1
0
mirror of https://github.com/laurivosandi/certidude synced 2024-12-23 00:25:18 +00:00

tests: More detailed error captures for API calls

This commit is contained in:
Lauri Võsandi 2017-05-01 20:49:25 +00:00
parent ffdcbcc41a
commit 128369f6f6
2 changed files with 39 additions and 39 deletions

View File

@ -41,7 +41,7 @@ class RevocationListResource(object):
resp.body = export_crl() resp.body = export_crl()
except: except:
logger.debug(u"Failed to export CRL, are you sure signer is running?") logger.debug(u"Failed to export CRL, are you sure signer is running?")
raise raise falcon.HTTPInternalServerError("Failed to export CRL")
else: else:
logger.debug(u"Client %s asked revocation list in unsupported format" % req.context.get("remote_addr")) logger.debug(u"Client %s asked revocation list in unsupported format" % req.context.get("remote_addr"))
raise falcon.HTTPUnsupportedMediaType( raise falcon.HTTPUnsupportedMediaType(

View File

@ -92,7 +92,7 @@ def test_cli_setup_authority():
# Check that we can retrieve empty CRL # Check that we can retrieve empty CRL
r = client().simulate_get("/api/revoked/") r = client().simulate_get("/api/revoked/")
assert r.status_code == 200 assert r.status_code == 200, r.text
# Test command line interface # Test command line interface
@ -185,51 +185,51 @@ def test_cli_setup_authority():
# Test signed certificate API call # Test signed certificate API call
r = client().simulate_get("/api/signed/nonexistant/") r = client().simulate_get("/api/signed/nonexistant/")
assert r.status_code == 404 assert r.status_code == 404, r.text
r = client().simulate_get("/api/signed/test2/") r = client().simulate_get("/api/signed/test2/")
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/x-pem-file" assert r.headers.get('content-type') == "application/x-pem-file"
r = client().simulate_get("/api/signed/test2/", headers={"Accept":"application/json"}) r = client().simulate_get("/api/signed/test2/", headers={"Accept":"application/json"})
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/json" assert r.headers.get('content-type') == "application/json"
r = client().simulate_get("/api/signed/test2/", headers={"Accept":"text/plain"}) r = client().simulate_get("/api/signed/test2/", headers={"Accept":"text/plain"})
assert r.status_code == 415 assert r.status_code == 415, r.text
# Test revocations API call # Test revocations API call
r = client().simulate_get("/api/revoked/", r = client().simulate_get("/api/revoked/",
headers={"Accept":"application/x-pem-file"}) headers={"Accept":"application/x-pem-file"})
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/x-pem-file" assert r.headers.get('content-type') == "application/x-pem-file"
r = requests.get("http://ca.example.lan/api/revoked/", r = requests.get("http://ca.example.lan/api/revoked/",
headers={"Accept":"application/x-pem-file"}) headers={"Accept":"application/x-pem-file"})
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/x-pem-file" assert r.headers.get('content-type') == "application/x-pem-file"
r = client().simulate_get("/api/revoked/") r = client().simulate_get("/api/revoked/")
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/x-pkcs7-crl" assert r.headers.get('content-type') == "application/x-pkcs7-crl"
r = requests.get("http://ca.example.lan/api/revoked/") r = requests.get("http://ca.example.lan/api/revoked/")
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/x-pkcs7-crl" assert r.headers.get('content-type') == "application/x-pkcs7-crl"
r = client().simulate_get("/api/revoked/", r = client().simulate_get("/api/revoked/",
headers={"Accept":"text/plain"}) headers={"Accept":"text/plain"})
assert r.status_code == 415 assert r.status_code == 415, r.text
r = client().simulate_get("/api/revoked/", query_string="wait=true", r = client().simulate_get("/api/revoked/", query_string="wait=true",
headers={"Accept":"application/x-pem-file"}) headers={"Accept":"application/x-pem-file"})
assert r.status_code == 303 assert r.status_code == 303, r.text
# Test attribute fetching API call # Test attribute fetching API call
r = client().simulate_get("/api/signed/test2/attr/") r = client().simulate_get("/api/signed/test2/attr/")
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_get("/api/signed/test2/lease/", headers={"Authorization":admintoken}) r = client().simulate_get("/api/signed/test2/lease/", headers={"Authorization":admintoken})
assert r.status_code == 404 assert r.status_code == 404, r.text
# Insert lease as if VPN gateway had submitted it # Insert lease as if VPN gateway had submitted it
path, _, _ = authority.get_signed("test2") path, _, _ = authority.get_signed("test2")
@ -237,92 +237,92 @@ def test_cli_setup_authority():
setxattr(path, "user.lease.address", b"127.0.0.1") setxattr(path, "user.lease.address", b"127.0.0.1")
setxattr(path, "user.lease.last_seen", b"random") setxattr(path, "user.lease.last_seen", b"random")
r = client().simulate_get("/api/signed/test2/attr/") r = client().simulate_get("/api/signed/test2/attr/")
assert r.status_code == 200 assert r.status_code == 200, r.text
# Test lease retrieval # Test lease retrieval
r = client().simulate_get("/api/signed/test2/lease/") r = client().simulate_get("/api/signed/test2/lease/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_get("/api/signed/test2/lease/", headers={"Authorization":usertoken}) r = client().simulate_get("/api/signed/test2/lease/", headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_get("/api/signed/test2/lease/", headers={"Authorization":admintoken}) r = client().simulate_get("/api/signed/test2/lease/", headers={"Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/json; charset=UTF-8" assert r.headers.get('content-type') == "application/json; charset=UTF-8"
# Tags should not be visible anonymously # Tags should not be visible anonymously
r = client().simulate_get("/api/signed/test2/tag/") r = client().simulate_get("/api/signed/test2/tag/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_get("/api/signed/test2/tag/", headers={"Authorization":usertoken}) r = client().simulate_get("/api/signed/test2/tag/", headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_get("/api/signed/test2/tag/", headers={"Authorization":admintoken}) r = client().simulate_get("/api/signed/test2/tag/", headers={"Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
# Tags can be added only by admin # Tags can be added only by admin
r = client().simulate_post("/api/signed/test2/tag/") r = client().simulate_post("/api/signed/test2/tag/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_post("/api/signed/test2/tag/", r = client().simulate_post("/api/signed/test2/tag/",
headers={"Authorization":usertoken}) headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_post("/api/signed/test2/tag/", r = client().simulate_post("/api/signed/test2/tag/",
body="key=other&value=something", body="key=other&value=something",
headers={"content-type": "application/x-www-form-urlencoded", "Authorization":admintoken}) headers={"content-type": "application/x-www-form-urlencoded", "Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
# Tags can be overwritten only by admin # Tags can be overwritten only by admin
r = client().simulate_put("/api/signed/test2/tag/other/") r = client().simulate_put("/api/signed/test2/tag/other/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_put("/api/signed/test2/tag/other/", r = client().simulate_put("/api/signed/test2/tag/other/",
headers={"Authorization":usertoken}) headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_put("/api/signed/test2/tag/other/", r = client().simulate_put("/api/signed/test2/tag/other/",
body="value=else", body="value=else",
headers={"content-type": "application/x-www-form-urlencoded", "Authorization":admintoken}) headers={"content-type": "application/x-www-form-urlencoded", "Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
# Tags can be deleted only by admin # Tags can be deleted only by admin
r = client().simulate_delete("/api/signed/test2/tag/else/") r = client().simulate_delete("/api/signed/test2/tag/else/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_delete("/api/signed/test2/tag/else/", r = client().simulate_delete("/api/signed/test2/tag/else/",
headers={"Authorization":usertoken}) headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_delete("/api/signed/test2/tag/else/", r = client().simulate_delete("/api/signed/test2/tag/else/",
headers={"content-type": "application/x-www-form-urlencoded", "Authorization":admintoken}) headers={"content-type": "application/x-www-form-urlencoded", "Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
# Test revocation # Test revocation
r = client().simulate_delete("/api/signed/test2/") r = client().simulate_delete("/api/signed/test2/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_delete("/api/signed/test2/", r = client().simulate_delete("/api/signed/test2/",
headers={"Authorization":usertoken}) headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_delete("/api/signed/test2/", r = client().simulate_delete("/api/signed/test2/",
headers={"Authorization":admintoken}) headers={"Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
result = runner.invoke(cli, ['revoke', 'test3']) result = runner.invoke(cli, ['revoke', 'test3'])
assert not result.exception, result.output assert not result.exception, result.output
# Test static # Test static
r = client().simulate_delete("/nonexistant.html") r = client().simulate_delete("/nonexistant.html")
assert r.status_code == 404 assert r.status_code == 404, r.text
r = client().simulate_delete("/index.html") r = client().simulate_delete("/index.html")
assert r.status_code == 200 assert r.status_code == 200, r.text
# Log can be read only by admin # Log can be read only by admin
r = client().simulate_get("/api/log/") r = client().simulate_get("/api/log/")
assert r.status_code == 401 assert r.status_code == 401, r.text
r = client().simulate_get("/api/log/", r = client().simulate_get("/api/log/",
headers={"Authorization":usertoken}) headers={"Authorization":usertoken})
assert r.status_code == 403 assert r.status_code == 403, r.text
r = client().simulate_get("/api/log/", r = client().simulate_get("/api/log/",
headers={"Authorization":admintoken}) headers={"Authorization":admintoken})
assert r.status_code == 200 assert r.status_code == 200, r.text
assert r.headers.get('content-type') == "application/json; charset=UTF-8" assert r.headers.get('content-type') == "application/json; charset=UTF-8"
# Test token mech # Test token mech
r = client().simulate_post("/api/token/") r = client().simulate_post("/api/token/")
assert r.status_code == 404 assert r.status_code == 404, r.text
config.BUNDLE_FORMAT = "ovpn" config.BUNDLE_FORMAT = "ovpn"
config.USER_ENROLLMENT_ALLOWED = True config.USER_ENROLLMENT_ALLOWED = True