Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
M
moodle_rebase10.1.2
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Dmitry Blinov
moodle_rebase10.1.2
Commits
e26843de
Commit
e26843de
authored
Dec 14, 2018
by
Łukasz Nowak
Committed by
Łukasz Nowak
Dec 20, 2018
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
caddy-frontend: Adapt to SLAPOS_SR_TEST
parent
ae7b83b8
Changes
19
Hide whitespace changes
Inline
Side-by-side
Showing
19 changed files
with
113 additions
and
113 deletions
+113
-113
software/caddy-frontend/test/test.py
software/caddy-frontend/test/test.py
+82
-82
software/caddy-frontend/test/utils.py
software/caddy-frontend/test/utils.py
+2
-2
software/erp5/test/utils.py
software/erp5/test/utils.py
+2
-2
software/kvm/test/test.py
software/kvm/test/test.py
+1
-1
software/kvm/test/utils.py
software/kvm/test/utils.py
+2
-2
software/monitor/test/test.py
software/monitor/test/test.py
+1
-1
software/monitor/test/utils.py
software/monitor/test/utils.py
+2
-2
software/plantuml/test/test.py
software/plantuml/test/test.py
+1
-1
software/plantuml/test/utils.py
software/plantuml/test/utils.py
+2
-2
software/powerdns/test/test.py
software/powerdns/test/test.py
+1
-1
software/powerdns/test/utils.py
software/powerdns/test/utils.py
+2
-2
software/proftpd/test/test.py
software/proftpd/test/test.py
+1
-1
software/proftpd/test/utils.py
software/proftpd/test/utils.py
+2
-2
software/re6stnet/test/test.py
software/re6stnet/test/test.py
+3
-3
software/re6stnet/test/utils.py
software/re6stnet/test/utils.py
+2
-2
software/seleniumserver/test/test.py
software/seleniumserver/test/test.py
+2
-2
software/seleniumserver/test/utils.py
software/seleniumserver/test/utils.py
+2
-2
software/slaprunner/test/test.py
software/slaprunner/test/test.py
+1
-1
software/slaprunner/test/utils.py
software/slaprunner/test/utils.py
+2
-2
No files found.
software/caddy-frontend/test/test.py
View file @
e26843de
...
...
@@ -55,8 +55,8 @@ from cryptography.hazmat.primitives import serialization
from
cryptography.hazmat.primitives.asymmetric
import
rsa
from
cryptography.x509.oid
import
NameOID
LOCAL_IPV4
=
os
.
environ
[
'LOCAL
_IPV4'
]
GLOBAL_IPV6
=
os
.
environ
[
'GLOBAL
_IPV6'
]
SLAPOS_TEST_IPV4
=
os
.
environ
[
'SLAPOS_TEST
_IPV4'
]
SLAPOS_TEST_IPV6
=
os
.
environ
[
'SLAPOS_TEST
_IPV6'
]
# ports chosen to not collide with test systems
HTTP_PORT
=
'11080'
...
...
@@ -69,7 +69,7 @@ MONITOR_F2_HTTPD_PORT = '13002'
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
@@ -337,7 +337,7 @@ class HttpFrontendTestCase(SlapOSInstanceTestCase):
@
classmethod
def
getSoftwareURLList
(
cls
):
return
[
os
.
path
.
realpath
(
os
.
environ
[
'TEST_SR'
])]
return
(
os
.
path
.
abspath
(
os
.
path
.
join
(
os
.
path
.
dirname
(
__file__
),
'..'
,
'software.cfg'
)),
)
@
classmethod
def
setUpClass
(
cls
):
...
...
@@ -477,17 +477,17 @@ class SlaveHttpFrontendTestCase(HttpFrontendTestCase):
@
classmethod
def
startServerProcess
(
cls
):
server
=
HTTPServer
(
(
LOCAL_IPV4
,
findFreeTCPPort
(
LOCAL
_IPV4
)),
(
SLAPOS_TEST_IPV4
,
findFreeTCPPort
(
SLAPOS_TEST
_IPV4
)),
TestHandler
)
server_https
=
HTTPServer
(
(
LOCAL_IPV4
,
findFreeTCPPort
(
LOCAL
_IPV4
)),
(
SLAPOS_TEST_IPV4
,
findFreeTCPPort
(
SLAPOS_TEST
_IPV4
)),
TestHandler
)
cls
.
another_server_ca
=
CertificateAuthority
(
"Another Server Root CA"
)
cls
.
test_server_ca
=
CertificateAuthority
(
"Test Server Root CA"
)
key
,
key_pem
,
csr
,
csr_pem
=
createCSR
(
"testserver.example.com"
,
LOCAL
_IPV4
)
"testserver.example.com"
,
SLAPOS_TEST
_IPV4
)
_
,
cls
.
test_server_certificate_pem
=
cls
.
test_server_ca
.
signCSR
(
csr
)
cls
.
test_server_certificate_file
=
tempfile
.
NamedTemporaryFile
(
...
...
@@ -721,7 +721,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
return
{
'domain'
:
'example.com'
,
'nginx-domain'
:
'nginx.example.com'
,
'public-ipv4'
:
LOCAL
_IPV4
,
'public-ipv4'
:
SLAPOS_TEST
_IPV4
,
'apache-certificate'
:
cls
.
certificate_pem
,
'apache-key'
:
cls
.
key_pem
,
'-frontend-authorized-slave-string'
:
...
...
@@ -1073,7 +1073,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'url'
:
'http://empty.example.com'
,
'site_url'
:
'http://empty.example.com'
,
'secure_access'
:
'https://empty.example.com'
,
'public-ipv4'
:
LOCAL
_IPV4
,
'public-ipv4'
:
SLAPOS_TEST
_IPV4
,
}
)
...
...
@@ -1134,7 +1134,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
url
.
example
.
com
',
'
site_url
': '
http
:
//
url
.
example
.
com
',
'
secure_access
': '
https
:
//
url
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1195,17 +1195,17 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
url
.
example
.
com
',
'
site_url
': '
http
:
//
url
.
example
.
com
',
'
secure_access
': '
https
:
//
url
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
result_ipv6 = self.fakeHTTPSResult(
parameter_dict['
domain
'],
GLOBAL
_IPV6, '
test
-
path
',
source_ip=
GLOBAL
_IPV6)
parameter_dict['
domain
'],
SLAPOS_TEST
_IPV6, '
test
-
path
',
source_ip=
SLAPOS_TEST
_IPV6)
self.assertEqual(
GLOBAL
_IPV6,
SLAPOS_TEST
_IPV6,
result_ipv6.json()['
Incoming
Headers
']['
x
-
forwarded
-
for
']
)
...
...
@@ -1225,7 +1225,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
typezopepath
.
example
.
com
',
'
site_url
': '
http
:
//
typezopepath
.
example
.
com
',
'
secure_access
': '
https
:
//
typezopepath
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1254,7 +1254,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
typezopedefaultpath
.
example
.
com
',
'
site_url
': '
http
:
//
typezopedefaultpath
.
example
.
com
',
'
secure_access
': '
https
:
//
typezopedefaultpath
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1282,7 +1282,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
serveralias
.
example
.
com
',
'
site_url
': '
http
:
//
serveralias
.
example
.
com
',
'
secure_access
': '
https
:
//
serveralias
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1322,7 +1322,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
serveraliaswildcard
.
example
.
com
',
'
site_url
': '
http
:
//
serveraliaswildcard
.
example
.
com
',
'
secure_access
': '
https
:
//
serveraliaswildcard
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1355,7 +1355,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
serveraliasduplicated
.
example
.
com
',
'
site_url
': '
http
:
//
serveraliasduplicated
.
example
.
com
',
'
secure_access
': '
https
:
//
serveraliasduplicated
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1389,7 +1389,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
alias4
.
example
.
com
',
'
site_url
': '
http
:
//
alias4
.
example
.
com
',
'
secure_access
': '
https
:
//
alias4
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1420,7 +1420,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
customdomainsslcrtsslkeysslcacrt
.
example
.
com
',
'
secure_access
':
'
https
:
//
customdomainsslcrtsslkeysslcacrt
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1454,7 +1454,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
sslcacrtgarbage
.
example
.
com
',
'
secure_access
':
'
https
:
//
sslcacrtgarbage
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1474,7 +1474,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
sslcacrtdoesnotmatch
.
example
.
com
',
'
secure_access
':
'
https
:
//
sslcacrtdoesnotmatch
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1498,7 +1498,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
httpsonly
.
example
.
com
',
'
site_url
': '
http
:
//
httpsonly
.
example
.
com
',
'
secure_access
': '
https
:
//
httpsonly
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1530,7 +1530,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
customdomain
.
example
.
com
',
'
site_url
': '
http
:
//
customdomain
.
example
.
com
',
'
secure_access
': '
https
:
//
customdomain
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1554,7 +1554,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//*
.
customdomain
.
example
.
com
',
'
site_url
': '
http
:
//*
.
customdomain
.
example
.
com
',
'
secure_access
': '
https
:
//*
.
customdomain
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1580,7 +1580,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
customdomainsslcrtsslkey
.
example
.
com
',
'
site_url
': '
http
:
//
customdomainsslcrtsslkey
.
example
.
com
',
'
secure_access
': '
https
:
//
customdomainsslcrtsslkey
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1604,7 +1604,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
typezope
.
example
.
com
',
'
site_url
': '
http
:
//
typezope
.
example
.
com
',
'
secure_access
': '
https
:
//
typezope
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1651,7 +1651,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
typezopevirtualhostroothttpport
.
example
.
com
',
'
secure_access
':
'
https
:
//
typezopevirtualhostroothttpport
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1678,7 +1678,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
typezopevirtualhostroothttpsport
.
example
.
com
',
'
secure_access
':
'
https
:
//
typezopevirtualhostroothttpsport
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1707,7 +1707,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
typenotebook
.
nginx
.
example
.
com
',
'
site_url
': '
http
:
//
typenotebook
.
nginx
.
example
.
com
',
'
secure_access
': '
https
:
//
typenotebook
.
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1748,7 +1748,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
typeeventsource
.
nginx
.
example
.
com
',
'
site_url
': '
http
:
//
typeeventsource
.
nginx
.
example
.
com
',
'
secure_access
': '
https
:
//
typeeventsource
.
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1789,7 +1789,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
typeredirect
.
example
.
com
',
'
site_url
': '
http
:
//
typeredirect
.
example
.
com
',
'
secure_access
': '
https
:
//
typeredirect
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1820,7 +1820,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
http
:
//
sslproxyverifysslproxycacrtunverified
.
example
.
com
',
'
secure_access
':
'
https
:
//
sslproxyverifysslproxycacrtunverified
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1857,7 +1857,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
sslproxyverifysslproxycacrt
.
example
.
com
',
'
site_url
': '
http
:
//
sslproxyverifysslproxycacrt
.
example
.
com
',
'
secure_access
': '
https
:
//
sslproxyverifysslproxycacrt
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1919,7 +1919,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
sslproxyverifyunverified
.
example
.
com
',
'
site_url
': '
http
:
//
sslproxyverifyunverified
.
example
.
com
',
'
secure_access
': '
https
:
//
sslproxyverifyunverified
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1952,7 +1952,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
http
:
//
enablecachesslproxyverifysslproxycacrtunverified
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablecachesslproxyverifysslproxycacrtunverified
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -1991,7 +1991,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
http
:
//
enablecachesslproxyverifysslproxycacrt
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablecachesslproxyverifysslproxycacrt
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2084,7 +2084,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
enablecachesslproxyverifyunverified
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablecachesslproxyverifyunverified
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2116,7 +2116,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
http
:
//
typezopesslproxyverifysslproxycacrtunverified
.
example
.
com
',
'
secure_access
':
'
https
:
//
typezopesslproxyverifysslproxycacrtunverified
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2154,7 +2154,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
typezopesslproxyverifysslproxycacrt
.
example
.
com
',
'
secure_access
':
'
https
:
//
typezopesslproxyverifysslproxycacrt
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2204,7 +2204,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
typezopesslproxyverifyunverified
.
example
.
com
',
'
secure_access
':
'
https
:
//
typezopesslproxyverifyunverified
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2231,7 +2231,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
monitoripv6test
.
example
.
com
',
'
site_url
': '
http
:
//
monitoripv6test
.
example
.
com
',
'
secure_access
': '
https
:
//
monitoripv6test
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2273,7 +2273,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
monitoripv4test
.
example
.
com
',
'
site_url
': '
http
:
//
monitoripv4test
.
example
.
com
',
'
secure_access
': '
https
:
//
monitoripv4test
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2315,7 +2315,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
re6stoptimaltest
.
example
.
com
',
'
site_url
': '
http
:
//
re6stoptimaltest
.
example
.
com
',
'
secure_access
': '
https
:
//
re6stoptimaltest
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2358,7 +2358,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
enablecache
.
example
.
com
',
'
site_url
': '
http
:
//
enablecache
.
example
.
com
',
'
secure_access
': '
https
:
//
enablecache
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2450,7 +2450,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
enablecachedisablenocacherequest
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablecachedisablenocacherequest
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2503,7 +2503,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
enablecachedisableviaheader
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablecachedisableviaheader
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2547,7 +2547,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
enablehttp2false
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2false
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2596,7 +2596,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
enablehttp2default
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2default
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2646,7 +2646,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
site_url
': '
http
:
//
prefergzipencodingtobackend
.
example
.
com
',
'
secure_access
':
'
https
:
//
prefergzipencodingtobackend
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2683,7 +2683,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
disabledcookielist
.
example
.
com
',
'
site_url
': '
http
:
//
disabledcookielist
.
example
.
com
',
'
secure_access
': '
https
:
//
disabledcookielist
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2731,7 +2731,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
apache_custom_http_s
-
accepted
')
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
{'
replication_number
': '
1
', '
public
-
ipv4
':
LOCAL
_IPV4},
{'
replication_number
': '
1
', '
public
-
ipv4
':
SLAPOS_TEST
_IPV4},
parameter_dict
)
...
...
@@ -2829,7 +2829,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
caddy_custom_http_s
-
accepted
')
self.assertLogAccessUrlWithPop(parameter_dict)
self.assertEqual(
{'
replication_number
': '
1
', '
public
-
ipv4
':
LOCAL
_IPV4},
{'
replication_number
': '
1
', '
public
-
ipv4
':
SLAPOS_TEST
_IPV4},
parameter_dict
)
...
...
@@ -2890,7 +2890,7 @@ http://apachecustomhttpsaccepted.example.com:%%(http_port)s {
'
url
': '
http
:
//
urlhttpsurl
.
example
.
com
',
'
site_url
': '
http
:
//
urlhttpsurl
.
example
.
com
',
'
secure_access
': '
https
:
//
urlhttpsurl
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2915,7 +2915,7 @@ class TestReplicateSlave(SlaveHttpFrontendTestCase, TestDataMixin):
return {
'
domain
': '
example
.
com
',
'
nginx
-
domain
': '
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
'
apache
-
certificate
': cls.certificate_pem,
'
apache
-
key
': cls.key_pem,
'
-
frontend
-
quantity
': 2,
...
...
@@ -2948,7 +2948,7 @@ class TestReplicateSlave(SlaveHttpFrontendTestCase, TestDataMixin):
'
url
': '
http
:
//
replicate
.
example
.
com
',
'
site_url
': '
http
:
//
replicate
.
example
.
com
',
'
secure_access
': '
https
:
//
replicate
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -2986,7 +2986,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
return {
'
domain
': '
example
.
com
',
'
nginx
-
domain
': '
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
'
apache
-
certificate
': cls.certificate_pem,
'
apache
-
key
': cls.key_pem,
'
enable
-
http2
-
by
-
default
': '
false
',
...
...
@@ -3022,7 +3022,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
'
site_url
': '
http
:
//
enablehttp2default
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2default
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3041,7 +3041,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
'
site_url
': '
http
:
//
enablehttp2false
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2false
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3060,7 +3060,7 @@ class TestEnableHttp2ByDefaultFalseSlave(SlaveHttpFrontendTestCase,
'
site_url
': '
http
:
//
enablehttp2true
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2true
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3076,7 +3076,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
return {
'
domain
': '
example
.
com
',
'
nginx
-
domain
': '
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
'
apache
-
certificate
': cls.certificate_pem,
'
apache
-
key
': cls.key_pem,
'
port
': HTTPS_PORT,
...
...
@@ -3111,7 +3111,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
'
site_url
': '
http
:
//
enablehttp2default
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2default
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3130,7 +3130,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
'
site_url
': '
http
:
//
enablehttp2false
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2false
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3149,7 +3149,7 @@ class TestEnableHttp2ByDefaultDefaultSlave(SlaveHttpFrontendTestCase,
'
site_url
': '
http
:
//
enablehttp2true
.
example
.
com
',
'
secure_access
':
'
https
:
//
enablehttp2true
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3262,7 +3262,7 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
return {
'
domain
': '
example
.
com
',
'
nginx
-
domain
': '
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
'
apache
-
certificate
': cls.certificate_pem,
'
apache
-
key
': cls.key_pem,
'
port
': HTTPS_PORT,
...
...
@@ -3318,7 +3318,7 @@ class TestMalformedBackenUrlSlave(SlaveHttpFrontendTestCase,
'
url
': '
http
:
//
empty
.
example
.
com
',
'
site_url
': '
http
:
//
empty
.
example
.
com
',
'
secure_access
': '
https
:
//
empty
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3386,9 +3386,9 @@ class TestDefaultMonitorHttpdPort(SlaveHttpFrontendTestCase, TestDataMixin):
'
monitor
-
httpd
.
conf
')).read()
self.assertTrue(
'
Listen
[
%
s
]:
8196
' % (
GLOBAL
_IPV6,) in master_monitor_conf)
'
Listen
[
%
s
]:
8196
' % (
SLAPOS_TEST
_IPV6,) in master_monitor_conf)
self.assertTrue(
'
Listen
[
%
s
]:
8072
' % (
GLOBAL
_IPV6,) in slave_monitor_conf)
'
Listen
[
%
s
]:
8072
' % (
SLAPOS_TEST
_IPV6,) in slave_monitor_conf)
class TestQuicEnabled(SlaveHttpFrontendTestCase, TestDataMixin):
...
...
@@ -3397,7 +3397,7 @@ class TestQuicEnabled(SlaveHttpFrontendTestCase, TestDataMixin):
return {
'
domain
': '
example
.
com
',
'
nginx
-
domain
': '
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
'
enable
-
quic
': '
true
',
'
apache
-
certificate
': cls.certificate_pem,
'
apache
-
key
': cls.key_pem,
...
...
@@ -3444,7 +3444,7 @@ class TestQuicEnabled(SlaveHttpFrontendTestCase, TestDataMixin):
'
url
': '
http
:
//
url
.
example
.
com
',
'
site_url
': '
http
:
//
url
.
example
.
com
',
'
secure_access
': '
https
:
//
url
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3507,7 +3507,7 @@ class TestSlaveBadParameters(SlaveHttpFrontendTestCase, TestDataMixin):
return {
'
domain
': '
example
.
com
',
'
nginx
-
domain
': '
nginx
.
example
.
com
',
'
public
-
ipv4
':
LOCAL
_IPV4,
'
public
-
ipv4
':
SLAPOS_TEST
_IPV4,
'
apache
-
certificate
': cls.certificate_pem,
'
apache
-
key
': cls.key_pem,
'
-
frontend
-
authorized
-
slave
-
string
': '
_caddy_custom_http_s
-
reject
',
...
...
@@ -3619,7 +3619,7 @@ https://www.google.com {}""",
'url': 'http://serveraliassame.example.com',
'site_url': 'http://serveraliassame.example.com',
'secure_access': 'https://serveraliassame.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3643,7 +3643,7 @@ https://www.google.com {}""",
'url': 'http://re6stoptimaltestunsafe.example.com',
'site_url': 'http://re6stoptimaltestunsafe.example.com',
'secure_access': 'https://re6stoptimaltestunsafe.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3686,7 +3686,7 @@ https://www.google.com {}""",
'url': 'http://re6stoptimaltestnocomma.example.com',
'site_url': 'http://re6stoptimaltestnocomma.example.com',
'secure_access': 'https://re6stoptimaltestnocomma.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3744,7 +3744,7 @@ https://www.google.com {}""",
'site_url': 'http://virtualhostroothttpportunsafe.example.com',
'secure_access':
'https://virtualhostroothttpportunsafe.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3771,7 +3771,7 @@ https://www.google.com {}""",
'site_url': 'http://virtualhostroothttpsportunsafe.example.com',
'secure_access':
'https://virtualhostroothttpsportunsafe.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3800,7 +3800,7 @@ https://www.google.com {}""",
'url': 'http://defaultpathunsafe.example.com',
'site_url': 'http://defaultpathunsafe.example.com',
'secure_access': 'https://defaultpathunsafe.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3828,7 +3828,7 @@ https://www.google.com {}""",
'url': 'http://monitoripv4testunsafe.example.com',
'site_url': 'http://monitoripv4testunsafe.example.com',
'secure_access': 'https://monitoripv4testunsafe.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3870,7 +3870,7 @@ https://www.google.com {}""",
'url': 'http://monitoripv6testunsafe.example.com',
'site_url': 'http://monitoripv6testunsafe.example.com',
'secure_access': 'https://monitoripv6testunsafe.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
@@ -3928,7 +3928,7 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
return {
'domain': 'example.com',
'nginx-domain': 'nginx.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
'apache-certificate': cls.certificate_pem,
'apache-key': cls.key_pem,
'-frontend-authorized-slave-string': '_caddy_custom_http_s-reject',
...
...
@@ -4000,7 +4000,7 @@ class TestDuplicateSiteKeyProtection(SlaveHttpFrontendTestCase, TestDataMixin):
'url': 'http://duplicate.example.com',
'site_url': 'http://duplicate.example.com',
'secure_access': 'https://duplicate.example.com',
'public-ipv4':
LOCAL
_IPV4,
'public-ipv4':
SLAPOS_TEST
_IPV4,
},
parameter_dict
)
...
...
software/caddy-frontend/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/erp5/test/utils.py
View file @
e26843de
...
...
@@ -197,8 +197,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/kvm/test/test.py
View file @
e26843de
...
...
@@ -40,7 +40,7 @@ import psutil
import
utils
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/kvm/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/monitor/test/test.py
View file @
e26843de
...
...
@@ -40,7 +40,7 @@ import psutil
import
utils
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/monitor/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/plantuml/test/test.py
View file @
e26843de
...
...
@@ -38,7 +38,7 @@ import plantuml
import
utils
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/plantuml/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/powerdns/test/test.py
View file @
e26843de
...
...
@@ -40,7 +40,7 @@ import psutil
import
utils
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/powerdns/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/proftpd/test/test.py
View file @
e26843de
...
...
@@ -41,7 +41,7 @@ import utils
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/proftpd/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/re6stnet/test/test.py
View file @
e26843de
...
...
@@ -39,12 +39,12 @@ import psutil
import
utils
LOCAL_IPV4
=
os
.
environ
[
'LOCAL
_IPV4'
]
GLOBAL_IPV6
=
os
.
environ
[
'GLOBAL
_IPV6'
]
SLAPOS_TEST_IPV4
=
os
.
environ
[
'SLAPOS_TEST
_IPV4'
]
SLAPOS_TEST_IPV6
=
os
.
environ
[
'SLAPOS_TEST
_IPV6'
]
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/re6stnet/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/seleniumserver/test/test.py
View file @
e26843de
...
...
@@ -46,7 +46,7 @@ from selenium.webdriver.support.ui import WebDriverWait
from
utils
import
SlapOSInstanceTestCase
,
findFreeTCPPort
debug_mode
=
os
.
environ
.
get
(
'DEBUG'
)
debug_mode
=
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
)
# for development: debugging logs and install Ctrl+C handler
if
debug_mode
:
import
logging
...
...
@@ -103,7 +103,7 @@ class WebServerMixin(object):
'''
%
(
form
[
'q'
].
value
,
file_data
))
super
(
WebServerMixin
,
self
).
setUp
()
ip
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ip
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
port
=
findFreeTCPPort
(
ip
)
server
=
HTTPServer
((
ip
,
port
),
TestHandler
)
self
.
server_process
=
multiprocessing
.
Process
(
target
=
server
.
serve_forever
)
...
...
software/seleniumserver/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
software/slaprunner/test/test.py
View file @
e26843de
...
...
@@ -40,7 +40,7 @@ import psutil
import
utils
# for development: debugging logs and install Ctrl+C handler
if
os
.
environ
.
get
(
'DEBUG'
):
if
os
.
environ
.
get
(
'
SLAPOS_TEST_
DEBUG'
):
import
logging
logging
.
basicConfig
(
level
=
logging
.
DEBUG
)
import
unittest
...
...
software/slaprunner/test/utils.py
View file @
e26843de
...
...
@@ -187,8 +187,8 @@ class SlapOSInstanceTestCase(unittest.TestCase):
'slapos_binary'
:
'slapos'
,
}
# Some tests are expecting that local IP is not set to 127.0.0.1
ipv4_address
=
os
.
environ
.
get
(
'
LOCAL
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
GLOBAL
_IPV6'
]
ipv4_address
=
os
.
environ
.
get
(
'
SLAPOS_TEST
_IPV4'
,
'127.0.1.1'
)
ipv6_address
=
os
.
environ
[
'
SLAPOS_TEST
_IPV6'
]
cls
.
config
[
'proxy_host'
]
=
cls
.
config
[
'ipv4_address'
]
=
ipv4_address
cls
.
config
[
'ipv6_address'
]
=
ipv6_address
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment