mirror of
https://github.com/jupyterhub/the-littlest-jupyterhub.git
synced 2025-12-18 21:54:05 +08:00
161 lines
5.7 KiB
Python
161 lines
5.7 KiB
Python
"""Test traefik configuration"""
|
|
import os
|
|
|
|
import pytest
|
|
import toml
|
|
|
|
from tljh import config, traefik
|
|
|
|
|
|
def test_download_traefik(tmpdir):
|
|
traefik_bin = tmpdir.mkdir("bin").join("traefik")
|
|
traefik.ensure_traefik_binary(str(tmpdir))
|
|
assert traefik_bin.exists()
|
|
# ignore higher-order permission bits, only verify ugo permissions
|
|
assert (traefik_bin.stat().mode & 0o777) == 0o755
|
|
|
|
|
|
def test_default_config(tmpdir, tljh_dir):
|
|
state_dir = tmpdir.mkdir("state")
|
|
traefik.ensure_traefik_config(str(state_dir))
|
|
assert state_dir.join("traefik.toml").exists()
|
|
traefik_toml = os.path.join(state_dir, "traefik.toml")
|
|
with open(traefik_toml) as f:
|
|
toml_cfg = f.read()
|
|
# print config for debugging on failure
|
|
print(config.CONFIG_FILE)
|
|
print(toml_cfg)
|
|
cfg = toml.loads(toml_cfg)
|
|
assert cfg["defaultEntryPoints"] == ["http"]
|
|
assert len(cfg["entryPoints"]["auth_api"]["auth"]["basic"]["users"]) == 1
|
|
# runtime generated entry, value not testable
|
|
cfg["entryPoints"]["auth_api"]["auth"]["basic"]["users"] = [""]
|
|
|
|
assert cfg["entryPoints"] == {
|
|
"http": {"address": ":80"},
|
|
"auth_api": {
|
|
"address": "127.0.0.1:8099",
|
|
"auth": {"basic": {"users": [""]}},
|
|
"whiteList": {"sourceRange": ["127.0.0.1"]},
|
|
},
|
|
}
|
|
|
|
|
|
def test_letsencrypt_config(tljh_dir):
|
|
state_dir = config.STATE_DIR
|
|
config.set_config_value(config.CONFIG_FILE, "https.enabled", True)
|
|
config.set_config_value(
|
|
config.CONFIG_FILE, "https.letsencrypt.email", "fake@jupyter.org"
|
|
)
|
|
config.set_config_value(
|
|
config.CONFIG_FILE, "https.letsencrypt.domains", ["testing.jovyan.org"]
|
|
)
|
|
traefik.ensure_traefik_config(str(state_dir))
|
|
traefik_toml = os.path.join(state_dir, "traefik.toml")
|
|
with open(traefik_toml) as f:
|
|
toml_cfg = f.read()
|
|
# print config for debugging on failure
|
|
print(config.CONFIG_FILE)
|
|
print(toml_cfg)
|
|
cfg = toml.loads(toml_cfg)
|
|
assert cfg["defaultEntryPoints"] == ["http", "https"]
|
|
assert "acme" in cfg
|
|
assert len(cfg["entryPoints"]["auth_api"]["auth"]["basic"]["users"]) == 1
|
|
# runtime generated entry, value not testable
|
|
cfg["entryPoints"]["auth_api"]["auth"]["basic"]["users"] = [""]
|
|
|
|
assert cfg["entryPoints"] == {
|
|
"http": {"address": ":80", "redirect": {"entryPoint": "https"}},
|
|
"https": {"address": ":443", "tls": {"minVersion": "VersionTLS12"}},
|
|
"auth_api": {
|
|
"address": "127.0.0.1:8099",
|
|
"auth": {"basic": {"users": [""]}},
|
|
"whiteList": {"sourceRange": ["127.0.0.1"]},
|
|
},
|
|
}
|
|
assert cfg["acme"] == {
|
|
"email": "fake@jupyter.org",
|
|
"storage": "acme.json",
|
|
"entryPoint": "https",
|
|
"httpChallenge": {"entryPoint": "http"},
|
|
"domains": [{"main": "testing.jovyan.org"}],
|
|
}
|
|
|
|
|
|
def test_manual_ssl_config(tljh_dir):
|
|
state_dir = config.STATE_DIR
|
|
config.set_config_value(config.CONFIG_FILE, "https.enabled", True)
|
|
config.set_config_value(config.CONFIG_FILE, "https.tls.key", "/path/to/ssl.key")
|
|
config.set_config_value(config.CONFIG_FILE, "https.tls.cert", "/path/to/ssl.cert")
|
|
traefik.ensure_traefik_config(str(state_dir))
|
|
traefik_toml = os.path.join(state_dir, "traefik.toml")
|
|
with open(traefik_toml) as f:
|
|
toml_cfg = f.read()
|
|
# print config for debugging on failure
|
|
print(config.CONFIG_FILE)
|
|
print(toml_cfg)
|
|
cfg = toml.loads(toml_cfg)
|
|
assert cfg["defaultEntryPoints"] == ["http", "https"]
|
|
assert "acme" not in cfg
|
|
assert len(cfg["entryPoints"]["auth_api"]["auth"]["basic"]["users"]) == 1
|
|
# runtime generated entry, value not testable
|
|
cfg["entryPoints"]["auth_api"]["auth"]["basic"]["users"] = [""]
|
|
assert cfg["entryPoints"] == {
|
|
"http": {"address": ":80", "redirect": {"entryPoint": "https"}},
|
|
"https": {
|
|
"address": ":443",
|
|
"tls": {
|
|
"minVersion": "VersionTLS12",
|
|
"certificates": [
|
|
{"certFile": "/path/to/ssl.cert", "keyFile": "/path/to/ssl.key"}
|
|
],
|
|
},
|
|
},
|
|
"auth_api": {
|
|
"address": "127.0.0.1:8099",
|
|
"auth": {"basic": {"users": [""]}},
|
|
"whiteList": {"sourceRange": ["127.0.0.1"]},
|
|
},
|
|
}
|
|
|
|
|
|
def test_extra_config(tmpdir, tljh_dir):
|
|
extra_config_dir = os.path.join(tljh_dir, config.CONFIG_DIR, "traefik_config.d")
|
|
state_dir = tmpdir.mkdir("state")
|
|
traefik_toml = os.path.join(state_dir, "traefik.toml")
|
|
|
|
# Generate default config
|
|
traefik.ensure_traefik_config(str(state_dir))
|
|
|
|
# Read the default config
|
|
toml_cfg = toml.load(traefik_toml)
|
|
|
|
# Make sure the defaults are what we expect
|
|
assert toml_cfg["logLevel"] == "INFO"
|
|
with pytest.raises(KeyError):
|
|
toml_cfg["checkNewVersion"]
|
|
assert toml_cfg["entryPoints"]["auth_api"]["address"] == "127.0.0.1:8099"
|
|
|
|
extra_config = {
|
|
# modify existing value
|
|
"logLevel": "ERROR",
|
|
# modify existing value with multiple levels
|
|
"entryPoints": {"auth_api": {"address": "127.0.0.1:9999"}},
|
|
# add new setting
|
|
"checkNewVersion": False,
|
|
}
|
|
|
|
with open(os.path.join(extra_config_dir, "extra.toml"), "w+") as extra_config_file:
|
|
toml.dump(extra_config, extra_config_file)
|
|
|
|
# Merge the extra config with the defaults
|
|
traefik.ensure_traefik_config(str(state_dir))
|
|
|
|
# Read back the merged config
|
|
toml_cfg = toml.load(traefik_toml)
|
|
|
|
# Check that the defaults were updated by the extra config
|
|
assert toml_cfg["logLevel"] == "ERROR"
|
|
assert toml_cfg["checkNewVersion"] == False
|
|
assert toml_cfg["entryPoints"]["auth_api"]["address"] == "127.0.0.1:9999"
|