def _create_ca_conf_helper(mocker, tmpdir, current_time, iam=True, ap=True, client_info=True): tls_dict = mount_efs.tls_paths_dictionary(MOUNT_NAME, str(tmpdir)) mount_efs.create_required_directory({}, tls_dict['mount_dir']) tls_dict['certificate_path'] = os.path.join(tls_dict['mount_dir'], 'config.conf') tls_dict['private_key'] = os.path.join(tls_dict['mount_dir'], 'privateKey.pem') tls_dict['public_key'] = os.path.join(tls_dict['mount_dir'], 'publicKey.pem') if iam: with open(tls_dict['public_key'], 'w') as f: f.write(PUBLIC_KEY_BODY) mocker.patch('watchdog.get_aws_security_credentials', return_value=CREDENTIALS) credentials = 'dummy:lookup' if iam else None ap_id = AP_ID if ap else None client_info = CLIENT_INFO if client_info else None full_config_body = watchdog.create_ca_conf(tls_dict['certificate_path'], COMMON_NAME, tls_dict['mount_dir'], tls_dict['private_key'], current_time, REGION, FS_ID, credentials, ap_id, client_info) assert os.path.exists(tls_dict['certificate_path']) return tls_dict, full_config_body
def test_create_state_file_dir_exists(tmpdir): state_file_dir = str(tmpdir.join("efs")) os.makedirs(state_file_dir) mount_efs.create_required_directory(_get_config(), state_file_dir) assert os.path.isdir(state_file_dir)
def test_create_state_file_dir(tmpdir): state_file_dir = str(tmpdir.join("efs")) mount_efs.create_required_directory(_get_config(), state_file_dir) assert os.path.isdir(state_file_dir) assert "0750" == oct(os.stat(state_file_dir).st_mode)[-4:]
def _create_ca_conf_helper(tmpdir, current_time, iam=True, ap=True): tls_dict = mount_efs.tls_paths_dictionary(MOUNT_NAME, str(tmpdir)) mount_efs.create_required_directory({}, tls_dict['mount_dir']) tls_dict['certificate_path'] = os.path.join(tls_dict['mount_dir'], 'config.conf') tls_dict['private_key'] = os.path.join(tls_dict['mount_dir'], 'privateKey.pem') tls_dict['public_key'] = os.path.join(tls_dict['mount_dir'], 'publicKey.pem') if iam: with open(tls_dict['public_key'], 'w') as f: f.write(PUBLIC_KEY_BODY) credentials = CREDENTIALS if iam else None ap_id = AP_ID if ap else None full_config_body = mount_efs.create_ca_conf(tls_dict['certificate_path'], COMMON_NAME, tls_dict['mount_dir'], tls_dict['private_key'], current_time, REGION, FS_ID, credentials, ap_id) assert os.path.exists(tls_dict['certificate_path']) return tls_dict, full_config_body
def test_create_state_file_dir_overridden_bad_mode(tmpdir): state_file_dir = str(tmpdir.join("efs")) mount_efs.create_required_directory(_get_config(mode="invalid-mode"), state_file_dir) assert os.path.isdir(state_file_dir) assert "0750" == oct(os.stat(state_file_dir).st_mode)[-4:]
def test_create_state_file_dir_exists_as_file(tmpdir): state_file = tmpdir.join("efs") state_file.write("", ensure=True) with pytest.raises(OSError) as ex: mount_efs.create_required_directory(_get_config(), str(state_file)) assert errno.EEXIST == ex.value.errno
def test_create_state_file_dir_overridden_mode(tmpdir): state_file_dir = str(tmpdir.join('efs')) mount_efs.create_required_directory(_get_config(mode=str(755)), state_file_dir) assert os.path.isdir(state_file_dir) assert '0755' == oct(os.stat(state_file_dir).st_mode)[-4:]
def _create_ca_conf_helper(mocker, tmpdir, current_time, iam=True, ap=True, client_info=True): config = _get_config() tls_dict = mount_efs.tls_paths_dictionary(MOUNT_NAME, str(tmpdir)) mount_efs.create_required_directory({}, tls_dict["mount_dir"]) tls_dict["certificate_path"] = os.path.join(tls_dict["mount_dir"], "config.conf") tls_dict["private_key"] = os.path.join(tls_dict["mount_dir"], "privateKey.pem") tls_dict["public_key"] = os.path.join(tls_dict["mount_dir"], "publicKey.pem") if iam: with open(tls_dict["public_key"], "w") as f: f.write(PUBLIC_KEY_BODY) mocker.patch("watchdog.get_aws_security_credentials", return_value=CREDENTIALS) credentials = "dummy:lookup" if iam else None ap_id = AP_ID if ap else None client_info = CLIENT_INFO if client_info else None full_config_body = watchdog.create_ca_conf( config, tls_dict["certificate_path"], COMMON_NAME, tls_dict["mount_dir"], tls_dict["private_key"], current_time, REGION, FS_ID, credentials, ap_id, client_info, ) assert os.path.exists(tls_dict["certificate_path"]) return tls_dict, full_config_body