-
Notifications
You must be signed in to change notification settings - Fork 4
Expand file tree
/
Copy pathtest_validate_upstream.py
More file actions
167 lines (144 loc) · 4.87 KB
/
test_validate_upstream.py
File metadata and controls
167 lines (144 loc) · 4.87 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
# def test_index(client):
# response = client.get('/')
# assert response.data == b'["http://localhost/v1/status"]\n'
import yaml
import pytest
from utils.validators import validate_upstream
def test_upstream_good(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myservice
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
validate_upstream (y, { }, [])
def test_upstream_localhost(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: localhost
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e1\)"):
validate_upstream (y, { }, [])
def test_upstream_127(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: 127.0.0.1
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e1\)"):
validate_upstream (y, { "perm-project": ["ns.mytest"]}, [])
def test_upstream_url(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
url: http://localhost:4000
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e1\)"):
validate_upstream (y, { "perm-project": ["ns.mytest"]}, [])
def test_upstream_invalid_url(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
url: localhost:4000
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream has invalid url specified \(e1\)"):
validate_upstream (y, { "perm-project": ["ns.mytest"]}, [])
def test_upstream_valid_service(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
validate_upstream (y, { "perm-project": ["ns.mytest"]}, [])
def test_upstream_protected_service_allow(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
validate_upstream (y, { "perm-protected-ns": ["allow"]}, ['my-namespace'])
def test_upstream_protected_service(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e3\)"):
validate_upstream (y, {}, ['my-namespace'])
def test_upstream_protected_service_deny(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e3\)"):
validate_upstream (y, { "perm-protected-ns": ["deny"]}, ['my-namespace'])
def test_upstream_invalid_host(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e2\)"):
validate_upstream (y, { "perm-protected-ns": ["deny"]}, ['my-namespace'])
def test_upstream_protected_service_allow(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-other-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
validate_upstream (y, { "perm-protected-ns": ["deny"]}, ['my-namespace'])
def test_upstream_pass_validation(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
validate_upstream (y, { "perm-upstreams": ["my-namespace"]}, [], True)
def test_upstream_pass_validation_exact_match(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: 192.168.1.1
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
validate_upstream (y, { "perm-upstreams": ["192.168.1.1"]}, [], True)
def test_upstream_fail_validation(app):
payload = '''
services:
- name: my-service
tags: ["ns.mytest", "another"]
host: myapi.my-namespace.svc
'''
y = yaml.load(payload, Loader=yaml.FullLoader)
with pytest.raises(Exception, match=r"service upstream is invalid \(e6\)"):
validate_upstream (y, {}, [], True)
with pytest.raises(Exception, match=r"service upstream is invalid \(e6\)"):
validate_upstream (y, { "perm-upstreams": ["other-namespace"]}, [], True)
with pytest.raises(Exception, match=r"service upstream is invalid \(e6\)"):
validate_upstream (y, { "perm-upstreams": [""]}, [], True)