forked from getsentry/self-hosted
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Port last integration tests to python (getsentry#2966)
* port custom ca cert test to python
- Loading branch information
1 parent
0cb7063
commit e9adac7
Showing
8 changed files
with
301 additions
and
127 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,15 +1,16 @@ | ||
import unittest | ||
|
||
import requests | ||
|
||
|
||
class CustomCATests(unittest.TestCase): | ||
def test_valid_self_signed(self): | ||
self.assertEqual(requests.get("https://self.test").text, 'ok') | ||
self.assertEqual(requests.get("https://self.test").text, "ok") | ||
|
||
def test_invalid_self_signed(self): | ||
with self.assertRaises(requests.exceptions.SSLError): | ||
requests.get("https://fail.test") | ||
|
||
|
||
if __name__ == '__main__': | ||
if __name__ == "__main__": | ||
unittest.main() |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,25 +1,69 @@ | ||
import subprocess | ||
import os | ||
import subprocess | ||
|
||
|
||
def test_sentry_admin(setup_backup_restore_env_variables): | ||
sentry_admin_sh = os.path.join(os.getcwd(), "sentry-admin.sh") | ||
output = subprocess.run( | ||
[sentry_admin_sh, "--help"], check=True, capture_output=True, encoding="utf8" | ||
).stdout | ||
assert "Usage: ./sentry-admin.sh" in output | ||
assert "SENTRY_DOCKER_IO_DIR" in output | ||
|
||
output = subprocess.run( | ||
[sentry_admin_sh, "permissions", "--help"], | ||
check=True, | ||
capture_output=True, | ||
encoding="utf8", | ||
).stdout | ||
assert "Usage: ./sentry-admin.sh permissions" in output | ||
|
||
|
||
def test_backup(setup_backup_restore_env_variables): | ||
# Docker was giving me permissioning issues when trying to create this file and write to it even after giving read + write access | ||
# to group and owner. Instead, try creating the empty file and then give everyone write access to the backup file | ||
file_path = os.path.join(os.getcwd(), 'sentry', 'backup.json') | ||
sentry_admin_sh = os.path.join(os.getcwd(), 'sentry-admin.sh') | ||
open(file_path, 'a', encoding='utf8').close() | ||
file_path = os.path.join(os.getcwd(), "sentry", "backup.json") | ||
sentry_admin_sh = os.path.join(os.getcwd(), "sentry-admin.sh") | ||
open(file_path, "a", encoding="utf8").close() | ||
os.chmod(file_path, 0o666) | ||
assert os.path.getsize(file_path) == 0 | ||
subprocess.run([sentry_admin_sh, "export", "global", "/sentry-admin/backup.json", "--no-prompt"], check=True) | ||
subprocess.run( | ||
[ | ||
sentry_admin_sh, | ||
"export", | ||
"global", | ||
"/sentry-admin/backup.json", | ||
"--no-prompt", | ||
], | ||
check=True, | ||
) | ||
assert os.path.getsize(file_path) > 0 | ||
|
||
|
||
def test_import(setup_backup_restore_env_variables): | ||
# Bring postgres down and recreate the docker volume | ||
subprocess.run(["docker", "compose", "--ansi", "never", "stop", "postgres"], check=True) | ||
subprocess.run(["docker", "compose", "--ansi", "never", "rm", "-f", "-v", "postgres"], check=True) | ||
subprocess.run( | ||
["docker", "compose", "--ansi", "never", "stop", "postgres"], check=True | ||
) | ||
subprocess.run( | ||
["docker", "compose", "--ansi", "never", "rm", "-f", "-v", "postgres"], | ||
check=True, | ||
) | ||
subprocess.run(["docker", "volume", "rm", "sentry-postgres"], check=True) | ||
subprocess.run(["docker", "volume", "create", "--name=sentry-postgres"], check=True) | ||
subprocess.run(["docker", "compose", "--ansi", "never", "run", "web", "upgrade", "--noinput"], check=True) | ||
subprocess.run( | ||
["docker", "compose", "--ansi", "never", "run", "web", "upgrade", "--noinput"], | ||
check=True, | ||
) | ||
subprocess.run(["docker", "compose", "--ansi", "never", "up", "-d"], check=True) | ||
sentry_admin_sh = os.path.join(os.getcwd(), 'sentry-admin.sh') | ||
subprocess.run([sentry_admin_sh, "import", "global", "/sentry-admin/backup.json", "--no-prompt"], check=True) | ||
sentry_admin_sh = os.path.join(os.getcwd(), "sentry-admin.sh") | ||
subprocess.run( | ||
[ | ||
sentry_admin_sh, | ||
"import", | ||
"global", | ||
"/sentry-admin/backup.json", | ||
"--no-prompt", | ||
], | ||
check=True, | ||
) |
Oops, something went wrong.