-
-
Notifications
You must be signed in to change notification settings - Fork 43
/
pytest_socket.py
294 lines (229 loc) · 8.68 KB
/
pytest_socket.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
import ipaddress
import itertools
import socket
import typing
from collections import defaultdict
from dataclasses import dataclass, field
import pytest
_true_socket = socket.socket
_true_connect = socket.socket.connect
class SocketBlockedError(RuntimeError):
def __init__(self, *_args, **_kwargs):
super().__init__("A test tried to use socket.socket.")
class SocketConnectBlockedError(RuntimeError):
def __init__(self, allowed, host, *_args, **_kwargs):
if allowed:
allowed = ",".join(allowed)
super().__init__(
"A test tried to use socket.socket.connect() "
f'with host "{host}" (allowed: "{allowed}").'
)
def pytest_addoption(parser):
group = parser.getgroup("socket")
group.addoption(
"--disable-socket",
action="store_true",
dest="disable_socket",
help="Disable socket.socket by default to block network calls.",
)
group.addoption(
"--force-enable-socket",
action="store_true",
dest="force_enable_socket",
help="Force enable socket.socket network calls (override --disable-socket).",
)
group.addoption(
"--allow-hosts",
dest="allow_hosts",
metavar="ALLOWED_HOSTS_CSV",
help="Only allow specified hosts through socket.socket.connect((host, port)).",
)
group.addoption(
"--allow-unix-socket",
action="store_true",
dest="allow_unix_socket",
help="Allow calls if they are to Unix domain sockets",
)
@pytest.fixture
def socket_disabled(pytestconfig):
"""disable socket.socket for duration of this test function"""
socket_config = pytestconfig.stash[_STASH_KEY]
disable_socket(allow_unix_socket=socket_config.allow_unix_socket)
yield
@pytest.fixture
def socket_enabled(pytestconfig):
"""enable socket.socket for duration of this test function"""
enable_socket()
yield
@dataclass
class _PytestSocketConfig:
socket_disabled: bool
socket_force_enabled: bool
allow_unix_socket: bool
allow_hosts: typing.Union[str, typing.List[str], None]
resolution_cache: typing.Dict[str, typing.Set[str]] = field(default_factory=dict)
_STASH_KEY = pytest.StashKey[_PytestSocketConfig]()
def _is_unix_socket(family) -> bool:
try:
is_unix_socket = family == socket.AF_UNIX
except AttributeError:
# AF_UNIX not supported on Windows https://bugs.python.org/issue33408
is_unix_socket = False
return is_unix_socket
def disable_socket(allow_unix_socket=False):
"""disable socket.socket to disable the Internet. useful in testing."""
class GuardedSocket(socket.socket):
"""socket guard to disable socket creation (from pytest-socket)"""
def __new__(cls, family=-1, type=-1, proto=-1, fileno=None):
if _is_unix_socket(family) and allow_unix_socket:
return super().__new__(cls, family, type, proto, fileno)
raise SocketBlockedError()
socket.socket = GuardedSocket
def enable_socket():
"""re-enable socket.socket to enable the Internet. useful in testing."""
socket.socket = _true_socket
def pytest_configure(config):
config.addinivalue_line(
"markers", "disable_socket(): Disable socket connections for a specific test"
)
config.addinivalue_line(
"markers", "enable_socket(): Enable socket connections for a specific test"
)
config.addinivalue_line(
"markers",
"allow_hosts([hosts]): Restrict socket connection to defined list of hosts",
)
# Store the global configs in the `pytest.Config` object.
config.stash[_STASH_KEY] = _PytestSocketConfig(
socket_force_enabled=config.getoption("--force-enable-socket"),
socket_disabled=config.getoption("--disable-socket"),
allow_unix_socket=config.getoption("--allow-unix-socket"),
allow_hosts=config.getoption("--allow-hosts"),
)
def pytest_runtest_setup(item) -> None:
"""During each test item's setup phase,
choose the behavior based on the configurations supplied.
This is the bulk of the logic for the plugin.
As the logic can be extensive, this method is allowed complexity.
It may be refactored in the future to be more readable.
If the given item is not a function test (i.e a DoctestItem)
or otherwise has no support for fixtures, skip it.
"""
if not hasattr(item, "fixturenames"):
return
socket_config = item.config.stash[_STASH_KEY]
# If test has the `enable_socket` marker, fixture or
# it's forced from the CLI, we accept this as most explicit.
if (
"socket_enabled" in item.fixturenames
or item.get_closest_marker("enable_socket")
or socket_config.socket_force_enabled
):
enable_socket()
return
# If the test has the `disable_socket` marker, it's explicitly disabled.
if "socket_disabled" in item.fixturenames or item.get_closest_marker(
"disable_socket"
):
disable_socket(socket_config.allow_unix_socket)
return
# Resolve `allow_hosts` behaviors.
hosts = _resolve_allow_hosts(item)
# Finally, check the global config and disable socket if needed.
if socket_config.socket_disabled and not hosts:
disable_socket(socket_config.allow_unix_socket)
def _resolve_allow_hosts(item):
"""Resolve `allow_hosts` behaviors."""
socket_config = item.config.stash[_STASH_KEY]
mark_restrictions = item.get_closest_marker("allow_hosts")
cli_restrictions = socket_config.allow_hosts
hosts = None
if mark_restrictions:
hosts = mark_restrictions.args[0]
elif cli_restrictions:
hosts = cli_restrictions
socket_allow_hosts(
hosts,
allow_unix_socket=socket_config.allow_unix_socket,
resolution_cache=socket_config.resolution_cache,
)
return hosts
def pytest_runtest_teardown():
_remove_restrictions()
def host_from_address(address):
host = address[0]
if isinstance(host, str):
return host
def host_from_connect_args(args):
address = args[0]
if isinstance(address, tuple):
return host_from_address(address)
def is_ipaddress(address: str) -> bool:
"""
Determine if the address is a valid IPv4 or IPv6 address.
"""
try:
ipaddress.ip_address(address)
return True
except ValueError:
return False
def resolve_hostnames(hostname: str) -> typing.Set[str]:
try:
return {
addr_struct[0] for *_, addr_struct in socket.getaddrinfo(hostname, None)
}
except socket.gaierror:
return set()
def normalize_allowed_hosts(
allowed_hosts: typing.List[str],
resolution_cache: typing.Optional[typing.Dict[str, typing.List[str]]] = None,
) -> typing.Dict[str, typing.Set[str]]:
"""Map all items in `allowed_hosts` to IP addresses."""
if resolution_cache is None:
resolution_cache = {}
ip_hosts = defaultdict(set)
for host in allowed_hosts:
host = host.strip()
if is_ipaddress(host):
ip_hosts[host].add(host)
continue
if host not in resolution_cache:
resolution_cache[host] = resolve_hostnames(host)
ip_hosts[host].update(resolution_cache[host])
return ip_hosts
def socket_allow_hosts(
allowed: typing.Union[str, typing.List[str], None] = None,
allow_unix_socket: bool = False,
resolution_cache: typing.Optional[typing.Dict[str, typing.List[str]]] = None,
) -> None:
"""disable socket.socket.connect() to disable the Internet. useful in testing."""
if isinstance(allowed, str):
allowed = allowed.split(",")
if not isinstance(allowed, list):
return
allowed_ip_hosts_by_host = normalize_allowed_hosts(allowed, resolution_cache)
allowed_ip_hosts_and_hostnames = set(
itertools.chain(*allowed_ip_hosts_by_host.values())
) | set(allowed_ip_hosts_by_host.keys())
allowed_list = sorted(
[
(
host
if len(normalized) == 1 and next(iter(normalized)) == host
else f"{host} ({','.join(sorted(normalized))})"
)
for host, normalized in allowed_ip_hosts_by_host.items()
]
)
def guarded_connect(inst, *args):
host = host_from_connect_args(args)
if host in allowed_ip_hosts_and_hostnames or (
_is_unix_socket(inst.family) and allow_unix_socket
):
return _true_connect(inst, *args)
raise SocketConnectBlockedError(allowed_list, host)
socket.socket.connect = guarded_connect
def _remove_restrictions():
"""restore socket.socket.* to allow access to the Internet. useful in testing."""
socket.socket = _true_socket
socket.socket.connect = _true_connect