2017-03-22 22:09:38 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
import logging
|
|
|
|
import sys
|
|
|
|
|
|
|
|
from django.conf import settings
|
|
|
|
from django.contrib.auth.models import AnonymousUser
|
|
|
|
from django.http import HttpRequest, HttpResponse
|
logging: Clear out the Django default config on logger `django`.
By default, Django sets up two handlers on this logger, one of them
its AdminEmailHandler. We have our own handler for sending email on
error, and we want to stick to that -- we like the format somewhat
better, and crucially we've given it some rate-limiting through
ZulipLimiter.
Since we cleaned out our logging config in e0a5e6fad, though, we've
been sending error emails through both paths. The config we'd had
before that for `django` was redundant with the config on the root --
but having *a* config there was essential for causing
`logging.config.dictConfig`, when Django passes it our LOGGING dict,
to clear out that logger's previous config. So, give it an empty
config.
Django by default configures two loggers: `django` and
`django.server`. We have our own settings for `django.server`
anyway, so this is the only one we need to add.
The stdlib `logging` and `logging.config` docs aren't 100% clear, and
while the source of `logging` is admirably straightforward the source
of `logging.config` is a little twisty, so it's not easy to become
totally confident that this has the right effect just by reading.
Fortunately we can put some of that source-diving to work in writing
a test for it.
2017-10-13 02:43:44 +02:00
|
|
|
from django.test import RequestFactory, TestCase
|
|
|
|
from django.utils.log import AdminEmailHandler
|
2017-03-22 22:09:38 +01:00
|
|
|
from functools import wraps
|
|
|
|
from mock import patch
|
2017-11-17 10:47:43 +01:00
|
|
|
from mypy_extensions import NoReturn
|
logging: Clear out the Django default config on logger `django`.
By default, Django sets up two handlers on this logger, one of them
its AdminEmailHandler. We have our own handler for sending email on
error, and we want to stick to that -- we like the format somewhat
better, and crucially we've given it some rate-limiting through
ZulipLimiter.
Since we cleaned out our logging config in e0a5e6fad, though, we've
been sending error emails through both paths. The config we'd had
before that for `django` was redundant with the config on the root --
but having *a* config there was essential for causing
`logging.config.dictConfig`, when Django passes it our LOGGING dict,
to clear out that logger's previous config. So, give it an empty
config.
Django by default configures two loggers: `django` and
`django.server`. We have our own settings for `django.server`
anyway, so this is the only one we need to add.
The stdlib `logging` and `logging.config` docs aren't 100% clear, and
while the source of `logging` is admirably straightforward the source
of `logging.config` is a little twisty, so it's not easy to become
totally confident that this has the right effect just by reading.
Fortunately we can put some of that source-diving to work in writing
a test for it.
2017-10-13 02:43:44 +02:00
|
|
|
from typing import Any, Callable, Dict, Mapping, Optional, Text, Iterator
|
2017-03-22 22:09:38 +01:00
|
|
|
|
|
|
|
from zerver.lib.request import JsonableError
|
|
|
|
from zerver.lib.test_classes import ZulipTestCase
|
|
|
|
from zerver.logging_handlers import AdminZulipHandler
|
|
|
|
from zerver.middleware import JsonErrorHandler
|
|
|
|
from zerver.views.compatibility import check_compatibility
|
|
|
|
from zerver.worker.queue_processors import QueueProcessingWorker
|
|
|
|
|
|
|
|
captured_request = None # type: Optional[HttpRequest]
|
|
|
|
captured_exc_info = None
|
2017-11-17 10:47:43 +01:00
|
|
|
def capture_and_throw(
|
|
|
|
domain: Optional[Text]=None) -> Callable[[Callable[..., HttpResponse]], Callable[..., HttpResponse]]:
|
|
|
|
def wrapper(view_func: Callable[..., HttpResponse]) -> Callable[..., HttpResponse]:
|
2017-03-22 22:09:38 +01:00
|
|
|
@wraps(view_func)
|
2017-11-17 10:47:43 +01:00
|
|
|
def wrapped_view(request: HttpRequest, *args: Any, **kwargs: Any) -> NoReturn:
|
2017-03-22 22:09:38 +01:00
|
|
|
global captured_request
|
|
|
|
captured_request = request
|
|
|
|
try:
|
|
|
|
raise Exception("Request error")
|
|
|
|
except Exception as e:
|
|
|
|
global captured_exc_info
|
|
|
|
captured_exc_info = sys.exc_info()
|
|
|
|
raise e
|
|
|
|
return wrapped_view
|
|
|
|
return wrapper
|
|
|
|
|
|
|
|
class AdminZulipHandlerTest(ZulipTestCase):
|
|
|
|
logger = logging.getLogger('django')
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def setUp(self) -> None:
|
2017-03-22 22:09:38 +01:00
|
|
|
self.handler = AdminZulipHandler()
|
|
|
|
# Prevent the exceptions we're going to raise from being printed
|
|
|
|
# You may want to disable this when debugging tests
|
|
|
|
settings.LOGGING_NOT_DISABLED = False
|
|
|
|
|
2017-04-26 03:52:12 +02:00
|
|
|
global captured_exc_info
|
|
|
|
global captured_request
|
|
|
|
captured_request = None
|
|
|
|
captured_exc_info = None
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def tearDown(self) -> None:
|
2017-03-22 22:09:38 +01:00
|
|
|
settings.LOGGING_NOT_DISABLED = True
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def get_admin_zulip_handler(self) -> AdminZulipHandler:
|
2017-09-27 02:28:28 +02:00
|
|
|
return [
|
|
|
|
h for h in logging.getLogger('').handlers
|
2017-08-08 00:23:21 +02:00
|
|
|
if isinstance(h, AdminZulipHandler)
|
2017-03-26 06:54:56 +02:00
|
|
|
][0]
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def test_basic(self) -> None:
|
2017-03-26 06:54:56 +02:00
|
|
|
"""A random exception passes happily through AdminZulipHandler"""
|
2017-09-27 02:28:28 +02:00
|
|
|
handler = self.get_admin_zulip_handler()
|
2017-03-26 06:54:56 +02:00
|
|
|
try:
|
|
|
|
raise Exception("Testing Error!")
|
|
|
|
except Exception:
|
|
|
|
exc_info = sys.exc_info()
|
2017-08-09 19:52:21 +02:00
|
|
|
record = self.logger.makeRecord('name', logging.ERROR, 'function', 16,
|
|
|
|
'message', {}, exc_info)
|
2017-03-26 06:54:56 +02:00
|
|
|
handler.emit(record)
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def run_handler(self, record: logging.LogRecord) -> Dict[str, Any]:
|
2017-03-22 22:09:38 +01:00
|
|
|
with patch('zerver.logging_handlers.queue_json_publish') as patched_publish:
|
|
|
|
self.handler.emit(record)
|
|
|
|
patched_publish.assert_called_once()
|
|
|
|
event = patched_publish.call_args[0][1]
|
|
|
|
self.assertIn("report", event)
|
|
|
|
return event["report"]
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def test_long_exception_request(self) -> None:
|
2017-04-26 03:52:12 +02:00
|
|
|
"""A request with with no stack where report.getMessage() has newlines
|
|
|
|
in it is handled properly"""
|
2017-05-24 05:08:49 +02:00
|
|
|
email = self.example_email('hamlet')
|
|
|
|
self.login(email)
|
2017-04-26 03:52:12 +02:00
|
|
|
with patch("zerver.decorator.rate_limit") as rate_limit_patch:
|
|
|
|
rate_limit_patch.side_effect = capture_and_throw
|
|
|
|
result = self.client_get("/json/users")
|
|
|
|
self.assert_json_error(result, "Internal server error", status_code=500)
|
|
|
|
rate_limit_patch.assert_called_once()
|
|
|
|
|
|
|
|
global captured_request
|
|
|
|
global captured_exc_info
|
2017-08-07 02:01:59 +02:00
|
|
|
record = self.logger.makeRecord('name', logging.ERROR, 'function', 15,
|
2017-08-09 19:52:21 +02:00
|
|
|
'message\nmoremesssage\nmore', {},
|
2017-04-26 08:44:41 +02:00
|
|
|
None)
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request = captured_request # type: ignore # this field is dynamically added
|
2017-04-26 03:52:12 +02:00
|
|
|
|
|
|
|
report = self.run_handler(record)
|
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertIn("stack_trace", report)
|
|
|
|
self.assertEqual(report['stack_trace'], 'message\nmoremesssage\nmore')
|
|
|
|
self.assertEqual(report['message'], 'message')
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def test_request(self) -> None:
|
2017-03-22 22:09:38 +01:00
|
|
|
"""A normal request is handled properly"""
|
2017-05-24 05:08:49 +02:00
|
|
|
email = self.example_email('hamlet')
|
|
|
|
self.login(email)
|
2017-03-22 22:09:38 +01:00
|
|
|
with patch("zerver.decorator.rate_limit") as rate_limit_patch:
|
|
|
|
rate_limit_patch.side_effect = capture_and_throw
|
|
|
|
result = self.client_get("/json/users")
|
|
|
|
self.assert_json_error(result, "Internal server error", status_code=500)
|
|
|
|
rate_limit_patch.assert_called_once()
|
|
|
|
|
|
|
|
global captured_request
|
|
|
|
global captured_exc_info
|
2017-08-09 19:52:21 +02:00
|
|
|
record = self.logger.makeRecord('name', logging.ERROR, 'function', 15,
|
|
|
|
'message', {}, captured_exc_info)
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request = captured_request # type: ignore # this field is dynamically added
|
2017-03-22 22:09:38 +01:00
|
|
|
|
|
|
|
report = self.run_handler(record)
|
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertIn("stack_trace", report)
|
2017-03-26 07:00:08 +02:00
|
|
|
|
|
|
|
# Test that `add_request_metadata` throwing an exception is fine
|
|
|
|
with patch("zerver.logging_handlers.traceback.print_exc"):
|
|
|
|
with patch("zerver.logging_handlers.add_request_metadata",
|
|
|
|
side_effect=Exception("Unexpected exception!")):
|
|
|
|
report = self.run_handler(record)
|
|
|
|
self.assertNotIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertEqual(report["stack_trace"], "See /var/log/zulip/errors.log")
|
|
|
|
|
|
|
|
# Check anonymous user is handled correctly
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request.user = AnonymousUser() # type: ignore # this field is dynamically added
|
2017-03-26 07:00:08 +02:00
|
|
|
report = self.run_handler(record)
|
2017-04-25 22:46:11 +02:00
|
|
|
self.assertIn("host", report)
|
2017-03-26 07:00:08 +02:00
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertIn("stack_trace", report)
|
|
|
|
|
|
|
|
# Now simulate a DisallowedHost exception
|
2017-11-17 10:47:43 +01:00
|
|
|
def get_host_error() -> None:
|
2017-03-26 07:00:08 +02:00
|
|
|
raise Exception("Get Host Failure!")
|
2017-06-04 11:37:26 +02:00
|
|
|
orig_get_host = record.request.get_host # type: ignore # this field is dynamically added
|
|
|
|
record.request.get_host = get_host_error # type: ignore # this field is dynamically added
|
2017-03-26 07:00:08 +02:00
|
|
|
report = self.run_handler(record)
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request.get_host = orig_get_host # type: ignore # this field is dynamically added
|
2017-04-25 22:46:11 +02:00
|
|
|
self.assertIn("host", report)
|
2017-03-26 07:00:08 +02:00
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertIn("stack_trace", report)
|
|
|
|
|
|
|
|
# Test an exception_filter exception
|
|
|
|
with patch("zerver.logging_handlers.get_exception_reporter_filter",
|
|
|
|
return_value=15):
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request.method = "POST" # type: ignore # this field is dynamically added
|
2017-03-26 07:00:08 +02:00
|
|
|
report = self.run_handler(record)
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request.method = "GET" # type: ignore # this field is dynamically added
|
2017-04-25 22:46:11 +02:00
|
|
|
self.assertIn("host", report)
|
2017-03-26 07:00:08 +02:00
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertIn("stack_trace", report)
|
|
|
|
|
|
|
|
# Test the catch-all exception handler doesn't throw
|
|
|
|
with patch('zerver.logging_handlers.queue_json_publish',
|
|
|
|
side_effect=Exception("queue error")):
|
|
|
|
self.handler.emit(record)
|
|
|
|
|
|
|
|
# Test the STAGING_ERROR_NOTIFICATIONS code path
|
|
|
|
with self.settings(STAGING_ERROR_NOTIFICATIONS=True):
|
|
|
|
with patch('zerver.lib.error_notify.notify_server_error',
|
|
|
|
side_effect=Exception("queue error")):
|
|
|
|
self.handler.emit(record)
|
|
|
|
|
|
|
|
# Test no exc_info
|
|
|
|
record.exc_info = None
|
|
|
|
report = self.run_handler(record)
|
2017-04-25 22:46:11 +02:00
|
|
|
self.assertIn("host", report)
|
2017-03-26 07:00:08 +02:00
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertEqual(report["stack_trace"], None)
|
|
|
|
|
|
|
|
# Test arbitrary exceptions from request.user
|
2017-06-04 11:37:26 +02:00
|
|
|
record.request.user = None # type: ignore # this field is dynamically added
|
2017-03-26 07:00:08 +02:00
|
|
|
with patch("zerver.logging_handlers.traceback.print_exc"):
|
|
|
|
report = self.run_handler(record)
|
2017-04-25 22:46:11 +02:00
|
|
|
self.assertIn("host", report)
|
2017-03-26 07:00:08 +02:00
|
|
|
self.assertIn("user_email", report)
|
|
|
|
self.assertIn("message", report)
|
|
|
|
self.assertIn("stack_trace", report)
|
logging: Clear out the Django default config on logger `django`.
By default, Django sets up two handlers on this logger, one of them
its AdminEmailHandler. We have our own handler for sending email on
error, and we want to stick to that -- we like the format somewhat
better, and crucially we've given it some rate-limiting through
ZulipLimiter.
Since we cleaned out our logging config in e0a5e6fad, though, we've
been sending error emails through both paths. The config we'd had
before that for `django` was redundant with the config on the root --
but having *a* config there was essential for causing
`logging.config.dictConfig`, when Django passes it our LOGGING dict,
to clear out that logger's previous config. So, give it an empty
config.
Django by default configures two loggers: `django` and
`django.server`. We have our own settings for `django.server`
anyway, so this is the only one we need to add.
The stdlib `logging` and `logging.config` docs aren't 100% clear, and
while the source of `logging` is admirably straightforward the source
of `logging.config` is a little twisty, so it's not easy to become
totally confident that this has the right effect just by reading.
Fortunately we can put some of that source-diving to work in writing
a test for it.
2017-10-13 02:43:44 +02:00
|
|
|
|
|
|
|
class LoggingConfigTest(TestCase):
|
|
|
|
@staticmethod
|
2017-11-17 10:47:43 +01:00
|
|
|
def all_loggers() -> Iterator[logging.Logger]:
|
logging: Clear out the Django default config on logger `django`.
By default, Django sets up two handlers on this logger, one of them
its AdminEmailHandler. We have our own handler for sending email on
error, and we want to stick to that -- we like the format somewhat
better, and crucially we've given it some rate-limiting through
ZulipLimiter.
Since we cleaned out our logging config in e0a5e6fad, though, we've
been sending error emails through both paths. The config we'd had
before that for `django` was redundant with the config on the root --
but having *a* config there was essential for causing
`logging.config.dictConfig`, when Django passes it our LOGGING dict,
to clear out that logger's previous config. So, give it an empty
config.
Django by default configures two loggers: `django` and
`django.server`. We have our own settings for `django.server`
anyway, so this is the only one we need to add.
The stdlib `logging` and `logging.config` docs aren't 100% clear, and
while the source of `logging` is admirably straightforward the source
of `logging.config` is a little twisty, so it's not easy to become
totally confident that this has the right effect just by reading.
Fortunately we can put some of that source-diving to work in writing
a test for it.
2017-10-13 02:43:44 +02:00
|
|
|
# There is no documented API for enumerating the loggers; but the
|
|
|
|
# internals of `logging` haven't changed in ages, so just use them.
|
|
|
|
loggerDict = logging.Logger.manager.loggerDict # type: ignore
|
|
|
|
for logger in loggerDict.values():
|
|
|
|
if not isinstance(logger, logging.Logger):
|
|
|
|
continue
|
|
|
|
yield logger
|
|
|
|
|
2017-11-17 10:47:43 +01:00
|
|
|
def test_django_emails_disabled(self) -> None:
|
logging: Clear out the Django default config on logger `django`.
By default, Django sets up two handlers on this logger, one of them
its AdminEmailHandler. We have our own handler for sending email on
error, and we want to stick to that -- we like the format somewhat
better, and crucially we've given it some rate-limiting through
ZulipLimiter.
Since we cleaned out our logging config in e0a5e6fad, though, we've
been sending error emails through both paths. The config we'd had
before that for `django` was redundant with the config on the root --
but having *a* config there was essential for causing
`logging.config.dictConfig`, when Django passes it our LOGGING dict,
to clear out that logger's previous config. So, give it an empty
config.
Django by default configures two loggers: `django` and
`django.server`. We have our own settings for `django.server`
anyway, so this is the only one we need to add.
The stdlib `logging` and `logging.config` docs aren't 100% clear, and
while the source of `logging` is admirably straightforward the source
of `logging.config` is a little twisty, so it's not easy to become
totally confident that this has the right effect just by reading.
Fortunately we can put some of that source-diving to work in writing
a test for it.
2017-10-13 02:43:44 +02:00
|
|
|
for logger in self.all_loggers():
|
|
|
|
# The `handlers` attribute is undocumented, but see comment on
|
|
|
|
# `all_loggers`.
|
|
|
|
for handler in logger.handlers:
|
|
|
|
assert not isinstance(handler, AdminEmailHandler)
|