mirror of
https://github.com/jupyterhub/jupyterhub.git
synced 2025-10-08 10:34:10 +00:00

this is the routespec for sending requests to the hub It is [host]/prefix/ (not /hub/) so it receives all requests, not just those destined for the hub
1652 lines
47 KiB
Python
1652 lines
47 KiB
Python
"""Tests for the REST API."""
|
|
|
|
from datetime import datetime
|
|
from concurrent.futures import Future
|
|
import json
|
|
import re
|
|
import sys
|
|
from unittest import mock
|
|
from urllib.parse import urlparse, quote
|
|
import uuid
|
|
from async_generator import async_generator, yield_
|
|
|
|
from pytest import mark
|
|
from tornado import gen
|
|
|
|
import jupyterhub
|
|
from .. import orm
|
|
from ..utils import url_path_join as ujoin
|
|
from .mocking import public_host, public_url
|
|
from .utils import async_requests
|
|
|
|
|
|
def check_db_locks(func):
|
|
"""Decorator that verifies no locks are held on database upon exit.
|
|
|
|
This decorator for test functions verifies no locks are held on the
|
|
application's database upon exit by creating and dropping a dummy table.
|
|
|
|
The decorator relies on an instance of JupyterHubApp being the first
|
|
argument to the decorated function.
|
|
|
|
Example
|
|
-------
|
|
|
|
@check_db_locks
|
|
def api_request(app, *api_path, **kwargs):
|
|
|
|
"""
|
|
def new_func(app, *args, **kwargs):
|
|
retval = func(app, *args, **kwargs)
|
|
|
|
temp_session = app.session_factory()
|
|
temp_session.execute('CREATE TABLE dummy (foo INT)')
|
|
temp_session.execute('DROP TABLE dummy')
|
|
temp_session.close()
|
|
|
|
return retval
|
|
|
|
return new_func
|
|
|
|
|
|
def find_user(db, name, app=None):
|
|
"""Find user in database."""
|
|
orm_user = db.query(orm.User).filter(orm.User.name == name).first()
|
|
if app is None:
|
|
return orm_user
|
|
else:
|
|
return app.users[orm_user.id]
|
|
|
|
|
|
def add_user(db, app=None, **kwargs):
|
|
"""Add a user to the database."""
|
|
orm_user = find_user(db, name=kwargs.get('name'))
|
|
if orm_user is None:
|
|
orm_user = orm.User(**kwargs)
|
|
db.add(orm_user)
|
|
else:
|
|
for attr, value in kwargs.items():
|
|
setattr(orm_user, attr, value)
|
|
db.commit()
|
|
if app:
|
|
return app.users[orm_user.id]
|
|
else:
|
|
return orm_user
|
|
|
|
|
|
def auth_header(db, name):
|
|
"""Return header with user's API authorization token."""
|
|
user = find_user(db, name)
|
|
if user is None:
|
|
user = add_user(db, name=name)
|
|
token = user.new_api_token()
|
|
return {'Authorization': 'token %s' % token}
|
|
|
|
|
|
@check_db_locks
|
|
@gen.coroutine
|
|
def api_request(app, *api_path, **kwargs):
|
|
"""Make an API request"""
|
|
base_url = app.hub.url
|
|
headers = kwargs.setdefault('headers', {})
|
|
|
|
if 'Authorization' not in headers and not kwargs.pop('noauth', False):
|
|
headers.update(auth_header(app.db, 'admin'))
|
|
|
|
url = ujoin(base_url, 'api', *api_path)
|
|
method = kwargs.pop('method', 'get')
|
|
f = getattr(async_requests, method)
|
|
resp = yield f(url, **kwargs)
|
|
assert "frame-ancestors 'self'" in resp.headers['Content-Security-Policy']
|
|
assert ujoin(app.hub.base_url, "security/csp-report") in resp.headers['Content-Security-Policy']
|
|
assert 'http' not in resp.headers['Content-Security-Policy']
|
|
return resp
|
|
|
|
|
|
# --------------------
|
|
# Authentication tests
|
|
# --------------------
|
|
|
|
|
|
@mark.gen_test
|
|
def test_auth_api(app):
|
|
db = app.db
|
|
r = yield api_request(app, 'authorizations', 'gobbledygook')
|
|
assert r.status_code == 404
|
|
|
|
# make a new cookie token
|
|
user = find_user(db, 'admin')
|
|
api_token = user.new_api_token()
|
|
|
|
# check success:
|
|
r = yield api_request(app, 'authorizations/token', api_token)
|
|
assert r.status_code == 200
|
|
reply = r.json()
|
|
assert reply['name'] == user.name
|
|
|
|
# check fail
|
|
r = yield api_request(app, 'authorizations/token', api_token,
|
|
headers={'Authorization': 'no sir'},
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
r = yield api_request(app, 'authorizations/token', api_token,
|
|
headers={'Authorization': 'token: %s' % user.cookie_id},
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
|
|
@mark.gen_test
|
|
def test_referer_check(app):
|
|
url = ujoin(public_host(app), app.hub.base_url)
|
|
host = urlparse(url).netloc
|
|
user = find_user(app.db, 'admin')
|
|
if user is None:
|
|
user = add_user(app.db, name='admin', admin=True)
|
|
cookies = yield app.login_user('admin')
|
|
|
|
r = yield api_request(app, 'users',
|
|
headers={
|
|
'Authorization': '',
|
|
'Referer': 'null',
|
|
}, cookies=cookies,
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
r = yield api_request(app, 'users',
|
|
headers={
|
|
'Authorization': '',
|
|
'Referer': 'http://attack.com/csrf/vulnerability',
|
|
}, cookies=cookies,
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
r = yield api_request(app, 'users',
|
|
headers={
|
|
'Authorization': '',
|
|
'Referer': url,
|
|
'Host': host,
|
|
}, cookies=cookies,
|
|
)
|
|
assert r.status_code == 200
|
|
|
|
r = yield api_request(app, 'users',
|
|
headers={
|
|
'Authorization': '',
|
|
'Referer': ujoin(url, 'foo/bar/baz/bat'),
|
|
'Host': host,
|
|
}, cookies=cookies,
|
|
)
|
|
assert r.status_code == 200
|
|
|
|
|
|
# --------------
|
|
# User API tests
|
|
# --------------
|
|
|
|
def normalize_timestamp(ts):
|
|
"""Normalize a timestamp
|
|
|
|
For easier comparison
|
|
"""
|
|
if ts is None:
|
|
return
|
|
return re.sub('\d(\.\d+)?', '0', ts)
|
|
|
|
|
|
def normalize_user(user):
|
|
"""Normalize a user model for comparison
|
|
|
|
smooths out user model with things like timestamps
|
|
for easier comparison
|
|
"""
|
|
for key in ('created', 'last_activity'):
|
|
user[key] = normalize_timestamp(user[key])
|
|
if 'servers' in user:
|
|
for server in user['servers'].values():
|
|
for key in ('started', 'last_activity'):
|
|
server[key] = normalize_timestamp(server[key])
|
|
server['progress_url'] = re.sub(r'.*/hub/api', 'PREFIX/hub/api', server['progress_url'])
|
|
if (isinstance(server['state'], dict)
|
|
and isinstance(server['state'].get('pid', None), int)):
|
|
server['state']['pid'] = 0
|
|
return user
|
|
|
|
def fill_user(model):
|
|
"""Fill a default user model
|
|
|
|
Any unspecified fields will be filled with the defaults
|
|
"""
|
|
model.setdefault('server', None)
|
|
model.setdefault('kind', 'user')
|
|
model.setdefault('groups', [])
|
|
model.setdefault('admin', False)
|
|
model.setdefault('server', None)
|
|
model.setdefault('pending', None)
|
|
model.setdefault('created', TIMESTAMP)
|
|
model.setdefault('last_activity', TIMESTAMP)
|
|
model.setdefault('servers', {})
|
|
return model
|
|
|
|
|
|
TIMESTAMP = normalize_timestamp(datetime.now().isoformat() + 'Z')
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_get_users(app):
|
|
db = app.db
|
|
r = yield api_request(app, 'users')
|
|
assert r.status_code == 200
|
|
|
|
users = sorted(r.json(), key=lambda d: d['name'])
|
|
users = [ normalize_user(u) for u in users ]
|
|
assert users == [
|
|
fill_user({
|
|
'name': 'admin',
|
|
'admin': True,
|
|
}),
|
|
fill_user({
|
|
'name': 'user',
|
|
'admin': False,
|
|
'last_activity': None,
|
|
}),
|
|
]
|
|
|
|
r = yield api_request(app, 'users',
|
|
headers=auth_header(db, 'user'),
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_get_self(app):
|
|
db = app.db
|
|
|
|
# basic get self
|
|
r = yield api_request(app, 'user')
|
|
r.raise_for_status()
|
|
assert r.json()['kind'] == 'user'
|
|
|
|
# identifying user via oauth token works
|
|
u = add_user(db, app=app, name='orpheus')
|
|
token = uuid.uuid4().hex
|
|
oauth_client = orm.OAuthClient(identifier='eurydice')
|
|
db.add(oauth_client)
|
|
db.commit()
|
|
oauth_token = orm.OAuthAccessToken(
|
|
user=u.orm_user,
|
|
client=oauth_client,
|
|
token=token,
|
|
grant_type=orm.GrantType.authorization_code,
|
|
)
|
|
db.add(oauth_token)
|
|
db.commit()
|
|
r = yield api_request(app, 'user', headers={
|
|
'Authorization': 'token ' + token,
|
|
})
|
|
r.raise_for_status()
|
|
model = r.json()
|
|
assert model['name'] == u.name
|
|
|
|
# invalid auth gets 403
|
|
r = yield api_request(app, 'user', headers={
|
|
'Authorization': 'token notvalid',
|
|
})
|
|
assert r.status_code == 403
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_user(app):
|
|
db = app.db
|
|
name = 'newuser'
|
|
r = yield api_request(app, 'users', name, method='post')
|
|
assert r.status_code == 201
|
|
user = find_user(db, name)
|
|
assert user is not None
|
|
assert user.name == name
|
|
assert not user.admin
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_get_user(app):
|
|
name = 'user'
|
|
r = yield api_request(app, 'users', name)
|
|
assert r.status_code == 200
|
|
|
|
user = normalize_user(r.json())
|
|
assert user == fill_user({'name': name, 'auth_state': None})
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_multi_user_bad(app):
|
|
r = yield api_request(app, 'users', method='post')
|
|
assert r.status_code == 400
|
|
r = yield api_request(app, 'users', method='post', data='{}')
|
|
assert r.status_code == 400
|
|
r = yield api_request(app, 'users', method='post', data='[]')
|
|
assert r.status_code == 400
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_multi_user_invalid(app):
|
|
app.authenticator.username_pattern = r'w.*'
|
|
r = yield api_request(app, 'users', method='post',
|
|
data=json.dumps({'usernames': ['Willow', 'Andrew', 'Tara']})
|
|
)
|
|
app.authenticator.username_pattern = ''
|
|
assert r.status_code == 400
|
|
assert r.json()['message'] == 'Invalid usernames: andrew, tara'
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_multi_user(app):
|
|
db = app.db
|
|
names = ['a', 'b']
|
|
r = yield api_request(app, 'users', method='post',
|
|
data=json.dumps({'usernames': names}),
|
|
)
|
|
assert r.status_code == 201
|
|
reply = r.json()
|
|
r_names = [ user['name'] for user in reply ]
|
|
assert names == r_names
|
|
|
|
for name in names:
|
|
user = find_user(db, name)
|
|
assert user is not None
|
|
assert user.name == name
|
|
assert not user.admin
|
|
|
|
# try to create the same users again
|
|
r = yield api_request(app, 'users', method='post',
|
|
data=json.dumps({'usernames': names}),
|
|
)
|
|
assert r.status_code == 409
|
|
|
|
names = ['a', 'b', 'ab']
|
|
|
|
# try to create the same users again
|
|
r = yield api_request(app, 'users', method='post',
|
|
data=json.dumps({'usernames': names}),
|
|
)
|
|
assert r.status_code == 201
|
|
reply = r.json()
|
|
r_names = [ user['name'] for user in reply ]
|
|
assert r_names == ['ab']
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_multi_user_admin(app):
|
|
db = app.db
|
|
names = ['c', 'd']
|
|
r = yield api_request(app, 'users', method='post',
|
|
data=json.dumps({'usernames': names, 'admin': True}),
|
|
)
|
|
assert r.status_code == 201
|
|
reply = r.json()
|
|
r_names = [ user['name'] for user in reply ]
|
|
assert names == r_names
|
|
|
|
for name in names:
|
|
user = find_user(db, name)
|
|
assert user is not None
|
|
assert user.name == name
|
|
assert user.admin
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_user_bad(app):
|
|
db = app.db
|
|
name = 'dne_newuser'
|
|
r = yield api_request(app, 'users', name, method='post')
|
|
assert r.status_code == 400
|
|
user = find_user(db, name)
|
|
assert user is None
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_user_duplicate(app):
|
|
db = app.db
|
|
name = 'user'
|
|
user = find_user(db, name)
|
|
# double-check that it exists
|
|
assert user is not None
|
|
r = yield api_request(app, 'users', name, method='post')
|
|
# special 409 conflict for creating a user that already exists
|
|
assert r.status_code == 409
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_add_admin(app):
|
|
db = app.db
|
|
name = 'newadmin'
|
|
r = yield api_request(app, 'users', name, method='post',
|
|
data=json.dumps({'admin': True}),
|
|
)
|
|
assert r.status_code == 201
|
|
user = find_user(db, name)
|
|
assert user is not None
|
|
assert user.name == name
|
|
assert user.admin
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_delete_user(app):
|
|
db = app.db
|
|
mal = add_user(db, name='mal')
|
|
r = yield api_request(app, 'users', 'mal', method='delete')
|
|
assert r.status_code == 204
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_make_admin(app):
|
|
db = app.db
|
|
name = 'admin2'
|
|
r = yield api_request(app, 'users', name, method='post')
|
|
assert r.status_code == 201
|
|
user = find_user(db, name)
|
|
assert user is not None
|
|
assert user.name == name
|
|
assert not user.admin
|
|
|
|
r = yield api_request(app, 'users', name, method='patch',
|
|
data=json.dumps({'admin': True})
|
|
)
|
|
assert r.status_code == 200
|
|
user = find_user(db, name)
|
|
assert user is not None
|
|
assert user.name == name
|
|
assert user.admin
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_set_auth_state(app, auth_state_enabled):
|
|
auth_state = {'secret': 'hello'}
|
|
db = app.db
|
|
name = 'admin'
|
|
user = find_user(db, name, app=app)
|
|
assert user is not None
|
|
assert user.name == name
|
|
|
|
r = yield api_request(app, 'users', name, method='patch',
|
|
data=json.dumps({'auth_state': auth_state})
|
|
)
|
|
|
|
assert r.status_code == 200
|
|
users_auth_state = yield user.get_auth_state()
|
|
assert users_auth_state == auth_state
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_user_set_auth_state(app, auth_state_enabled):
|
|
auth_state = {'secret': 'hello'}
|
|
db = app.db
|
|
name = 'user'
|
|
user = find_user(db, name, app=app)
|
|
assert user is not None
|
|
assert user.name == name
|
|
user_auth_state = yield user.get_auth_state()
|
|
assert user_auth_state is None
|
|
|
|
r = yield api_request(
|
|
app, 'users', name, method='patch',
|
|
data=json.dumps({'auth_state': auth_state}),
|
|
headers=auth_header(app.db, name),
|
|
)
|
|
|
|
assert r.status_code == 403
|
|
user_auth_state = yield user.get_auth_state()
|
|
assert user_auth_state is None
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_admin_get_auth_state(app, auth_state_enabled):
|
|
auth_state = {'secret': 'hello'}
|
|
db = app.db
|
|
name = 'admin'
|
|
user = find_user(db, name, app=app)
|
|
assert user is not None
|
|
assert user.name == name
|
|
yield user.save_auth_state(auth_state)
|
|
|
|
r = yield api_request(app, 'users', name)
|
|
|
|
assert r.status_code == 200
|
|
assert r.json()['auth_state'] == auth_state
|
|
|
|
|
|
@mark.user
|
|
@mark.gen_test
|
|
def test_user_get_auth_state(app, auth_state_enabled):
|
|
# explicitly check that a user will not get their own auth state via the API
|
|
auth_state = {'secret': 'hello'}
|
|
db = app.db
|
|
name = 'user'
|
|
user = find_user(db, name, app=app)
|
|
assert user is not None
|
|
assert user.name == name
|
|
yield user.save_auth_state(auth_state)
|
|
|
|
r = yield api_request(app, 'users', name,
|
|
headers=auth_header(app.db, name))
|
|
|
|
assert r.status_code == 200
|
|
assert 'auth_state' not in r.json()
|
|
|
|
|
|
@mark.gen_test
|
|
def test_spawn(app):
|
|
db = app.db
|
|
name = 'wash'
|
|
user = add_user(db, app=app, name=name)
|
|
options = {
|
|
's': ['value'],
|
|
'i': 5,
|
|
}
|
|
before_servers = sorted(db.query(orm.Server), key=lambda s: s.url)
|
|
r = yield api_request(app, 'users', name, 'server', method='post',
|
|
data=json.dumps(options),
|
|
)
|
|
assert r.status_code == 201
|
|
assert 'pid' in user.orm_spawners[''].state
|
|
app_user = app.users[name]
|
|
assert app_user.spawner is not None
|
|
spawner = app_user.spawner
|
|
assert app_user.spawner.user_options == options
|
|
assert not app_user.spawner._spawn_pending
|
|
status = yield app_user.spawner.poll()
|
|
assert status is None
|
|
|
|
assert spawner.server.base_url == ujoin(app.base_url, 'user/%s' % name) + '/'
|
|
url = public_url(app, user)
|
|
r = yield async_requests.get(url)
|
|
assert r.status_code == 200
|
|
assert r.text == spawner.server.base_url
|
|
|
|
r = yield async_requests.get(ujoin(url, 'args'))
|
|
assert r.status_code == 200
|
|
argv = r.json()
|
|
assert '--port' in ' '.join(argv)
|
|
r = yield async_requests.get(ujoin(url, 'env'))
|
|
env = r.json()
|
|
for expected in ['JUPYTERHUB_USER', 'JUPYTERHUB_BASE_URL', 'JUPYTERHUB_API_TOKEN']:
|
|
assert expected in env
|
|
if app.subdomain_host:
|
|
assert env['JUPYTERHUB_HOST'] == app.subdomain_host
|
|
|
|
r = yield api_request(app, 'users', name, 'server', method='delete')
|
|
assert r.status_code == 204
|
|
|
|
assert 'pid' not in user.orm_spawners[''].state
|
|
status = yield app_user.spawner.poll()
|
|
assert status == 0
|
|
|
|
# check that we cleaned up after ourselves
|
|
assert spawner.server is None
|
|
after_servers = sorted(db.query(orm.Server), key=lambda s: s.url)
|
|
assert before_servers == after_servers
|
|
tokens = list(db.query(orm.APIToken).filter(orm.APIToken.user_id == user.id))
|
|
assert tokens == []
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
|
|
|
|
@mark.slow
|
|
@mark.gen_test
|
|
def test_slow_spawn(app, no_patience, slow_spawn):
|
|
db = app.db
|
|
name = 'zoe'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
assert r.status_code == 202
|
|
assert app_user.spawner is not None
|
|
assert app_user.spawner._spawn_pending
|
|
assert not app_user.spawner._stop_pending
|
|
assert app.users.count_active_users()['pending'] == 1
|
|
|
|
@gen.coroutine
|
|
def wait_spawn():
|
|
while not app_user.running:
|
|
yield gen.sleep(0.1)
|
|
|
|
yield wait_spawn()
|
|
assert not app_user.spawner._spawn_pending
|
|
status = yield app_user.spawner.poll()
|
|
assert status is None
|
|
|
|
@gen.coroutine
|
|
def wait_stop():
|
|
while app_user.spawner._stop_pending:
|
|
yield gen.sleep(0.1)
|
|
|
|
r = yield api_request(app, 'users', name, 'server', method='delete')
|
|
r.raise_for_status()
|
|
assert r.status_code == 202
|
|
assert app_user.spawner is not None
|
|
assert app_user.spawner._stop_pending
|
|
|
|
r = yield api_request(app, 'users', name, 'server', method='delete')
|
|
r.raise_for_status()
|
|
assert r.status_code == 202
|
|
assert app_user.spawner is not None
|
|
assert app_user.spawner._stop_pending
|
|
|
|
yield wait_stop()
|
|
assert not app_user.spawner._stop_pending
|
|
assert app_user.spawner is not None
|
|
r = yield api_request(app, 'users', name, 'server', method='delete')
|
|
assert r.status_code == 400
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
assert app.users.count_active_users()['active'] == 0
|
|
|
|
|
|
@mark.gen_test
|
|
def test_never_spawn(app, no_patience, never_spawn):
|
|
db = app.db
|
|
name = 'badger'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert app_user.spawner is not None
|
|
assert app_user.spawner._spawn_pending
|
|
assert app.users.count_active_users()['pending'] == 1
|
|
|
|
while app_user.spawner.pending:
|
|
yield gen.sleep(0.1)
|
|
print(app_user.spawner.pending)
|
|
|
|
assert not app_user.spawner._spawn_pending
|
|
status = yield app_user.spawner.poll()
|
|
assert status is not None
|
|
# failed spawn should decrements pending count
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
|
|
|
|
@mark.gen_test
|
|
def test_bad_spawn(app, no_patience, bad_spawn):
|
|
db = app.db
|
|
name = 'prim'
|
|
user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert r.status_code == 500
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
|
|
|
|
@mark.gen_test
|
|
def test_slow_bad_spawn(app, no_patience, slow_bad_spawn):
|
|
db = app.db
|
|
name = 'zaphod'
|
|
user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
while user.spawner.pending:
|
|
yield gen.sleep(0.1)
|
|
# spawn failed
|
|
assert not user.running
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
|
|
|
|
def next_event(it):
|
|
"""read an event from an eventstream"""
|
|
while True:
|
|
try:
|
|
line = next(it)
|
|
except StopIteration:
|
|
return
|
|
if line.startswith('data:'):
|
|
return json.loads(line.split(':', 1)[1])
|
|
|
|
@mark.slow
|
|
@mark.gen_test
|
|
def test_progress(request, app, no_patience, slow_spawn):
|
|
db = app.db
|
|
name = 'martin'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
r = yield api_request(app, 'users', name, 'server/progress', stream=True)
|
|
r.raise_for_status()
|
|
request.addfinalizer(r.close)
|
|
ex = async_requests.executor
|
|
line_iter = iter(r.iter_lines(decode_unicode=True))
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt == {
|
|
'progress': 0,
|
|
'message': 'Server requested',
|
|
}
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt == {
|
|
'progress': 50,
|
|
'message': 'Spawning server...',
|
|
}
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
url = app_user.url
|
|
assert evt == {
|
|
'progress': 100,
|
|
'message': 'Server ready at {}'.format(url),
|
|
'html_message': 'Server ready at <a href="{0}">{0}</a>'.format(url),
|
|
'url': url,
|
|
'ready': True,
|
|
}
|
|
|
|
|
|
@mark.gen_test
|
|
def test_progress_not_started(request, app):
|
|
db = app.db
|
|
name = 'nope'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
r = yield api_request(app, 'users', name, 'server', method='delete')
|
|
r.raise_for_status()
|
|
r = yield api_request(app, 'users', name, 'server/progress')
|
|
assert r.status_code == 404
|
|
|
|
|
|
@mark.gen_test
|
|
def test_progress_not_found(request, app):
|
|
db = app.db
|
|
name = 'noserver'
|
|
r = yield api_request(app, 'users', 'nosuchuser', 'server/progress')
|
|
assert r.status_code == 404
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server/progress')
|
|
assert r.status_code == 404
|
|
|
|
|
|
@mark.gen_test
|
|
def test_progress_ready(request, app):
|
|
"""Test progress API when spawner is already started
|
|
|
|
e.g. a race between requesting progress and progress already being complete
|
|
"""
|
|
db = app.db
|
|
name = 'saga'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
r = yield api_request(app, 'users', name, 'server/progress', stream=True)
|
|
r.raise_for_status()
|
|
request.addfinalizer(r.close)
|
|
ex = async_requests.executor
|
|
line_iter = iter(r.iter_lines(decode_unicode=True))
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt['progress'] == 100
|
|
assert evt['ready']
|
|
assert evt['url'] == app_user.url
|
|
|
|
|
|
@mark.gen_test
|
|
def test_progress_bad(request, app, no_patience, bad_spawn):
|
|
"""Test progress API when spawner has already failed"""
|
|
db = app.db
|
|
name = 'simon'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert r.status_code == 500
|
|
r = yield api_request(app, 'users', name, 'server/progress', stream=True)
|
|
r.raise_for_status()
|
|
request.addfinalizer(r.close)
|
|
ex = async_requests.executor
|
|
line_iter = iter(r.iter_lines(decode_unicode=True))
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt == {
|
|
'progress': 100,
|
|
'failed': True,
|
|
'message': "Spawn failed: I don't work!",
|
|
}
|
|
|
|
|
|
@mark.gen_test
|
|
def test_progress_bad_slow(request, app, no_patience, slow_bad_spawn):
|
|
"""Test progress API when spawner fails while watching"""
|
|
db = app.db
|
|
name = 'eugene'
|
|
app_user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert r.status_code == 202
|
|
r = yield api_request(app, 'users', name, 'server/progress', stream=True)
|
|
r.raise_for_status()
|
|
request.addfinalizer(r.close)
|
|
ex = async_requests.executor
|
|
line_iter = iter(r.iter_lines(decode_unicode=True))
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt['progress'] == 0
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt['progress'] == 50
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt == {
|
|
'progress': 100,
|
|
'failed': True,
|
|
'message': "Spawn failed: I don't work!",
|
|
}
|
|
|
|
|
|
@async_generator
|
|
async def progress_forever():
|
|
"""progress function that yields messages forever"""
|
|
for i in range(1, 10):
|
|
await yield_({
|
|
'progress': i,
|
|
'message': 'Stage %s' % i,
|
|
})
|
|
# wait a long time before the next event
|
|
await gen.sleep(10)
|
|
|
|
|
|
if sys.version_info >= (3, 6):
|
|
# additional progress_forever defined as native
|
|
# async generator
|
|
# to test for issues with async_generator wrappers
|
|
exec("""
|
|
async def progress_forever_native():
|
|
for i in range(1, 10):
|
|
yield {
|
|
'progress': i,
|
|
'message': 'Stage %s' % i,
|
|
}
|
|
# wait a long time before the next event
|
|
await gen.sleep(10)
|
|
""", globals())
|
|
|
|
|
|
@mark.gen_test
|
|
def test_spawn_progress_cutoff(request, app, no_patience, slow_spawn):
|
|
"""Progress events stop when Spawner finishes
|
|
|
|
even if progress iterator is still going.
|
|
"""
|
|
db = app.db
|
|
name = 'geddy'
|
|
app_user = add_user(db, app=app, name=name)
|
|
if sys.version_info >= (3, 6):
|
|
# Python >= 3.6, try native async generator
|
|
app_user.spawner.progress = globals()['progress_forever_native']
|
|
else:
|
|
app_user.spawner.progress = progress_forever
|
|
app_user.spawner.delay = 1
|
|
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
r = yield api_request(app, 'users', name, 'server/progress', stream=True)
|
|
r.raise_for_status()
|
|
request.addfinalizer(r.close)
|
|
ex = async_requests.executor
|
|
line_iter = iter(r.iter_lines(decode_unicode=True))
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt['progress'] == 0
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt == {
|
|
'progress': 1,
|
|
'message': 'Stage 1',
|
|
}
|
|
evt = yield ex.submit(next_event, line_iter)
|
|
assert evt['progress'] == 100
|
|
|
|
|
|
@mark.gen_test
|
|
def test_spawn_limit(app, no_patience, slow_spawn, request):
|
|
db = app.db
|
|
p = mock.patch.dict(app.tornado_settings,
|
|
{'concurrent_spawn_limit': 2})
|
|
p.start()
|
|
request.addfinalizer(p.stop)
|
|
|
|
# start two pending spawns
|
|
names = ['ykka', 'hjarka']
|
|
users = [ add_user(db, app=app, name=name) for name in names ]
|
|
users[0].spawner._start_future = Future()
|
|
users[1].spawner._start_future = Future()
|
|
for name in names:
|
|
yield api_request(app, 'users', name, 'server', method='post')
|
|
assert app.users.count_active_users()['pending'] == 2
|
|
|
|
# ykka and hjarka's spawns are both pending. Essun should fail with 429
|
|
name = 'essun'
|
|
user = add_user(db, app=app, name=name)
|
|
user.spawner._start_future = Future()
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert r.status_code == 429
|
|
|
|
# allow ykka to start
|
|
users[0].spawner._start_future.set_result(None)
|
|
# wait for ykka to finish
|
|
while not users[0].running:
|
|
yield gen.sleep(0.1)
|
|
|
|
assert app.users.count_active_users()['pending'] == 1
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
assert app.users.count_active_users()['pending'] == 2
|
|
users.append(user)
|
|
# allow hjarka and essun to finish starting
|
|
for user in users[1:]:
|
|
user.spawner._start_future.set_result(None)
|
|
while not all(u.running for u in users):
|
|
yield gen.sleep(0.1)
|
|
|
|
# everybody's running, pending count should be back to 0
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
for u in users:
|
|
u.spawner.delay = 0
|
|
r = yield api_request(app, 'users', u.name, 'server', method='delete')
|
|
r.raise_for_status()
|
|
while any(u.spawner.active for u in users):
|
|
yield gen.sleep(0.1)
|
|
|
|
@mark.slow
|
|
@mark.gen_test
|
|
def test_active_server_limit(app, request):
|
|
db = app.db
|
|
p = mock.patch.dict(app.tornado_settings,
|
|
{'active_server_limit': 2})
|
|
p.start()
|
|
request.addfinalizer(p.stop)
|
|
|
|
# start two pending spawns
|
|
names = ['ykka', 'hjarka']
|
|
users = [ add_user(db, app=app, name=name) for name in names ]
|
|
for name in names:
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
counts = app.users.count_active_users()
|
|
assert counts['active'] == 2
|
|
assert counts['ready'] == 2
|
|
assert counts['pending'] == 0
|
|
|
|
# ykka and hjarka's servers are running. Essun should fail with 429
|
|
name = 'essun'
|
|
user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert r.status_code == 429
|
|
counts = app.users.count_active_users()
|
|
assert counts['active'] == 2
|
|
assert counts['ready'] == 2
|
|
assert counts['pending'] == 0
|
|
|
|
# stop one server
|
|
yield api_request(app, 'users', names[0], 'server', method='delete')
|
|
counts = app.users.count_active_users()
|
|
assert counts['active'] == 1
|
|
assert counts['ready'] == 1
|
|
assert counts['pending'] == 0
|
|
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
r.raise_for_status()
|
|
counts = app.users.count_active_users()
|
|
assert counts['active'] == 2
|
|
assert counts['ready'] == 2
|
|
assert counts['pending'] == 0
|
|
users.append(user)
|
|
|
|
# everybody's running, pending count should be back to 0
|
|
assert app.users.count_active_users()['pending'] == 0
|
|
for u in users:
|
|
if not u.spawner.active:
|
|
continue
|
|
r = yield api_request(app, 'users', u.name, 'server', method='delete')
|
|
r.raise_for_status()
|
|
|
|
counts = app.users.count_active_users()
|
|
assert counts['active'] == 0
|
|
assert counts['ready'] == 0
|
|
assert counts['pending'] == 0
|
|
|
|
@mark.slow
|
|
@mark.gen_test
|
|
def test_start_stop_race(app, no_patience, slow_spawn):
|
|
user = add_user(app.db, app, name='panda')
|
|
spawner = user.spawner
|
|
# start the server
|
|
r = yield api_request(app, 'users', user.name, 'server', method='post')
|
|
assert r.status_code == 202
|
|
assert spawner.pending == 'spawn'
|
|
# additional spawns while spawning shouldn't trigger a new spawn
|
|
with mock.patch.object(spawner, 'start') as m:
|
|
r = yield api_request(app, 'users', user.name, 'server', method='post')
|
|
assert r.status_code == 202
|
|
assert m.call_count == 0
|
|
|
|
# stop while spawning is not okay
|
|
r = yield api_request(app, 'users', user.name, 'server', method='delete')
|
|
assert r.status_code == 400
|
|
while not spawner.ready:
|
|
yield gen.sleep(0.1)
|
|
|
|
spawner.delay = 3
|
|
# stop the spawner
|
|
r = yield api_request(app, 'users', user.name, 'server', method='delete')
|
|
assert r.status_code == 202
|
|
assert spawner.pending == 'stop'
|
|
# make sure we get past deleting from the proxy
|
|
yield gen.sleep(1)
|
|
# additional stops while stopping shouldn't trigger a new stop
|
|
with mock.patch.object(spawner, 'stop') as m:
|
|
r = yield api_request(app, 'users', user.name, 'server', method='delete')
|
|
assert r.status_code == 202
|
|
assert m.call_count == 0
|
|
# start while stopping is not allowed
|
|
with mock.patch.object(spawner, 'start') as m:
|
|
r = yield api_request(app, 'users', user.name, 'server', method='post')
|
|
assert r.status_code == 400
|
|
|
|
while spawner.active:
|
|
yield gen.sleep(0.1)
|
|
# start after stop is okay
|
|
r = yield api_request(app, 'users', user.name, 'server', method='post')
|
|
assert r.status_code == 202
|
|
|
|
|
|
@mark.gen_test
|
|
def test_get_proxy(app):
|
|
r = yield api_request(app, 'proxy')
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert list(reply.keys()) == [app.hub.routespec]
|
|
|
|
|
|
@mark.gen_test
|
|
def test_cookie(app):
|
|
db = app.db
|
|
name = 'patience'
|
|
user = add_user(db, app=app, name=name)
|
|
r = yield api_request(app, 'users', name, 'server', method='post')
|
|
assert r.status_code == 201
|
|
assert 'pid' in user.orm_spawners[''].state
|
|
app_user = app.users[name]
|
|
|
|
cookies = yield app.login_user(name)
|
|
cookie_name = app.hub.cookie_name
|
|
# cookie jar gives '"cookie-value"', we want 'cookie-value'
|
|
cookie = cookies[cookie_name][1:-1]
|
|
r = yield api_request(app, 'authorizations/cookie',
|
|
cookie_name, "nothintoseehere",
|
|
)
|
|
assert r.status_code == 404
|
|
|
|
r = yield api_request(app, 'authorizations/cookie',
|
|
cookie_name, quote(cookie, safe=''),
|
|
)
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['name'] == name
|
|
|
|
# deprecated cookie in body:
|
|
r = yield api_request(app, 'authorizations/cookie',
|
|
cookie_name, data=cookie,
|
|
)
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['name'] == name
|
|
|
|
|
|
def normalize_token(token):
|
|
for key in ('created', 'last_activity'):
|
|
token[key] = normalize_timestamp(token[key])
|
|
return token
|
|
|
|
|
|
@mark.gen_test
|
|
def test_check_token(app):
|
|
name = 'book'
|
|
user = add_user(app.db, app=app, name=name)
|
|
token = user.new_api_token()
|
|
r = yield api_request(app, 'authorizations/token', token)
|
|
r.raise_for_status()
|
|
user_model = r.json()
|
|
assert user_model['name'] == name
|
|
r = yield api_request(app, 'authorizations/token', 'notauthorized')
|
|
assert r.status_code == 404
|
|
|
|
|
|
@mark.gen_test
|
|
@mark.parametrize("headers, status", [
|
|
({}, 200),
|
|
({'Authorization': 'token bad'}, 403),
|
|
])
|
|
def test_get_new_token_deprecated(app, headers, status):
|
|
# request a new token
|
|
r = yield api_request(app, 'authorizations', 'token',
|
|
method='post',
|
|
headers=headers,
|
|
)
|
|
assert r.status_code == status
|
|
if status != 200:
|
|
return
|
|
reply = r.json()
|
|
assert 'token' in reply
|
|
r = yield api_request(app, 'authorizations', 'token', reply['token'])
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['name'] == 'admin'
|
|
|
|
|
|
@mark.gen_test
|
|
def test_token_formdata_deprecated(app):
|
|
"""Create a token for a user with formdata and no auth header"""
|
|
data = {
|
|
'username': 'fake',
|
|
'password': 'fake',
|
|
}
|
|
r = yield api_request(app, 'authorizations', 'token',
|
|
method='post',
|
|
data=json.dumps(data) if data else None,
|
|
noauth=True,
|
|
)
|
|
assert r.status_code == 200
|
|
reply = r.json()
|
|
assert 'token' in reply
|
|
r = yield api_request(app, 'authorizations', 'token', reply['token'])
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['name'] == data['username']
|
|
|
|
|
|
@mark.gen_test
|
|
@mark.parametrize("as_user, for_user, status", [
|
|
('admin', 'other', 200),
|
|
('admin', 'missing', 400),
|
|
('user', 'other', 403),
|
|
('user', 'user', 200),
|
|
])
|
|
def test_token_as_user_deprecated(app, as_user, for_user, status):
|
|
# ensure both users exist
|
|
u = add_user(app.db, app, name=as_user)
|
|
if for_user != 'missing':
|
|
add_user(app.db, app, name=for_user)
|
|
data = {'username': for_user}
|
|
headers = {
|
|
'Authorization': 'token %s' % u.new_api_token(),
|
|
}
|
|
r = yield api_request(app, 'authorizations', 'token',
|
|
method='post',
|
|
data=json.dumps(data),
|
|
headers=headers,
|
|
)
|
|
assert r.status_code == status
|
|
reply = r.json()
|
|
if status != 200:
|
|
return
|
|
assert 'token' in reply
|
|
r = yield api_request(app, 'authorizations', 'token', reply['token'])
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['name'] == data['username']
|
|
|
|
|
|
@mark.gen_test
|
|
@mark.parametrize("headers, status, note", [
|
|
({}, 200, 'test note'),
|
|
({}, 200, ''),
|
|
({'Authorization': 'token bad'}, 403, ''),
|
|
])
|
|
def test_get_new_token(app, headers, status, note):
|
|
if note:
|
|
body = json.dumps({'note': note})
|
|
else:
|
|
body = ''
|
|
# request a new token
|
|
r = yield api_request(app, 'users/admin/tokens',
|
|
method='post',
|
|
headers=headers,
|
|
data=body,
|
|
)
|
|
assert r.status_code == status
|
|
if status != 200:
|
|
return
|
|
# check the new-token reply
|
|
reply = r.json()
|
|
assert 'token' in reply
|
|
assert reply['user'] == 'admin'
|
|
assert reply['created']
|
|
assert 'last_activity' in reply
|
|
if note:
|
|
assert reply['note'] == note
|
|
else:
|
|
assert reply['note'] == 'Requested via api'
|
|
token_id = reply['id']
|
|
initial = normalize_token(reply)
|
|
# pop token for later comparison
|
|
initial.pop('token')
|
|
|
|
# check the validity of the new token
|
|
r = yield api_request(app, 'users/admin/tokens', token_id)
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert normalize_token(reply) == initial
|
|
|
|
# delete the token
|
|
r = yield api_request(app, 'users/admin/tokens', token_id,
|
|
method='delete')
|
|
assert r.status_code == 204
|
|
# verify deletion
|
|
r = yield api_request(app, 'users/admin/tokens', token_id)
|
|
assert r.status_code == 404
|
|
|
|
|
|
@mark.gen_test
|
|
@mark.parametrize("as_user, for_user, status", [
|
|
('admin', 'other', 200),
|
|
('admin', 'missing', 404),
|
|
('user', 'other', 403),
|
|
('user', 'user', 200),
|
|
])
|
|
def test_token_for_user(app, as_user, for_user, status):
|
|
# ensure both users exist
|
|
u = add_user(app.db, app, name=as_user)
|
|
if for_user != 'missing':
|
|
add_user(app.db, app, name=for_user)
|
|
data = {'username': for_user}
|
|
headers = {
|
|
'Authorization': 'token %s' % u.new_api_token(),
|
|
}
|
|
r = yield api_request(app, 'users', for_user, 'tokens',
|
|
method='post',
|
|
data=json.dumps(data),
|
|
headers=headers,
|
|
)
|
|
assert r.status_code == status
|
|
reply = r.json()
|
|
if status != 200:
|
|
return
|
|
assert 'token' in reply
|
|
token_id = reply['id']
|
|
r = yield api_request(app, 'users', for_user, 'tokens', token_id,
|
|
headers=headers,
|
|
)
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['user'] == for_user
|
|
if for_user == as_user:
|
|
note = 'Requested via api'
|
|
else:
|
|
note = 'Requested via api by user %s' % as_user
|
|
assert reply['note'] == note
|
|
|
|
|
|
# delete the token
|
|
r = yield api_request(app, 'users', for_user, 'tokens', token_id,
|
|
method='delete',
|
|
headers=headers,
|
|
)
|
|
|
|
assert r.status_code == 204
|
|
r = yield api_request(app, 'users', for_user, 'tokens', token_id,
|
|
headers=headers,
|
|
)
|
|
assert r.status_code == 404
|
|
|
|
|
|
@mark.gen_test
|
|
def test_token_authenticator_noauth(app):
|
|
"""Create a token for a user relying on Authenticator.authenticate and no auth header"""
|
|
name = 'user'
|
|
data = {
|
|
'auth': {
|
|
'username': name,
|
|
'password': name,
|
|
},
|
|
}
|
|
r = yield api_request(app, 'users', name, 'tokens',
|
|
method='post',
|
|
data=json.dumps(data) if data else None,
|
|
noauth=True,
|
|
)
|
|
assert r.status_code == 200
|
|
reply = r.json()
|
|
assert 'token' in reply
|
|
r = yield api_request(app, 'authorizations', 'token', reply['token'])
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply['name'] == name
|
|
|
|
|
|
@mark.gen_test
|
|
@mark.parametrize("as_user, for_user, status", [
|
|
('admin', 'other', 200),
|
|
('admin', 'missing', 404),
|
|
('user', 'other', 403),
|
|
('user', 'user', 200),
|
|
])
|
|
def test_token_list(app, as_user, for_user, status):
|
|
u = add_user(app.db, app, name=as_user)
|
|
if for_user != 'missing':
|
|
for_user_obj = add_user(app.db, app, name=for_user)
|
|
headers = {
|
|
'Authorization': 'token %s' % u.new_api_token(),
|
|
}
|
|
r = yield api_request(app, 'users', for_user, 'tokens',
|
|
headers=headers,
|
|
)
|
|
assert r.status_code == status
|
|
if status != 200:
|
|
return
|
|
reply = r.json()
|
|
assert sorted(reply) == ['api_tokens', 'oauth_tokens']
|
|
assert len(reply['api_tokens']) == len(for_user_obj.api_tokens)
|
|
assert all(token['user'] == for_user for token in reply['api_tokens'])
|
|
assert all(token['user'] == for_user for token in reply['oauth_tokens'])
|
|
# validate individual token ids
|
|
for token in reply['api_tokens'] + reply['oauth_tokens']:
|
|
r = yield api_request(app, 'users', for_user, 'tokens', token['id'],
|
|
headers=headers,
|
|
)
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert normalize_token(reply) == normalize_token(token)
|
|
|
|
|
|
# ---------------
|
|
# Group API tests
|
|
# ---------------
|
|
|
|
|
|
@mark.group
|
|
@mark.gen_test
|
|
def test_groups_list(app):
|
|
r = yield api_request(app, 'groups')
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply == []
|
|
|
|
# create a group
|
|
group = orm.Group(name='alphaflight')
|
|
app.db.add(group)
|
|
app.db.commit()
|
|
|
|
r = yield api_request(app, 'groups')
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply == [{
|
|
'kind': 'group',
|
|
'name': 'alphaflight',
|
|
'users': []
|
|
}]
|
|
|
|
|
|
@mark.group
|
|
@mark.gen_test
|
|
def test_add_multi_group(app):
|
|
db = app.db
|
|
names = ['group1', 'group2']
|
|
r = yield api_request(app, 'groups', method='post',
|
|
data=json.dumps({'groups': names}),
|
|
)
|
|
assert r.status_code == 201
|
|
reply = r.json()
|
|
r_names = [group['name'] for group in reply]
|
|
assert names == r_names
|
|
|
|
# try to create the same groups again
|
|
r = yield api_request(app, 'groups', method='post',
|
|
data=json.dumps({'groups': names}),
|
|
)
|
|
assert r.status_code == 409
|
|
|
|
|
|
@mark.group
|
|
@mark.gen_test
|
|
def test_group_get(app):
|
|
group = orm.Group.find(app.db, name='alphaflight')
|
|
user = add_user(app.db, app=app, name='sasquatch')
|
|
group.users.append(user)
|
|
app.db.commit()
|
|
|
|
r = yield api_request(app, 'groups/runaways')
|
|
assert r.status_code == 404
|
|
|
|
r = yield api_request(app, 'groups/alphaflight')
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert reply == {
|
|
'kind': 'group',
|
|
'name': 'alphaflight',
|
|
'users': ['sasquatch']
|
|
}
|
|
|
|
|
|
@mark.group
|
|
@mark.gen_test
|
|
def test_group_create_delete(app):
|
|
db = app.db
|
|
r = yield api_request(app, 'groups/runaways', method='delete')
|
|
assert r.status_code == 404
|
|
|
|
r = yield api_request(app, 'groups/new', method='post',
|
|
data=json.dumps({'users': ['doesntexist']}),
|
|
)
|
|
assert r.status_code == 400
|
|
assert orm.Group.find(db, name='new') is None
|
|
|
|
r = yield api_request(app, 'groups/omegaflight', method='post',
|
|
data=json.dumps({'users': ['sasquatch']}),
|
|
)
|
|
r.raise_for_status()
|
|
|
|
omegaflight = orm.Group.find(db, name='omegaflight')
|
|
sasquatch = find_user(db, name='sasquatch')
|
|
assert omegaflight in sasquatch.groups
|
|
assert sasquatch in omegaflight.users
|
|
|
|
# create duplicate raises 400
|
|
r = yield api_request(app, 'groups/omegaflight', method='post')
|
|
assert r.status_code == 409
|
|
|
|
r = yield api_request(app, 'groups/omegaflight', method='delete')
|
|
assert r.status_code == 204
|
|
assert omegaflight not in sasquatch.groups
|
|
assert orm.Group.find(db, name='omegaflight') is None
|
|
|
|
# delete nonexistent gives 404
|
|
r = yield api_request(app, 'groups/omegaflight', method='delete')
|
|
assert r.status_code == 404
|
|
|
|
|
|
@mark.group
|
|
@mark.gen_test
|
|
def test_group_add_users(app):
|
|
db = app.db
|
|
# must specify users
|
|
r = yield api_request(app, 'groups/alphaflight/users', method='post', data='{}')
|
|
assert r.status_code == 400
|
|
|
|
names = ['aurora', 'guardian', 'northstar', 'sasquatch', 'shaman', 'snowbird']
|
|
users = [ find_user(db, name=name) or add_user(db, app=app, name=name) for name in names ]
|
|
r = yield api_request(app, 'groups/alphaflight/users', method='post', data=json.dumps({
|
|
'users': names,
|
|
}))
|
|
r.raise_for_status()
|
|
|
|
for user in users:
|
|
print(user.name)
|
|
assert [ g.name for g in user.groups ] == ['alphaflight']
|
|
|
|
group = orm.Group.find(db, name='alphaflight')
|
|
assert sorted([ u.name for u in group.users ]) == sorted(names)
|
|
|
|
|
|
@mark.group
|
|
@mark.gen_test
|
|
def test_group_delete_users(app):
|
|
db = app.db
|
|
# must specify users
|
|
r = yield api_request(app, 'groups/alphaflight/users', method='delete', data='{}')
|
|
assert r.status_code == 400
|
|
|
|
names = ['aurora', 'guardian', 'northstar', 'sasquatch', 'shaman', 'snowbird']
|
|
users = [ find_user(db, name=name) for name in names ]
|
|
r = yield api_request(app, 'groups/alphaflight/users', method='delete', data=json.dumps({
|
|
'users': names[:2],
|
|
}))
|
|
r.raise_for_status()
|
|
|
|
for user in users[:2]:
|
|
assert user.groups == []
|
|
for user in users[2:]:
|
|
assert [ g.name for g in user.groups ] == ['alphaflight']
|
|
|
|
group = orm.Group.find(db, name='alphaflight')
|
|
assert sorted([ u.name for u in group.users ]) == sorted(names[2:])
|
|
|
|
|
|
# -----------------
|
|
# Service API tests
|
|
# -----------------
|
|
|
|
|
|
@mark.services
|
|
@mark.gen_test
|
|
def test_get_services(app, mockservice_url):
|
|
mockservice = mockservice_url
|
|
db = app.db
|
|
r = yield api_request(app, 'services')
|
|
r.raise_for_status()
|
|
assert r.status_code == 200
|
|
|
|
services = r.json()
|
|
assert services == {
|
|
mockservice.name: {
|
|
'name': mockservice.name,
|
|
'admin': True,
|
|
'command': mockservice.command,
|
|
'pid': mockservice.proc.pid,
|
|
'prefix': mockservice.server.base_url,
|
|
'url': mockservice.url,
|
|
'info': {},
|
|
}
|
|
}
|
|
|
|
r = yield api_request(app, 'services',
|
|
headers=auth_header(db, 'user'),
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
|
|
@mark.services
|
|
@mark.gen_test
|
|
def test_get_service(app, mockservice_url):
|
|
mockservice = mockservice_url
|
|
db = app.db
|
|
r = yield api_request(app, 'services/%s' % mockservice.name)
|
|
r.raise_for_status()
|
|
assert r.status_code == 200
|
|
|
|
service = r.json()
|
|
assert service == {
|
|
'name': mockservice.name,
|
|
'admin': True,
|
|
'command': mockservice.command,
|
|
'pid': mockservice.proc.pid,
|
|
'prefix': mockservice.server.base_url,
|
|
'url': mockservice.url,
|
|
'info': {},
|
|
}
|
|
|
|
r = yield api_request(app, 'services/%s' % mockservice.name,
|
|
headers={
|
|
'Authorization': 'token %s' % mockservice.api_token
|
|
}
|
|
)
|
|
r.raise_for_status()
|
|
r = yield api_request(app, 'services/%s' % mockservice.name,
|
|
headers=auth_header(db, 'user'),
|
|
)
|
|
assert r.status_code == 403
|
|
|
|
|
|
@mark.gen_test
|
|
def test_root_api(app):
|
|
base_url = app.hub.url
|
|
url = ujoin(base_url, 'api')
|
|
r = yield async_requests.get(url)
|
|
r.raise_for_status()
|
|
expected = {
|
|
'version': jupyterhub.__version__
|
|
}
|
|
assert r.json() == expected
|
|
|
|
|
|
@mark.gen_test
|
|
def test_info(app):
|
|
r = yield api_request(app, 'info')
|
|
r.raise_for_status()
|
|
data = r.json()
|
|
assert data['version'] == jupyterhub.__version__
|
|
assert sorted(data) == [
|
|
'authenticator',
|
|
'python',
|
|
'spawner',
|
|
'sys_executable',
|
|
'version',
|
|
]
|
|
assert data['python'] == sys.version
|
|
assert data['sys_executable'] == sys.executable
|
|
assert data['authenticator'] == {
|
|
'class': 'jupyterhub.tests.mocking.MockPAMAuthenticator',
|
|
'version': jupyterhub.__version__,
|
|
}
|
|
assert data['spawner'] == {
|
|
'class': 'jupyterhub.tests.mocking.MockSpawner',
|
|
'version': jupyterhub.__version__,
|
|
}
|
|
|
|
|
|
# -----------------
|
|
# General API tests
|
|
# -----------------
|
|
|
|
|
|
@mark.gen_test
|
|
def test_options(app):
|
|
r = yield api_request(app, 'users', method='options')
|
|
r.raise_for_status()
|
|
assert 'Access-Control-Allow-Headers' in r.headers
|
|
|
|
|
|
@mark.gen_test
|
|
def test_bad_json_body(app):
|
|
r = yield api_request(app, 'users', method='post', data='notjson')
|
|
assert r.status_code == 400
|
|
|
|
|
|
# ---------------------------------
|
|
# Shutdown MUST always be last test
|
|
# ---------------------------------
|
|
|
|
|
|
def test_shutdown(app):
|
|
loop = app.io_loop
|
|
|
|
# have to do things a little funky since we are going to stop the loop,
|
|
# which makes gen_test unhappy. So we run the loop ourselves.
|
|
|
|
@gen.coroutine
|
|
def shutdown():
|
|
r = yield api_request(app, 'shutdown', method='post',
|
|
data=json.dumps({'servers': True, 'proxy': True,}),
|
|
)
|
|
return r
|
|
|
|
real_stop = loop.stop
|
|
def stop():
|
|
stop.called = True
|
|
loop.call_later(1, real_stop)
|
|
with mock.patch.object(loop, 'stop', stop):
|
|
r = loop.run_sync(shutdown, timeout=5)
|
|
r.raise_for_status()
|
|
reply = r.json()
|
|
assert stop.called
|