...
 
Commits (12)
......@@ -2,7 +2,7 @@ stages:
- test
variables:
LD_LIBRARY_PATH: ""
LD_LIBRARY_PATH: /opt/sqlite-compat-django/lib/
before_script:
- python3.6 -m venv $HOME/tox
......@@ -14,7 +14,3 @@ api-test-py3:
coverage: '/^TOTAL.*\s+(\d+\.\d\%)\s*$/'
allow_failure: true
api-test-py2:
stage: test
script: $HOME/tox/bin/tox -e 'py27'
coverage: '/^TOTAL.*\s+(\d+\.\d\%)\s*$/'
......@@ -26,7 +26,7 @@ class Command(BaseCommand):
continue
try:
url = user.remote_reverse("health")
url = user.remote_reverse("api:health")
r = requests.get(url, headers=headers, timeout=5)
if r.status_code == 200:
......
......@@ -44,7 +44,7 @@ class Command(BaseCommand):
token = user.token()
headers = {'Authorization': 'token ' + str(token)}
try:
url = user.remote_reverse("health")
url = user.remote_reverse("api:health")
r = requests.get(url, headers=headers, timeout=5)
if r.status_code == 200:
logger.info("{} OK".format(user.username))
......
......@@ -100,17 +100,17 @@ class Migration(migrations.Migration):
migrations.AddField(
model_name='resource',
name='sp',
field=models.ForeignKey(verbose_name=b'SP', to='api.ServiceProvider'),
field=models.ForeignKey(verbose_name=b'SP', to='api.ServiceProvider', on_delete=models.PROTECT),
),
migrations.AddField(
model_name='attribute',
name='resource',
field=models.ForeignKey(related_name='attributes', to='api.Resource'),
field=models.ForeignKey(related_name='attributes', to='api.Resource', on_delete=models.CASCADE),
),
migrations.AddField(
model_name='tokenauthuser',
name='sp',
field=models.ForeignKey(blank=True, to='api.ServiceProvider', help_text=b'Must be set for type SP!', null=True, verbose_name=b'SP'),
field=models.ForeignKey(blank=True, to='api.ServiceProvider', help_text=b'Must be set for type SP!', null=True, verbose_name=b'SP', on_delete=models.PROTECT),
),
migrations.AddField(
model_name='tokenauthuser',
......
......@@ -47,6 +47,6 @@ class Migration(migrations.Migration):
migrations.AddField(
model_name='localresourcepolicy',
name='sp',
field=models.OneToOneField(verbose_name=b'SP', to='api.ServiceProvider'),
field=models.OneToOneField(verbose_name=b'SP', to='api.ServiceProvider', on_delete=models.CASCADE),
),
]
......@@ -29,7 +29,7 @@ from django.core.exceptions import ValidationError
from django.db import transaction, models
from django.contrib.auth.models import AbstractUser
from django.conf import settings
from django.core.urlresolvers import get_script_prefix
from django.urls import get_script_prefix
from django.db.models.signals import post_save
from django.dispatch import receiver
from django_choice_object import Choice
......@@ -135,7 +135,7 @@ class ServiceProvider(models.Model):
class LocalResourcePolicy(models.Model):
sp = models.OneToOneField(ServiceProvider, verbose_name="SP")
sp = models.OneToOneField(ServiceProvider, verbose_name="SP", on_delete=models.CASCADE)
delete_after_days = models.IntegerField(
default=90,
verbose_name="Default delete policy for resources",
......@@ -166,7 +166,7 @@ class Resource(models.Model):
updated = models.DateTimeField(auto_now=True)
expiry_date = models.DateTimeField(db_index=True)
deletion_date = models.DateTimeField(db_index=True)
sp = models.ForeignKey(ServiceProvider, verbose_name="SP")
sp = models.ForeignKey(ServiceProvider, verbose_name="SP", on_delete=models.PROTECT)
sp_primary_key = models.CharField(max_length=255,
blank=True,
verbose_name="Primary Key of resource in SP software")
......@@ -243,7 +243,9 @@ class Resource(models.Model):
if self.reject_request(is_sp_local, local_attrib, rmt_attrib, user_type):
attrib_dict.update({
"status": "rejected"
"status": "rejected",
"vec_sp": local_attrib.vec_sp,
"vec_idp": local_attrib.vec_idp,
})
res.append({attrib_name: attrib_dict})
else:
......@@ -271,10 +273,10 @@ class Resource(models.Model):
return res
def reject_request(self, is_sp_local, local_attrib, rmt_attrib, user_type):
local_vec = VersionVector(local_attrib.vec_sp, local_attrib.vec_idp)
remote_vec = VersionVector(rmt_attrib.get("vec_sp"), rmt_attrib.get("vec_idp"))
reject_request = False
if user_type == UserType.TYPE_SYNC:
local_vec = VersionVector(local_attrib.vec_sp, local_attrib.vec_idp)
remote_vec = VersionVector(rmt_attrib.get("vec_sp"), rmt_attrib.get("vec_idp"))
if local_vec.concurrent_to(remote_vec) or remote_vec.happened_before(local_vec):
# As this is represents a conflict situation - depending on prioritization -
# we might have to reject this request in order to keep ours dominant
......@@ -285,7 +287,29 @@ class Resource(models.Model):
if local_attrib.prio == PriorityRole.ROLE_IDP and not is_sp_local:
# We are IdP and this attribute prioritizes IdP
reject_request = True
# else: Local changes only require incrementing our local component
# jetzt müssen wir noch testen, dass die andere Seite nicht fälschlicherweise unseren Teil der Vektoruhr updatet
if is_sp_local:
if remote_vec.sp and remote_vec.sp != local_vec.sp:
reject_request = True
else:
if remote_vec.idp and remote_vec.idp != local_vec.idp:
reject_request = True
else: # Local changes only require incrementing our local component
if remote_vec.idp and remote_vec.sp:
if local_vec.concurrent_to(remote_vec) or remote_vec.happened_before(local_vec):
reject_request = True
if remote_vec.idp and remote_vec.idp < local_vec.idp:
reject_request = True
if remote_vec.sp and remote_vec.sp < local_vec.sp:
reject_request = True
if remote_vec.sp and user_type == UserType.TYPE_IDP and remote_vec.sp != local_vec.sp:
# IDP Darf SP Wert nicht verändern
reject_request = True
if remote_vec.idp and user_type == UserType.TYPE_SP and remote_vec.idp != local_vec.idp:
# SP Darf IDP Wert nicht verändern
reject_request = True
return reject_request
......@@ -328,7 +352,7 @@ class Attribute(models.Model):
name = models.CharField(max_length=100, db_index=True)
default_value = models.CharField(max_length=100, blank=True)
value = models.CharField(max_length=100)
resource = models.ForeignKey(Resource, related_name="attributes")
resource = models.ForeignKey(Resource, related_name="attributes", on_delete=models.CASCADE)
vec_sp = models.IntegerField(verbose_name="VV (SP)", default=1)
vec_idp = models.IntegerField(verbose_name="VV (IdP)", default=0)
prio = models.CharField(verbose_name="Priority role",
......@@ -354,7 +378,9 @@ class TokenAuthUser(AbstractUser):
verbose_name="SP",
blank=True,
null=True,
help_text="Must be set for type SP!")
help_text="Must be set for type SP!",
on_delete=models.PROTECT,
)
realm = models.CharField(verbose_name="Realm",
max_length=100,
blank=True,
......
......@@ -51,7 +51,7 @@ class AttributeUpdateTest(APITestCase):
)
def test_attribute_update(self):
url = reverse('resource_attributes', args=[self.res.uuid])
url = reverse('api:resource_attributes', args=[self.res.uuid])
user = TokenAuthUser.objects.get(username='a_super')
self.client.force_authenticate(user=user, token=user.token())
......@@ -93,7 +93,7 @@ class AttributeUpdateTest(APITestCase):
self.assertEqual(2, QueueJob.objects.count())
def test_attribute_update_as_sp(self):
url = reverse('resource_attributes', args=[self.res.uuid])
url = reverse('api:resource_attributes', args=[self.res.uuid])
user = TokenAuthUser.objects.get(username='testservice')
self.client.force_authenticate(user=user, token=user.token())
......@@ -134,7 +134,7 @@ class AttributeUpdateTest(APITestCase):
self.assertEqual(2, QueueJob.objects.count())
def test_attribute_update_rejected(self):
url = reverse('resource_attributes', args=[self.res.uuid])
url = reverse('api:resource_attributes', args=[self.res.uuid])
user = TokenAuthUser.objects.get(username='b_sync')
self.client.force_authenticate(user=user, token=user.token())
......
......@@ -25,7 +25,7 @@ class AuthTestCommandTest(TestCase):
def test_success(self):
out = StringIO()
with requests_mock.Mocker() as m:
m.register_uri("GET", self.user.remote_reverse("health"), status_code=200)
m.register_uri("GET", self.user.remote_reverse("api:health"), status_code=200)
call_command("auth_test", stdout=out)
self.assertTrue(m.called)
self.assertEqual(out.getvalue(), "1 passed, 0 failed.\n")
......@@ -33,7 +33,7 @@ class AuthTestCommandTest(TestCase):
def test_failed(self):
out = StringIO()
with requests_mock.Mocker() as m:
m.register_uri("GET", self.user.remote_reverse("health"), status_code=500)
m.register_uri("GET", self.user.remote_reverse("api:health"), status_code=500)
call_command("auth_test", stdout=out)
self.assertTrue(m.called)
self.assertEqual(out.getvalue(), "0 passed, 1 failed.\n\nFailed:\nb_sync\n")
......@@ -41,7 +41,7 @@ class AuthTestCommandTest(TestCase):
def test_connection_failed(self):
out = StringIO()
with requests_mock.Mocker() as m:
m.register_uri("GET", self.user.remote_reverse("health"), exc=requests.exceptions.ConnectTimeout)
m.register_uri("GET", self.user.remote_reverse("api:health"), exc=requests.exceptions.ConnectTimeout)
call_command("auth_test", stdout=out)
self.assertTrue(m.called)
self.assertEqual(out.getvalue(), "0 passed, 1 failed.\n\nFailed:\nb_sync\n")
......@@ -51,7 +51,7 @@ class AuthTestCommandTest(TestCase):
self.user.save()
out = StringIO()
with requests_mock.Mocker() as m:
m.register_uri("GET", self.user.remote_reverse("health"))
m.register_uri("GET", self.user.remote_reverse("api:health"))
call_command("auth_test", stdout=out)
self.assertFalse(m.called)
self.assertEqual(out.getvalue(), "0 passed, 1 failed.\n\nFailed:\nb_sync\n")
......
......@@ -32,7 +32,7 @@ class AttributeUpdateTest(APITestCase):
realm="b.edu")
def test_health(self):
url = reverse('health')
url = reverse('api:health')
user = TokenAuthUser.objects.get(username='a_super')
token = Token.objects.get(user_id=user)
......@@ -83,7 +83,7 @@ class TestHealthCommand(TestCase):
remote_user.save()
with requests_mock.Mocker() as m:
m.register_uri("GET", remote_user.remote_reverse("health"), status_code=500)
m.register_uri("GET", remote_user.remote_reverse("api:health"), status_code=500)
with self.assertRaises(SystemExit) as ex:
call_command("check_health")
self.assertEqual(ex.exception.code, 1)
......@@ -97,7 +97,7 @@ class TestHealthCommand(TestCase):
remote_user.save()
with requests_mock.Mocker() as m:
m.register_uri("GET", remote_user.remote_reverse("health"), exc=requests.exceptions.ConnectTimeout)
m.register_uri("GET", remote_user.remote_reverse("api:health"), exc=requests.exceptions.ConnectTimeout)
with self.assertRaises(SystemExit) as ex:
call_command("check_health")
self.assertEqual(ex.exception.code, 1)
......@@ -18,6 +18,6 @@ class TokenAuthUserTest(APITestCase):
realm="a.edu")
def test_remote_reverse(self):
self.assertEqual(
self.a_super.remote_reverse("health"),
self.a_super.remote_reverse("api:health"),
"http://api.a.edu:7000/foobar/health/"
)
......@@ -63,7 +63,7 @@ class SyncResourceTest(TestCase):
"""
transfer_data = '{"foo": "bar"}'
with requests_mock.Mocker() as m:
m.register_uri('POST', self.remote_user.remote_reverse("resource_list"), status_code=201)
m.register_uri('POST', self.remote_user.remote_reverse("api:resource_list"), status_code=201)
queue_utils.sync_resource(self.remote_user, transfer_data)
self.assertTrue(m.called)
# content matches
......@@ -77,7 +77,7 @@ class SyncResourceTest(TestCase):
"""
transfer_data = '{"foo": "bar"}'
with requests_mock.Mocker() as m:
m.register_uri('POST', self.remote_user.remote_reverse("resource_list"), status_code=500)
m.register_uri('POST', self.remote_user.remote_reverse("api:resource_list"), status_code=500)
with self.assertRaises(queue_utils.SyncException):
queue_utils.sync_resource(self.remote_user, transfer_data)
self.assertTrue(m.called)
......@@ -86,8 +86,8 @@ class SyncResourceTest(TestCase):
transfer_data = '{"foo": "bar", "uuid": "12345"}'
uuid = '12345'
with requests_mock.Mocker() as m:
m.register_uri('POST', self.remote_user.remote_reverse("resource_list"), status_code=400)
m.register_uri('GET', self.remote_user.remote_reverse("resource_detail", args=(uuid, )), status_code=200)
m.register_uri('POST', self.remote_user.remote_reverse("api:resource_list"), status_code=400)
m.register_uri('GET', self.remote_user.remote_reverse("api:resource_detail", args=(uuid, )), status_code=200)
queue_utils.sync_resource(self.remote_user, transfer_data)
self.assertTrue(m.called)
......@@ -95,8 +95,8 @@ class SyncResourceTest(TestCase):
transfer_data = '{"foo": "bar", "uuid": "12345"}'
uuid = '12345'
with requests_mock.Mocker() as m:
m.register_uri('POST', self.remote_user.remote_reverse("resource_list"), status_code=400)
m.register_uri('GET', self.remote_user.remote_reverse("resource_detail", args=(uuid, )), status_code=404)
m.register_uri('POST', self.remote_user.remote_reverse("api:resource_list"), status_code=400)
m.register_uri('GET', self.remote_user.remote_reverse("api:resource_detail", args=(uuid, )), status_code=404)
with self.assertRaises(queue_utils.SyncException):
queue_utils.sync_resource(self.remote_user, transfer_data)
self.assertTrue(m.called)
......@@ -131,7 +131,7 @@ class SyncAttributesTest(TestCase):
}
])
with requests_mock.Mocker() as m:
m.register_uri('PUT', self.remote_user.remote_reverse("resource_attributes", args=(self.r.pk, )), status_code=200, text=answer)
m.register_uri('PUT', self.remote_user.remote_reverse("api:resource_attributes", args=(self.r.pk, )), status_code=200, text=answer)
queue_utils.sync_attributes(self.remote_user, transfer_data, str(self.r.pk))
foo = Attribute.objects.get(pk=self.foo.pk)
self.assertEquals(foo.vec_idp, 2)
......@@ -145,7 +145,7 @@ class SyncAttributesTest(TestCase):
}
])
with requests_mock.Mocker() as m:
m.register_uri('PUT', self.remote_user.remote_reverse("resource_attributes", args=(self.r.pk, )), status_code=404, text=answer)
m.register_uri('PUT', self.remote_user.remote_reverse("api:resource_attributes", args=(self.r.pk, )), status_code=404, text=answer)
with self.assertRaises(queue_utils.SyncException):
queue_utils.sync_attributes(self.remote_user, transfer_data, str(self.r.pk))
......@@ -162,18 +162,18 @@ class DeleteResourceTest(TestCase):
def test_success(self):
uuid = "12345"
with requests_mock.Mocker() as m:
m.register_uri('DELETE', self.remote_user.remote_reverse("resource_detail", args=(uuid, )), status_code=200)
m.register_uri('DELETE', self.remote_user.remote_reverse("api:resource_detail", args=(uuid, )), status_code=200)
queue_utils.delete_resource(self.remote_user, uuid)
def test_not_found(self):
uuid = "12345"
with requests_mock.Mocker() as m:
m.register_uri('DELETE', self.remote_user.remote_reverse("resource_detail", args=(uuid, )), status_code=404)
m.register_uri('DELETE', self.remote_user.remote_reverse("api:resource_detail", args=(uuid, )), status_code=404)
queue_utils.delete_resource(self.remote_user, uuid)
def test_failure(self):
uuid = "12345"
with requests_mock.Mocker() as m:
m.register_uri('DELETE', self.remote_user.remote_reverse("resource_detail", args=(uuid, )), status_code=500)
m.register_uri('DELETE', self.remote_user.remote_reverse("api:resource_detail", args=(uuid, )), status_code=500)
with self.assertRaises(queue_utils.SyncException):
queue_utils.delete_resource(self.remote_user, uuid)
......@@ -53,7 +53,7 @@ class ResourceUpdatedTest(APITestCase):
self.resource_update_signals.append((sender, resource, user_type))
def test_attribute_update(self):
url = reverse('resource_attributes', args=[self.res.uuid])
url = reverse('api:resource_attributes', args=[self.res.uuid])
user = TokenAuthUser.objects.get(username='a_super')
self.client.force_authenticate(user=user, token=user.token())
......@@ -110,7 +110,7 @@ class ResourceCreatedTest(APITestCase):
self.created_signal_calls.append((sender, resource, user_type))
def test_create_resource(self):
url = reverse('resource_list')
url = reverse('api:resource_list')
user = TokenAuthUser.objects.get(username='a_super')
self.client.force_authenticate(user=user, token=user.token())
......
......@@ -43,7 +43,7 @@ class SyncNewResourceTest(APITestCase):
vec_idp=0)
def test_sync_new_resource(self):
url = reverse('resource_list')
url = reverse('api:resource_list')
user = TokenAuthUser.objects.get(username='b_sync')
self.client.force_authenticate(user=user, token=user.token())
......
......@@ -14,7 +14,7 @@ from django.test.client import encode_multipart
from rest_framework.renderers import JSONRenderer
from rest_framework.reverse import reverse
from rest_framework.test import APITestCase
from api.models import QueueJob, Resource, ServiceProvider, TokenAuthUser, UserType
from api.models import Attribute, QueueJob, Resource, ServiceProvider, TokenAuthUser, UserType
from api.serializers import ResourceSerializer
......@@ -83,7 +83,7 @@ class ResourceDeleteTest(APITestCase):
def _test_delete(self, res, user, queue_delta):
qlen = QueueJob.objects.filter(res_uuid=res.uuid).count()
self.client.force_authenticate(user=user, token=user.token())
self.client.delete(reverse('resource_detail', kwargs={'uuid': res.uuid}))
self.client.delete(reverse('api:resource_detail', kwargs={'uuid': res.uuid}))
# resource has been deleted
self.assertEqual(Resource.objects.filter(uuid=res.uuid).count(), 0)
# no queueJob has been created
......@@ -151,7 +151,7 @@ class ResourceCreateTest(APITestCase):
sp=self.local_sp,
sp_primary_key="usera@a.edu",
)
self.url = reverse('resource_list')
self.url = reverse('api:resource_list')
self.res = Resource()
self.queue_data = JSONRenderer().render(ResourceSerializer(self.localResource).data)
......@@ -204,14 +204,14 @@ class ResourceGetTest(APITestCase):
def test_unauthenticated(self):
invalid_uuid = str(uuid.uuid4())
url = reverse("resource_detail", args=(invalid_uuid,))
url = reverse("api:resource_detail", args=(invalid_uuid,))
r = self.client.get(url)
self.assertEqual(r.status_code, 401)
def test_not_exist(self):
invalid_uuid = str(uuid.uuid4())
self.client.force_authenticate(self.sp_user)
url = reverse("resource_detail", args=(invalid_uuid,))
url = reverse("api:resource_detail", args=(invalid_uuid,))
r = self.client.get(url)
self.assertEqual(r.status_code, 404)
......@@ -220,11 +220,236 @@ class ResourceGetTest(APITestCase):
r.full_clean()
r.save()
self.client.force_authenticate(self.sp_user)
url = reverse("resource_detail", args=(r.pk,))
url = reverse("api:resource_detail", args=(r.pk,))
r = self.client.get(url)
self.assertEqual(r.status_code, 200)
class ResourceUpdateTest(APITestCase):
def setUp(self):
self.sp = ServiceProvider.objects.create(
name="TestService",
expiry_date=timezone.now(),
realm="a.edu"
)
self.sp_user = TokenAuthUser.objects.create_superuser(
username='sp',
email='foo@bar.com',
password='sp',
user_type=UserType.TYPE_SP,
api_url="http://api.a.edu:7000/",
realm="a.edu",
sp=self.sp,
)
self.idp_user = TokenAuthUser.objects.create_superuser(
username='idp',
email='foo@bar.com',
password='idp',
user_type=UserType.TYPE_IDP,
api_url="http://api.b.edu:7000/",
realm="b.edu",
)
self.sync_user = TokenAuthUser.objects.create_superuser(
username='sync',
email='foo@bar.com',
password='idp',
user_type=UserType.TYPE_SYNC,
api_url="http://api.b.edu:7000/",
realm="b.edu",
)
self.r = Resource(sp=self.sp, expiry_date=timezone.now(), deletion_date=timezone.now(), setup_token="1234", eppn="foo@b.edu")
self.r.full_clean()
self.r.save()
self.attr1 = Attribute(name='test', value='foo', vec_sp=3, vec_idp=1, resource=self.r)
self.attr1.full_clean()
self.attr1.save()
self.attr2 = Attribute(name='other', value='bar', vec_sp=5, vec_idp=2, resource=self.r)
self.attr2.full_clean()
self.attr2.save()
def test_get(self):
self.client.force_authenticate(self.sp_user)
r = self.client.get(reverse('api:resource_list'))
self.maxDiff=None
self.assertEqual(r.status_code, 200)
self.assertEqual(r.json(),[{
'uuid': str(self.r.uuid),
'added': self.r.added.astimezone(timezone.get_default_timezone()).isoformat(),
'updated': self.r.updated.astimezone(timezone.get_default_timezone()).isoformat(),
'deletion_date': self.r.deletion_date.astimezone(timezone.get_default_timezone()).isoformat(),
'expiry_date': self.r.expiry_date.astimezone(timezone.get_default_timezone()).isoformat(),
'eppn': 'foo@b.edu',
'realm_idp': 'b.edu',
'setup_token': '1234',
'sp': str(self.sp.uuid),
'sp_primary_key': '',
'attributes': [
{
'name': 'test',
'value': 'foo',
'default_value': '',
'vec_sp': 3,
'vec_idp': 1
},
{
'name': 'other',
'value': 'bar',
'default_value': '',
'vec_sp': 5,
'vec_idp': 2
},
]
}])
def _run_test_update(self, vec_sp, vec_idp):
self._run_test_update_with_result(vec_sp, vec_idp, 200, vec_sp, vec_idp, 'updated')
def _run_test_update_with_result(self, vec_sp, vec_idp, expected_status_code, expected_vec_sp, expected_vec_idp, expected_status):
data = [
{
'name': 'other',
'value': 'bar2',
'default_value': '',
'vec_sp': vec_sp,
'vec_idp': vec_idp
},
]
url = reverse("api:resource_attributes", args=(self.r.pk,))
res = self.client.put(url, data, format='json')
self.assertEqual(res.status_code, expected_status_code)
result_data = res.json()
result_dict = result_data[0]['other']
self.assertEqual(result_dict, {
'status': expected_status,
'vec_sp': expected_vec_sp,
'vec_idp': expected_vec_idp,
})
attr = Attribute.objects.get(pk=self.attr2.pk)
self.assertEqual({
'vec_sp': attr.vec_sp,
'vec_idp': attr.vec_idp,
}, {
'vec_sp': expected_vec_sp,
'vec_idp': expected_vec_idp,
})
if vec_sp == expected_vec_sp and vec_idp == expected_vec_idp:
self.assertEqual(attr.value, 'bar2')
else:
self.assertEqual(attr.value, 'bar')
def test_update_ok_as_sp(self):
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.sp_user)
self._run_test_update(6, 2)
def test_update_conflict_as_sp(self):
"""
Dieses Update muss fehlschlagen, weil es eine Nebenläufigkeit der Vektoruhren gibt.
"""
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.sp_user)
self._run_test_update_with_result(6, 1, 200, 5, 2, 'rejected')
def test_update_too_old_as_sp(self):
"""
Dieses Update muss fehlschlagen, weil der SP Nutzer auf der SP Instanz
versucht, einen Wert zu aktualisieren, obwohl der mitgeschickte vec_sp
Zähler zu alt ist
"""
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.sp_user)
self._run_test_update_with_result(4, 2, 200, 5, 2, 'rejected')
def test_update_sp_must_not_incement_idp(self):
"""
Dieses Update muss fehlschlagen, weil der SP den Zähler vom IDP nicht erhöhen darf.
"""
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.sp_user)
self._run_test_update_with_result(6, 3, 200, 5, 2, 'rejected')
self._run_test_update_with_result(5, 3, 200, 5, 2, 'rejected')
@override_settings(SERVER_REALM="b.edu")
def test_update_ok_as_idp(self):
self.assertEqual(self.sp.is_local, False)
self.client.force_authenticate(self.idp_user)
self._run_test_update(5, 3)
@override_settings(SERVER_REALM="b.edu")
def test_conflict_as_idp(self):
"""
Dieses Update muss fehlschlagen, weil es eine Nebenläufigkeit der Vektoruhren gibt.
"""
self.assertEqual(self.sp.is_local, False)
self.client.force_authenticate(self.idp_user)
self._run_test_update_with_result(4, 3, 200, 5, 2, 'rejected')
@override_settings(SERVER_REALM="b.edu")
def test_too_old_as_idp(self):
"""
Dieses Update muss fehlschlagen, weil der IDP Nutzer auf der IDP Instanz
versucht, einen Wert zu aktualisieren, obwohl der mitgeschickte vec_idp
Zähler zu alt ist
"""
self.assertEqual(self.sp.is_local, False)
self.client.force_authenticate(self.idp_user)
self._run_test_update_with_result(5, 1, 200, 5, 2, 'rejected')
def test_update_idp_must_not_incement_sp(self):
"""
Dieses Update muss fehlschlagen, weil der IDP den Zähler vom SP nicht erhöhen darf.
"""
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.idp_user)
self._run_test_update_with_result(6, 3, 200, 5, 2, 'rejected')
self._run_test_update_with_result(6, 2, 200, 5, 2, 'rejected')
@override_settings(SERVER_REALM="b.edu")
def test_ok_sync_from_sp_side(self):
# Hier testen wir, ob die Vektoruhr richtig gesetzt wird, wenn ein sync
# update vin der Seite des SPs beim IdP aufgerufen wird, also der SP ein
# Attribut geändert hat
self.assertEqual(self.sp.is_local, False)
self.client.force_authenticate(self.sync_user)
self._run_test_update(6, 2)
@override_settings(SERVER_REALM="b.edu")
def test_conflict_sync_from_sp_side(self):
self.assertEqual(self.sp.is_local, False)
self.client.force_authenticate(self.sync_user)
# nebenläufig
self._run_test_update_with_result(6, 1, 200, 5, 2, 'rejected')
# IdP Wert geändert
self._run_test_update_with_result(6, 3, 200, 5, 2, 'rejected')
# SP Wert Lokal schon neuer
self._run_test_update_with_result(4, 1, 200, 5, 2, 'rejected')
# IdP Wert geändert, SP Wert lokal schon neuer
self._run_test_update_with_result(4, 3, 200, 5, 2, 'rejected')
def test_ok_sync_from_idp_side(self):
"""
hier testen wir, ob die Vektoruhr richtig gesetzt wird, wenn ein sync
update von der Seite des IdPs beim SP aufgerufen wird, also der IdP
ein Attribut geändert hat und dass es beim SP richtig aktualisiert wird
"""
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.sync_user)
self._run_test_update(5, 3)
def test_conflict_sync_from_idp_side(self):
"""
Das muss fehlschlagen, weil es hier eine Nebenläufigkeit der Vektoruhren
gibt.
"""
self.assertEqual(self.sp.is_local, True)
self.client.force_authenticate(self.sync_user)
self._run_test_update_with_result(4, 3, 200, 5, 2, 'rejected')
self._run_test_update_with_result(6, 3, 200, 5, 2, 'rejected')
self._run_test_update_with_result(4, 2, 200, 5, 2, 'rejected')
self._run_test_update_with_result(6, 2, 200, 5, 2, 'rejected')
class AttributesTest(APITestCase):
def setUp(self):
self.local_sp = ServiceProvider.objects.create(
......@@ -244,14 +469,14 @@ class AttributesTest(APITestCase):
def test_unauthenticated(self):
invalid_uuid = str(uuid.uuid4())
url = reverse("resource_attributes", args=(invalid_uuid,))
url = reverse("api:resource_attributes", args=(invalid_uuid,))
r = self.client.get(url)
self.assertEqual(r.status_code, 401)
def test_not_exist(self):
invalid_uuid = str(uuid.uuid4())
self.client.force_authenticate(self.sp_user)
url = reverse("resource_attributes", args=(invalid_uuid,))
url = reverse("api:resource_attributes", args=(invalid_uuid,))
r = self.client.get(url)
self.assertEqual(r.status_code, 404)
......@@ -260,7 +485,7 @@ class AttributesTest(APITestCase):
r.full_clean()
r.save()
self.client.force_authenticate(self.sp_user)
url = reverse("resource_attributes", args=(r.pk,))
url = reverse("api:resource_attributes", args=(r.pk,))
r = self.client.get(url)
self.assertEqual(r.status_code, 200)
......@@ -284,20 +509,20 @@ class ServiceProviderGetTest(APITestCase):
def test_unauthenticated(self):
invalid_uuid = str(uuid.uuid4())
url = reverse("service_detail", args=(invalid_uuid,))
url = reverse("api:service_detail", args=(invalid_uuid,))
r = self.client.get(url)
self.assertEqual(r.status_code, 401)
def test_not_exist(self):
invalid_uuid = str(uuid.uuid4())
self.client.force_authenticate(self.sp_user)
url = reverse("service_detail", args=(invalid_uuid,))
url = reverse("api:service_detail", args=(invalid_uuid,))
r = self.client.get(url)
self.assertEqual(r.status_code, 404)
def test_regular(self):
self.client.force_authenticate(self.sp_user)
url = reverse("service_detail", args=(self.local_sp.pk,))
url = reverse("api:service_detail", args=(self.local_sp.pk,))
r = self.client.get(url)
self.assertEqual(r.status_code, 200)
......@@ -345,7 +570,7 @@ class CsvUploadViewTest(APITestCase):
sp=self.local_sp,
)
self.url = reverse('csv_upload')
self.url = reverse('api:csv_upload')
def test_upload_unauthenticated(self):
now = timezone.now()
......
......@@ -21,3 +21,4 @@ urlpatterns = [
]
urlpatterns = format_suffix_patterns(urlpatterns)
app_name = 'api'
......@@ -32,7 +32,7 @@ def dispatch_resource_sync(resource):
def sync_resource(sync_user, resource_json):
url = sync_user.remote_reverse("resource_list")
url = sync_user.remote_reverse("api:resource_list")
token = sync_user.token()
headers = {'Authorization': 'token ' + str(token),
'Content-type': 'application/json'}
......@@ -43,7 +43,7 @@ def sync_resource(sync_user, resource_json):
# status code could mean, resource exists on remote side
# try to fetch it an compare.
uuid = json.loads(resource_json)['uuid']
detail_url = sync_user.remote_reverse("resource_detail", args=(uuid,))
detail_url = sync_user.remote_reverse("api:resource_detail", args=(uuid,))
r2 = requests.get(detail_url, headers=headers)
if r2.status_code == 200:
logger.info("Resource {} already exists on remote side".format(uuid))
......@@ -78,7 +78,7 @@ def dispatch_attributes_sync(attributes, res_uuid, dates):
def sync_attributes(sync_user, attributes_json, res_uuid):
url = sync_user.remote_reverse("resource_attributes", args=[res_uuid])
url = sync_user.remote_reverse("api:resource_attributes", args=[res_uuid])
token = sync_user.token()
headers = {'Authorization': 'token ' + str(token),
'Content-type': 'application/json'}
......@@ -118,7 +118,7 @@ def dispatch_deletion_sync(resource, res_uuid):
def delete_resource(sync_user, res_uuid):
url = sync_user.remote_reverse("resource_detail", args=[res_uuid])
url = sync_user.remote_reverse("api:resource_detail", args=[res_uuid])
token = sync_user.token()
headers = {'Authorization': 'token ' + str(token),
'Content-type': 'application/json'}
......
......@@ -8,7 +8,7 @@ except ImportError:
from urllib.parse import urljoin
from django.conf import settings
from django.core.urlresolvers import get_script_prefix
from django.urls import get_script_prefix
from rest_framework.authtoken.models import Token
from rest_framework.reverse import reverse
......
......@@ -24,7 +24,7 @@ class VectorClock(object):
return found_one
else:
raise NotImplementedError
raise NotImplementedError # pragma: no cover
def concurrent_to(self, other):
if isinstance(other, VectorClock) and len(self.comp) == len(self.comp):
......@@ -33,7 +33,7 @@ class VectorClock(object):
return False
else:
raise NotImplementedError
raise NotImplementedError # pragma: no cover
def merge(self, other): # Side effect func
if isinstance(other, VectorClock) and len(self.comp) == len(self.comp):
......@@ -48,7 +48,7 @@ class VectorClock(object):
return self.comp
else:
raise NotImplementedError
raise NotImplementedError # pragma: no cover
def __str__(self):
return str(self.comp)
......@@ -62,4 +62,11 @@ class VersionVector(VectorClock):
Since the only difference relies in how VV's are updated,
no implementation changes are necessary at this place.
"""
pass
@property
def sp(self):
return self.comp[0]
@property
def idp(self):
return self.comp[1]
......@@ -121,7 +121,7 @@ class ResourceList(AuthAPIView):
if sp_primary_key:
try:
obj = Resource.objects.get(sp=request.user.sp, sp_primary_key=sp_primary_key)
location = local_reverse("resource_detail", args=[str(obj.uuid)])
location = local_reverse("api:resource_detail", args=[str(obj.uuid)])
return Response(status=status.HTTP_201_CREATED, headers={"Location": location})
except Resource.DoesNotExist:
pass
......@@ -137,7 +137,7 @@ class ResourceList(AuthAPIView):
if not ServiceProvider.objects.filter(uuid=request.data["sp"]).exists():
# That is the case, thus fetching that SP entry is now a priority
foreign_api_url = request.user\
.remote_reverse('service_detail', args=[request.data["sp"]])
.remote_reverse('api:service_detail', args=[request.data["sp"]])
headers = {'Authorization': 'token ' + str(request.auth)}
r = requests.get(foreign_api_url, headers=headers, timeout=5)
......@@ -172,7 +172,7 @@ class ResourceList(AuthAPIView):
# Dispatch resource sync procedure in queue
dispatch_resource_sync(obj)
location = local_reverse("resource_detail", args=[str(obj.uuid)])
location = local_reverse("api:resource_detail", args=[str(obj.uuid)])
return Response(status=status.HTTP_201_CREATED, headers={"Location": location})
return Response(ser.errors, status=status.HTTP_400_BAD_REQUEST)
except requests.exceptions.Timeout:
......@@ -255,7 +255,7 @@ class ResourceAttributes(AuthAPIView):
res = resource.update_attribute(request.data, request.user.user_type)
location = local_reverse("resource_attributes", args=[str(uuid)])
location = local_reverse("api:resource_attributes", args=[str(uuid)])
return Response(data=res, status=status.HTTP_200_OK, headers={"Location": location})
......
FROM debian:buster
RUN apt-get update && apt-get -y upgrade
RUN apt-get install -y uwsgi python3.7 uwsgi-plugin-python3 python3-venv git libpq-dev libmariadb-dev libmariadb-dev-compat gcc python3-dev
RUN apt-get install -y uwsgi python3.7 uwsgi-plugin-python3 python3-venv git libpq-dev libmariadb-dev libmariadb-dev-compat gcc python3-dev libev-dev
COPY install.sh /tmp/install.sh
COPY frms.ini /etc/uwsgi/apps-enabled
COPY startsync.sh /var/www/django/frms/startsync.sh
COPY startuwsgi.sh /var/www/django/frms/startuwsgi.sh
COPY manage.py /usr/bin/manage.py
COPY manage.py.sh /usr/bin/manage.py
RUN chmod 755 /var/www/django/frms/startsync.sh
RUN chmod 755 /var/www/django/frms/startuwsgi.sh
RUN chmod 755 /usr/bin/manage.py
......
......@@ -32,3 +32,13 @@ Im Apache reicht dann folgende Konfiguration im passenden Virtualhost:
ProxyPass /static uwsgi://127.0.0.1:8000/frms/static
```
Testen
------
Die Container können gleich mit zum Testen der Funktionalität genutzt werden. Dazu muss lokal ein passender Container gebaut werden und die Tests gestartet werden.
Zur Ausführung der Tests wird docker-compose genutzt.
~~~bash
./buildimage.sh
./test.sh
~~~
version: "3"
services:
db1:
image: postgres
environment:
POSTGRES_PASSWORD: frms1
POSTGRES_USER: frms1
db2:
image: postgres
environment:
POSTGRES_PASSWORD: frms2
POSTGRES_USER: frms2
frms1:
#build: .
image: frms:latest
entrypoint: /root/prepare_and_run_frms1.sh
volumes:
- ./tests/config/frms1/:/var/www/django/frms/private/
- ./tests/prepare_and_run_frms1.sh:/root/prepare_and_run_frms1.sh
depends_on:
- db1
frms1-web:
image: httpd:2.4
volumes:
- ./tests/config/httpd1.conf:/usr/local/apache2/conf/httpd.conf
depends_on:
- frms1
ports:
- "8000:80"
frms2:
#build: .
image: frms:latest
entrypoint: /root/prepare_and_run_frms2.sh
volumes:
- ./tests/config/frms2/:/var/www/django/frms/private/
- ./tests/prepare_and_run_frms2.sh:/root/prepare_and_run_frms2.sh
depends_on:
- db2
frms2-web:
image: httpd:2.4
volumes:
- ./tests/config/httpd2.conf:/usr/local/apache2/conf/httpd.conf
depends_on:
- frms2
ports:
- "8001:80"
......@@ -3,7 +3,7 @@ TARGET=/var/www/django/frms
mkdir -p /var/www/django/frms/logs
git clone https://gitlab.hrz.tu-chemnitz.de/saxid-federated-resource-management/frms.git $TARGET/app
cd $TARGET/app
git checkout docker
#git checkout django22_vektorfix
python3 -mvenv $TARGET/env
source $TARGET/env/bin/activate
cd $TARGET/app
......
......@@ -22,5 +22,5 @@ fi
chown -R www-data:www-data "${FRMS_DIR}/logs"
su www-data -s /bin/bash -c "${FRMS_DIR}/env/bin/python ${FRMS_DIR}/app/manage.py migrate"
su www-data -s /bin/bash -c "${FRMS_DIR}/env/bin/python ${FRMS_DIR}/app/manage.py collectstatic"
su www-data -s /bin/bash -c "${FRMS_DIR}/env/bin/python ${FRMS_DIR}/app/manage.py collectstatic --noinput"
/usr/bin/uwsgi --ini /etc/uwsgi/apps-enabled/frms.ini
#!/usr/bin/env bash
docker-compose up -d
sleep 20
python tests/test.py
success=$?
docker-compose down
exit $success
:{z58^K~|F0CCpbk5B&gm(App}.=N1q#VjI7lO271g-BI^+`5@Y|RX_x,&ex
[
{
"model": "api.serviceprovider",
"pk": "5ebc3b5b-f9c3-4be1-a4aa-d9171c3af6ec",
"fields": {
"name": "test-sp",
"description": "",
"url": "",
"realm": "frms1.edu",
"expiry_date": "2099-12-31T22:59:59Z",
"default_delete_after_days": 90,
"default_purge_api_data_after_days": 7
}
},
{
"model": "api.tokenauthuser",
"pk": 1,
"fields": {
"password": "pbkdf2_sha256$150000$APNEEBzLoc2v$xat6AcMwpgOT5YHHhmb9CmECBeveunpNEhY6TOl6vok=",
"last_login": "2020-06-25T14:31:44.074Z",
"is_superuser": true,
"username": "admin",
"first_name": "",
"last_name": "",
"email": "",
"is_staff": true,
"is_active": true,
"date_joined": "2020-06-25T14:07:18.299Z",
"user_type": "",
"sp": null,
"realm": "",
"api_url": "",
"groups": [],
"user_permissions": []
}
},
{
"model": "api.tokenauthuser",
"pk": 2,
"fields": {
"password": "1234",
"last_login": null,
"is_superuser": false,
"username": "sync_2",
"first_name": "",
"last_name": "",
"email": "",
"is_staff": false,
"is_active": true,
"date_joined": "2020-06-25T14:07:36Z",
"user_type": "sync",
"sp": null,
"realm": "frms2.edu",
"api_url": "http://frms2-web/api/",
"groups": [],
"user_permissions": []
}
},
{
"model": "api.tokenauthuser",
"pk": 3,
"fields": {
"password": "1234",
"last_login": null,
"is_superuser": false,
"username": "test-sp",
"first_name": "",
"last_name": "",
"email": "",
"is_staff": false,
"is_active": true,
"date_joined": "2020-06-25T14:19:02Z",
"user_type": "sp",
"sp": "5ebc3b5b-f9c3-4be1-a4aa-d9171c3af6ec",
"realm": "",
"api_url": "",
"groups": [],
"user_permissions": []
}
},
{
"model": "authtoken.token",
"pk": "565f70c158116cbabb6d93649605cead18f52ac9",
"fields": {
"user": 2,
"created": "2020-06-25T14:10:31.710Z"
}
},
{
"model": "authtoken.token",
"pk": "5ed7aa7aad88935836b6dea38d6a73e9e1d10527",
"fields": {
"user": 1,
"created": "2020-06-25T14:07:18.394Z"
}
},
{
"model": "authtoken.token",
"pk": "b7bc73430378e67a79a9ca1caf1e39f15944c4d0",
"fields": {
"user": 3,
"created": "2020-06-25T14:19:26.328Z"
}
}
]
# -*- coding: utf-8 -*-
from __future__ import unicode_literals, print_function
SERVER_REALM="frms1.edu" # hs-mittweida.de
HTTP_SERVER_NAME="http://frms1-web" # https://saxid-api.hs-mittweida.de
ALLOWED_HOSTS = ["*"] # saxid-api.hs-mittweida.de
DATABASES = {
'default': {
'ENGINE': 'django.db.backends.postgresql_psycopg2',
'NAME': 'frms1',
'USER': 'frms1',
'PASSWORD': 'frms1', # @UndefinedVariable
'HOST': 'db1',
}
}
o,9^|A5HAf]A|urZscmo@06rF|2tUf4(SGOcLvrb^g4G69,4NgI_}DG)~F3k
[
{
"model": "api.tokenauthuser",
"pk": 1,
"fields": {
"password": "pbkdf2_sha256$150000$APNEEBzLoc2v$xat6AcMwpgOT5YHHhmb9CmECBeveunpNEhY6TOl6vok=",
"last_login": "2020-06-25T14:07:27.815Z",
"is_superuser": true,
"username": "admin",
"first_name": "",
"last_name": "",
"email": "",
"is_staff": true,
"is_active": true,
"date_joined": "2020-06-25T14:07:18.299Z",
"user_type": "",
"sp": null,
"realm": "",
"api_url": "",
"groups": [],
"user_permissions": []
}
},
{
"model": "api.tokenauthuser",
"pk": 2,
"fields": {
"password": "1234",
"last_login": null,
"is_superuser": false,
"username": "sync_1",
"first_name": "",
"last_name": "",
"email": "",
"is_staff": false,
"is_active": true,
"date_joined": "2020-06-25T14:07:36Z",
"user_type": "sync",
"sp": null,
"realm": "frms1.edu",
"api_url": "http://frms1-web/api/",
"groups": [],
"user_permissions": []
}
},
{
"model": "api.tokenauthuser",
"pk": 3,
"fields": {
"password": "1234",
"last_login": null,
"is_superuser": false,
"username": "test-idm",
"first_name": "",
"last_name": "",
"email": "",
"is_staff": false,
"is_active": true,
"date_joined": "2020-06-25T14:19:02Z",
"user_type": "idp",
"sp": null,
"realm": "",
"api_url": "",
"groups": [],
"user_permissions": []
}
},
{
"model": "authtoken.token",
"pk": "565f70c158116cbabb6d93649605cead18f52ac9",
"fields": {
"user": 2,
"created": "2020-06-25T14:10:31.710Z"
}
},
{
"model": "authtoken.token",
"pk": "4f293b4ec20adb59b6ff3a826b0185aec6f015e0",
"fields": {
"user": 1,
"created": "2020-06-25T14:07:18.394Z"
}
},
{
"model": "authtoken.token",
"pk": "b8cbe4bc3fb913b923534faf06f1d0a2a8a3575c",
"fields": {
"user": 3,
"created": "2020-06-25T14:19:26.328Z"
}
}
]
# -*- coding: utf-8 -*-
from __future__ import unicode_literals, print_function
SERVER_REALM="frms2.edu" # hs-mittweida.de
HTTP_SERVER_NAME="http://frms2-web" # https://saxid-api.hs-mittweida.de
ALLOWED_HOSTS = ["*"] # saxid-api.hs-mittweida.de
DATABASES = {
'default': {
'ENGINE': 'django.db.backends.postgresql_psycopg2',
'NAME': 'frms2',
'USER': 'frms2',
'PASSWORD': 'frms2', # @UndefinedVariable
'HOST': 'db2',
}
}
#
# This is the main Apache HTTP server configuration file. It contains the
# configuration directives that give the server its instructions.
# See <URL:http://httpd.apache.org/docs/2.4/> for detailed information.
# In particular, see
# <URL:http://httpd.apache.org/docs/2.4/mod/directives.html>
# for a discussion of each configuration directive.
#
# Do NOT simply read the instructions in here without understanding
# what they do. They're here only as hints or reminders. If you are unsure
# consult the online docs. You have been warned.
#
# Configuration and logfile names: If the filenames you specify for many
# of the server's control files begin with "/" (or "drive:/" for Win32), the
# server will use that explicit path. If the filenames do *not* begin
# with "/", the value of ServerRoot is prepended -- so "logs/access_log"
# with ServerRoot set to "/usr/local/apache2" will be interpreted by the
# server as "/usr/local/apache2/logs/access_log", whereas "/logs/access_log"
# will be interpreted as '/logs/access_log'.
#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# Do not add a slash at the end of the directory path. If you point
# ServerRoot at a non-local disk, be sure to specify a local disk on the
# Mutex directive, if file-based mutexes are used. If you wish to share the
# same ServerRoot for multiple httpd daemons, you will need to change at
# least PidFile.
#
ServerRoot "/usr/local/apache2"
#
# Mutex: Allows you to set the mutex mechanism and mutex file directory
# for individual mutexes, or change the global defaults
#
# Uncomment and change the directory if mutexes are file-based and the default
# mutex file directory is not on a local disk or is not appropriate for some
# other reason.
#
# Mutex default:logs
#
# Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, instead of the default. See also the <VirtualHost>
# directive.
#
# Change this to Listen on specific IP addresses as shown below to
# prevent Apache from glomming onto all bound IP addresses.
#
#Listen 12.34.56.78:80
Listen 80
#
# Dynamic Shared Object (DSO) Support
#
# To be able to use the functionality of a module which was built as a DSO you
# have to place corresponding `LoadModule' lines at this location so the
# directives contained in it are actually available _before_ they are used.
# Statically compiled modules (those listed by `httpd -l') do not need
# to be loaded here.
#
# Example:
# LoadModule foo_module modules/mod_foo.so
#
LoadModule mpm_event_module modules/mod_mpm_event.so
#LoadModule mpm_prefork_module modules/mod_mpm_prefork.so
#LoadModule mpm_worker_module modules/mod_mpm_worker.so
LoadModule authn_file_module modules/mod_authn_file.so
#LoadModule authn_dbm_module modules/mod_authn_dbm.so
#LoadModule authn_anon_module modules/mod_authn_anon.so
#LoadModule authn_dbd_module modules/mod_authn_dbd.so
#LoadModule authn_socache_module modules/mod_authn_socache.so
LoadModule authn_core_module modules/mod_authn_core.so
LoadModule authz_host_module modules/mod_authz_host.so
LoadModule authz_groupfile_module modules/mod_authz_groupfile.so
LoadModule authz_user_module modules/mod_authz_user.so
#LoadModule authz_dbm_module modules/mod_authz_dbm.so
#LoadModule authz_owner_module modules/mod_authz_owner.so
#LoadModule authz_dbd_module modules/mod_authz_dbd.so
LoadModule authz_core_module modules/mod_authz_core.so
#LoadModule authnz_ldap_module modules/mod_authnz_ldap.so
#LoadModule authnz_fcgi_module modules/mod_authnz_fcgi.so
LoadModule access_compat_module modules/mod_access_compat.so
LoadModule auth_basic_module modules/mod_auth_basic.so
#LoadModule auth_form_module modules/mod_auth_form.so
#LoadModule auth_digest_module modules/mod_auth_digest.so
#LoadModule allowmethods_module modules/mod_allowmethods.so
#LoadModule isapi_module modules/mod_isapi.so
#LoadModule file_cache_module modules/mod_file_cache.so
#LoadModule cache_module modules/mod_cache.so
#LoadModule cache_disk_module modules/mod_cache_disk.so
#LoadModule cache_socache_module modules/mod_cache_socache.so
#LoadModule socache_shmcb_module modules/mod_socache_shmcb.so
#LoadModule socache_dbm_module modules/mod_socache_dbm.so
#LoadModule socache_memcache_module modules/mod_socache_memcache.so
#LoadModule socache_redis_module modules/mod_socache_redis.so
#LoadModule watchdog_module modules/mod_watchdog.so
#LoadModule macro_module modules/mod_macro.so
#LoadModule dbd_module modules/mod_dbd.so
#LoadModule bucketeer_module modules/mod_bucketeer.so
#LoadModule dumpio_module modules/mod_dumpio.so
#LoadModule echo_module modules/mod_echo.so
#LoadModule example_hooks_module modules/mod_example_hooks.so
#LoadModule case_filter_module modules/mod_case_filter.so
#LoadModule case_filter_in_module modules/mod_case_filter_in.so
#LoadModule example_ipc_module modules/mod_example_ipc.so
#LoadModule buffer_module modules/mod_buffer.so
#LoadModule data_module modules/mod_data.so
#LoadModule ratelimit_module modules/mod_ratelimit.so
LoadModule reqtimeout_module modules/mod_reqtimeout.so
#LoadModule ext_filter_module modules/mod_ext_filter.so
#LoadModule request_module modules/mod_request.so
#LoadModule include_module modules/mod_include.so
LoadModule filter_module modules/mod_filter.so
#LoadModule reflector_module modules/mod_reflector.so
#LoadModule substitute_module modules/mod_substitute.so
#LoadModule sed_module modules/mod_sed.so
#LoadModule charset_lite_module modules/mod_charset_lite.so
#LoadModule deflate_module modules/mod_deflate.so
#LoadModule xml2enc_module modules/mod_xml2enc.so
#LoadModule proxy_html_module modules/mod_proxy_html.so
#LoadModule brotli_module modules/mod_brotli.so
LoadModule mime_module modules/mod_mime.so
#LoadModule ldap_module modules/mod_ldap.so
LoadModule log_config_module modules/mod_log_config.so
#LoadModule log_debug_module modules/mod_log_debug.so
#LoadModule log_forensic_module modules/mod_log_forensic.so
#LoadModule logio_module modules/mod_logio.so
#LoadModule lua_module modules/mod_lua.so
LoadModule env_module modules/mod_env.so
#LoadModule mime_magic_module modules/mod_mime_magic.so
#LoadModule cern_meta_module modules/mod_cern_meta.so
#LoadModule expires_module modules/mod_expires.so
LoadModule headers_module modules/mod_headers.so
#LoadModule ident_module modules/mod_ident.so
#LoadModule usertrack_module modules/mod_usertrack.so
#LoadModule unique_id_module modules/mod_unique_id.so
LoadModule setenvif_module modules/mod_setenvif.so
LoadModule version_module modules/mod_version.so
#LoadModule remoteip_module modules/mod_remoteip.so
LoadModule proxy_module modules/mod_proxy.so
#LoadModule proxy_connect_module modules/mod_proxy_connect.so
#LoadModule proxy_ftp_module modules/mod_proxy_ftp.so
LoadModule proxy_http_module modules/mod_proxy_http.so
#LoadModule proxy_fcgi_module modules/mod_proxy_fcgi.so
#LoadModule proxy_scgi_module modules/mod_proxy_scgi.so
LoadModule proxy_uwsgi_module modules/mod_proxy_uwsgi.so
#LoadModule proxy_fdpass_module modules/mod_proxy_fdpass.so
#LoadModule proxy_wstunnel_module modules/mod_proxy_wstunnel.so
#LoadModule proxy_ajp_module modules/mod_proxy_ajp.so
#LoadModule proxy_balancer_module modules/mod_proxy_balancer.so
#LoadModule proxy_express_module modules/mod_proxy_express.so
#LoadModule proxy_hcheck_module modules/mod_proxy_hcheck.so
#LoadModule session_module modules/mod_session.so
#LoadModule session_cookie_module modules/mod_session_cookie.so
#LoadModule session_crypto_module modules/mod_session_crypto.so
#LoadModule session_dbd_module modules/mod_session_dbd.so
#LoadModule slotmem_shm_module modules/mod_slotmem_shm.so
#LoadModule slotmem_plain_module modules/mod_slotmem_plain.so
#LoadModule ssl_module modules/mod_ssl.so
#LoadModule optional_hook_export_module modules/mod_optional_hook_export.so
#LoadModule optional_hook_import_module modules/mod_optional_hook_import.so
#LoadModule optional_fn_import_module modules/mod_optional_fn_import.so
#LoadModule optional_fn_export_module modules/mod_optional_fn_export.so
#LoadModule dialup_module modules/mod_dialup.so
#LoadModule http2_module modules/mod_http2.so
#LoadModule proxy_http2_module modules/mod_proxy_http2.so
#LoadModule md_module modules/mod_md.so
#LoadModule lbmethod_byrequests_module modules/mod_lbmethod_byrequests.so
#LoadModule lbmethod_bytraffic_module modules/mod_lbmethod_bytraffic.so
#LoadModule lbmethod_bybusyness_module modules/mod_lbmethod_bybusyness.so
#LoadModule lbmethod_heartbeat_module modules/mod_lbmethod_heartbeat.so
LoadModule unixd_module modules/mod_unixd.so
#LoadModule heartbeat_module modules/mod_heartbeat.so
#LoadModule heartmonitor_module modules/mod_heartmonitor.so
#LoadModule dav_module modules/mod_dav.so
LoadModule status_module modules/mod_status.so
LoadModule autoindex_module modules/mod_autoindex.so
#LoadModule asis_module modules/mod_asis.so
#LoadModule info_module modules/mod_info.so
#LoadModule suexec_module modules/mod_suexec.so
<IfModule !mpm_prefork_module>
#LoadModule cgid_module modules/mod_cgid.so
</IfModule>
<IfModule mpm_prefork_module>
#LoadModule cgi_module modules/mod_cgi.so
</IfModule>
#LoadModule dav_fs_module modules/mod_dav_fs.so
#LoadModule dav_lock_module modules/mod_dav_lock.so
#LoadModule vhost_alias_module modules/mod_vhost_alias.so
#LoadModule negotiation_module modules/mod_negotiation.so
LoadModule dir_module modules/mod_dir.so
#LoadModule imagemap_module modules/mod_imagemap.so
#LoadModule actions_module modules/mod_actions.so
#LoadModule speling_module modules/mod_speling.so
#LoadModule userdir_module modules/mod_userdir.so
LoadModule alias_module modules/mod_alias.so
#LoadModule rewrite_module modules/mod_rewrite.so
<IfModule unixd_module>
#
# If you wish httpd to run as a different user or group, you must run