123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241 |
- from io import BytesIO
- from unittest import mock
- from uuid import uuid4
- import pytest
- from sentry.models.eventattachment import EventAttachment
- from sentry.tasks.relay import invalidate_project_config
- from sentry.testutils.cases import TransactionTestCase
- from sentry.testutils.helpers.datetime import before_now, iso_format, timestamp_format
- from sentry.testutils.relay import RelayStoreHelper
- from sentry.testutils.silo import region_silo_test
- from sentry.testutils.skips import requires_kafka
- pytestmark = [requires_kafka]
- @region_silo_test
- class SentryRemoteTest(RelayStoreHelper, TransactionTestCase):
- # used to be test_ungzipped_data
- def test_simple_data(self):
- event_data = {"message": "hello", "timestamp": iso_format(before_now(seconds=1))}
- event = self.post_and_retrieve_event(event_data)
- assert event.message == "hello"
- def test_csp(self):
- event_data = {
- "csp-report": {
- "document-uri": "https://example.com/foo/bar",
- "referrer": "https://www.google.com/",
- "violated-directive": "default-src self",
- "original-policy": "default-src self; report-uri /csp-hotline.php",
- "blocked-uri": "http://evilhackerscripts.com",
- }
- }
- event = self.post_and_retrieve_security_report(event_data)
- assert event.message == "Blocked 'default-src' from 'evilhackerscripts.com'"
- def test_hpkp(self):
- event_data = {
- "date-time": "2014-04-06T13:00:50Z",
- "hostname": "www.example.com",
- "port": 443,
- "effective-expiration-date": "2014-05-01T12:40:50Z",
- "include-subdomains": False,
- "served-certificate-chain": [
- "-----BEGIN CERTIFICATE-----\n MIIEBDCCAuygBQUAMEIxCzAJBgNVBAYTAlVT\n -----END CERTIFICATE-----"
- ],
- "validated-certificate-chain": [
- "-----BEGIN CERTIFICATE-----\n MIIEBDCCAuygAwIBAgIDCzAJBgNVBAYTAlVT\n -----END CERTIFICATE-----"
- ],
- "known-pins": [
- 'pin-sha256="d6qzRu9zOECb90Uez27xWltNsj0e1Md7GkYYkVoZWmM="',
- 'pin-sha256="E9CZ9INDbd+2eRQozYqqbQ2yXLVKB9+xcprMF+44U1g="',
- ],
- }
- event = self.post_and_retrieve_security_report(event_data)
- assert event.message == "Public key pinning validation failed for 'www.example.com'"
- assert event.group.title == "Public key pinning validation failed for 'www.example.com'"
- def test_expect_ct(self):
- event_data = {
- "expect-ct-report": {
- "date-time": "2014-04-06T13:00:50Z",
- "hostname": "www.example.com",
- "port": 443,
- "effective-expiration-date": "2014-05-01T12:40:50Z",
- "served-certificate-chain": [
- "-----BEGIN CERTIFICATE-----\nABC\n-----END CERTIFICATE-----"
- ],
- "validated-certificate-chain": [
- "-----BEGIN CERTIFICATE-----\nCDE\n-----END CERTIFICATE-----"
- ],
- "scts": [
- {
- "version": 1,
- "status": "invalid",
- "source": "embedded",
- "serialized_sct": "ABCD==",
- }
- ],
- }
- }
- event = self.post_and_retrieve_security_report(event_data)
- assert event.message == "Expect-CT failed for 'www.example.com'"
- assert event.group.title == "Expect-CT failed for 'www.example.com'"
- def test_expect_staple(self):
- event_data = {
- "expect-staple-report": {
- "date-time": "2014-04-06T13:00:50Z",
- "hostname": "www.example.com",
- "port": 443,
- "response-status": "ERROR_RESPONSE",
- "cert-status": "REVOKED",
- "effective-expiration-date": "2014-05-01T12:40:50Z",
- "served-certificate-chain": [
- "-----BEGIN CERTIFICATE-----\nABC\n-----END CERTIFICATE-----"
- ],
- "validated-certificate-chain": [
- "-----BEGIN CERTIFICATE-----\nCDE\n-----END CERTIFICATE-----"
- ],
- }
- }
- event = self.post_and_retrieve_security_report(event_data)
- assert event.message == "Expect-Staple failed for 'www.example.com'"
- assert event.group.title == "Expect-Staple failed for 'www.example.com'"
- def test_standalone_attachment(self):
- event_id = uuid4().hex
- # First, ingest the attachment and ensure it is saved
- files = {"some_file": ("hello.txt", BytesIO(b"Hello World!"))}
- self.post_and_retrieve_attachment(event_id, files)
- # Next, ingest an error event
- event = self.post_and_retrieve_event({"event_id": event_id, "message": "my error"})
- assert event.event_id == event_id
- assert event.group_id
- # Finally, fetch the updated attachment and compare the group id
- attachment = EventAttachment.objects.get(project_id=self.project.id, event_id=event_id)
- assert attachment.group_id == event.group_id
- def test_blob_only_attachment(self):
- event_id = uuid4().hex
- files = {"some_file": ("hello.txt", BytesIO(b"Hello World! default"))}
- self.post_and_retrieve_attachment(event_id, files)
- attachments = EventAttachment.objects.filter(project_id=self.project.id)
- assert len(attachments) == 1
- attachment = EventAttachment.objects.get(event_id=event_id)
- with attachment.getfile() as blob:
- assert blob.read() == b"Hello World! default"
- assert attachment.blob_path is not None
- def test_transaction(self):
- event_data = {
- "event_id": "d2132d31b39445f1938d7e21b6bf0ec4",
- "type": "transaction",
- "transaction": "/organizations/:orgId/performance/:eventSlug/",
- "start_timestamp": iso_format(before_now(minutes=1, milliseconds=500)),
- "timestamp": iso_format(before_now(minutes=1)),
- "contexts": {
- "trace": {
- "trace_id": "ff62a8b040f340bda5d830223def1d81",
- "span_id": "8f5a2b8768cafb4e",
- "type": "trace",
- }
- },
- "spans": [
- {
- "description": "<OrganizationContext>",
- "op": "react.mount",
- "parent_span_id": "8f5a2b8768cafb4e",
- "span_id": "bd429c44b67a3eb4",
- "start_timestamp": timestamp_format(before_now(minutes=1, milliseconds=250)),
- "timestamp": timestamp_format(before_now(minutes=1)),
- "trace_id": "ff62a8b040f340bda5d830223def1d81",
- },
- {
- "description": "browser span",
- "op": "browser",
- "parent_span_id": "bd429c44b67a3eb4",
- "span_id": "a99fd04e79e17631",
- "start_timestamp": timestamp_format(before_now(minutes=1, milliseconds=200)),
- "timestamp": timestamp_format(before_now(minutes=1)),
- "trace_id": "ff62a8b040f340bda5d830223def1d81",
- },
- {
- "description": "resource span",
- "op": "resource",
- "parent_span_id": "bd429c44b67a3eb4",
- "span_id": "a71a5e67db5ce938",
- "start_timestamp": timestamp_format(before_now(minutes=1, milliseconds=200)),
- "timestamp": timestamp_format(before_now(minutes=1)),
- "trace_id": "ff62a8b040f340bda5d830223def1d81",
- },
- {
- "description": "http span",
- "op": "http",
- "parent_span_id": "a99fd04e79e17631",
- "span_id": "abe79ad9292b90a9",
- "start_timestamp": timestamp_format(before_now(minutes=1, milliseconds=200)),
- "timestamp": timestamp_format(before_now(minutes=1)),
- "trace_id": "ff62a8b040f340bda5d830223def1d81",
- },
- {
- "description": "db span",
- "op": "db",
- "parent_span_id": "abe79ad9292b90a9",
- "span_id": "9c045ea336297177",
- "start_timestamp": timestamp_format(before_now(minutes=1, milliseconds=200)),
- "timestamp": timestamp_format(before_now(minutes=1)),
- "trace_id": "ff62a8b040f340bda5d830223def1d81",
- },
- ],
- }
- event = self.post_and_retrieve_event(event_data)
- raw_event = event.get_raw_data()
- assert raw_event["breakdowns"] == {
- "span_ops": {
- "ops.browser": {"unit": "millisecond", "value": pytest.approx(200, abs=2)},
- "ops.resource": {"unit": "millisecond", "value": pytest.approx(200, abs=2)},
- "ops.http": {"unit": "millisecond", "value": pytest.approx(200, abs=2)},
- "ops.db": {"unit": "millisecond", "value": pytest.approx(200, abs=2)},
- "total.time": {"unit": "millisecond", "value": pytest.approx(1050, abs=2)},
- }
- }
- @pytest.mark.skip(
- "Fails when test suite is run in region mode, possibly due to cache pollution"
- )
- # Background: This test used to pass reliably when the undecorated test cases were
- # run in monolith mode by default, but began failing during CI for unclear reasons
- # when the global default was switched to region mode. (See
- # get_default_silo_mode_for_test_cases in sentry/testutils/pytest/sentry.py.) Note
- # that this case was marked as @region_silo_test when it was passing, so there was
- # no change in the silo mode in which *this* case is run. The probable explanation
- # is that the test is sensitive to side effects (possibly in Redis?) of other test
- # cases, which *did* have their silo mode changed.
- def test_project_config_compression(self):
- # Populate redis cache with compressed config:
- invalidate_project_config(public_key=self.projectkey, trigger="test")
- # Disable project config endpoint, to make sure Relay gets its data
- # from redis:
- with mock.patch(
- "sentry.api.endpoints.relay.project_configs.RelayProjectConfigsEndpoint.post"
- ):
- event_data = {"message": "hello", "timestamp": iso_format(before_now(seconds=1))}
- event = self.post_and_retrieve_event(event_data)
- assert event.message == "hello"
|