1250,18 +1262,16 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1250,18 +1262,16 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_ssl_ca_crt_only(self):
def test_ssl_ca_crt_only(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
ssl_ca_crt_only
')
'
ssl_ca_crt_only
']
self.assertEqual(
self.assertEqual(
parameter_dict,
parameter_dict,
{
{
'
request
-
error
-
list
':
'
[
"ssl_ca_crt is present, so ssl_crt and '
'
request
-
error
-
list
':
[
'ssl_key are required"
]
'
}
"ssl_ca_crt is present, so ssl_crt and ssl_key are required"]
}
)
)
def test_ssl_ca_crt_garbage(self):
def test_ssl_ca_crt_garbage(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
ssl_ca_crt_garbage
')
'
ssl_ca_crt_garbage
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1286,8 +1296,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1286,8 +1296,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_ssl_ca_crt_does_not_match(self):
def test_ssl_ca_crt_does_not_match(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
ssl_ca_crt_does_not_match
')
'
ssl_ca_crt_does_not_match
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1312,8 +1321,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1312,8 +1321,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_https_only(self):
def test_https_only(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
https
-
only
')
'
https
-
only
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1345,8 +1353,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1345,8 +1353,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_custom_domain(self):
def test_custom_domain(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
custom_domain
')
'
custom_domain
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1370,8 +1377,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1370,8 +1377,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_custom_domain_wildcard(self):
def test_custom_domain_wildcard(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
custom_domain_wildcard
')
'
custom_domain_wildcard
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1396,8 +1402,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1396,8 +1402,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_custom_domain_ssl_crt_ssl_key(self):
def test_custom_domain_ssl_crt_ssl_key(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
custom_domain_ssl_crt_ssl_key
'
]
'
custom_domain_ssl_crt_ssl_key
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1421,8 +1427,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1421,8 +1427,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
self.assertEqualResultJson(result, '
Path
', '
/
test
-
path
')
def test_type_zope(self):
def test_type_zope(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
type
-
zope
')
'
type
-
zope
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1467,8 +1472,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1467,8 +1472,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_zope_virtualhostroot_http_port(self):
def test_type_zope_virtualhostroot_http_port(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
type
-
zope
-
virtualhostroot
-
http
-
port
'
]
'
type
-
zope
-
virtualhostroot
-
http
-
port
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1494,8 +1499,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1494,8 +1499,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_zope_virtualhostroot_https_port(self):
def test_type_zope_virtualhostroot_https_port(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
type
-
zope
-
virtualhostroot
-
https
-
port
'
]
'
type
-
zope
-
virtualhostroot
-
https
-
port
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1525,8 +1530,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1525,8 +1530,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_notebook(self):
def test_type_notebook(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
type
-
notebook
')
'
type
-
notebook
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1567,8 +1571,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1567,8 +1571,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
# Caddy as a proxy in front of nginx-push-stream . If we have a
# Caddy as a proxy in front of nginx-push-stream . If we have a
# "central shared" caddy instance, can it handle keeping connections
# "central shared" caddy instance, can it handle keeping connections
# opens for many clients ?
# opens for many clients ?
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
type
-
eventsource
')
'
type
-
eventsource
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1609,8 +1612,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1609,8 +1612,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_redirect(self):
def test_type_redirect(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
type
-
redirect
')
'
type
-
redirect
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1637,8 +1639,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1637,8 +1639,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_ssl_proxy_verify_ssl_proxy_ca_crt(self):
def test_ssl_proxy_verify_ssl_proxy_ca_crt(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
ssl
-
proxy
-
verify_ssl_proxy_ca_crt
'
]
'
ssl
-
proxy
-
verify_ssl_proxy_ca_crt
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
...
@@ -1674,8 +1676,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1674,8 +1676,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_ssl_proxy_verify_unverified(self):
def test_ssl_proxy_verify_unverified(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
ssl
-
proxy
-
verify
-
unverified
'
]
'
ssl
-
proxy
-
verify
-
unverified
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
...
@@ -1703,8 +1705,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1703,8 +1705,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_enable_cache_ssl_proxy_verify_ssl_proxy_ca_crt(self):
def test_enable_cache_ssl_proxy_verify_ssl_proxy_ca_crt(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
enable_cache
-
ssl
-
proxy
-
verify_ssl_proxy_ca_crt
'
]
'
enable_cache
-
ssl
-
proxy
-
verify_ssl_proxy_ca_crt
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
...
@@ -1742,8 +1744,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1742,8 +1744,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_enable_cache_ssl_proxy_verify_unverified(self):
def test_enable_cache_ssl_proxy_verify_unverified(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
enable_cache
-
ssl
-
proxy
-
verify
-
unverified
'
]
'
enable_cache
-
ssl
-
proxy
-
verify
-
unverified
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
...
@@ -1772,8 +1774,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1772,8 +1774,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_zope_ssl_proxy_verify_ssl_proxy_ca_crt(self):
def test_type_zope_ssl_proxy_verify_ssl_proxy_ca_crt(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
type
-
zope
-
ssl
-
proxy
-
verify_ssl_proxy_ca_crt
'
]
'
type
-
zope
-
ssl
-
proxy
-
verify_ssl_proxy_ca_crt
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
...
@@ -1810,8 +1812,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1810,8 +1812,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_type_zope_ssl_proxy_verify_unverified(self):
def test_type_zope_ssl_proxy_verify_unverified(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
type
-
zope
-
ssl
-
proxy
-
verify
-
unverified
'
]
'
type
-
zope
-
ssl
-
proxy
-
verify
-
unverified
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
...
@@ -1840,8 +1842,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1840,8 +1842,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_monitor_ipv6_test(self):
def test_monitor_ipv6_test(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
monitor
-
ipv6
-
test
')
'
monitor
-
ipv6
-
test
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1883,8 +1884,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1883,8 +1884,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_monitor_ipv4_test(self):
def test_monitor_ipv4_test(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
monitor
-
ipv4
-
test
')
'
monitor
-
ipv4
-
test
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1926,8 +1926,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1926,8 +1926,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_re6st_optimal_test(self):
def test_re6st_optimal_test(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
re6st
-
optimal
-
test
')
'
re6st
-
optimal
-
test
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -1970,8 +1969,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -1970,8 +1969,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_enable_cache(self):
def test_enable_cache(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable_cache
')
'
enable_cache
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2061,8 +2059,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2061,8 +2059,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_enable_cache_disable_no_cache_request(self):
def test_enable_cache_disable_no_cache_request(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
enable_cache
-
disable
-
no
-
cache
-
request
'
]
'
enable_cache
-
disable
-
no
-
cache
-
request
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2114,8 +2112,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2114,8 +2112,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertFalse('
pragma
' in j['
Incoming
Headers
'].keys())
self.assertFalse('
pragma
' in j['
Incoming
Headers
'].keys())
def test_enable_cache_disable_via_header(self):
def test_enable_cache_disable_via_header(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
enable_cache
-
disable
-
via
-
header
'
]
'
enable_cache
-
disable
-
via
-
header
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2159,8 +2157,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2159,8 +2157,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
)
)
def test_enable_http2_false(self):
def test_enable_http2_false(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
false
')
'
enable
-
http2
-
false
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2209,8 +2206,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2209,8 +2206,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
def test_enable_http2_default(self):
def test_enable_http2_default(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
default
')
'
enable
-
http2
-
default
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2259,8 +2255,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2259,8 +2255,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
def test_prefer_gzip_encoding_to_backend(self):
def test_prefer_gzip_encoding_to_backend(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
prefer
-
gzip
-
encoding
-
to
-
backend
'
]
'
prefer
-
gzip
-
encoding
-
to
-
backend
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2298,8 +2294,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2298,8 +2294,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
deflate
', result.json()['
Incoming
Headers
']['
accept
-
encoding
'])
'
deflate
', result.json()['
Incoming
Headers
']['
accept
-
encoding
'])
def test_disabled_cookie_list(self):
def test_disabled_cookie_list(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
disabled
-
cookie
-
list
')
'
disabled
-
cookie
-
list
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2331,11 +2326,11 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2331,11 +2326,11 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
Coffee
=
present
', result.json()['
Incoming
Headers
']['
cookie
'])
'
Coffee
=
present
', result.json()['
Incoming
Headers
']['
cookie
'])
def test_apache_custom_http_s_rejected(self):
def test_apache_custom_http_s_rejected(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
apache_custom_http_s
-
rejected
'
]
'
apache_custom_http_s
-
rejected
'
)
self.assertEqual(
self.assertEqual(
{
{
'
request
-
error
-
list
':
'
[
"slave not authorized"
]
'
'
request
-
error
-
list
':
["slave not authorized"]
},
},
parameter_dict)
parameter_dict)
slave_configuration_file_list = glob.glob(os.path.join(
slave_configuration_file_list = glob.glob(os.path.join(
...
@@ -2352,8 +2347,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2352,8 +2347,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqual([], configuration_file_with_custom_http_list)
self.assertEqual([], configuration_file_with_custom_http_list)
def test_apache_custom_http_s_accepted(self):
def test_apache_custom_http_s_accepted(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
apache_custom_http_s
-
accepted
'
]
'
apache_custom_http_s
-
accepted
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{'
replication_number
': '
1
', '
public
-
ipv4
': LOCAL_IPV4},
{'
replication_number
': '
1
', '
public
-
ipv4
': LOCAL_IPV4},
...
@@ -2408,11 +2403,11 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2408,11 +2403,11 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqual(1, len(configuration_file_with_custom_http_list))
self.assertEqual(1, len(configuration_file_with_custom_http_list))
def test_caddy_custom_http_s_rejected(self):
def test_caddy_custom_http_s_rejected(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
caddy_custom_http_s
-
rejected
'
]
'
caddy_custom_http_s
-
rejected
'
)
self.assertEqual(
self.assertEqual(
{
{
'
request
-
error
-
list
':
'
[
"slave not authorized"
]
'
'
request
-
error
-
list
':
["slave not authorized"]
},
},
parameter_dict)
parameter_dict)
slave_configuration_file_list = glob.glob(os.path.join(
slave_configuration_file_list = glob.glob(os.path.join(
...
@@ -2429,11 +2424,11 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2429,11 +2424,11 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqual([], configuration_file_with_custom_http_list)
self.assertEqual([], configuration_file_with_custom_http_list)
def test_caddy_custom_http_s(self):
def test_caddy_custom_http_s(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
caddy_custom_http_s
'
]
'
caddy_custom_http_s
'
)
self.assertEqual(
self.assertEqual(
{
{
'
request
-
error
-
list
':
'
[
"slave not authorized"
]
'
'
request
-
error
-
list
':
["slave not authorized"]
},
},
parameter_dict)
parameter_dict)
slave_configuration_file_list = glob.glob(os.path.join(
slave_configuration_file_list = glob.glob(os.path.join(
...
@@ -2450,8 +2445,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2450,8 +2445,8 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqual([], configuration_file_with_custom_http_list)
self.assertEqual([], configuration_file_with_custom_http_list)
def test_caddy_custom_http_s_accepted(self):
def test_caddy_custom_http_s_accepted(self):
parameter_dict = self.
slave_connection_parameter_dict_dict[
parameter_dict = self.
parseSlaveParameterDict(
'
caddy_custom_http_s
-
accepted
'
]
'
caddy_custom_http_s
-
accepted
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{'
replication_number
': '
1
', '
public
-
ipv4
': LOCAL_IPV4},
{'
replication_number
': '
1
', '
public
-
ipv4
': LOCAL_IPV4},
...
@@ -2506,8 +2501,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
...
@@ -2506,8 +2501,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
self.assertEqual(1, len(configuration_file_with_custom_http_list))
self.assertEqual(1, len(configuration_file_with_custom_http_list))
def test_https_url(self):
def test_https_url(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
url_https
-
url
')
'
url_https
-
url
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2565,8 +2559,7 @@ class TestReplicateSlave(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -2565,8 +2559,7 @@ class TestReplicateSlave(SlaveHttpFrontendTestCase, TestDataMixin):
}
}
def test(self):
def test(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
replicate
')
'
replicate
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2639,8 +2632,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
...
@@ -2639,8 +2632,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
}
}
def test_enable_http2_default(self):
def test_enable_http2_default(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
default
')
'
enable
-
http2
-
default
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2659,8 +2651,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
...
@@ -2659,8 +2651,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
def test_enable_http2_false(self):
def test_enable_http2_false(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
false
')
'
enable
-
http2
-
false
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2679,8 +2670,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
...
@@ -2679,8 +2670,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
def test_enable_http2_true(self):
def test_enable_http2_true(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
true
')
'
enable
-
http2
-
true
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2731,8 +2721,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
...
@@ -2731,8 +2721,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
}
}
def test_enable_http2_default(self):
def test_enable_http2_default(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
default
')
'
enable
-
http2
-
default
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2751,8 +2740,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
...
@@ -2751,8 +2740,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
def test_enable_http2_false(self):
def test_enable_http2_false(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
false
')
'
enable
-
http2
-
false
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2771,8 +2759,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
...
@@ -2771,8 +2759,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
isHTTP2(parameter_dict['
domain
'], parameter_dict['
public
-
ipv4
']))
def test_enable_http2_true(self):
def test_enable_http2_true(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
enable
-
http2
-
true
')
'
enable
-
http2
-
true
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2812,8 +2799,7 @@ class TestRe6stVerificationUrlDefaultSlave(SlaveHttpFrontendTestCase,
...
@@ -2812,8 +2799,7 @@ class TestRe6stVerificationUrlDefaultSlave(SlaveHttpFrontendTestCase,
}
}
def test_default(self):
def test_default(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
default
')
'
default
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2862,8 +2848,7 @@ class TestRe6stVerificationUrlSlave(SlaveHttpFrontendTestCase,
...
@@ -2862,8 +2848,7 @@ class TestRe6stVerificationUrlSlave(SlaveHttpFrontendTestCase,
}
}
def test_default(self):
def test_default(self):
parameter_dict = self.slave_connection_parameter_dict_dict[
parameter_dict = self.parseSlaveParameterDict('
default
')
'
default
']
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2922,7 +2907,7 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
...
@@ -2922,7 +2907,7 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
}
}
def test_master_partition_state(self):
def test_master_partition_state(self):
parameter_dict = self.
computer_partition.get
ConnectionParameterDict()
parameter_dict = self.
parse
ConnectionParameterDict()
self.assertKeyWithPop('
monitor
-
setup
-
url
', parameter_dict)
self.assertKeyWithPop('
monitor
-
setup
-
url
', parameter_dict)
expected_parameter_dict = {
expected_parameter_dict = {
...
@@ -2931,10 +2916,11 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
...
@@ -2931,10 +2916,11 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
'
accepted
-
slave
-
amount
': '
1
',
'
accepted
-
slave
-
amount
': '
1
',
'
rejected
-
slave
-
amount
': '
2
',
'
rejected
-
slave
-
amount
': '
2
',
'
slave
-
amount
': '
3
',
'
slave
-
amount
': '
3
',
'
rejected
-
slave
-
dict
':
'
rejected
-
slave
-
dict
': {
'
{
"_https-url"
:
[
"slave https-url
\
\
"
https
:
//
[
fd46
::
c2ae
]:
!
py
!
u
\
'123123'
'
_https
-
url
': ['
slave
https
-
url
"https://[fd46::c2ae]:!py!u
\
'
123123
\
'
"'
'
\
'
\
\
" invalid"], "_url": ["slave url
\
\
"https://[fd46::c2ae]:!py!u
\
'
'
'
invalid
'],
'123123
\
'
\
\
" invalid"]}'
'
_url
': [u'
slave
url
"https://[fd46::c2ae]:!py!u
\
'
123123
\
'
"
invalid
']
}
}
}
self.assertEqual(
self.assertEqual(
...
@@ -2943,8 +2929,7 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
...
@@ -2943,8 +2929,7 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
)
)
def test_empty(self):
def test_empty(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
empty
')
'empty'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -2968,23 +2953,21 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
...
@@ -2968,23 +2953,21 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
self.assertEqual(httplib.NOT_FOUND, result.status_code)
self.assertEqual(httplib.NOT_FOUND, result.status_code)
def test_url(self):
def test_url(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
url
')
'url'
].
copy
()
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'["slave url
\
\
"https://[fd46::c2ae]:!py!'
'
request
-
error
-
list
':
[
'u
\
'
123123
\
'
\
\
" invalid"]'
"slave url
\
"
https://[fd46::c2ae]:!py!u'
123123
'
\
"
invalid"]
},
},
parameter_dict
parameter_dict
)
)
def test_https_url(self):
def test_https_url(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
https
-
url
')
'https-url'
].
copy
()
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'["slave https-url
\
\
"https://[fd46::c2ae]:'
'
request
-
error
-
list
':
[
'!py!u
\
'
123123
\
'
\
\
" invalid"]'
"slave https-url
\
"
https://[fd46::c2ae]:!py!u'
123123
'
\
"
invalid"]
},
},
parameter_dict
parameter_dict
)
)
...
@@ -3006,8 +2989,7 @@ class TestDefaultMonitorHttpdPort(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -3006,8 +2989,7 @@ class TestDefaultMonitorHttpdPort(SlaveHttpFrontendTestCase, TestDataMixin):
}
}
def test(self):
def test(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
test
')
'test'
]
self.assertKeyWithPop('
log
-
access
-
url
', parameter_dict)
self.assertKeyWithPop('
log
-
access
-
url
', parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3073,8 +3055,7 @@ class TestQuicEnabled(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -3073,8 +3055,7 @@ class TestQuicEnabled(SlaveHttpFrontendTestCase, TestDataMixin):
if os.path.exists(os.path.join(q, '
etc
', '
trafficserver
'))][0]
if os.path.exists(os.path.join(q, '
etc
', '
trafficserver
'))][0]
def test_url(self):
def test_url(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
url
')
'url'
].
copy
()
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3214,7 +3195,7 @@ https://www.google.com {}""",
...
@@ -3214,7 +3195,7 @@ https://www.google.com {}""",
}
}
def test_master_partition_state(self):
def test_master_partition_state(self):
parameter_dict
=
self
.
computer_partition
.
get
ConnectionParameterDict
()
parameter_dict = self.
parse
ConnectionParameterDict()
self.assertKeyWithPop('monitor-setup-url', parameter_dict)
self.assertKeyWithPop('monitor-setup-url', parameter_dict)
expected_parameter_dict = {
expected_parameter_dict = {
...
@@ -3223,14 +3204,21 @@ https://www.google.com {}""",
...
@@ -3223,14 +3204,21 @@ https://www.google.com {}""",
'accepted-slave-amount': '8',
'accepted-slave-amount': '8',
'rejected-slave-amount': '4',
'rejected-slave-amount': '4',
'slave-amount': '12',
'slave-amount': '12',
'rejected-slave-dict'
:
'rejected-slave-dict': {
'{"_caddy_custom_http_s-reject": ["slave caddy_custom_http '
'_caddy_custom_http_s-reject': [
'configuration invalid", "slave caddy_custom_https configuration '
'slave caddy_custom_http configuration invalid',
'invalid"], "_server-alias-unsafe": ["server-alias
\
'
${section:option}
\
'
'
'slave caddy_custom_https configuration invalid'],
' not valid", "server-alias
\
'
afterspace
\
'
not valid"], '
'_custom_domain-unsafe': [
'"_custom_domain-unsafe": ["custom_domain
\
'
${section:option} '
"
custom_domain
'${section:option} afterspace
\
\
nafternewline'
invalid
"
'afterspace
\
\
\
\
nafternewline
\
'
invalid"], "_ssl_key-ssl_crt-unsafe": '
],
'["slave ssl_key and ssl_crt does not match"]}'
'_server-alias-unsafe': [
"
server
-
alias
'${section:option}'
not
valid
",
"
server
-
alias
'afterspace'
not
valid
"
],
'_ssl_key-ssl_crt-unsafe': [
'slave ssl_key and ssl_crt does not match'
]
}
}
}
self.assertEqual(
self.assertEqual(
...
@@ -3239,8 +3227,7 @@ https://www.google.com {}""",
...
@@ -3239,8 +3227,7 @@ https://www.google.com {}""",
)
)
def test_server_alias_same(self):
def test_server_alias_same(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('server-alias-same')
'server-alias-same'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3264,8 +3251,7 @@ https://www.google.com {}""",
...
@@ -3264,8 +3251,7 @@ https://www.google.com {}""",
self.assertEqualResultJson(result, 'Path', '/test-path')
self.assertEqualResultJson(result, 'Path', '/test-path')
def test_re6st_optimal_test_unsafe(self):
def test_re6st_optimal_test_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('re6st-optimal-test-unsafe')
're6st-optimal-test-unsafe'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3308,8 +3294,7 @@ https://www.google.com {}""",
...
@@ -3308,8 +3294,7 @@ https://www.google.com {}""",
)
)
def test_re6st_optimal_test_nocomma(self):
def test_re6st_optimal_test_nocomma(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('re6st-optimal-test-nocomma')
're6st-optimal-test-nocomma'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3343,32 +3328,30 @@ https://www.google.com {}""",
...
@@ -3343,32 +3328,30 @@ https://www.google.com {}""",
)
)
def test_custom_domain_unsafe(self):
def test_custom_domain_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('custom_domain-unsafe')
'custom_domain-unsafe'
]
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'request-error-list':
[
'["custom_domain
\
'
${section:option} afterspace
\
\
\
\
nafternewline
\
'
'
"
custom_domain
\
'${section:option} afterspace
\
\
\
\
nafternewline
\
'
"
'invalid"]'
"invalid"]
},
},
parameter_dict
parameter_dict
)
)
def test_server_alias_unsafe(self):
def test_server_alias_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
server
-
alias
-
unsafe
')
'server-alias-unsafe'
]
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'
request
-
error
-
list
':
[
'["server-alias
\
'
${section:option}
\
'
not valid", "server-alias '
"server-alias '
$
{
section
:
option
}
' not valid", "server-alias "
'
\
'
afterspace
\
'
not valid"]'
"'
afterspace
' not valid"]
},
},
parameter_dict
parameter_dict
)
)
def test_virtualhostroot_http_port_unsafe(self):
def test_virtualhostroot_http_port_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.
parseSlaveParameterDict(
'virtualhostroot-http-port-unsafe'
]
'
virtualhostroot
-
http
-
port
-
unsafe
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3394,8 +3377,8 @@ https://www.google.com {}""",
...
@@ -3394,8 +3377,8 @@ https://www.google.com {}""",
)
)
def test_virtualhostroot_https_port_unsafe(self):
def test_virtualhostroot_https_port_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.
parseSlaveParameterDict(
'virtualhostroot-https-port-unsafe'
]
'
virtualhostroot
-
https
-
port
-
unsafe
'
)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3425,8 +3408,7 @@ https://www.google.com {}""",
...
@@ -3425,8 +3408,7 @@ https://www.google.com {}""",
)
)
def default_path_unsafe(self):
def default_path_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
default
-
path
-
unsafe
')
'default-path-unsafe'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3454,8 +3436,7 @@ https://www.google.com {}""",
...
@@ -3454,8 +3436,7 @@ https://www.google.com {}""",
)
)
def test_monitor_ipv4_test_unsafe(self):
def test_monitor_ipv4_test_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
monitor
-
ipv4
-
test
-
unsafe
')
'monitor-ipv4-test-unsafe'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3497,8 +3478,7 @@ https://www.google.com {}""",
...
@@ -3497,8 +3478,7 @@ https://www.google.com {}""",
)
)
def test_monitor_ipv6_test_unsafe(self):
def test_monitor_ipv6_test_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
monitor
-
ipv6
-
test
-
unsafe
')
'monitor-ipv6-test-unsafe'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3540,21 +3520,20 @@ https://www.google.com {}""",
...
@@ -3540,21 +3520,20 @@ https://www.google.com {}""",
)
)
def test_ssl_key_ssl_crt_unsafe(self):
def test_ssl_key_ssl_crt_unsafe(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
ssl_key
-
ssl_crt
-
unsafe
')
'ssl_key-ssl_crt-unsafe'
]
self.assertEqual(
self.assertEqual(
{
'request-error-list'
:
'["slave ssl_key and ssl_crt does not match"]'
},
{'
request
-
error
-
list
':
["slave ssl_key and ssl_crt does not match"]
},
parameter_dict
parameter_dict
)
)
def test_caddy_custom_http_s_reject(self):
def test_caddy_custom_http_s_reject(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
caddy_custom_http_s
-
reject
')
'caddy_custom_http_s-reject'
]
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'
request
-
error
-
list
': [
'["slave caddy_custom_http configuration invalid", '
"slave caddy_custom_http configuration invalid",
'"slave caddy_custom_https configuration invalid"]'
"slave caddy_custom_https configuration invalid"
]
},
},
parameter_dict
parameter_dict
)
)
...
@@ -3598,7 +3577,7 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -3598,7 +3577,7 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
}
}
def test_master_partition_state(self):
def test_master_partition_state(self):
parameter_dict
=
self
.
computer_partition
.
get
ConnectionParameterDict
()
parameter_dict = self.
parse
ConnectionParameterDict()
self.assertKeyWithPop('
monitor
-
setup
-
url
', parameter_dict)
self.assertKeyWithPop('
monitor
-
setup
-
url
', parameter_dict)
expected_parameter_dict = {
expected_parameter_dict = {
...
@@ -3607,10 +3586,11 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -3607,10 +3586,11 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
'
accepted
-
slave
-
amount
': '
1
',
'
accepted
-
slave
-
amount
': '
1
',
'
rejected
-
slave
-
amount
': '
3
',
'
rejected
-
slave
-
amount
': '
3
',
'
slave
-
amount
': '
4
',
'
slave
-
amount
': '
4
',
'rejected-slave-dict'
:
'
rejected
-
slave
-
dict
': {
'{"_site_4": ["custom_domain
\
'
duplicate.example.com
\
'
clashes"], '
'
_site_1
': ["custom_domain '
duplicate
.
example
.
com
' clashes"],
'"_site_1": ["custom_domain
\
'
duplicate.example.com
\
'
clashes"], '
'
_site_3
': ["server-alias '
duplicate
.
example
.
com
' clashes"],
'"_site_3": ["server-alias
\
'
duplicate.example.com
\
'
clashes"]}'
'
_site_4
': ["custom_domain '
duplicate
.
example
.
com
' clashes"]
}
}
}
self.assertEqual(
self.assertEqual(
...
@@ -3619,19 +3599,16 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -3619,19 +3599,16 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
)
)
def test_site_1(self):
def test_site_1(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
site_1
')
'site_1'
]
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'
request
-
error
-
list
': ["custom_domain '
duplicate
.
example
.
com
' clashes"]
'["custom_domain
\
'
duplicate.example.com
\
'
clashes"]'
},
},
parameter_dict
parameter_dict
)
)
def test_site_2(self):
def test_site_2(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
site_2
')
'site_2'
]
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
self.assertEqual(
{
{
...
@@ -3646,23 +3623,19 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
...
@@ -3646,23 +3623,19 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
)
)
def test_site_3(self):
def test_site_3(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
site_3
')
'site_3'
]
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'
request
-
error
-
list
': ["server-alias '
duplicate
.
example
.
com
' clashes"]
'["server-alias
\
'
duplicate.example.com
\
'
clashes"]'
},
},
parameter_dict,
parameter_dict,
)
)
def test_site_4(self):
def test_site_4(self):
parameter_dict
=
self
.
slave_connection_parameter_dict_dict
[
parameter_dict = self.parseSlaveParameterDict('
site_4
')
'site_4'
]
self.assertEqual(
self.assertEqual(
{
{
'request-error-list'
:
'
request
-
error
-
list
': ["custom_domain '
duplicate
.
example
.
com
' clashes"]
'["custom_domain
\
'
duplicate.example.com
\
'
clashes"]'
},
},
parameter_dict
parameter_dict
)
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment