mirror of https://github.com/caronc/apprise
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
178 lines
5.5 KiB
178 lines
5.5 KiB
# -*- coding: utf-8 -*-
|
|
# BSD 2-Clause License
|
|
#
|
|
# Apprise - Push Notification Library.
|
|
# Copyright (c) 2024, Chris Caron <lead2gold@gmail.com>
|
|
#
|
|
# Redistribution and use in source and binary forms, with or without
|
|
# modification, are permitted provided that the following conditions are met:
|
|
#
|
|
# 1. Redistributions of source code must retain the above copyright notice,
|
|
# this list of conditions and the following disclaimer.
|
|
#
|
|
# 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
# this list of conditions and the following disclaimer in the documentation
|
|
# and/or other materials provided with the distribution.
|
|
#
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
# POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
import requests
|
|
|
|
from apprise.plugins.splunk import NotifySplunk
|
|
from helpers import AppriseURLTester
|
|
|
|
# Disable logging for a cleaner testing output
|
|
import logging
|
|
logging.disable(logging.CRITICAL)
|
|
|
|
# Our Testing URLs
|
|
apprise_url_tests = (
|
|
('splunk://', {
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://:@/', {
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://routekey@%badapi%', {
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://abc123', {
|
|
# No route key provided
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://%badroute%@apikey', {
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://?apikey=abc123&routing_key=db', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://route@abc123/entity_id', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://route@abc123/?entity_id=my_entity', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
# Support legacy URL
|
|
('https://alert.victorops.com/integrations/generic/20131114/' \
|
|
'alert/apikey/routing_key', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
# Support legacy URL (with entity id provided)
|
|
('https://alert.victorops.com/integrations/generic/20131114/' \
|
|
'alert/apikey/routing_key/entity_id', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
# support victorops:// too!
|
|
('victorops://?apikey=abc123&route=db', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://?apikey=abc123&route=db', {
|
|
# We're good
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=recovery', {
|
|
# Always Recovery Alias
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=resolve', {
|
|
# Always Recovery Alias
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=r', {
|
|
# Always Recovery (short form)
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=acknowledgement', {
|
|
# Always Acknowledgement
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=ack', {
|
|
# Always Acknowledgement (short form)
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=critical', {
|
|
# Always Critical
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=crit', {
|
|
# Always Critical (short form)
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=warning', {
|
|
# Always Warning
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=warn', {
|
|
# Always Warning (short form)
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=info', {
|
|
# Always INFO
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=i', {
|
|
# Always INFO (short form)
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?action=invalid', {
|
|
# Invalid Action
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://db@apikey?:warning=critical', {
|
|
# Map warnings to CRITICAL
|
|
'instance': NotifySplunk,
|
|
}),
|
|
('splunk://db@apikey?:invalid=critical', {
|
|
# A bad Apprise Notification Type was provided
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://db@apikey?:warning=invalid', {
|
|
# A bad Splunk Notification Type was provided
|
|
'instance': TypeError,
|
|
}),
|
|
('splunk://db@apikey', {
|
|
'instance': NotifySplunk,
|
|
# force a failure
|
|
'response': False,
|
|
'requests_response_code': requests.codes.internal_server_error,
|
|
}),
|
|
('splunk://db@apikey', {
|
|
'instance': NotifySplunk,
|
|
# throw a bizzare code forcing us to fail to look it up
|
|
'response': False,
|
|
'requests_response_code': 999,
|
|
}),
|
|
('splunk://db@token', {
|
|
'instance': NotifySplunk,
|
|
# Throws a series of connection and transfer exceptions when this flag
|
|
# is set and tests that we gracfully handle them
|
|
'test_requests_exceptions': True,
|
|
}),
|
|
)
|
|
|
|
|
|
def test_plugin_splunk_urls():
|
|
"""
|
|
NotifySplunk() Apprise URLs
|
|
|
|
"""
|
|
|
|
# Run our general tests
|
|
AppriseURLTester(tests=apprise_url_tests).run_all()
|