|
|
@ -804,10 +804,10 @@ class TestUrllibRequestHandler(TestRequestHandlerBase):
|
|
|
|
assert not isinstance(exc_info.value, TransportError)
|
|
|
|
assert not isinstance(exc_info.value, TransportError)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def run_validation(handler, fail, req, **handler_kwargs):
|
|
|
|
def run_validation(handler, error, req, **handler_kwargs):
|
|
|
|
with handler(**handler_kwargs) as rh:
|
|
|
|
with handler(**handler_kwargs) as rh:
|
|
|
|
if fail:
|
|
|
|
if error:
|
|
|
|
with pytest.raises(UnsupportedRequest):
|
|
|
|
with pytest.raises(error):
|
|
|
|
rh.validate(req)
|
|
|
|
rh.validate(req)
|
|
|
|
else:
|
|
|
|
else:
|
|
|
|
rh.validate(req)
|
|
|
|
rh.validate(req)
|
|
|
@ -824,6 +824,9 @@ class TestRequestHandlerValidation:
|
|
|
|
_SUPPORTED_PROXY_SCHEMES = None
|
|
|
|
_SUPPORTED_PROXY_SCHEMES = None
|
|
|
|
_SUPPORTED_URL_SCHEMES = None
|
|
|
|
_SUPPORTED_URL_SCHEMES = None
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def _check_extensions(self, extensions):
|
|
|
|
|
|
|
|
extensions.clear()
|
|
|
|
|
|
|
|
|
|
|
|
class HTTPSupportedRH(ValidationRH):
|
|
|
|
class HTTPSupportedRH(ValidationRH):
|
|
|
|
_SUPPORTED_URL_SCHEMES = ('http',)
|
|
|
|
_SUPPORTED_URL_SCHEMES = ('http',)
|
|
|
|
|
|
|
|
|
|
|
@ -834,26 +837,26 @@ class TestRequestHandlerValidation:
|
|
|
|
('https', False, {}),
|
|
|
|
('https', False, {}),
|
|
|
|
('data', False, {}),
|
|
|
|
('data', False, {}),
|
|
|
|
('ftp', False, {}),
|
|
|
|
('ftp', False, {}),
|
|
|
|
('file', True, {}),
|
|
|
|
('file', UnsupportedRequest, {}),
|
|
|
|
('file', False, {'enable_file_urls': True}),
|
|
|
|
('file', False, {'enable_file_urls': True}),
|
|
|
|
]),
|
|
|
|
]),
|
|
|
|
(NoCheckRH, [('http', False, {})]),
|
|
|
|
(NoCheckRH, [('http', False, {})]),
|
|
|
|
(ValidationRH, [('http', True, {})])
|
|
|
|
(ValidationRH, [('http', UnsupportedRequest, {})])
|
|
|
|
]
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
PROXY_SCHEME_TESTS = [
|
|
|
|
PROXY_SCHEME_TESTS = [
|
|
|
|
# scheme, expected to fail
|
|
|
|
# scheme, expected to fail
|
|
|
|
('Urllib', [
|
|
|
|
('Urllib', [
|
|
|
|
('http', False),
|
|
|
|
('http', False),
|
|
|
|
('https', True),
|
|
|
|
('https', UnsupportedRequest),
|
|
|
|
('socks4', False),
|
|
|
|
('socks4', False),
|
|
|
|
('socks4a', False),
|
|
|
|
('socks4a', False),
|
|
|
|
('socks5', False),
|
|
|
|
('socks5', False),
|
|
|
|
('socks5h', False),
|
|
|
|
('socks5h', False),
|
|
|
|
('socks', True),
|
|
|
|
('socks', UnsupportedRequest),
|
|
|
|
]),
|
|
|
|
]),
|
|
|
|
(NoCheckRH, [('http', False)]),
|
|
|
|
(NoCheckRH, [('http', False)]),
|
|
|
|
(HTTPSupportedRH, [('http', True)]),
|
|
|
|
(HTTPSupportedRH, [('http', UnsupportedRequest)]),
|
|
|
|
]
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
PROXY_KEY_TESTS = [
|
|
|
|
PROXY_KEY_TESTS = [
|
|
|
@ -863,8 +866,22 @@ class TestRequestHandlerValidation:
|
|
|
|
('unrelated', False),
|
|
|
|
('unrelated', False),
|
|
|
|
]),
|
|
|
|
]),
|
|
|
|
(NoCheckRH, [('all', False)]),
|
|
|
|
(NoCheckRH, [('all', False)]),
|
|
|
|
(HTTPSupportedRH, [('all', True)]),
|
|
|
|
(HTTPSupportedRH, [('all', UnsupportedRequest)]),
|
|
|
|
(HTTPSupportedRH, [('no', True)]),
|
|
|
|
(HTTPSupportedRH, [('no', UnsupportedRequest)]),
|
|
|
|
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
EXTENSION_TESTS = [
|
|
|
|
|
|
|
|
('Urllib', [
|
|
|
|
|
|
|
|
({'cookiejar': 'notacookiejar'}, AssertionError),
|
|
|
|
|
|
|
|
({'cookiejar': CookieJar()}, False),
|
|
|
|
|
|
|
|
({'timeout': 1}, False),
|
|
|
|
|
|
|
|
({'timeout': 'notatimeout'}, AssertionError),
|
|
|
|
|
|
|
|
({'unsupported': 'value'}, UnsupportedRequest),
|
|
|
|
|
|
|
|
]),
|
|
|
|
|
|
|
|
(NoCheckRH, [
|
|
|
|
|
|
|
|
({'cookiejar': 'notacookiejar'}, False),
|
|
|
|
|
|
|
|
({'somerandom': 'test'}, False), # but any extension is allowed through
|
|
|
|
|
|
|
|
]),
|
|
|
|
]
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('handler,scheme,fail,handler_kwargs', [
|
|
|
|
@pytest.mark.parametrize('handler,scheme,fail,handler_kwargs', [
|
|
|
@ -907,15 +924,16 @@ class TestRequestHandlerValidation:
|
|
|
|
@pytest.mark.parametrize('proxy_url', ['//example.com', 'example.com', '127.0.0.1'])
|
|
|
|
@pytest.mark.parametrize('proxy_url', ['//example.com', 'example.com', '127.0.0.1'])
|
|
|
|
@pytest.mark.parametrize('handler', ['Urllib'], indirect=True)
|
|
|
|
@pytest.mark.parametrize('handler', ['Urllib'], indirect=True)
|
|
|
|
def test_missing_proxy_scheme(self, handler, proxy_url):
|
|
|
|
def test_missing_proxy_scheme(self, handler, proxy_url):
|
|
|
|
run_validation(handler, True, Request('http://', proxies={'http': 'example.com'}))
|
|
|
|
run_validation(handler, UnsupportedRequest, Request('http://', proxies={'http': 'example.com'}))
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('handler', ['Urllib'], indirect=True)
|
|
|
|
|
|
|
|
def test_cookiejar_extension(self, handler):
|
|
|
|
|
|
|
|
run_validation(handler, True, Request('http://', extensions={'cookiejar': 'notacookiejar'}))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@pytest.mark.parametrize('handler', ['Urllib'], indirect=True)
|
|
|
|
@pytest.mark.parametrize('handler,extensions,fail', [
|
|
|
|
def test_timeout_extension(self, handler):
|
|
|
|
(handler_tests[0], extensions, fail)
|
|
|
|
run_validation(handler, True, Request('http://', extensions={'timeout': 'notavalidtimeout'}))
|
|
|
|
for handler_tests in EXTENSION_TESTS
|
|
|
|
|
|
|
|
for extensions, fail in handler_tests[1]
|
|
|
|
|
|
|
|
], indirect=['handler'])
|
|
|
|
|
|
|
|
def test_extension(self, handler, extensions, fail):
|
|
|
|
|
|
|
|
run_validation(
|
|
|
|
|
|
|
|
handler, fail, Request('http://', extensions=extensions))
|
|
|
|
|
|
|
|
|
|
|
|
def test_invalid_request_type(self):
|
|
|
|
def test_invalid_request_type(self):
|
|
|
|
rh = self.ValidationRH(logger=FakeLogger())
|
|
|
|
rh = self.ValidationRH(logger=FakeLogger())
|
|
|
|