~bzr-pqm/bzr/bzr.dev

« back to all changes in this revision

Viewing changes to bzrlib/tests/test_http.py

  • Committer: Vincent Ladeuil
  • Date: 2009-10-27 14:04:29 UTC
  • mto: (4772.1.1 integration)
  • mto: This revision was merged to the branch mainline in revision 4773.
  • Revision ID: v.ladeuil+lp@free.fr-20091027140429-br7sqcmk3zstngmm
Fix some typos.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
# Copyright (C) 2005-2011 Canonical Ltd
 
1
# Copyright (C) 2005, 2006, 2007, 2008, 2009 Canonical Ltd
2
2
#
3
3
# This program is free software; you can redistribute it and/or modify
4
4
# it under the terms of the GNU General Public License as published by
23
23
# TODO: Should be renamed to bzrlib.transport.http.tests?
24
24
# TODO: What about renaming to bzrlib.tests.transport.http ?
25
25
 
 
26
from cStringIO import StringIO
26
27
import httplib
 
28
import os
 
29
import select
27
30
import SimpleHTTPServer
28
31
import socket
29
32
import sys
32
35
import bzrlib
33
36
from bzrlib import (
34
37
    bzrdir,
35
 
    cethread,
36
38
    config,
37
 
    debug,
38
39
    errors,
39
40
    osutils,
40
41
    remote as _mod_remote,
41
42
    tests,
42
 
    trace,
43
43
    transport,
44
44
    ui,
 
45
    urlutils,
 
46
    )
 
47
from bzrlib.symbol_versioning import (
 
48
    deprecated_in,
45
49
    )
46
50
from bzrlib.tests import (
47
 
    features,
48
51
    http_server,
49
52
    http_utils,
50
 
    test_server,
51
 
    )
52
 
from bzrlib.tests.scenarios import (
53
 
    load_tests_apply_scenarios,
54
 
    multiply_scenarios,
55
53
    )
56
54
from bzrlib.transport import (
57
55
    http,
63
61
    )
64
62
 
65
63
 
66
 
if features.pycurl.available():
 
64
try:
67
65
    from bzrlib.transport.http._pycurl import PyCurlTransport
68
 
 
69
 
 
70
 
load_tests = load_tests_apply_scenarios
71
 
 
72
 
 
73
 
def vary_by_http_client_implementation():
74
 
    """Test the two libraries we can use, pycurl and urllib."""
 
66
    pycurl_present = True
 
67
except errors.DependencyNotPresent:
 
68
    pycurl_present = False
 
69
 
 
70
 
 
71
def load_tests(standard_tests, module, loader):
 
72
    """Multiply tests for http clients and protocol versions."""
 
73
    result = loader.suiteClass()
 
74
 
 
75
    # one for each transport implementation
 
76
    t_tests, remaining_tests = tests.split_suite_by_condition(
 
77
        standard_tests, tests.condition_isinstance((
 
78
                TestHttpTransportRegistration,
 
79
                TestHttpTransportUrls,
 
80
                Test_redirected_to,
 
81
                )))
75
82
    transport_scenarios = [
76
83
        ('urllib', dict(_transport=_urllib.HttpTransport_urllib,
77
84
                        _server=http_server.HttpServer_urllib,
78
 
                        _url_protocol='http+urllib',)),
 
85
                        _qualified_prefix='http+urllib',)),
79
86
        ]
80
 
    if features.pycurl.available():
 
87
    if pycurl_present:
81
88
        transport_scenarios.append(
82
89
            ('pycurl', dict(_transport=PyCurlTransport,
83
90
                            _server=http_server.HttpServer_PyCurl,
84
 
                            _url_protocol='http+pycurl',)))
85
 
    return transport_scenarios
86
 
 
87
 
 
88
 
def vary_by_http_protocol_version():
89
 
    """Test on http/1.0 and 1.1"""
90
 
    return [
91
 
        ('HTTP/1.0',  dict(_protocol_version='HTTP/1.0')),
92
 
        ('HTTP/1.1',  dict(_protocol_version='HTTP/1.1')),
 
91
                            _qualified_prefix='http+pycurl',)))
 
92
    tests.multiply_tests(t_tests, transport_scenarios, result)
 
93
 
 
94
    # each implementation tested with each HTTP version
 
95
    tp_tests, remaining_tests = tests.split_suite_by_condition(
 
96
        remaining_tests, tests.condition_isinstance((
 
97
                SmartHTTPTunnellingTest,
 
98
                TestDoCatchRedirections,
 
99
                TestHTTPConnections,
 
100
                TestHTTPRedirections,
 
101
                TestHTTPSilentRedirections,
 
102
                TestLimitedRangeRequestServer,
 
103
                TestPost,
 
104
                TestProxyHttpServer,
 
105
                TestRanges,
 
106
                TestSpecificRequestHandler,
 
107
                )))
 
108
    protocol_scenarios = [
 
109
            ('HTTP/1.0',  dict(_protocol_version='HTTP/1.0')),
 
110
            ('HTTP/1.1',  dict(_protocol_version='HTTP/1.1')),
 
111
            ]
 
112
    tp_scenarios = tests.multiply_scenarios(transport_scenarios,
 
113
                                            protocol_scenarios)
 
114
    tests.multiply_tests(tp_tests, tp_scenarios, result)
 
115
 
 
116
    # proxy auth: each auth scheme on all http versions on all implementations.
 
117
    tppa_tests, remaining_tests = tests.split_suite_by_condition(
 
118
        remaining_tests, tests.condition_isinstance((
 
119
                TestProxyAuth,
 
120
                )))
 
121
    proxy_auth_scheme_scenarios = [
 
122
        ('basic', dict(_auth_server=http_utils.ProxyBasicAuthServer)),
 
123
        ('digest', dict(_auth_server=http_utils.ProxyDigestAuthServer)),
 
124
        ('basicdigest',
 
125
         dict(_auth_server=http_utils.ProxyBasicAndDigestAuthServer)),
93
126
        ]
94
 
 
95
 
 
96
 
def vary_by_http_auth_scheme():
97
 
    scenarios = [
 
127
    tppa_scenarios = tests.multiply_scenarios(tp_scenarios,
 
128
                                              proxy_auth_scheme_scenarios)
 
129
    tests.multiply_tests(tppa_tests, tppa_scenarios, result)
 
130
 
 
131
    # auth: each auth scheme on all http versions on all implementations.
 
132
    tpa_tests, remaining_tests = tests.split_suite_by_condition(
 
133
        remaining_tests, tests.condition_isinstance((
 
134
                TestAuth,
 
135
                )))
 
136
    auth_scheme_scenarios = [
98
137
        ('basic', dict(_auth_server=http_utils.HTTPBasicAuthServer)),
99
138
        ('digest', dict(_auth_server=http_utils.HTTPDigestAuthServer)),
100
139
        ('basicdigest',
101
 
            dict(_auth_server=http_utils.HTTPBasicAndDigestAuthServer)),
102
 
        ]
103
 
    # Add some attributes common to all scenarios
104
 
    for scenario_id, scenario_dict in scenarios:
105
 
        scenario_dict.update(_auth_header='Authorization',
106
 
                             _username_prompt_prefix='',
107
 
                             _password_prompt_prefix='')
108
 
    return scenarios
109
 
 
110
 
 
111
 
def vary_by_http_proxy_auth_scheme():
112
 
    scenarios = [
113
 
        ('proxy-basic', dict(_auth_server=http_utils.ProxyBasicAuthServer)),
114
 
        ('proxy-digest', dict(_auth_server=http_utils.ProxyDigestAuthServer)),
115
 
        ('proxy-basicdigest',
116
 
            dict(_auth_server=http_utils.ProxyBasicAndDigestAuthServer)),
117
 
        ]
118
 
    # Add some attributes common to all scenarios
119
 
    for scenario_id, scenario_dict in scenarios:
120
 
        scenario_dict.update(_auth_header='Proxy-Authorization',
121
 
                             _username_prompt_prefix='Proxy ',
122
 
                             _password_prompt_prefix='Proxy ')
123
 
    return scenarios
124
 
 
125
 
 
126
 
def vary_by_http_activity():
 
140
         dict(_auth_server=http_utils.HTTPBasicAndDigestAuthServer)),
 
141
        ]
 
142
    tpa_scenarios = tests.multiply_scenarios(tp_scenarios,
 
143
                                             auth_scheme_scenarios)
 
144
    tests.multiply_tests(tpa_tests, tpa_scenarios, result)
 
145
 
 
146
    # activity: on all http[s] versions on all implementations
 
147
    tpact_tests, remaining_tests = tests.split_suite_by_condition(
 
148
        remaining_tests, tests.condition_isinstance((
 
149
                TestActivity,
 
150
                )))
127
151
    activity_scenarios = [
128
152
        ('urllib,http', dict(_activity_server=ActivityHTTPServer,
129
 
                            _transport=_urllib.HttpTransport_urllib,)),
 
153
                             _transport=_urllib.HttpTransport_urllib,)),
130
154
        ]
131
 
    if features.HTTPSServerFeature.available():
 
155
    if tests.HTTPSServerFeature.available():
132
156
        activity_scenarios.append(
133
157
            ('urllib,https', dict(_activity_server=ActivityHTTPSServer,
134
 
                                _transport=_urllib.HttpTransport_urllib,)),)
135
 
    if features.pycurl.available():
 
158
                                  _transport=_urllib.HttpTransport_urllib,)),)
 
159
    if pycurl_present:
136
160
        activity_scenarios.append(
137
161
            ('pycurl,http', dict(_activity_server=ActivityHTTPServer,
138
 
                                _transport=PyCurlTransport,)),)
139
 
        if features.HTTPSServerFeature.available():
 
162
                                 _transport=PyCurlTransport,)),)
 
163
        if tests.HTTPSServerFeature.available():
140
164
            from bzrlib.tests import (
141
165
                ssl_certs,
142
166
                )
153
177
 
154
178
            activity_scenarios.append(
155
179
                ('pycurl,https', dict(_activity_server=ActivityHTTPSServer,
156
 
                                    _transport=HTTPS_pycurl_transport,)),)
157
 
    return activity_scenarios
 
180
                                      _transport=HTTPS_pycurl_transport,)),)
 
181
 
 
182
    tpact_scenarios = tests.multiply_scenarios(activity_scenarios,
 
183
                                               protocol_scenarios)
 
184
    tests.multiply_tests(tpact_tests, tpact_scenarios, result)
 
185
 
 
186
    # No parametrization for the remaining tests
 
187
    result.addTests(remaining_tests)
 
188
 
 
189
    return result
158
190
 
159
191
 
160
192
class FakeManager(object):
188
220
    def get_url(self):
189
221
        return '%s://%s:%s/' % (self.scheme, self.host, self.port)
190
222
 
191
 
    def start_server(self):
 
223
    def setUp(self):
192
224
        self._sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
193
225
        self._sock.bind(('127.0.0.1', 0))
194
226
        self.host, self.port = self._sock.getsockname()
195
227
        self._ready = threading.Event()
196
 
        self._thread = test_server.TestThread(
197
 
            sync_event=self._ready, target=self._accept_read_and_reply)
 
228
        self._thread = threading.Thread(target=self._accept_read_and_reply)
 
229
        self._thread.setDaemon(True)
198
230
        self._thread.start()
199
 
        if 'threads' in tests.selftest_debug_flags:
200
 
            sys.stderr.write('Thread started: %s\n' % (self._thread.ident,))
201
 
        self._ready.wait()
 
231
        self._ready.wait(5)
202
232
 
203
233
    def _accept_read_and_reply(self):
204
234
        self._sock.listen(1)
205
235
        self._ready.set()
206
 
        conn, address = self._sock.accept()
207
 
        if self._expect_body_tail is not None:
 
236
        self._sock.settimeout(5)
 
237
        try:
 
238
            conn, address = self._sock.accept()
 
239
            # On win32, the accepted connection will be non-blocking to start
 
240
            # with because we're using settimeout.
 
241
            conn.setblocking(True)
208
242
            while not self.received_bytes.endswith(self._expect_body_tail):
209
243
                self.received_bytes += conn.recv(4096)
210
244
            conn.sendall('HTTP/1.1 200 OK\r\n')
211
 
        try:
 
245
        except socket.timeout:
 
246
            # Make sure the client isn't stuck waiting for us to e.g. accept.
212
247
            self._sock.close()
213
248
        except socket.error:
214
249
            # The client may have already closed the socket.
215
250
            pass
216
251
 
217
 
    def stop_server(self):
 
252
    def tearDown(self):
218
253
        try:
219
 
            # Issue a fake connection to wake up the server and allow it to
220
 
            # finish quickly
221
 
            fake_conn = osutils.connect_socket((self.host, self.port))
222
 
            fake_conn.close()
 
254
            self._sock.close()
223
255
        except socket.error:
224
256
            # We might have already closed it.  We don't care.
225
257
            pass
226
258
        self.host = None
227
259
        self.port = None
228
 
        self._thread.join()
229
 
        if 'threads' in tests.selftest_debug_flags:
230
 
            sys.stderr.write('Thread  joined: %s\n' % (self._thread.ident,))
231
260
 
232
261
 
233
262
class TestAuthHeader(tests.TestCase):
240
269
 
241
270
    def test_empty_header(self):
242
271
        scheme, remainder = self.parse_header('')
243
 
        self.assertEqual('', scheme)
 
272
        self.assertEquals('', scheme)
244
273
        self.assertIs(None, remainder)
245
274
 
246
275
    def test_negotiate_header(self):
247
276
        scheme, remainder = self.parse_header('Negotiate')
248
 
        self.assertEqual('negotiate', scheme)
 
277
        self.assertEquals('negotiate', scheme)
249
278
        self.assertIs(None, remainder)
250
279
 
251
280
    def test_basic_header(self):
252
281
        scheme, remainder = self.parse_header(
253
282
            'Basic realm="Thou should not pass"')
254
 
        self.assertEqual('basic', scheme)
255
 
        self.assertEqual('realm="Thou should not pass"', remainder)
 
283
        self.assertEquals('basic', scheme)
 
284
        self.assertEquals('realm="Thou should not pass"', remainder)
256
285
 
257
286
    def test_basic_extract_realm(self):
258
287
        scheme, remainder = self.parse_header(
260
289
            _urllib2_wrappers.BasicAuthHandler)
261
290
        match, realm = self.auth_handler.extract_realm(remainder)
262
291
        self.assertTrue(match is not None)
263
 
        self.assertEqual('Thou should not pass', realm)
 
292
        self.assertEquals('Thou should not pass', realm)
264
293
 
265
294
    def test_digest_header(self):
266
295
        scheme, remainder = self.parse_header(
267
296
            'Digest realm="Thou should not pass"')
268
 
        self.assertEqual('digest', scheme)
269
 
        self.assertEqual('realm="Thou should not pass"', remainder)
270
 
 
271
 
 
272
 
class TestHTTPRangeParsing(tests.TestCase):
273
 
 
274
 
    def setUp(self):
275
 
        super(TestHTTPRangeParsing, self).setUp()
276
 
        # We focus on range  parsing here and ignore everything else
277
 
        class RequestHandler(http_server.TestingHTTPRequestHandler):
278
 
            def setup(self): pass
279
 
            def handle(self): pass
280
 
            def finish(self): pass
281
 
 
282
 
        self.req_handler = RequestHandler(None, None, None)
283
 
 
284
 
    def assertRanges(self, ranges, header, file_size):
285
 
        self.assertEquals(ranges,
286
 
                          self.req_handler._parse_ranges(header, file_size))
287
 
 
288
 
    def test_simple_range(self):
289
 
        self.assertRanges([(0,2)], 'bytes=0-2', 12)
290
 
 
291
 
    def test_tail(self):
292
 
        self.assertRanges([(8, 11)], 'bytes=-4', 12)
293
 
 
294
 
    def test_tail_bigger_than_file(self):
295
 
        self.assertRanges([(0, 11)], 'bytes=-99', 12)
296
 
 
297
 
    def test_range_without_end(self):
298
 
        self.assertRanges([(4, 11)], 'bytes=4-', 12)
299
 
 
300
 
    def test_invalid_ranges(self):
301
 
        self.assertRanges(None, 'bytes=12-22', 12)
302
 
        self.assertRanges(None, 'bytes=1-3,12-22', 12)
303
 
        self.assertRanges(None, 'bytes=-', 12)
 
297
        self.assertEquals('digest', scheme)
 
298
        self.assertEquals('realm="Thou should not pass"', remainder)
304
299
 
305
300
 
306
301
class TestHTTPServer(tests.TestCase):
311
306
 
312
307
            protocol_version = 'HTTP/0.1'
313
308
 
314
 
        self.assertRaises(httplib.UnknownProtocol,
315
 
                          http_server.HttpServer, BogusRequestHandler)
 
309
        server = http_server.HttpServer(BogusRequestHandler)
 
310
        try:
 
311
            self.assertRaises(httplib.UnknownProtocol, server.setUp)
 
312
        except:
 
313
            server.tearDown()
 
314
            self.fail('HTTP Server creation did not raise UnknownProtocol')
316
315
 
317
316
    def test_force_invalid_protocol(self):
318
 
        self.assertRaises(httplib.UnknownProtocol,
319
 
                          http_server.HttpServer, protocol_version='HTTP/0.1')
 
317
        server = http_server.HttpServer(protocol_version='HTTP/0.1')
 
318
        try:
 
319
            self.assertRaises(httplib.UnknownProtocol, server.setUp)
 
320
        except:
 
321
            server.tearDown()
 
322
            self.fail('HTTP Server creation did not raise UnknownProtocol')
320
323
 
321
324
    def test_server_start_and_stop(self):
322
325
        server = http_server.HttpServer()
323
 
        self.addCleanup(server.stop_server)
324
 
        server.start_server()
325
 
        self.assertTrue(server.server is not None)
326
 
        self.assertTrue(server.server.serving is not None)
327
 
        self.assertTrue(server.server.serving)
 
326
        server.setUp()
 
327
        try:
 
328
            self.assertTrue(server._http_running)
 
329
        finally:
 
330
            server.tearDown()
 
331
        self.assertFalse(server._http_running)
328
332
 
329
333
    def test_create_http_server_one_zero(self):
330
334
        class RequestHandlerOneZero(http_server.TestingHTTPRequestHandler):
333
337
 
334
338
        server = http_server.HttpServer(RequestHandlerOneZero)
335
339
        self.start_server(server)
336
 
        self.assertIsInstance(server.server, http_server.TestingHTTPServer)
 
340
        self.assertIsInstance(server._httpd, http_server.TestingHTTPServer)
337
341
 
338
342
    def test_create_http_server_one_one(self):
339
343
        class RequestHandlerOneOne(http_server.TestingHTTPRequestHandler):
342
346
 
343
347
        server = http_server.HttpServer(RequestHandlerOneOne)
344
348
        self.start_server(server)
345
 
        self.assertIsInstance(server.server,
 
349
        self.assertIsInstance(server._httpd,
346
350
                              http_server.TestingThreadingHTTPServer)
347
351
 
348
352
    def test_create_http_server_force_one_one(self):
353
357
        server = http_server.HttpServer(RequestHandlerOneZero,
354
358
                                        protocol_version='HTTP/1.1')
355
359
        self.start_server(server)
356
 
        self.assertIsInstance(server.server,
 
360
        self.assertIsInstance(server._httpd,
357
361
                              http_server.TestingThreadingHTTPServer)
358
362
 
359
363
    def test_create_http_server_force_one_zero(self):
364
368
        server = http_server.HttpServer(RequestHandlerOneOne,
365
369
                                        protocol_version='HTTP/1.0')
366
370
        self.start_server(server)
367
 
        self.assertIsInstance(server.server,
 
371
        self.assertIsInstance(server._httpd,
368
372
                              http_server.TestingHTTPServer)
369
373
 
370
374
 
372
376
    """Test case to inherit from if pycurl is present"""
373
377
 
374
378
    def _get_pycurl_maybe(self):
375
 
        self.requireFeature(features.pycurl)
376
 
        return PyCurlTransport
 
379
        try:
 
380
            from bzrlib.transport.http._pycurl import PyCurlTransport
 
381
            return PyCurlTransport
 
382
        except errors.DependencyNotPresent:
 
383
            raise tests.TestSkipped('pycurl not present')
377
384
 
378
385
    _transport = property(_get_pycurl_maybe)
379
386
 
386
393
    def test_url_parsing(self):
387
394
        f = FakeManager()
388
395
        url = http.extract_auth('http://example.com', f)
389
 
        self.assertEqual('http://example.com', url)
390
 
        self.assertEqual(0, len(f.credentials))
 
396
        self.assertEquals('http://example.com', url)
 
397
        self.assertEquals(0, len(f.credentials))
391
398
        url = http.extract_auth(
392
 
            'http://user:pass@example.com/bzr/bzr.dev', f)
393
 
        self.assertEqual('http://example.com/bzr/bzr.dev', url)
394
 
        self.assertEqual(1, len(f.credentials))
395
 
        self.assertEqual([None, 'example.com', 'user', 'pass'],
396
 
                         f.credentials[0])
 
399
            'http://user:pass@www.bazaar-vcs.org/bzr/bzr.dev', f)
 
400
        self.assertEquals('http://www.bazaar-vcs.org/bzr/bzr.dev', url)
 
401
        self.assertEquals(1, len(f.credentials))
 
402
        self.assertEquals([None, 'www.bazaar-vcs.org', 'user', 'pass'],
 
403
                          f.credentials[0])
397
404
 
398
405
 
399
406
class TestHttpTransportUrls(tests.TestCase):
400
407
    """Test the http urls."""
401
408
 
402
 
    scenarios = vary_by_http_client_implementation()
403
 
 
404
409
    def test_abs_url(self):
405
410
        """Construction of absolute http URLs"""
406
 
        t = self._transport('http://example.com/bzr/bzr.dev/')
 
411
        t = self._transport('http://bazaar-vcs.org/bzr/bzr.dev/')
407
412
        eq = self.assertEqualDiff
408
 
        eq(t.abspath('.'), 'http://example.com/bzr/bzr.dev')
409
 
        eq(t.abspath('foo/bar'), 'http://example.com/bzr/bzr.dev/foo/bar')
410
 
        eq(t.abspath('.bzr'), 'http://example.com/bzr/bzr.dev/.bzr')
 
413
        eq(t.abspath('.'), 'http://bazaar-vcs.org/bzr/bzr.dev')
 
414
        eq(t.abspath('foo/bar'), 'http://bazaar-vcs.org/bzr/bzr.dev/foo/bar')
 
415
        eq(t.abspath('.bzr'), 'http://bazaar-vcs.org/bzr/bzr.dev/.bzr')
411
416
        eq(t.abspath('.bzr/1//2/./3'),
412
 
           'http://example.com/bzr/bzr.dev/.bzr/1/2/3')
 
417
           'http://bazaar-vcs.org/bzr/bzr.dev/.bzr/1/2/3')
413
418
 
414
419
    def test_invalid_http_urls(self):
415
420
        """Trap invalid construction of urls"""
416
 
        self._transport('http://example.com/bzr/bzr.dev/')
 
421
        t = self._transport('http://bazaar-vcs.org/bzr/bzr.dev/')
417
422
        self.assertRaises(errors.InvalidURL,
418
423
                          self._transport,
419
 
                          'http://http://example.com/bzr/bzr.dev/')
 
424
                          'http://http://bazaar-vcs.org/bzr/bzr.dev/')
420
425
 
421
426
    def test_http_root_urls(self):
422
427
        """Construction of URLs from server root"""
423
 
        t = self._transport('http://example.com/')
 
428
        t = self._transport('http://bzr.ozlabs.org/')
424
429
        eq = self.assertEqualDiff
425
430
        eq(t.abspath('.bzr/tree-version'),
426
 
           'http://example.com/.bzr/tree-version')
 
431
           'http://bzr.ozlabs.org/.bzr/tree-version')
427
432
 
428
433
    def test_http_impl_urls(self):
429
434
        """There are servers which ask for particular clients to connect"""
430
435
        server = self._server()
431
 
        server.start_server()
 
436
        server.setUp()
432
437
        try:
433
438
            url = server.get_url()
434
 
            self.assertTrue(url.startswith('%s://' % self._url_protocol))
 
439
            self.assertTrue(url.startswith('%s://' % self._qualified_prefix))
435
440
        finally:
436
 
            server.stop_server()
 
441
            server.tearDown()
437
442
 
438
443
 
439
444
class TestHttps_pycurl(TestWithTransport_pycurl, tests.TestCase):
448
453
        https by supplying a fake version_info that do not
449
454
        support it.
450
455
        """
451
 
        self.requireFeature(features.pycurl)
452
 
        # Import the module locally now that we now it's available.
453
 
        pycurl = features.pycurl.module
 
456
        try:
 
457
            import pycurl
 
458
        except ImportError:
 
459
            raise tests.TestSkipped('pycurl not present')
454
460
 
455
 
        self.overrideAttr(pycurl, 'version_info',
456
 
                          # Fake the pycurl version_info This was taken from
457
 
                          # a windows pycurl without SSL (thanks to bialix)
458
 
                          lambda : (2,
459
 
                                    '7.13.2',
460
 
                                    462082,
461
 
                                    'i386-pc-win32',
462
 
                                    2576,
463
 
                                    None,
464
 
                                    0,
465
 
                                    None,
466
 
                                    ('ftp', 'gopher', 'telnet',
467
 
                                     'dict', 'ldap', 'http', 'file'),
468
 
                                    None,
469
 
                                    0,
470
 
                                    None))
471
 
        self.assertRaises(errors.DependencyNotPresent, self._transport,
472
 
                          'https://launchpad.net')
 
461
        version_info_orig = pycurl.version_info
 
462
        try:
 
463
            # Now that we have pycurl imported, we can fake its version_info
 
464
            # This was taken from a windows pycurl without SSL
 
465
            # (thanks to bialix)
 
466
            pycurl.version_info = lambda : (2,
 
467
                                            '7.13.2',
 
468
                                            462082,
 
469
                                            'i386-pc-win32',
 
470
                                            2576,
 
471
                                            None,
 
472
                                            0,
 
473
                                            None,
 
474
                                            ('ftp', 'gopher', 'telnet',
 
475
                                             'dict', 'ldap', 'http', 'file'),
 
476
                                            None,
 
477
                                            0,
 
478
                                            None)
 
479
            self.assertRaises(errors.DependencyNotPresent, self._transport,
 
480
                              'https://launchpad.net')
 
481
        finally:
 
482
            # Restore the right function
 
483
            pycurl.version_info = version_info_orig
473
484
 
474
485
 
475
486
class TestHTTPConnections(http_utils.TestCaseWithWebserver):
476
487
    """Test the http connections."""
477
488
 
478
 
    scenarios = multiply_scenarios(
479
 
        vary_by_http_client_implementation(),
480
 
        vary_by_http_protocol_version(),
481
 
        )
482
 
 
483
489
    def setUp(self):
484
490
        http_utils.TestCaseWithWebserver.setUp(self)
485
491
        self.build_tree(['foo/', 'foo/bar'], line_endings='binary',
487
493
 
488
494
    def test_http_has(self):
489
495
        server = self.get_readonly_server()
490
 
        t = self.get_readonly_transport()
 
496
        t = self._transport(server.get_url())
491
497
        self.assertEqual(t.has('foo/bar'), True)
492
498
        self.assertEqual(len(server.logs), 1)
493
499
        self.assertContainsRe(server.logs[0],
495
501
 
496
502
    def test_http_has_not_found(self):
497
503
        server = self.get_readonly_server()
498
 
        t = self.get_readonly_transport()
 
504
        t = self._transport(server.get_url())
499
505
        self.assertEqual(t.has('not-found'), False)
500
506
        self.assertContainsRe(server.logs[1],
501
507
            r'"HEAD /not-found HTTP/1.." 404 - "-" "bzr/')
502
508
 
503
509
    def test_http_get(self):
504
510
        server = self.get_readonly_server()
505
 
        t = self.get_readonly_transport()
 
511
        t = self._transport(server.get_url())
506
512
        fp = t.get('foo/bar')
507
513
        self.assertEqualDiff(
508
514
            fp.read(),
530
536
class TestHttpTransportRegistration(tests.TestCase):
531
537
    """Test registrations of various http implementations"""
532
538
 
533
 
    scenarios = vary_by_http_client_implementation()
534
 
 
535
539
    def test_http_registered(self):
536
 
        t = transport.get_transport('%s://foo.com/' % self._url_protocol)
 
540
        t = transport.get_transport('%s://foo.com/' % self._qualified_prefix)
537
541
        self.assertIsInstance(t, transport.Transport)
538
542
        self.assertIsInstance(t, self._transport)
539
543
 
540
544
 
541
545
class TestPost(tests.TestCase):
542
546
 
543
 
    scenarios = multiply_scenarios(
544
 
        vary_by_http_client_implementation(),
545
 
        vary_by_http_protocol_version(),
546
 
        )
547
 
 
548
547
    def test_post_body_is_received(self):
549
548
        server = RecordingServer(expect_body_tail='end-of-body',
550
 
                                 scheme=self._url_protocol)
 
549
            scheme=self._qualified_prefix)
551
550
        self.start_server(server)
552
551
        url = server.get_url()
553
 
        # FIXME: needs a cleanup -- vila 20100611
554
 
        http_transport = transport.get_transport(url)
 
552
        http_transport = self._transport(url)
555
553
        code, response = http_transport._post('abc def end-of-body')
556
554
        self.assertTrue(
557
555
            server.received_bytes.startswith('POST /.bzr/smart HTTP/1.'))
558
556
        self.assertTrue('content-length: 19\r' in server.received_bytes.lower())
559
 
        self.assertTrue('content-type: application/octet-stream\r'
560
 
                        in server.received_bytes.lower())
561
557
        # The transport should not be assuming that the server can accept
562
558
        # chunked encoding the first time it connects, because HTTP/1.1, so we
563
559
        # check for the literal string.
599
595
    Daughter classes are expected to override _req_handler_class
600
596
    """
601
597
 
602
 
    scenarios = multiply_scenarios(
603
 
        vary_by_http_client_implementation(),
604
 
        vary_by_http_protocol_version(),
605
 
        )
606
 
 
607
598
    # Provide a useful default
608
599
    _req_handler_class = http_server.TestingHTTPRequestHandler
609
600
 
610
601
    def create_transport_readonly_server(self):
611
 
        server = http_server.HttpServer(self._req_handler_class,
612
 
                                        protocol_version=self._protocol_version)
613
 
        server._url_protocol = self._url_protocol
614
 
        return server
 
602
        return http_server.HttpServer(self._req_handler_class,
 
603
                                      protocol_version=self._protocol_version)
615
604
 
616
605
    def _testing_pycurl(self):
617
 
        # TODO: This is duplicated for lots of the classes in this file
618
 
        return (features.pycurl.available()
619
 
                and self._transport == PyCurlTransport)
 
606
        return pycurl_present and self._transport == PyCurlTransport
620
607
 
621
608
 
622
609
class WallRequestHandler(http_server.TestingHTTPRequestHandler):
623
610
    """Whatever request comes in, close the connection"""
624
611
 
625
 
    def _handle_one_request(self):
 
612
    def handle_one_request(self):
626
613
        """Handle a single HTTP request, by abruptly closing the connection"""
627
614
        self.close_connection = 1
628
615
 
633
620
    _req_handler_class = WallRequestHandler
634
621
 
635
622
    def test_http_has(self):
636
 
        t = self.get_readonly_transport()
 
623
        server = self.get_readonly_server()
 
624
        t = self._transport(server.get_url())
637
625
        # Unfortunately httplib (see HTTPResponse._read_status
638
626
        # for details) make no distinction between a closed
639
627
        # socket and badly formatted status line, so we can't
645
633
                          t.has, 'foo/bar')
646
634
 
647
635
    def test_http_get(self):
648
 
        t = self.get_readonly_transport()
 
636
        server = self.get_readonly_server()
 
637
        t = self._transport(server.get_url())
649
638
        self.assertRaises((errors.ConnectionError, errors.ConnectionReset,
650
639
                           errors.InvalidHttpResponse),
651
640
                          t.get, 'foo/bar')
668
657
    _req_handler_class = BadStatusRequestHandler
669
658
 
670
659
    def test_http_has(self):
671
 
        t = self.get_readonly_transport()
 
660
        server = self.get_readonly_server()
 
661
        t = self._transport(server.get_url())
672
662
        self.assertRaises(errors.InvalidHttpResponse, t.has, 'foo/bar')
673
663
 
674
664
    def test_http_get(self):
675
 
        t = self.get_readonly_transport()
 
665
        server = self.get_readonly_server()
 
666
        t = self._transport(server.get_url())
676
667
        self.assertRaises(errors.InvalidHttpResponse, t.get, 'foo/bar')
677
668
 
678
669
 
683
674
        """Fakes handling a single HTTP request, returns a bad status"""
684
675
        ignored = http_server.TestingHTTPRequestHandler.parse_request(self)
685
676
        self.wfile.write("Invalid status line\r\n")
686
 
        # If we don't close the connection pycurl will hang. Since this is a
687
 
        # stress test we don't *have* to respect the protocol, but we don't
688
 
        # have to sabotage it too much either.
689
 
        self.close_connection = True
690
677
        return False
691
678
 
692
679
 
698
685
 
699
686
    _req_handler_class = InvalidStatusRequestHandler
700
687
 
 
688
    def test_http_has(self):
 
689
        if self._testing_pycurl() and self._protocol_version == 'HTTP/1.1':
 
690
            raise tests.KnownFailure(
 
691
                'pycurl hangs if the server send back garbage')
 
692
        super(TestInvalidStatusServer, self).test_http_has()
 
693
 
 
694
    def test_http_get(self):
 
695
        if self._testing_pycurl() and self._protocol_version == 'HTTP/1.1':
 
696
            raise tests.KnownFailure(
 
697
                'pycurl hangs if the server send back garbage')
 
698
        super(TestInvalidStatusServer, self).test_http_get()
 
699
 
701
700
 
702
701
class BadProtocolRequestHandler(http_server.TestingHTTPRequestHandler):
703
702
    """Whatever request comes in, returns a bad protocol version"""
719
718
    _req_handler_class = BadProtocolRequestHandler
720
719
 
721
720
    def setUp(self):
722
 
        if self._testing_pycurl():
 
721
        if pycurl_present and self._transport == PyCurlTransport:
723
722
            raise tests.TestNotApplicable(
724
723
                "pycurl doesn't check the protocol version")
725
724
        super(TestBadProtocolServer, self).setUp()
726
725
 
727
726
    def test_http_has(self):
728
 
        t = self.get_readonly_transport()
 
727
        server = self.get_readonly_server()
 
728
        t = self._transport(server.get_url())
729
729
        self.assertRaises(errors.InvalidHttpResponse, t.has, 'foo/bar')
730
730
 
731
731
    def test_http_get(self):
732
 
        t = self.get_readonly_transport()
 
732
        server = self.get_readonly_server()
 
733
        t = self._transport(server.get_url())
733
734
        self.assertRaises(errors.InvalidHttpResponse, t.get, 'foo/bar')
734
735
 
735
736
 
749
750
    _req_handler_class = ForbiddenRequestHandler
750
751
 
751
752
    def test_http_has(self):
752
 
        t = self.get_readonly_transport()
 
753
        server = self.get_readonly_server()
 
754
        t = self._transport(server.get_url())
753
755
        self.assertRaises(errors.TransportError, t.has, 'foo/bar')
754
756
 
755
757
    def test_http_get(self):
756
 
        t = self.get_readonly_transport()
 
758
        server = self.get_readonly_server()
 
759
        t = self._transport(server.get_url())
757
760
        self.assertRaises(errors.TransportError, t.get, 'foo/bar')
758
761
 
759
762
 
765
768
        self.assertEqual(None, server.host)
766
769
        self.assertEqual(None, server.port)
767
770
 
768
 
    def test_setUp_and_stop(self):
 
771
    def test_setUp_and_tearDown(self):
769
772
        server = RecordingServer(expect_body_tail=None)
770
 
        server.start_server()
 
773
        server.setUp()
771
774
        try:
772
775
            self.assertNotEqual(None, server.host)
773
776
            self.assertNotEqual(None, server.port)
774
777
        finally:
775
 
            server.stop_server()
 
778
            server.tearDown()
776
779
        self.assertEqual(None, server.host)
777
780
        self.assertEqual(None, server.port)
778
781
 
798
801
        self.build_tree_contents([('a', '0123456789')],)
799
802
 
800
803
    def test_readv(self):
801
 
        t = self.get_readonly_transport()
 
804
        server = self.get_readonly_server()
 
805
        t = self._transport(server.get_url())
802
806
        l = list(t.readv('a', ((0, 1), (1, 1), (3, 2), (9, 1))))
803
807
        self.assertEqual(l[0], (0, '0'))
804
808
        self.assertEqual(l[1], (1, '1'))
806
810
        self.assertEqual(l[3], (9, '9'))
807
811
 
808
812
    def test_readv_out_of_order(self):
809
 
        t = self.get_readonly_transport()
 
813
        server = self.get_readonly_server()
 
814
        t = self._transport(server.get_url())
810
815
        l = list(t.readv('a', ((1, 1), (9, 1), (0, 1), (3, 2))))
811
816
        self.assertEqual(l[0], (1, '1'))
812
817
        self.assertEqual(l[1], (9, '9'))
814
819
        self.assertEqual(l[3], (3, '34'))
815
820
 
816
821
    def test_readv_invalid_ranges(self):
817
 
        t = self.get_readonly_transport()
 
822
        server = self.get_readonly_server()
 
823
        t = self._transport(server.get_url())
818
824
 
819
825
        # This is intentionally reading off the end of the file
820
826
        # since we are sure that it cannot get there
828
834
 
829
835
    def test_readv_multiple_get_requests(self):
830
836
        server = self.get_readonly_server()
831
 
        t = self.get_readonly_transport()
 
837
        t = self._transport(server.get_url())
832
838
        # force transport to issue multiple requests
833
839
        t._max_readv_combine = 1
834
840
        t._max_get_ranges = 1
842
848
 
843
849
    def test_readv_get_max_size(self):
844
850
        server = self.get_readonly_server()
845
 
        t = self.get_readonly_transport()
 
851
        t = self._transport(server.get_url())
846
852
        # force transport to issue multiple requests by limiting the number of
847
853
        # bytes by request. Note that this apply to coalesced offsets only, a
848
854
        # single range will keep its size even if bigger than the limit.
857
863
 
858
864
    def test_complete_readv_leave_pipe_clean(self):
859
865
        server = self.get_readonly_server()
860
 
        t = self.get_readonly_transport()
 
866
        t = self._transport(server.get_url())
861
867
        # force transport to issue multiple requests
862
868
        t._get_max_size = 2
863
 
        list(t.readv('a', ((0, 1), (1, 1), (2, 4), (6, 4))))
 
869
        l = list(t.readv('a', ((0, 1), (1, 1), (2, 4), (6, 4))))
864
870
        # The server should have issued 3 requests
865
871
        self.assertEqual(3, server.GET_request_nb)
866
872
        self.assertEqual('0123456789', t.get_bytes('a'))
868
874
 
869
875
    def test_incomplete_readv_leave_pipe_clean(self):
870
876
        server = self.get_readonly_server()
871
 
        t = self.get_readonly_transport()
 
877
        t = self._transport(server.get_url())
872
878
        # force transport to issue multiple requests
873
879
        t._get_max_size = 2
874
880
        # Don't collapse readv results into a list so that we leave unread
943
949
    def get_multiple_ranges(self, file, file_size, ranges):
944
950
        self.send_response(206)
945
951
        self.send_header('Accept-Ranges', 'bytes')
946
 
        # XXX: this is strange; the 'random' name below seems undefined and
947
 
        # yet the tests pass -- mbp 2010-10-11 bug 658773
948
952
        boundary = "%d" % random.randint(0,0x7FFFFFFF)
949
953
        self.send_header("Content-Type",
950
954
                         "multipart/byteranges; boundary=%s" % boundary)
1012
1016
                return
1013
1017
            self.send_range_content(file, start, end - start + 1)
1014
1018
            cur += 1
1015
 
        # Final boundary
 
1019
        # No final boundary
1016
1020
        self.wfile.write(boundary_line)
1017
1021
 
1018
1022
 
1026
1030
 
1027
1031
    def test_readv_with_short_reads(self):
1028
1032
        server = self.get_readonly_server()
1029
 
        t = self.get_readonly_transport()
 
1033
        t = self._transport(server.get_url())
1030
1034
        # Force separate ranges for each offset
1031
1035
        t._bytes_to_read_before_seek = 0
1032
1036
        ireadv = iter(t.readv('a', ((0, 1), (2, 1), (4, 2), (9, 1))))
1047
1051
        # that mode
1048
1052
        self.assertEqual('single', t._range_hint)
1049
1053
 
1050
 
 
1051
 
class TruncatedBeforeBoundaryRequestHandler(
1052
 
    http_server.TestingHTTPRequestHandler):
1053
 
    """Truncation before a boundary, like in bug 198646"""
1054
 
 
1055
 
    _truncated_ranges = 1
1056
 
 
1057
 
    def get_multiple_ranges(self, file, file_size, ranges):
1058
 
        self.send_response(206)
1059
 
        self.send_header('Accept-Ranges', 'bytes')
1060
 
        boundary = 'tagada'
1061
 
        self.send_header('Content-Type',
1062
 
                         'multipart/byteranges; boundary=%s' % boundary)
1063
 
        boundary_line = '--%s\r\n' % boundary
1064
 
        # Calculate the Content-Length
1065
 
        content_length = 0
1066
 
        for (start, end) in ranges:
1067
 
            content_length += len(boundary_line)
1068
 
            content_length += self._header_line_length(
1069
 
                'Content-type', 'application/octet-stream')
1070
 
            content_length += self._header_line_length(
1071
 
                'Content-Range', 'bytes %d-%d/%d' % (start, end, file_size))
1072
 
            content_length += len('\r\n') # end headers
1073
 
            content_length += end - start # + 1
1074
 
        content_length += len(boundary_line)
1075
 
        self.send_header('Content-length', content_length)
1076
 
        self.end_headers()
1077
 
 
1078
 
        # Send the multipart body
1079
 
        cur = 0
1080
 
        for (start, end) in ranges:
1081
 
            if cur + self._truncated_ranges >= len(ranges):
1082
 
                # Abruptly ends the response and close the connection
1083
 
                self.close_connection = 1
1084
 
                return
1085
 
            self.wfile.write(boundary_line)
1086
 
            self.send_header('Content-type', 'application/octet-stream')
1087
 
            self.send_header('Content-Range', 'bytes %d-%d/%d'
1088
 
                             % (start, end, file_size))
1089
 
            self.end_headers()
1090
 
            self.send_range_content(file, start, end - start + 1)
1091
 
            cur += 1
1092
 
        # Final boundary
1093
 
        self.wfile.write(boundary_line)
1094
 
 
1095
 
 
1096
 
class TestTruncatedBeforeBoundary(TestSpecificRequestHandler):
1097
 
    """Tests the case of bug 198646, disconnecting before a boundary."""
1098
 
 
1099
 
    _req_handler_class = TruncatedBeforeBoundaryRequestHandler
1100
 
 
1101
 
    def setUp(self):
1102
 
        super(TestTruncatedBeforeBoundary, self).setUp()
1103
 
        self.build_tree_contents([('a', '0123456789')],)
1104
 
 
1105
 
    def test_readv_with_short_reads(self):
1106
 
        server = self.get_readonly_server()
1107
 
        t = self.get_readonly_transport()
1108
 
        # Force separate ranges for each offset
1109
 
        t._bytes_to_read_before_seek = 0
1110
 
        ireadv = iter(t.readv('a', ((0, 1), (2, 1), (4, 2), (9, 1))))
1111
 
        self.assertEqual((0, '0'), ireadv.next())
1112
 
        self.assertEqual((2, '2'), ireadv.next())
1113
 
        self.assertEqual((4, '45'), ireadv.next())
1114
 
        self.assertEqual((9, '9'), ireadv.next())
1115
 
 
1116
 
 
1117
1054
class LimitedRangeRequestHandler(http_server.TestingHTTPRequestHandler):
1118
1055
    """Errors out when range specifiers exceed the limit"""
1119
1056
 
1143
1080
class TestLimitedRangeRequestServer(http_utils.TestCaseWithWebserver):
1144
1081
    """Tests readv requests against a server erroring out on too much ranges."""
1145
1082
 
1146
 
    scenarios = multiply_scenarios(
1147
 
        vary_by_http_client_implementation(),
1148
 
        vary_by_http_protocol_version(),
1149
 
        )
1150
 
 
1151
1083
    # Requests with more range specifiers will error out
1152
1084
    range_limit = 3
1153
1085
 
1155
1087
        return LimitedRangeHTTPServer(range_limit=self.range_limit,
1156
1088
                                      protocol_version=self._protocol_version)
1157
1089
 
 
1090
    def get_transport(self):
 
1091
        return self._transport(self.get_readonly_server().get_url())
 
1092
 
1158
1093
    def setUp(self):
1159
1094
        http_utils.TestCaseWithWebserver.setUp(self)
1160
1095
        # We need to manipulate ranges that correspond to real chunks in the
1164
1099
        self.build_tree_contents([('a', content)],)
1165
1100
 
1166
1101
    def test_few_ranges(self):
1167
 
        t = self.get_readonly_transport()
 
1102
        t = self.get_transport()
1168
1103
        l = list(t.readv('a', ((0, 4), (1024, 4), )))
1169
1104
        self.assertEqual(l[0], (0, '0000'))
1170
1105
        self.assertEqual(l[1], (1024, '0001'))
1171
1106
        self.assertEqual(1, self.get_readonly_server().GET_request_nb)
1172
1107
 
1173
1108
    def test_more_ranges(self):
1174
 
        t = self.get_readonly_transport()
 
1109
        t = self.get_transport()
1175
1110
        l = list(t.readv('a', ((0, 4), (1024, 4), (4096, 4), (8192, 4))))
1176
1111
        self.assertEqual(l[0], (0, '0000'))
1177
1112
        self.assertEqual(l[1], (1024, '0001'))
1188
1123
    Only the urllib implementation is tested here.
1189
1124
    """
1190
1125
 
 
1126
    def setUp(self):
 
1127
        tests.TestCase.setUp(self)
 
1128
        self._old_env = {}
 
1129
 
 
1130
    def tearDown(self):
 
1131
        self._restore_env()
 
1132
        tests.TestCase.tearDown(self)
 
1133
 
 
1134
    def _install_env(self, env):
 
1135
        for name, value in env.iteritems():
 
1136
            self._old_env[name] = osutils.set_or_unset_env(name, value)
 
1137
 
 
1138
    def _restore_env(self):
 
1139
        for name, value in self._old_env.iteritems():
 
1140
            osutils.set_or_unset_env(name, value)
 
1141
 
1191
1142
    def _proxied_request(self):
1192
1143
        handler = _urllib2_wrappers.ProxyHandler()
1193
 
        request = _urllib2_wrappers.Request('GET', 'http://baz/buzzle')
 
1144
        request = _urllib2_wrappers.Request('GET','http://baz/buzzle')
1194
1145
        handler.set_proxy(request, 'http')
1195
1146
        return request
1196
1147
 
1197
 
    def assertEvaluateProxyBypass(self, expected, host, no_proxy):
1198
 
        handler = _urllib2_wrappers.ProxyHandler()
1199
 
        self.assertEquals(expected,
1200
 
                          handler.evaluate_proxy_bypass(host, no_proxy))
1201
 
 
1202
1148
    def test_empty_user(self):
1203
 
        self.overrideEnv('http_proxy', 'http://bar.com')
1204
 
        request = self._proxied_request()
1205
 
        self.assertFalse(request.headers.has_key('Proxy-authorization'))
1206
 
 
1207
 
    def test_user_with_at(self):
1208
 
        self.overrideEnv('http_proxy',
1209
 
                         'http://username@domain:password@proxy_host:1234')
 
1149
        self._install_env({'http_proxy': 'http://bar.com'})
1210
1150
        request = self._proxied_request()
1211
1151
        self.assertFalse(request.headers.has_key('Proxy-authorization'))
1212
1152
 
1213
1153
    def test_invalid_proxy(self):
1214
1154
        """A proxy env variable without scheme"""
1215
 
        self.overrideEnv('http_proxy', 'host:1234')
 
1155
        self._install_env({'http_proxy': 'host:1234'})
1216
1156
        self.assertRaises(errors.InvalidURL, self._proxied_request)
1217
1157
 
1218
 
    def test_evaluate_proxy_bypass_true(self):
1219
 
        """The host is not proxied"""
1220
 
        self.assertEvaluateProxyBypass(True, 'example.com', 'example.com')
1221
 
        self.assertEvaluateProxyBypass(True, 'bzr.example.com', '*example.com')
1222
 
 
1223
 
    def test_evaluate_proxy_bypass_false(self):
1224
 
        """The host is proxied"""
1225
 
        self.assertEvaluateProxyBypass(False, 'bzr.example.com', None)
1226
 
 
1227
 
    def test_evaluate_proxy_bypass_unknown(self):
1228
 
        """The host is not explicitly proxied"""
1229
 
        self.assertEvaluateProxyBypass(None, 'example.com', 'not.example.com')
1230
 
        self.assertEvaluateProxyBypass(None, 'bzr.example.com', 'example.com')
1231
 
 
1232
 
    def test_evaluate_proxy_bypass_empty_entries(self):
1233
 
        """Ignore empty entries"""
1234
 
        self.assertEvaluateProxyBypass(None, 'example.com', '')
1235
 
        self.assertEvaluateProxyBypass(None, 'example.com', ',')
1236
 
        self.assertEvaluateProxyBypass(None, 'example.com', 'foo,,bar')
1237
 
 
1238
1158
 
1239
1159
class TestProxyHttpServer(http_utils.TestCaseWithTwoWebservers):
1240
1160
    """Tests proxy server.
1245
1165
    to the file names).
1246
1166
    """
1247
1167
 
1248
 
    scenarios = multiply_scenarios(
1249
 
        vary_by_http_client_implementation(),
1250
 
        vary_by_http_protocol_version(),
1251
 
        )
1252
 
 
1253
1168
    # FIXME: We don't have an https server available, so we don't
1254
 
    # test https connections. --vila toolongago
 
1169
    # test https connections.
1255
1170
 
1256
1171
    def setUp(self):
1257
1172
        super(TestProxyHttpServer, self).setUp()
1258
 
        self.transport_secondary_server = http_utils.ProxyServer
1259
1173
        self.build_tree_contents([('foo', 'contents of foo\n'),
1260
1174
                                  ('foo-proxied', 'proxied contents of foo\n')])
1261
1175
        # Let's setup some attributes for tests
1262
 
        server = self.get_readonly_server()
1263
 
        self.server_host_port = '%s:%d' % (server.host, server.port)
 
1176
        self.server = self.get_readonly_server()
 
1177
        self.proxy_address = '%s:%d' % (self.server.host, self.server.port)
1264
1178
        if self._testing_pycurl():
1265
1179
            # Oh my ! pycurl does not check for the port as part of
1266
1180
            # no_proxy :-( So we just test the host part
1267
 
            self.no_proxy_host = server.host
 
1181
            self.no_proxy_host = 'localhost'
1268
1182
        else:
1269
 
            self.no_proxy_host = self.server_host_port
 
1183
            self.no_proxy_host = self.proxy_address
1270
1184
        # The secondary server is the proxy
1271
 
        self.proxy_url = self.get_secondary_url()
 
1185
        self.proxy = self.get_secondary_server()
 
1186
        self.proxy_url = self.proxy.get_url()
 
1187
        self._old_env = {}
1272
1188
 
1273
1189
    def _testing_pycurl(self):
1274
 
        # TODO: This is duplicated for lots of the classes in this file
1275
 
        return (features.pycurl.available()
1276
 
                and self._transport == PyCurlTransport)
1277
 
 
1278
 
    def assertProxied(self):
1279
 
        t = self.get_readonly_transport()
1280
 
        self.assertEqual('proxied contents of foo\n', t.get('foo').read())
1281
 
 
1282
 
    def assertNotProxied(self):
1283
 
        t = self.get_readonly_transport()
1284
 
        self.assertEqual('contents of foo\n', t.get('foo').read())
 
1190
        return pycurl_present and self._transport == PyCurlTransport
 
1191
 
 
1192
    def create_transport_secondary_server(self):
 
1193
        """Creates an http server that will serve files with
 
1194
        '-proxied' appended to their names.
 
1195
        """
 
1196
        return http_utils.ProxyServer(protocol_version=self._protocol_version)
 
1197
 
 
1198
    def _install_env(self, env):
 
1199
        for name, value in env.iteritems():
 
1200
            self._old_env[name] = osutils.set_or_unset_env(name, value)
 
1201
 
 
1202
    def _restore_env(self):
 
1203
        for name, value in self._old_env.iteritems():
 
1204
            osutils.set_or_unset_env(name, value)
 
1205
 
 
1206
    def proxied_in_env(self, env):
 
1207
        self._install_env(env)
 
1208
        url = self.server.get_url()
 
1209
        t = self._transport(url)
 
1210
        try:
 
1211
            self.assertEqual('proxied contents of foo\n', t.get('foo').read())
 
1212
        finally:
 
1213
            self._restore_env()
 
1214
 
 
1215
    def not_proxied_in_env(self, env):
 
1216
        self._install_env(env)
 
1217
        url = self.server.get_url()
 
1218
        t = self._transport(url)
 
1219
        try:
 
1220
            self.assertEqual('contents of foo\n', t.get('foo').read())
 
1221
        finally:
 
1222
            self._restore_env()
1285
1223
 
1286
1224
    def test_http_proxy(self):
1287
 
        self.overrideEnv('http_proxy', self.proxy_url)
1288
 
        self.assertProxied()
 
1225
        self.proxied_in_env({'http_proxy': self.proxy_url})
1289
1226
 
1290
1227
    def test_HTTP_PROXY(self):
1291
1228
        if self._testing_pycurl():
1294
1231
            # about. Should we ?)
1295
1232
            raise tests.TestNotApplicable(
1296
1233
                'pycurl does not check HTTP_PROXY for security reasons')
1297
 
        self.overrideEnv('HTTP_PROXY', self.proxy_url)
1298
 
        self.assertProxied()
 
1234
        self.proxied_in_env({'HTTP_PROXY': self.proxy_url})
1299
1235
 
1300
1236
    def test_all_proxy(self):
1301
 
        self.overrideEnv('all_proxy', self.proxy_url)
1302
 
        self.assertProxied()
 
1237
        self.proxied_in_env({'all_proxy': self.proxy_url})
1303
1238
 
1304
1239
    def test_ALL_PROXY(self):
1305
 
        self.overrideEnv('ALL_PROXY', self.proxy_url)
1306
 
        self.assertProxied()
 
1240
        self.proxied_in_env({'ALL_PROXY': self.proxy_url})
1307
1241
 
1308
1242
    def test_http_proxy_with_no_proxy(self):
1309
 
        self.overrideEnv('no_proxy', self.no_proxy_host)
1310
 
        self.overrideEnv('http_proxy', self.proxy_url)
1311
 
        self.assertNotProxied()
 
1243
        self.not_proxied_in_env({'http_proxy': self.proxy_url,
 
1244
                                 'no_proxy': self.no_proxy_host})
1312
1245
 
1313
1246
    def test_HTTP_PROXY_with_NO_PROXY(self):
1314
1247
        if self._testing_pycurl():
1315
1248
            raise tests.TestNotApplicable(
1316
1249
                'pycurl does not check HTTP_PROXY for security reasons')
1317
 
        self.overrideEnv('NO_PROXY', self.no_proxy_host)
1318
 
        self.overrideEnv('HTTP_PROXY', self.proxy_url)
1319
 
        self.assertNotProxied()
 
1250
        self.not_proxied_in_env({'HTTP_PROXY': self.proxy_url,
 
1251
                                 'NO_PROXY': self.no_proxy_host})
1320
1252
 
1321
1253
    def test_all_proxy_with_no_proxy(self):
1322
 
        self.overrideEnv('no_proxy', self.no_proxy_host)
1323
 
        self.overrideEnv('all_proxy', self.proxy_url)
1324
 
        self.assertNotProxied()
 
1254
        self.not_proxied_in_env({'all_proxy': self.proxy_url,
 
1255
                                 'no_proxy': self.no_proxy_host})
1325
1256
 
1326
1257
    def test_ALL_PROXY_with_NO_PROXY(self):
1327
 
        self.overrideEnv('NO_PROXY', self.no_proxy_host)
1328
 
        self.overrideEnv('ALL_PROXY', self.proxy_url)
1329
 
        self.assertNotProxied()
 
1258
        self.not_proxied_in_env({'ALL_PROXY': self.proxy_url,
 
1259
                                 'NO_PROXY': self.no_proxy_host})
1330
1260
 
1331
1261
    def test_http_proxy_without_scheme(self):
1332
 
        self.overrideEnv('http_proxy', self.server_host_port)
1333
1262
        if self._testing_pycurl():
1334
1263
            # pycurl *ignores* invalid proxy env variables. If that ever change
1335
1264
            # in the future, this test will fail indicating that pycurl do not
1336
1265
            # ignore anymore such variables.
1337
 
            self.assertNotProxied()
 
1266
            self.not_proxied_in_env({'http_proxy': self.proxy_address})
1338
1267
        else:
1339
 
            self.assertRaises(errors.InvalidURL, self.assertProxied)
 
1268
            self.assertRaises(errors.InvalidURL,
 
1269
                              self.proxied_in_env,
 
1270
                              {'http_proxy': self.proxy_address})
1340
1271
 
1341
1272
 
1342
1273
class TestRanges(http_utils.TestCaseWithWebserver):
1343
1274
    """Test the Range header in GET methods."""
1344
1275
 
1345
 
    scenarios = multiply_scenarios(
1346
 
        vary_by_http_client_implementation(),
1347
 
        vary_by_http_protocol_version(),
1348
 
        )
1349
 
 
1350
1276
    def setUp(self):
1351
1277
        http_utils.TestCaseWithWebserver.setUp(self)
1352
1278
        self.build_tree_contents([('a', '0123456789')],)
 
1279
        server = self.get_readonly_server()
 
1280
        self.transport = self._transport(server.get_url())
1353
1281
 
1354
1282
    def create_transport_readonly_server(self):
1355
1283
        return http_server.HttpServer(protocol_version=self._protocol_version)
1356
1284
 
1357
1285
    def _file_contents(self, relpath, ranges):
1358
 
        t = self.get_readonly_transport()
1359
1286
        offsets = [ (start, end - start + 1) for start, end in ranges]
1360
 
        coalesce = t._coalesce_offsets
 
1287
        coalesce = self.transport._coalesce_offsets
1361
1288
        coalesced = list(coalesce(offsets, limit=0, fudge_factor=0))
1362
 
        code, data = t._get(relpath, coalesced)
 
1289
        code, data = self.transport._get(relpath, coalesced)
1363
1290
        self.assertTrue(code in (200, 206),'_get returns: %d' % code)
1364
1291
        for start, end in ranges:
1365
1292
            data.seek(start)
1366
1293
            yield data.read(end - start + 1)
1367
1294
 
1368
1295
    def _file_tail(self, relpath, tail_amount):
1369
 
        t = self.get_readonly_transport()
1370
 
        code, data = t._get(relpath, [], tail_amount)
 
1296
        code, data = self.transport._get(relpath, [], tail_amount)
1371
1297
        self.assertTrue(code in (200, 206),'_get returns: %d' % code)
1372
1298
        data.seek(-tail_amount, 2)
1373
1299
        return data.read(tail_amount)
1392
1318
class TestHTTPRedirections(http_utils.TestCaseWithRedirectedWebserver):
1393
1319
    """Test redirection between http servers."""
1394
1320
 
1395
 
    scenarios = multiply_scenarios(
1396
 
        vary_by_http_client_implementation(),
1397
 
        vary_by_http_protocol_version(),
1398
 
        )
 
1321
    def create_transport_secondary_server(self):
 
1322
        """Create the secondary server redirecting to the primary server"""
 
1323
        new = self.get_readonly_server()
 
1324
 
 
1325
        redirecting = http_utils.HTTPServerRedirecting(
 
1326
            protocol_version=self._protocol_version)
 
1327
        redirecting.redirect_to(new.host, new.port)
 
1328
        return redirecting
1399
1329
 
1400
1330
    def setUp(self):
1401
1331
        super(TestHTTPRedirections, self).setUp()
1403
1333
                                  ('bundle',
1404
1334
                                  '# Bazaar revision bundle v0.9\n#\n')
1405
1335
                                  ],)
 
1336
        # The requests to the old server will be redirected to the new server
 
1337
        self.old_transport = self._transport(self.old_server.get_url())
1406
1338
 
1407
1339
    def test_redirected(self):
1408
 
        self.assertRaises(errors.RedirectRequested,
1409
 
                          self.get_old_transport().get, 'a')
1410
 
        self.assertEqual('0123456789', self.get_new_transport().get('a').read())
 
1340
        self.assertRaises(errors.RedirectRequested, self.old_transport.get, 'a')
 
1341
        t = self._transport(self.new_server.get_url())
 
1342
        self.assertEqual('0123456789', t.get('a').read())
 
1343
 
 
1344
    def test_read_redirected_bundle_from_url(self):
 
1345
        from bzrlib.bundle import read_bundle_from_url
 
1346
        url = self.old_transport.abspath('bundle')
 
1347
        bundle = self.applyDeprecated(deprecated_in((1, 12, 0)),
 
1348
                read_bundle_from_url, url)
 
1349
        # If read_bundle_from_url was successful we get an empty bundle
 
1350
        self.assertEqual([], bundle.revisions)
1411
1351
 
1412
1352
 
1413
1353
class RedirectedRequest(_urllib2_wrappers.Request):
1426
1366
        self.follow_redirections = True
1427
1367
 
1428
1368
 
1429
 
def install_redirected_request(test):
1430
 
    test.overrideAttr(_urllib2_wrappers, 'Request', RedirectedRequest)
1431
 
 
1432
 
 
1433
 
def cleanup_http_redirection_connections(test):
1434
 
    # Some sockets are opened but never seen by _urllib, so we trap them at
1435
 
    # the _urllib2_wrappers level to be able to clean them up.
1436
 
    def socket_disconnect(sock):
1437
 
        try:
1438
 
            sock.shutdown(socket.SHUT_RDWR)
1439
 
            sock.close()
1440
 
        except socket.error:
1441
 
            pass
1442
 
    def connect(connection):
1443
 
        test.http_connect_orig(connection)
1444
 
        test.addCleanup(socket_disconnect, connection.sock)
1445
 
    test.http_connect_orig = test.overrideAttr(
1446
 
        _urllib2_wrappers.HTTPConnection, 'connect', connect)
1447
 
    def connect(connection):
1448
 
        test.https_connect_orig(connection)
1449
 
        test.addCleanup(socket_disconnect, connection.sock)
1450
 
    test.https_connect_orig = test.overrideAttr(
1451
 
        _urllib2_wrappers.HTTPSConnection, 'connect', connect)
1452
 
 
1453
 
 
1454
1369
class TestHTTPSilentRedirections(http_utils.TestCaseWithRedirectedWebserver):
1455
1370
    """Test redirections.
1456
1371
 
1465
1380
    -- vila 20070212
1466
1381
    """
1467
1382
 
1468
 
    scenarios = multiply_scenarios(
1469
 
        vary_by_http_client_implementation(),
1470
 
        vary_by_http_protocol_version(),
1471
 
        )
1472
 
 
1473
1383
    def setUp(self):
1474
 
        if (features.pycurl.available()
1475
 
            and self._transport == PyCurlTransport):
 
1384
        if pycurl_present and self._transport == PyCurlTransport:
1476
1385
            raise tests.TestNotApplicable(
1477
 
                "pycurl doesn't redirect silently anymore")
 
1386
                "pycurl doesn't redirect silently annymore")
1478
1387
        super(TestHTTPSilentRedirections, self).setUp()
1479
 
        install_redirected_request(self)
1480
 
        cleanup_http_redirection_connections(self)
 
1388
        self.setup_redirected_request()
 
1389
        self.addCleanup(self.cleanup_redirected_request)
1481
1390
        self.build_tree_contents([('a','a'),
1482
1391
                                  ('1/',),
1483
1392
                                  ('1/a', 'redirected once'),
1491
1400
                                  ('5/a', 'redirected 5 times'),
1492
1401
                                  ],)
1493
1402
 
 
1403
        self.old_transport = self._transport(self.old_server.get_url())
 
1404
 
 
1405
    def setup_redirected_request(self):
 
1406
        self.original_class = _urllib2_wrappers.Request
 
1407
        _urllib2_wrappers.Request = RedirectedRequest
 
1408
 
 
1409
    def cleanup_redirected_request(self):
 
1410
        _urllib2_wrappers.Request = self.original_class
 
1411
 
 
1412
    def create_transport_secondary_server(self):
 
1413
        """Create the secondary server, redirections are defined in the tests"""
 
1414
        return http_utils.HTTPServerRedirecting(
 
1415
            protocol_version=self._protocol_version)
 
1416
 
1494
1417
    def test_one_redirection(self):
1495
 
        t = self.get_old_transport()
1496
 
        req = RedirectedRequest('GET', t._remote_path('a'))
 
1418
        t = self.old_transport
 
1419
 
 
1420
        req = RedirectedRequest('GET', t.abspath('a'))
 
1421
        req.follow_redirections = True
1497
1422
        new_prefix = 'http://%s:%s' % (self.new_server.host,
1498
1423
                                       self.new_server.port)
1499
1424
        self.old_server.redirections = \
1500
1425
            [('(.*)', r'%s/1\1' % (new_prefix), 301),]
1501
 
        self.assertEqual('redirected once', t._perform(req).read())
 
1426
        self.assertEquals('redirected once',t._perform(req).read())
1502
1427
 
1503
1428
    def test_five_redirections(self):
1504
 
        t = self.get_old_transport()
1505
 
        req = RedirectedRequest('GET', t._remote_path('a'))
 
1429
        t = self.old_transport
 
1430
 
 
1431
        req = RedirectedRequest('GET', t.abspath('a'))
 
1432
        req.follow_redirections = True
1506
1433
        old_prefix = 'http://%s:%s' % (self.old_server.host,
1507
1434
                                       self.old_server.port)
1508
1435
        new_prefix = 'http://%s:%s' % (self.new_server.host,
1514
1441
            ('/4(.*)', r'%s/5\1' % (new_prefix), 301),
1515
1442
            ('(/[^/]+)', r'%s/1\1' % (old_prefix), 301),
1516
1443
            ]
1517
 
        self.assertEqual('redirected 5 times', t._perform(req).read())
 
1444
        self.assertEquals('redirected 5 times',t._perform(req).read())
1518
1445
 
1519
1446
 
1520
1447
class TestDoCatchRedirections(http_utils.TestCaseWithRedirectedWebserver):
1521
1448
    """Test transport.do_catching_redirections."""
1522
1449
 
1523
 
    scenarios = multiply_scenarios(
1524
 
        vary_by_http_client_implementation(),
1525
 
        vary_by_http_protocol_version(),
1526
 
        )
1527
 
 
1528
1450
    def setUp(self):
1529
1451
        super(TestDoCatchRedirections, self).setUp()
1530
1452
        self.build_tree_contents([('a', '0123456789'),],)
1531
 
        cleanup_http_redirection_connections(self)
1532
 
 
1533
 
        self.old_transport = self.get_old_transport()
1534
 
 
1535
 
    def get_a(self, t):
1536
 
        return t.get('a')
 
1453
 
 
1454
        self.old_transport = self._transport(self.old_server.get_url())
 
1455
 
 
1456
    def get_a(self, transport):
 
1457
        return transport.get('a')
1537
1458
 
1538
1459
    def test_no_redirection(self):
1539
 
        t = self.get_new_transport()
 
1460
        t = self._transport(self.new_server.get_url())
1540
1461
 
1541
1462
        # We use None for redirected so that we fail if redirected
1542
 
        self.assertEqual('0123456789',
1543
 
                         transport.do_catching_redirections(
 
1463
        self.assertEquals('0123456789',
 
1464
                          transport.do_catching_redirections(
1544
1465
                self.get_a, t, None).read())
1545
1466
 
1546
1467
    def test_one_redirection(self):
1547
1468
        self.redirections = 0
1548
1469
 
1549
 
        def redirected(t, exception, redirection_notice):
 
1470
        def redirected(transport, exception, redirection_notice):
1550
1471
            self.redirections += 1
1551
 
            redirected_t = t._redirected_to(exception.source, exception.target)
1552
 
            return redirected_t
 
1472
            dir, file = urlutils.split(exception.target)
 
1473
            return self._transport(dir)
1553
1474
 
1554
 
        self.assertEqual('0123456789',
1555
 
                         transport.do_catching_redirections(
 
1475
        self.assertEquals('0123456789',
 
1476
                          transport.do_catching_redirections(
1556
1477
                self.get_a, self.old_transport, redirected).read())
1557
 
        self.assertEqual(1, self.redirections)
 
1478
        self.assertEquals(1, self.redirections)
1558
1479
 
1559
1480
    def test_redirection_loop(self):
1560
1481
 
1569
1490
                          self.get_a, self.old_transport, redirected)
1570
1491
 
1571
1492
 
1572
 
def _setup_authentication_config(**kwargs):
1573
 
    conf = config.AuthenticationConfig()
1574
 
    conf._get_config().update({'httptest': kwargs})
1575
 
    conf._save()
1576
 
 
1577
 
 
1578
 
class TestUrllib2AuthHandler(tests.TestCaseWithTransport):
1579
 
    """Unit tests for glue by which urllib2 asks us for authentication"""
1580
 
 
1581
 
    def test_get_user_password_without_port(self):
1582
 
        """We cope if urllib2 doesn't tell us the port.
1583
 
 
1584
 
        See https://bugs.launchpad.net/bzr/+bug/654684
1585
 
        """
1586
 
        user = 'joe'
1587
 
        password = 'foo'
1588
 
        _setup_authentication_config(scheme='http', host='localhost',
1589
 
                                     user=user, password=password)
1590
 
        handler = _urllib2_wrappers.HTTPAuthHandler()
1591
 
        got_pass = handler.get_user_password(dict(
1592
 
            user='joe',
1593
 
            protocol='http',
1594
 
            host='localhost',
1595
 
            path='/',
1596
 
            realm='Realm',
1597
 
            ))
1598
 
        self.assertEquals((user, password), got_pass)
1599
 
 
1600
 
 
1601
1493
class TestAuth(http_utils.TestCaseWithWebserver):
1602
1494
    """Test authentication scheme"""
1603
1495
 
1604
 
    scenarios = multiply_scenarios(
1605
 
        vary_by_http_client_implementation(),
1606
 
        vary_by_http_protocol_version(),
1607
 
        vary_by_http_auth_scheme(),
1608
 
        )
 
1496
    _auth_header = 'Authorization'
 
1497
    _password_prompt_prefix = ''
 
1498
    _username_prompt_prefix = ''
 
1499
    # Set by load_tests
 
1500
    _auth_server = None
1609
1501
 
1610
1502
    def setUp(self):
1611
1503
        super(TestAuth, self).setUp()
1614
1506
                                  ('b', 'contents of b\n'),])
1615
1507
 
1616
1508
    def create_transport_readonly_server(self):
1617
 
        server = self._auth_server(protocol_version=self._protocol_version)
1618
 
        server._url_protocol = self._url_protocol
1619
 
        return server
 
1509
        return self._auth_server(protocol_version=self._protocol_version)
1620
1510
 
1621
1511
    def _testing_pycurl(self):
1622
 
        # TODO: This is duplicated for lots of the classes in this file
1623
 
        return (features.pycurl.available()
1624
 
                and self._transport == PyCurlTransport)
 
1512
        return pycurl_present and self._transport == PyCurlTransport
1625
1513
 
1626
1514
    def get_user_url(self, user, password):
1627
1515
        """Build an url embedding user and password"""
1635
1523
        return url
1636
1524
 
1637
1525
    def get_user_transport(self, user, password):
1638
 
        t = transport.get_transport(self.get_user_url(user, password))
1639
 
        return t
 
1526
        return self._transport(self.get_user_url(user, password))
1640
1527
 
1641
1528
    def test_no_user(self):
1642
1529
        self.server.add_user('joe', 'foo')
1693
1580
        self.assertEqual('', ui.ui_factory.stdin.readline())
1694
1581
        stderr.seek(0)
1695
1582
        expected_prompt = self._expected_username_prompt(t._unqualified_scheme)
1696
 
        self.assertEqual(expected_prompt, stderr.read(len(expected_prompt)))
1697
 
        self.assertEqual('', stdout.getvalue())
 
1583
        self.assertEquals(expected_prompt, stderr.read(len(expected_prompt)))
 
1584
        self.assertEquals('', stdout.getvalue())
1698
1585
        self._check_password_prompt(t._unqualified_scheme, 'joe',
1699
1586
                                    stderr.readline())
1700
1587
 
1715
1602
        self.assertEqual('', ui.ui_factory.stdin.readline())
1716
1603
        self._check_password_prompt(t._unqualified_scheme, 'joe',
1717
1604
                                    stderr.getvalue())
1718
 
        self.assertEqual('', stdout.getvalue())
 
1605
        self.assertEquals('', stdout.getvalue())
1719
1606
        # And we shouldn't prompt again for a different request
1720
1607
        # against the same transport.
1721
1608
        self.assertEqual('contents of b\n',t.get('b').read())
1731
1618
                              % (scheme.upper(),
1732
1619
                                 user, self.server.host, self.server.port,
1733
1620
                                 self.server.auth_realm)))
1734
 
        self.assertEqual(expected_prompt, actual_prompt)
 
1621
        self.assertEquals(expected_prompt, actual_prompt)
1735
1622
 
1736
1623
    def _expected_username_prompt(self, scheme):
1737
1624
        return (self._username_prompt_prefix
1751
1638
        self.server.add_user(user, password)
1752
1639
        t = self.get_user_transport(user, None)
1753
1640
        ui.ui_factory = tests.TestUIFactory(stdin=stdin_content,
1754
 
                                            stderr=tests.StringIOWrapper())
 
1641
                                            stdout=tests.StringIOWrapper())
1755
1642
        # Create a minimal config file with the right password
1756
 
        _setup_authentication_config(scheme='http', port=self.server.port,
1757
 
                                     user=user, password=password)
 
1643
        conf = config.AuthenticationConfig()
 
1644
        conf._get_config().update(
 
1645
            {'httptest': {'scheme': 'http', 'port': self.server.port,
 
1646
                          'user': user, 'password': password}})
 
1647
        conf._save()
1758
1648
        # Issue a request to the server to connect
1759
1649
        self.assertEqual('contents of a\n',t.get('a').read())
1760
1650
        # stdin should have  been left untouched
1762
1652
        # Only one 'Authentication Required' error should occur
1763
1653
        self.assertEqual(1, self.server.auth_required_errors)
1764
1654
 
 
1655
    def test_user_from_auth_conf(self):
 
1656
        if self._testing_pycurl():
 
1657
            raise tests.TestNotApplicable(
 
1658
                'pycurl does not support authentication.conf')
 
1659
        user = 'joe'
 
1660
        password = 'foo'
 
1661
        self.server.add_user(user, password)
 
1662
        # Create a minimal config file with the right password
 
1663
        conf = config.AuthenticationConfig()
 
1664
        conf._get_config().update(
 
1665
            {'httptest': {'scheme': 'http', 'port': self.server.port,
 
1666
                          'user': user, 'password': password}})
 
1667
        conf._save()
 
1668
        t = self.get_user_transport(None, None)
 
1669
        # Issue a request to the server to connect
 
1670
        self.assertEqual('contents of a\n', t.get('a').read())
 
1671
        # Only one 'Authentication Required' error should occur
 
1672
        self.assertEqual(1, self.server.auth_required_errors)
 
1673
 
1765
1674
    def test_changing_nonce(self):
1766
1675
        if self._auth_server not in (http_utils.HTTPDigestAuthServer,
1767
1676
                                     http_utils.ProxyDigestAuthServer):
1768
1677
            raise tests.TestNotApplicable('HTTP/proxy auth digest only test')
1769
1678
        if self._testing_pycurl():
1770
 
            self.knownFailure(
 
1679
            raise tests.KnownFailure(
1771
1680
                'pycurl does not handle a nonce change')
1772
1681
        self.server.add_user('joe', 'foo')
1773
1682
        t = self.get_user_transport('joe', 'foo')
1783
1692
        # initial 'who are you' and a second 'who are you' with the new nonce)
1784
1693
        self.assertEqual(2, self.server.auth_required_errors)
1785
1694
 
1786
 
    def test_user_from_auth_conf(self):
1787
 
        if self._testing_pycurl():
1788
 
            raise tests.TestNotApplicable(
1789
 
                'pycurl does not support authentication.conf')
1790
 
        user = 'joe'
1791
 
        password = 'foo'
1792
 
        self.server.add_user(user, password)
1793
 
        _setup_authentication_config(scheme='http', port=self.server.port,
1794
 
                                     user=user, password=password)
1795
 
        t = self.get_user_transport(None, None)
1796
 
        # Issue a request to the server to connect
1797
 
        self.assertEqual('contents of a\n', t.get('a').read())
1798
 
        # Only one 'Authentication Required' error should occur
1799
 
        self.assertEqual(1, self.server.auth_required_errors)
1800
 
 
1801
 
    def test_no_credential_leaks_in_log(self):
1802
 
        self.overrideAttr(debug, 'debug_flags', set(['http']))
1803
 
        user = 'joe'
1804
 
        password = 'very-sensitive-password'
1805
 
        self.server.add_user(user, password)
1806
 
        t = self.get_user_transport(user, password)
1807
 
        # Capture the debug calls to mutter
1808
 
        self.mutters = []
1809
 
        def mutter(*args):
1810
 
            lines = args[0] % args[1:]
1811
 
            # Some calls output multiple lines, just split them now since we
1812
 
            # care about a single one later.
1813
 
            self.mutters.extend(lines.splitlines())
1814
 
        self.overrideAttr(trace, 'mutter', mutter)
1815
 
        # Issue a request to the server to connect
1816
 
        self.assertEqual(True, t.has('a'))
1817
 
        # Only one 'Authentication Required' error should occur
1818
 
        self.assertEqual(1, self.server.auth_required_errors)
1819
 
        # Since the authentification succeeded, there should be a corresponding
1820
 
        # debug line
1821
 
        sent_auth_headers = [line for line in self.mutters
1822
 
                             if line.startswith('> %s' % (self._auth_header,))]
1823
 
        self.assertLength(1, sent_auth_headers)
1824
 
        self.assertStartsWith(sent_auth_headers[0],
1825
 
                              '> %s: <masked>' % (self._auth_header,))
1826
1695
 
1827
1696
 
1828
1697
class TestProxyAuth(TestAuth):
1829
 
    """Test proxy authentication schemes.
1830
 
 
1831
 
    This inherits from TestAuth to tweak the setUp and filter some failing
1832
 
    tests.
1833
 
    """
1834
 
 
1835
 
    scenarios = multiply_scenarios(
1836
 
        vary_by_http_client_implementation(),
1837
 
        vary_by_http_protocol_version(),
1838
 
        vary_by_http_proxy_auth_scheme(),
1839
 
        )
 
1698
    """Test proxy authentication schemes."""
 
1699
 
 
1700
    _auth_header = 'Proxy-authorization'
 
1701
    _password_prompt_prefix = 'Proxy '
 
1702
    _username_prompt_prefix = 'Proxy '
1840
1703
 
1841
1704
    def setUp(self):
1842
1705
        super(TestProxyAuth, self).setUp()
 
1706
        self._old_env = {}
 
1707
        self.addCleanup(self._restore_env)
1843
1708
        # Override the contents to avoid false positives
1844
1709
        self.build_tree_contents([('a', 'not proxied contents of a\n'),
1845
1710
                                  ('b', 'not proxied contents of b\n'),
1848
1713
                                  ])
1849
1714
 
1850
1715
    def get_user_transport(self, user, password):
1851
 
        self.overrideEnv('all_proxy', self.get_user_url(user, password))
1852
 
        return TestAuth.get_user_transport(self, user, password)
 
1716
        self._install_env({'all_proxy': self.get_user_url(user, password)})
 
1717
        return self._transport(self.server.get_url())
 
1718
 
 
1719
    def _install_env(self, env):
 
1720
        for name, value in env.iteritems():
 
1721
            self._old_env[name] = osutils.set_or_unset_env(name, value)
 
1722
 
 
1723
    def _restore_env(self):
 
1724
        for name, value in self._old_env.iteritems():
 
1725
            osutils.set_or_unset_env(name, value)
1853
1726
 
1854
1727
    def test_empty_pass(self):
1855
1728
        if self._testing_pycurl():
1856
1729
            import pycurl
1857
1730
            if pycurl.version_info()[1] < '7.16.0':
1858
 
                self.knownFailure(
 
1731
                raise tests.KnownFailure(
1859
1732
                    'pycurl < 7.16.0 does not handle empty proxy passwords')
1860
1733
        super(TestProxyAuth, self).test_empty_pass()
1861
1734
 
1874
1747
        self.readfile = StringIO(socket_read_content)
1875
1748
        self.writefile = StringIO()
1876
1749
        self.writefile.close = lambda: None
1877
 
        self.close = lambda: None
1878
1750
 
1879
1751
    def makefile(self, mode='r', bufsize=None):
1880
1752
        if 'r' in mode:
1885
1757
 
1886
1758
class SmartHTTPTunnellingTest(tests.TestCaseWithTransport):
1887
1759
 
1888
 
    scenarios = multiply_scenarios(
1889
 
        vary_by_http_client_implementation(),
1890
 
        vary_by_http_protocol_version(),
1891
 
        )
1892
 
 
1893
1760
    def setUp(self):
1894
1761
        super(SmartHTTPTunnellingTest, self).setUp()
1895
1762
        # We use the VFS layer as part of HTTP tunnelling tests.
1896
 
        self.overrideEnv('BZR_NO_SMART_VFS', None)
 
1763
        self._captureVar('BZR_NO_SMART_VFS', None)
1897
1764
        self.transport_readonly_server = http_utils.HTTPServerWithSmarts
1898
 
        self.http_server = self.get_readonly_server()
1899
1765
 
1900
1766
    def create_transport_readonly_server(self):
1901
 
        server = http_utils.HTTPServerWithSmarts(
 
1767
        return http_utils.HTTPServerWithSmarts(
1902
1768
            protocol_version=self._protocol_version)
1903
 
        server._url_protocol = self._url_protocol
1904
 
        return server
1905
1769
 
1906
1770
    def test_open_bzrdir(self):
1907
1771
        branch = self.make_branch('relpath')
1908
 
        url = self.http_server.get_url() + 'relpath'
 
1772
        http_server = self.get_readonly_server()
 
1773
        url = http_server.get_url() + 'relpath'
1909
1774
        bd = bzrdir.BzrDir.open(url)
1910
 
        self.addCleanup(bd.transport.disconnect)
1911
1775
        self.assertIsInstance(bd, _mod_remote.RemoteBzrDir)
1912
1776
 
1913
1777
    def test_bulk_data(self):
1915
1779
        # The 'readv' command in the smart protocol both sends and receives
1916
1780
        # bulk data, so we use that.
1917
1781
        self.build_tree(['data-file'])
1918
 
        http_transport = transport.get_transport(self.http_server.get_url())
 
1782
        http_server = self.get_readonly_server()
 
1783
        http_transport = self._transport(http_server.get_url())
1919
1784
        medium = http_transport.get_smart_medium()
1920
1785
        # Since we provide the medium, the url below will be mostly ignored
1921
1786
        # during the test, as long as the path is '/'.
1929
1794
        post_body = 'hello\n'
1930
1795
        expected_reply_body = 'ok\x012\n'
1931
1796
 
1932
 
        http_transport = transport.get_transport(self.http_server.get_url())
 
1797
        http_server = self.get_readonly_server()
 
1798
        http_transport = self._transport(http_server.get_url())
1933
1799
        medium = http_transport.get_smart_medium()
1934
1800
        response = medium.send_http_smart_request(post_body)
1935
1801
        reply_body = response.read()
1936
1802
        self.assertEqual(expected_reply_body, reply_body)
1937
1803
 
1938
1804
    def test_smart_http_server_post_request_handler(self):
1939
 
        httpd = self.http_server.server
 
1805
        httpd = self.get_readonly_server()._get_httpd()
1940
1806
 
1941
1807
        socket = SampleSocket(
1942
1808
            'POST /.bzr/smart %s \r\n' % self._protocol_version
1974
1840
 
1975
1841
    def test_probe_smart_server(self):
1976
1842
        """Test error handling against server refusing smart requests."""
1977
 
        t = self.get_readonly_transport()
 
1843
        server = self.get_readonly_server()
 
1844
        t = self._transport(server.get_url())
1978
1845
        # No need to build a valid smart request here, the server will not even
1979
1846
        # try to interpret it.
1980
1847
        self.assertRaises(errors.SmartProtocolError,
1981
1848
                          t.get_smart_medium().send_http_smart_request,
1982
1849
                          'whatever')
1983
1850
 
1984
 
 
1985
1851
class Test_redirected_to(tests.TestCase):
1986
1852
 
1987
 
    scenarios = vary_by_http_client_implementation()
1988
 
 
1989
1853
    def test_redirected_to_subdir(self):
1990
1854
        t = self._transport('http://www.example.com/foo')
1991
1855
        r = t._redirected_to('http://www.example.com/foo',
1992
1856
                             'http://www.example.com/foo/subdir')
1993
1857
        self.assertIsInstance(r, type(t))
1994
1858
        # Both transports share the some connection
1995
 
        self.assertEqual(t._get_connection(), r._get_connection())
 
1859
        self.assertEquals(t._get_connection(), r._get_connection())
1996
1860
 
1997
1861
    def test_redirected_to_self_with_slash(self):
1998
1862
        t = self._transport('http://www.example.com/foo')
2002
1866
        # Both transports share the some connection (one can argue that we
2003
1867
        # should return the exact same transport here, but that seems
2004
1868
        # overkill).
2005
 
        self.assertEqual(t._get_connection(), r._get_connection())
 
1869
        self.assertEquals(t._get_connection(), r._get_connection())
2006
1870
 
2007
1871
    def test_redirected_to_host(self):
2008
1872
        t = self._transport('http://www.example.com/foo')
2027
1891
        r = t._redirected_to('http://www.example.com/foo',
2028
1892
                             'https://foo.example.com/foo')
2029
1893
        self.assertIsInstance(r, type(t))
2030
 
        self.assertEqual(t._parsed_url.user, r._parsed_url.user)
 
1894
        self.assertEquals(t._user, r._user)
2031
1895
 
2032
1896
 
2033
1897
class PredefinedRequestHandler(http_server.TestingHTTPRequestHandler):
2042
1906
    line.
2043
1907
    """
2044
1908
 
2045
 
    def _handle_one_request(self):
 
1909
    def handle_one_request(self):
2046
1910
        tcs = self.server.test_case_server
2047
1911
        requestline = self.rfile.readline()
2048
1912
        headers = self.MessageClass(self.rfile, 0)
2086
1950
    pass
2087
1951
 
2088
1952
 
2089
 
if features.HTTPSServerFeature.available():
 
1953
if tests.HTTPSServerFeature.available():
2090
1954
    from bzrlib.tests import https_server
2091
1955
    class ActivityHTTPSServer(ActivityServerMixin, https_server.HTTPSServer):
2092
1956
        pass
2093
1957
 
2094
1958
 
2095
 
class TestActivityMixin(object):
 
1959
class TestActivity(tests.TestCase):
2096
1960
    """Test socket activity reporting.
2097
1961
 
2098
1962
    We use a special purpose server to control the bytes sent and received and
2102
1966
    def setUp(self):
2103
1967
        tests.TestCase.setUp(self)
2104
1968
        self.server = self._activity_server(self._protocol_version)
2105
 
        self.server.start_server()
2106
 
        _activities = {} # Don't close over self and create a cycle
 
1969
        self.server.setUp()
 
1970
        self.activities = {}
2107
1971
        def report_activity(t, bytes, direction):
2108
 
            count = _activities.get(direction, 0)
 
1972
            count = self.activities.get(direction, 0)
2109
1973
            count += bytes
2110
 
            _activities[direction] = count
2111
 
        self.activities = _activities
 
1974
            self.activities[direction] = count
2112
1975
 
2113
1976
        # We override at class level because constructors may propagate the
2114
1977
        # bound method and render instance overriding ineffective (an
2115
1978
        # alternative would be to define a specific ui factory instead...)
2116
 
        self.overrideAttr(self._transport, '_report_activity', report_activity)
2117
 
        self.addCleanup(self.server.stop_server)
 
1979
        self.orig_report_activity = self._transport._report_activity
 
1980
        self._transport._report_activity = report_activity
 
1981
 
 
1982
    def tearDown(self):
 
1983
        self._transport._report_activity = self.orig_report_activity
 
1984
        self.server.tearDown()
 
1985
        tests.TestCase.tearDown(self)
2118
1986
 
2119
1987
    def get_transport(self):
2120
 
        t = self._transport(self.server.get_url())
2121
 
        # FIXME: Needs cleanup -- vila 20100611
2122
 
        return t
 
1988
        return self._transport(self.server.get_url())
2123
1989
 
2124
1990
    def assertActivitiesMatch(self):
2125
1991
        self.assertEqual(self.server.bytes_read,
2230
2096
'''
2231
2097
        t = self.get_transport()
2232
2098
        # We must send a single line of body bytes, see
2233
 
        # PredefinedRequestHandler._handle_one_request
 
2099
        # PredefinedRequestHandler.handle_one_request
2234
2100
        code, f = t._post('abc def end-of-body\n')
2235
2101
        self.assertEqual('lalala whatever as long as itsssss\n', f.read())
2236
2102
        self.assertActivitiesMatch()
2237
 
 
2238
 
 
2239
 
class TestActivity(tests.TestCase, TestActivityMixin):
2240
 
 
2241
 
    scenarios = multiply_scenarios(
2242
 
        vary_by_http_activity(),
2243
 
        vary_by_http_protocol_version(),
2244
 
        )
2245
 
 
2246
 
    def setUp(self):
2247
 
        TestActivityMixin.setUp(self)
2248
 
 
2249
 
 
2250
 
class TestNoReportActivity(tests.TestCase, TestActivityMixin):
2251
 
 
2252
 
    # Unlike TestActivity, we are really testing ReportingFileSocket and
2253
 
    # ReportingSocket, so we don't need all the parametrization. Since
2254
 
    # ReportingFileSocket and ReportingSocket are wrappers, it's easier to
2255
 
    # test them through their use by the transport than directly (that's a
2256
 
    # bit less clean but far more simpler and effective).
2257
 
    _activity_server = ActivityHTTPServer
2258
 
    _protocol_version = 'HTTP/1.1'
2259
 
 
2260
 
    def setUp(self):
2261
 
        self._transport =_urllib.HttpTransport_urllib
2262
 
        TestActivityMixin.setUp(self)
2263
 
 
2264
 
    def assertActivitiesMatch(self):
2265
 
        # Nothing to check here
2266
 
        pass
2267
 
 
2268
 
 
2269
 
class TestAuthOnRedirected(http_utils.TestCaseWithRedirectedWebserver):
2270
 
    """Test authentication on the redirected http server."""
2271
 
 
2272
 
    scenarios = vary_by_http_protocol_version()
2273
 
 
2274
 
    _auth_header = 'Authorization'
2275
 
    _password_prompt_prefix = ''
2276
 
    _username_prompt_prefix = ''
2277
 
    _auth_server = http_utils.HTTPBasicAuthServer
2278
 
    _transport = _urllib.HttpTransport_urllib
2279
 
 
2280
 
    def setUp(self):
2281
 
        super(TestAuthOnRedirected, self).setUp()
2282
 
        self.build_tree_contents([('a','a'),
2283
 
                                  ('1/',),
2284
 
                                  ('1/a', 'redirected once'),
2285
 
                                  ],)
2286
 
        new_prefix = 'http://%s:%s' % (self.new_server.host,
2287
 
                                       self.new_server.port)
2288
 
        self.old_server.redirections = [
2289
 
            ('(.*)', r'%s/1\1' % (new_prefix), 301),]
2290
 
        self.old_transport = self.get_old_transport()
2291
 
        self.new_server.add_user('joe', 'foo')
2292
 
        cleanup_http_redirection_connections(self)
2293
 
 
2294
 
    def create_transport_readonly_server(self):
2295
 
        server = self._auth_server(protocol_version=self._protocol_version)
2296
 
        server._url_protocol = self._url_protocol
2297
 
        return server
2298
 
 
2299
 
    def get_a(self, t):
2300
 
        return t.get('a')
2301
 
 
2302
 
    def test_auth_on_redirected_via_do_catching_redirections(self):
2303
 
        self.redirections = 0
2304
 
 
2305
 
        def redirected(t, exception, redirection_notice):
2306
 
            self.redirections += 1
2307
 
            redirected_t = t._redirected_to(exception.source, exception.target)
2308
 
            self.addCleanup(redirected_t.disconnect)
2309
 
            return redirected_t
2310
 
 
2311
 
        stdout = tests.StringIOWrapper()
2312
 
        stderr = tests.StringIOWrapper()
2313
 
        ui.ui_factory = tests.TestUIFactory(stdin='joe\nfoo\n',
2314
 
                                            stdout=stdout, stderr=stderr)
2315
 
        self.assertEqual('redirected once',
2316
 
                         transport.do_catching_redirections(
2317
 
                self.get_a, self.old_transport, redirected).read())
2318
 
        self.assertEqual(1, self.redirections)
2319
 
        # stdin should be empty
2320
 
        self.assertEqual('', ui.ui_factory.stdin.readline())
2321
 
        # stdout should be empty, stderr will contains the prompts
2322
 
        self.assertEqual('', stdout.getvalue())
2323
 
 
2324
 
    def test_auth_on_redirected_via_following_redirections(self):
2325
 
        self.new_server.add_user('joe', 'foo')
2326
 
        stdout = tests.StringIOWrapper()
2327
 
        stderr = tests.StringIOWrapper()
2328
 
        ui.ui_factory = tests.TestUIFactory(stdin='joe\nfoo\n',
2329
 
                                            stdout=stdout, stderr=stderr)
2330
 
        t = self.old_transport
2331
 
        req = RedirectedRequest('GET', t.abspath('a'))
2332
 
        new_prefix = 'http://%s:%s' % (self.new_server.host,
2333
 
                                       self.new_server.port)
2334
 
        self.old_server.redirections = [
2335
 
            ('(.*)', r'%s/1\1' % (new_prefix), 301),]
2336
 
        self.assertEqual('redirected once', t._perform(req).read())
2337
 
        # stdin should be empty
2338
 
        self.assertEqual('', ui.ui_factory.stdin.readline())
2339
 
        # stdout should be empty, stderr will contains the prompts
2340
 
        self.assertEqual('', stdout.getvalue())
2341