1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285
|
#!/usr/bin/env python
import json
import pytest
import os
import time
import sys
import confluent_kafka
from confluent_kafka import Consumer, Producer
from confluent_kafka.admin import AdminClient
from tests.common import TestConsumer
def test_version():
print('Using confluent_kafka module version %s (0x%x)' % confluent_kafka.version())
sver, iver = confluent_kafka.version()
assert len(sver) > 0
assert iver > 0
print('Using librdkafka version %s (0x%x)' % confluent_kafka.libversion())
sver, iver = confluent_kafka.libversion()
assert len(sver) > 0
assert iver > 0
assert confluent_kafka.version()[0] == confluent_kafka.__version__
def test_error_cb():
""" Tests error_cb. """
seen_error_cb = False
def error_cb(error_msg):
nonlocal seen_error_cb
seen_error_cb = True
acceptable_error_codes = (confluent_kafka.KafkaError._TRANSPORT, confluent_kafka.KafkaError._ALL_BROKERS_DOWN)
assert error_msg.code() in acceptable_error_codes
conf = {'bootstrap.servers': 'localhost:65531', # Purposely cause connection refused error
'group.id': 'test',
'session.timeout.ms': 1000, # Avoid close() blocking too long
'error_cb': error_cb
}
kc = TestConsumer(conf)
kc.subscribe(["test"])
while not seen_error_cb:
kc.poll(timeout=0.1)
kc.close()
def test_stats_cb():
""" Tests stats_cb. """
seen_stats_cb = False
def stats_cb(stats_json_str):
nonlocal seen_stats_cb
seen_stats_cb = True
stats_json = json.loads(stats_json_str)
assert len(stats_json['name']) > 0
conf = {'group.id': 'test',
'session.timeout.ms': 1000, # Avoid close() blocking too long
'statistics.interval.ms': 200,
'stats_cb': stats_cb
}
kc = TestConsumer(conf)
kc.subscribe(["test"])
while not seen_stats_cb:
kc.poll(timeout=0.1)
kc.close()
def test_conf_none():
""" Issue #133
Test that None can be passed for NULL by setting bootstrap.servers
to None. If None would be converted to a string then a broker would
show up in statistics. Verify that it doesnt. """
seen_stats_cb_check_no_brokers = False
def stats_cb_check_no_brokers(stats_json_str):
""" Make sure no brokers are reported in stats """
nonlocal seen_stats_cb_check_no_brokers
stats = json.loads(stats_json_str)
assert len(stats['brokers']) == 0, "expected no brokers in stats: %s" % stats_json_str
seen_stats_cb_check_no_brokers = True
conf = {'bootstrap.servers': None, # overwrites previous value
'statistics.interval.ms': 10,
'stats_cb': stats_cb_check_no_brokers}
p = confluent_kafka.Producer(conf)
p.poll(timeout=0.1)
assert seen_stats_cb_check_no_brokers
def throttle_cb_instantiate_fail():
""" Ensure noncallables raise TypeError"""
with pytest.raises(ValueError):
confluent_kafka.Producer({'throttle_cb': 1})
def throttle_cb_instantiate():
""" Ensure we can configure a proper callback"""
def throttle_cb(throttle_event):
pass
confluent_kafka.Producer({'throttle_cb': throttle_cb})
def test_throttle_event_types():
throttle_event = confluent_kafka.ThrottleEvent("broker", 0, 10.0)
assert isinstance(throttle_event.broker_name, str) and throttle_event.broker_name == "broker"
assert isinstance(throttle_event.broker_id, int) and throttle_event.broker_id == 0
assert isinstance(throttle_event.throttle_time, float) and throttle_event.throttle_time == 10.0
assert str(throttle_event) == "broker/0 throttled for 10000 ms"
def test_oauth_cb():
""" Tests oauth_cb. """
seen_oauth_cb = False
def oauth_cb(oauth_config):
nonlocal seen_oauth_cb
seen_oauth_cb = True
assert oauth_config == 'oauth_cb'
return 'token', time.time() + 300.0
conf = {'group.id': 'test',
'security.protocol': 'sasl_plaintext',
'sasl.mechanisms': 'OAUTHBEARER',
'session.timeout.ms': 1000, # Avoid close() blocking too long
'sasl.oauthbearer.config': 'oauth_cb',
'oauth_cb': oauth_cb
}
kc = TestConsumer(conf)
while not seen_oauth_cb:
kc.poll(timeout=0.1)
kc.close()
def test_oauth_cb_principal_sasl_extensions():
""" Tests oauth_cb. """
seen_oauth_cb = False
def oauth_cb(oauth_config):
nonlocal seen_oauth_cb
seen_oauth_cb = True
assert oauth_config == 'oauth_cb'
return 'token', time.time() + 300.0, oauth_config, {"extone": "extoneval", "exttwo": "exttwoval"}
conf = {'group.id': 'test',
'security.protocol': 'sasl_plaintext',
'sasl.mechanisms': 'OAUTHBEARER',
'session.timeout.ms': 100, # Avoid close() blocking too long
'sasl.oauthbearer.config': 'oauth_cb',
'oauth_cb': oauth_cb
}
kc = TestConsumer(conf)
while not seen_oauth_cb:
kc.poll(timeout=0.1)
kc.close()
def test_oauth_cb_failure():
""" Tests oauth_cb. """
oauth_cb_count = 0
def oauth_cb(oauth_config):
nonlocal oauth_cb_count
oauth_cb_count += 1
assert oauth_config == 'oauth_cb'
if oauth_cb_count == 2:
return 'token', time.time() + 100.0, oauth_config, {"extthree": "extthreeval"}
raise Exception
conf = {'group.id': 'test',
'security.protocol': 'sasl_plaintext',
'sasl.mechanisms': 'OAUTHBEARER',
'session.timeout.ms': 1000, # Avoid close() blocking too long
'sasl.oauthbearer.config': 'oauth_cb',
'oauth_cb': oauth_cb
}
kc = TestConsumer(conf)
while oauth_cb_count < 2:
kc.poll(timeout=0.1)
kc.close()
def skip_interceptors():
# Run interceptor test if monitoring-interceptor is found
for path in ["/usr/lib", "/usr/local/lib", "staging/libs", "."]:
for ext in [".so", ".dylib", ".dll"]:
f = os.path.join(path, "monitoring-interceptor" + ext)
if os.path.exists(f):
return False
# Skip interceptor tests
return True
@pytest.mark.xfail(sys.platform in ('linux2', 'linux'),
reason="confluent-librdkafka-plugins packaging issues")
@pytest.mark.skipif(skip_interceptors(),
reason="requires confluent-librdkafka-plugins be installed and copied to the current directory")
@pytest.mark.parametrize("init_func", [
Consumer,
Producer,
AdminClient,
])
def test_unordered_dict(init_func):
"""
Interceptor configs can only be handled after the plugin has been loaded not before.
"""
client = init_func({'group.id': 'test-group',
'confluent.monitoring.interceptor.publishMs': 1000,
'confluent.monitoring.interceptor.sessionDurationMs': 1000,
'plugin.library.paths': 'monitoring-interceptor',
'confluent.monitoring.interceptor.topic': 'confluent-kafka-testing',
'confluent.monitoring.interceptor.icdebug': False})
client.poll(0)
def test_topic_config_update():
seen_delivery_cb = False
# *NOTE* default.topic.config has been deprecated.
# This example remains to ensure backward-compatibility until its removal.
confs = [{"message.timeout.ms": 600000, "default.topic.config": {"message.timeout.ms": 1000}},
{"message.timeout.ms": 1000},
{"default.topic.config": {"message.timeout.ms": 1000}}]
def on_delivery(err, msg):
# Since there is no broker, produced messages should time out.
nonlocal seen_delivery_cb
seen_delivery_cb = True
assert err.code() == confluent_kafka.KafkaError._MSG_TIMED_OUT
for conf in confs:
p = confluent_kafka.Producer(conf)
start = time.time()
timeout = start + 10.0
p.produce('mytopic', value='somedata', key='a key', on_delivery=on_delivery)
while time.time() < timeout:
if seen_delivery_cb:
return
p.poll(1.0)
if "CI" in os.environ:
pytest.xfail("Timeout exceeded")
pytest.fail("Timeout exceeded")
def test_set_sasl_credentials_api():
clients = [
AdminClient({}),
TestConsumer({"group.id": "dummy"}),
confluent_kafka.Producer({})]
for c in clients:
c.set_sasl_credentials('username', 'password')
c.set_sasl_credentials('override', 'override')
with pytest.raises(TypeError):
c.set_sasl_credentials(None, 'password')
with pytest.raises(TypeError):
c.set_sasl_credentials('username', None)
|