be16d6c4fd
unittest.SkipTest suffices. Change-Id: I11eb73f7dc4a8598fae85d1efca721f69067fb4f
1354 lines
51 KiB
Python
1354 lines
51 KiB
Python
# Copyright (c) 2014 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
from __future__ import print_function
|
|
import mock
|
|
import os
|
|
import six
|
|
from six.moves.urllib.parse import urlparse, urlsplit, urlunsplit
|
|
import sys
|
|
import pickle
|
|
import socket
|
|
import locale
|
|
import eventlet
|
|
import eventlet.debug
|
|
import functools
|
|
import random
|
|
import base64
|
|
|
|
from time import time, sleep
|
|
from contextlib import closing
|
|
from gzip import GzipFile
|
|
from shutil import rmtree
|
|
from tempfile import mkdtemp
|
|
from unittest import SkipTest
|
|
|
|
from six.moves.configparser import ConfigParser, NoSectionError
|
|
from six.moves import http_client
|
|
from six.moves.http_client import HTTPException
|
|
|
|
from swift.common.middleware.memcache import MemcacheMiddleware
|
|
from swift.common.storage_policy import parse_storage_policies, PolicyError
|
|
from swift.common.utils import set_swift_dir
|
|
|
|
from test import get_config, listen_zero
|
|
|
|
from test.debug_logger import debug_logger
|
|
from test.unit import FakeMemcache
|
|
# importing skip_if_no_xattrs so that functional tests can grab it from the
|
|
# test.functional namespace.
|
|
from test.unit import skip_if_no_xattrs as real_skip_if_no_xattrs
|
|
|
|
from swift.common import constraints, utils, ring, storage_policy
|
|
from swift.common.ring import Ring
|
|
from swift.common.http_protocol import SwiftHttpProtocol
|
|
from swift.common.wsgi import loadapp
|
|
from swift.common.utils import config_true_value, split_path
|
|
from swift.account import server as account_server
|
|
from swift.container import server as container_server
|
|
from swift.obj import server as object_server, mem_server as mem_object_server
|
|
import swift.proxy.controllers.obj
|
|
|
|
http_client._MAXHEADERS = constraints.MAX_HEADER_COUNT
|
|
DEBUG = True
|
|
|
|
# In order to get the proper blocking behavior of sockets without using
|
|
# threads, where we can set an arbitrary timeout for some piece of code under
|
|
# test, we use eventlet with the standard socket library patched. We have to
|
|
# perform this setup at module import time, since all the socket module
|
|
# bindings in the swiftclient code will have been made by the time nose
|
|
# invokes the package or class setup methods.
|
|
eventlet.hubs.use_hub(utils.get_hub())
|
|
eventlet.patcher.monkey_patch(all=False, socket=True)
|
|
eventlet.debug.hub_exceptions(False)
|
|
|
|
# swift_test_client import from swiftclient, so move after the monkey-patching
|
|
from test.functional.swift_test_client import Account, Connection, Container, \
|
|
ResponseError
|
|
|
|
from swiftclient import get_auth, http_connection
|
|
|
|
has_insecure = False
|
|
try:
|
|
from swiftclient import __version__ as client_version
|
|
# Prevent a ValueError in StrictVersion with '2.0.3.68.ga99c2ff'
|
|
client_version = '.'.join(client_version.split('.')[:3])
|
|
except ImportError:
|
|
# Pre-PBR we had version, not __version__. Anyhow...
|
|
client_version = '1.2'
|
|
from distutils.version import StrictVersion
|
|
if StrictVersion(client_version) >= StrictVersion('2.0'):
|
|
has_insecure = True
|
|
|
|
|
|
config = {}
|
|
web_front_end = None
|
|
normalized_urls = None
|
|
|
|
# If no config was read, we will fall back to old school env vars
|
|
swift_test_auth_version = None
|
|
swift_test_auth = os.environ.get('SWIFT_TEST_AUTH')
|
|
swift_test_user = [os.environ.get('SWIFT_TEST_USER'), None, None, '', '', '']
|
|
swift_test_key = [os.environ.get('SWIFT_TEST_KEY'), None, None, '', '', '']
|
|
swift_test_tenant = ['', '', '', '', '', '']
|
|
swift_test_perm = ['', '', '', '', '', '']
|
|
swift_test_domain = ['', '', '', '', '', '']
|
|
swift_test_user_id = ['', '', '', '', '', '']
|
|
swift_test_tenant_id = ['', '', '', '', '', '']
|
|
|
|
skip, skip2, skip3, skip_if_not_v3, skip_service_tokens, \
|
|
skip_if_no_reseller_admin = False, False, False, False, False, False
|
|
|
|
orig_collate = ''
|
|
insecure = False
|
|
|
|
in_process = False
|
|
_testdir = _test_servers = _test_coros = _test_socks = None
|
|
policy_specified = None
|
|
skip_if_no_xattrs = None
|
|
|
|
|
|
class FakeMemcacheMiddleware(MemcacheMiddleware):
|
|
"""
|
|
Caching middleware that fakes out caching in swift if memcached
|
|
does not appear to be running.
|
|
"""
|
|
|
|
def __init__(self, app, conf):
|
|
super(FakeMemcacheMiddleware, self).__init__(app, conf)
|
|
self.memcache = FakeMemcache()
|
|
|
|
|
|
class InProcessException(BaseException):
|
|
pass
|
|
|
|
|
|
def _info(msg):
|
|
print(msg, file=sys.stderr)
|
|
|
|
|
|
def _debug(msg):
|
|
if DEBUG:
|
|
_info('DEBUG: ' + msg)
|
|
|
|
|
|
def _in_process_setup_swift_conf(swift_conf_src, testdir):
|
|
# override swift.conf contents for in-process functional test runs
|
|
conf = ConfigParser()
|
|
conf.read(swift_conf_src)
|
|
try:
|
|
section = 'swift-hash'
|
|
conf.set(section, 'swift_hash_path_suffix', 'inprocfunctests')
|
|
conf.set(section, 'swift_hash_path_prefix', 'inprocfunctests')
|
|
section = 'swift-constraints'
|
|
max_file_size = (8 * 1024 * 1024) + 2 # 8 MB + 2
|
|
conf.set(section, 'max_file_size', str(max_file_size))
|
|
except NoSectionError:
|
|
msg = 'Conf file %s is missing section %s' % (swift_conf_src, section)
|
|
raise InProcessException(msg)
|
|
|
|
test_conf_file = os.path.join(testdir, 'swift.conf')
|
|
with open(test_conf_file, 'w') as fp:
|
|
conf.write(fp)
|
|
|
|
return test_conf_file
|
|
|
|
|
|
def _in_process_find_conf_file(conf_src_dir, conf_file_name, use_sample=True):
|
|
"""
|
|
Look for a file first in conf_src_dir, if it exists, otherwise optionally
|
|
look in the source tree sample 'etc' dir.
|
|
|
|
:param conf_src_dir: Directory in which to search first for conf file. May
|
|
be None
|
|
:param conf_file_name: Name of conf file
|
|
:param use_sample: If True and the conf_file_name is not found, then return
|
|
any sample conf file found in the source tree sample
|
|
'etc' dir by appending '-sample' to conf_file_name
|
|
:returns: Path to conf file
|
|
:raises InProcessException: If no conf file is found
|
|
"""
|
|
dflt_src_dir = os.path.normpath(os.path.join(os.path.abspath(__file__),
|
|
os.pardir, os.pardir, os.pardir,
|
|
'etc'))
|
|
conf_src_dir = dflt_src_dir if conf_src_dir is None else conf_src_dir
|
|
conf_file_path = os.path.join(conf_src_dir, conf_file_name)
|
|
if os.path.exists(conf_file_path):
|
|
return conf_file_path
|
|
|
|
if use_sample:
|
|
# fall back to using the corresponding sample conf file
|
|
conf_file_name += '-sample'
|
|
conf_file_path = os.path.join(dflt_src_dir, conf_file_name)
|
|
if os.path.exists(conf_file_path):
|
|
return conf_file_path
|
|
|
|
msg = 'Failed to find config file %s' % conf_file_name
|
|
raise InProcessException(msg)
|
|
|
|
|
|
def _in_process_setup_ring(swift_conf, conf_src_dir, testdir):
|
|
"""
|
|
If SWIFT_TEST_POLICY is set:
|
|
- look in swift.conf file for specified policy
|
|
- move this to be policy-0 but preserving its options
|
|
- copy its ring file to test dir, changing its devices to suit
|
|
in process testing, and renaming it to suit policy-0
|
|
Otherwise, create a default ring file.
|
|
"""
|
|
conf = ConfigParser()
|
|
conf.read(swift_conf)
|
|
sp_prefix = 'storage-policy:'
|
|
|
|
try:
|
|
# policy index 0 will be created if no policy exists in conf
|
|
policies = parse_storage_policies(conf)
|
|
except PolicyError as e:
|
|
raise InProcessException(e)
|
|
|
|
# clear all policies from test swift.conf before adding test policy back
|
|
for policy in policies:
|
|
conf.remove_section(sp_prefix + str(policy.idx))
|
|
|
|
if policy_specified:
|
|
policy_to_test = policies.get_by_name(policy_specified)
|
|
if policy_to_test is None:
|
|
raise InProcessException('Failed to find policy name "%s"'
|
|
% policy_specified)
|
|
_info('Using specified policy %s' % policy_to_test.name)
|
|
else:
|
|
policy_to_test = policies.default
|
|
_info('Defaulting to policy %s' % policy_to_test.name)
|
|
|
|
# make policy_to_test be policy index 0 and default for the test config
|
|
sp_zero_section = sp_prefix + '0'
|
|
conf.add_section(sp_zero_section)
|
|
for (k, v) in policy_to_test.get_info(config=True).items():
|
|
conf.set(sp_zero_section, k, str(v))
|
|
conf.set(sp_zero_section, 'default', 'True')
|
|
|
|
with open(swift_conf, 'w') as fp:
|
|
conf.write(fp)
|
|
|
|
# look for a source ring file
|
|
ring_file_src = ring_file_test = 'object.ring.gz'
|
|
if policy_to_test.idx:
|
|
ring_file_src = 'object-%s.ring.gz' % policy_to_test.idx
|
|
try:
|
|
ring_file_src = _in_process_find_conf_file(conf_src_dir, ring_file_src,
|
|
use_sample=False)
|
|
except InProcessException:
|
|
if policy_specified:
|
|
raise InProcessException('Failed to find ring file %s'
|
|
% ring_file_src)
|
|
ring_file_src = None
|
|
|
|
ring_file_test = os.path.join(testdir, ring_file_test)
|
|
if ring_file_src:
|
|
# copy source ring file to a policy-0 test ring file, re-homing servers
|
|
_info('Using source ring file %s' % ring_file_src)
|
|
ring_data = ring.RingData.load(ring_file_src)
|
|
obj_sockets = []
|
|
for dev in ring_data.devs:
|
|
device = 'sd%c1' % chr(len(obj_sockets) + ord('a'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sda1'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sda1', 'tmp'))
|
|
obj_socket = listen_zero()
|
|
obj_sockets.append(obj_socket)
|
|
dev['port'] = obj_socket.getsockname()[1]
|
|
dev['ip'] = '127.0.0.1'
|
|
dev['device'] = device
|
|
dev['replication_port'] = dev['port']
|
|
dev['replication_ip'] = dev['ip']
|
|
ring_data.save(ring_file_test)
|
|
else:
|
|
# make default test ring, 3 replicas, 4 partitions, 3 devices
|
|
# which will work for a replication policy or a 2+1 EC policy
|
|
_info('No source object ring file, creating 3rep/4part/3dev ring')
|
|
obj_sockets = [listen_zero() for _ in (0, 1, 2)]
|
|
replica2part2dev_id = [[0, 1, 2, 0],
|
|
[1, 2, 0, 1],
|
|
[2, 0, 1, 2]]
|
|
devs = [{'id': 0, 'zone': 0, 'device': 'sda1', 'ip': '127.0.0.1',
|
|
'port': obj_sockets[0].getsockname()[1]},
|
|
{'id': 1, 'zone': 1, 'device': 'sdb1', 'ip': '127.0.0.1',
|
|
'port': obj_sockets[1].getsockname()[1]},
|
|
{'id': 2, 'zone': 2, 'device': 'sdc1', 'ip': '127.0.0.1',
|
|
'port': obj_sockets[2].getsockname()[1]}]
|
|
ring_data = ring.RingData(replica2part2dev_id, devs, 30)
|
|
with closing(GzipFile(ring_file_test, 'wb')) as f:
|
|
pickle.dump(ring_data, f)
|
|
|
|
for dev in ring_data.devs:
|
|
_debug('Ring file dev: %s' % dev)
|
|
|
|
return obj_sockets
|
|
|
|
|
|
def _load_encryption(proxy_conf_file, swift_conf_file, **kwargs):
|
|
"""
|
|
Load encryption configuration and override proxy-server.conf contents.
|
|
|
|
:param proxy_conf_file: Source proxy conf filename
|
|
:param swift_conf_file: Source swift conf filename
|
|
:returns: Tuple of paths to the proxy conf file and swift conf file to use
|
|
:raises InProcessException: raised if proxy conf contents are invalid
|
|
"""
|
|
_debug('Setting configuration for encryption')
|
|
|
|
# The global conf dict cannot be used to modify the pipeline.
|
|
# The pipeline loader requires the pipeline to be set in the local_conf.
|
|
# If pipeline is set in the global conf dict (which in turn populates the
|
|
# DEFAULTS options) then it prevents pipeline being loaded into the local
|
|
# conf during wsgi load_app.
|
|
# Therefore we must modify the [pipeline:main] section.
|
|
|
|
conf = ConfigParser()
|
|
conf.read(proxy_conf_file)
|
|
try:
|
|
section = 'pipeline:main'
|
|
pipeline = conf.get(section, 'pipeline')
|
|
pipeline = pipeline.replace(
|
|
"proxy-logging proxy-server",
|
|
"keymaster encryption proxy-logging proxy-server")
|
|
pipeline = pipeline.replace(
|
|
"cache listing_formats",
|
|
"cache etag-quoter listing_formats")
|
|
conf.set(section, 'pipeline', pipeline)
|
|
root_secret = base64.b64encode(os.urandom(32))
|
|
if not six.PY2:
|
|
root_secret = root_secret.decode('ascii')
|
|
conf.set('filter:keymaster', 'encryption_root_secret', root_secret)
|
|
conf.set('filter:versioned_writes', 'allow_object_versioning', 'true')
|
|
conf.set('filter:etag-quoter', 'enable_by_default', 'true')
|
|
except NoSectionError as err:
|
|
msg = 'Error problem with proxy conf file %s: %s' % \
|
|
(proxy_conf_file, err)
|
|
raise InProcessException(msg)
|
|
|
|
test_conf_file = os.path.join(_testdir, 'proxy-server.conf')
|
|
with open(test_conf_file, 'w') as fp:
|
|
conf.write(fp)
|
|
|
|
return test_conf_file, swift_conf_file
|
|
|
|
|
|
def _load_ec_as_default_policy(proxy_conf_file, swift_conf_file, **kwargs):
|
|
"""
|
|
Override swift.conf [storage-policy:0] section to use a 2+1 EC policy.
|
|
|
|
:param proxy_conf_file: Source proxy conf filename
|
|
:param swift_conf_file: Source swift conf filename
|
|
:returns: Tuple of paths to the proxy conf file and swift conf file to use
|
|
"""
|
|
_debug('Setting configuration for default EC policy')
|
|
|
|
conf = ConfigParser()
|
|
conf.read(swift_conf_file)
|
|
# remove existing policy sections that came with swift.conf-sample
|
|
for section in list(conf.sections()):
|
|
if section.startswith('storage-policy'):
|
|
conf.remove_section(section)
|
|
# add new policy 0 section for an EC policy
|
|
conf.add_section('storage-policy:0')
|
|
ec_policy_spec = {
|
|
'name': 'ec-test',
|
|
'policy_type': 'erasure_coding',
|
|
'ec_type': 'liberasurecode_rs_vand',
|
|
'ec_num_data_fragments': 2,
|
|
'ec_num_parity_fragments': 1,
|
|
'ec_object_segment_size': 1048576,
|
|
'default': True
|
|
}
|
|
|
|
for k, v in ec_policy_spec.items():
|
|
conf.set('storage-policy:0', k, str(v))
|
|
|
|
with open(swift_conf_file, 'w') as fp:
|
|
conf.write(fp)
|
|
return proxy_conf_file, swift_conf_file
|
|
|
|
|
|
def _load_domain_remap_staticweb(proxy_conf_file, swift_conf_file, **kwargs):
|
|
"""
|
|
Load domain_remap and staticweb into proxy server pipeline.
|
|
|
|
:param proxy_conf_file: Source proxy conf filename
|
|
:param swift_conf_file: Source swift conf filename
|
|
:returns: Tuple of paths to the proxy conf file and swift conf file to use
|
|
:raises InProcessException: raised if proxy conf contents are invalid
|
|
"""
|
|
_debug('Setting configuration for domain_remap')
|
|
|
|
# add a domain_remap storage_domain to the test configuration
|
|
storage_domain = 'example.net'
|
|
global config
|
|
config['storage_domain'] = storage_domain
|
|
|
|
# The global conf dict cannot be used to modify the pipeline.
|
|
# The pipeline loader requires the pipeline to be set in the local_conf.
|
|
# If pipeline is set in the global conf dict (which in turn populates the
|
|
# DEFAULTS options) then it prevents pipeline being loaded into the local
|
|
# conf during wsgi load_app.
|
|
# Therefore we must modify the [pipeline:main] section.
|
|
conf = ConfigParser()
|
|
conf.read(proxy_conf_file)
|
|
try:
|
|
section = 'pipeline:main'
|
|
old_pipeline = conf.get(section, 'pipeline')
|
|
pipeline = old_pipeline.replace(
|
|
" tempauth ",
|
|
" tempauth staticweb ")
|
|
pipeline = pipeline.replace(
|
|
" listing_formats ",
|
|
" domain_remap listing_formats ")
|
|
if pipeline == old_pipeline:
|
|
raise InProcessException(
|
|
"Failed to insert domain_remap and staticweb into pipeline: %s"
|
|
% old_pipeline)
|
|
conf.set(section, 'pipeline', pipeline)
|
|
# set storage_domain in domain_remap middleware to match test config
|
|
section = 'filter:domain_remap'
|
|
conf.set(section, 'storage_domain', storage_domain)
|
|
except NoSectionError as err:
|
|
msg = 'Error problem with proxy conf file %s: %s' % \
|
|
(proxy_conf_file, err)
|
|
raise InProcessException(msg)
|
|
|
|
test_conf_file = os.path.join(_testdir, 'proxy-server.conf')
|
|
with open(test_conf_file, 'w') as fp:
|
|
conf.write(fp)
|
|
|
|
return test_conf_file, swift_conf_file
|
|
|
|
|
|
def _load_s3api(proxy_conf_file, swift_conf_file, **kwargs):
|
|
"""
|
|
Load s3api configuration and override proxy-server.conf contents.
|
|
|
|
:param proxy_conf_file: Source proxy conf filename
|
|
:param swift_conf_file: Source swift conf filename
|
|
:returns: Tuple of paths to the proxy conf file and swift conf file to use
|
|
:raises InProcessException: raised if proxy conf contents are invalid
|
|
"""
|
|
_debug('Setting configuration for s3api')
|
|
|
|
# The global conf dict cannot be used to modify the pipeline.
|
|
# The pipeline loader requires the pipeline to be set in the local_conf.
|
|
# If pipeline is set in the global conf dict (which in turn populates the
|
|
# DEFAULTS options) then it prevents pipeline being loaded into the local
|
|
# conf during wsgi load_app.
|
|
# Therefore we must modify the [pipeline:main] section.
|
|
|
|
conf = ConfigParser()
|
|
conf.read(proxy_conf_file)
|
|
try:
|
|
section = 'pipeline:main'
|
|
pipeline = conf.get(section, 'pipeline')
|
|
pipeline = pipeline.replace(
|
|
"tempauth",
|
|
"s3api tempauth")
|
|
conf.set(section, 'pipeline', pipeline)
|
|
conf.set('filter:s3api', 's3_acl', 'true')
|
|
|
|
conf.set('filter:versioned_writes', 'allow_object_versioning', 'true')
|
|
except NoSectionError as err:
|
|
msg = 'Error problem with proxy conf file %s: %s' % \
|
|
(proxy_conf_file, err)
|
|
raise InProcessException(msg)
|
|
|
|
test_conf_file = os.path.join(_testdir, 'proxy-server.conf')
|
|
with open(test_conf_file, 'w') as fp:
|
|
conf.write(fp)
|
|
|
|
return test_conf_file, swift_conf_file
|
|
|
|
|
|
# Mapping from possible values of the variable
|
|
# SWIFT_TEST_IN_PROCESS_CONF_LOADER
|
|
# to the method to call for loading the associated configuration
|
|
# The expected signature for these methods is:
|
|
# conf_filename_to_use loader(input_conf_filename, **kwargs)
|
|
conf_loaders = {
|
|
'encryption': _load_encryption,
|
|
'ec': _load_ec_as_default_policy,
|
|
}
|
|
|
|
|
|
def in_process_setup(the_object_server=object_server):
|
|
_info('IN-PROCESS SERVERS IN USE FOR FUNCTIONAL TESTS')
|
|
_info('Using object_server class: %s' % the_object_server.__name__)
|
|
conf_src_dir = os.environ.get('SWIFT_TEST_IN_PROCESS_CONF_DIR')
|
|
show_debug_logs = os.environ.get('SWIFT_TEST_DEBUG_LOGS')
|
|
|
|
if conf_src_dir is not None:
|
|
if not os.path.isdir(conf_src_dir):
|
|
msg = 'Config source %s is not a dir' % conf_src_dir
|
|
raise InProcessException(msg)
|
|
_info('Using config source dir: %s' % conf_src_dir)
|
|
|
|
# If SWIFT_TEST_IN_PROCESS_CONF specifies a config source dir then
|
|
# prefer config files from there, otherwise read config from source tree
|
|
# sample files. A mixture of files from the two sources is allowed.
|
|
proxy_conf = _in_process_find_conf_file(conf_src_dir, 'proxy-server.conf')
|
|
_info('Using proxy config from %s' % proxy_conf)
|
|
swift_conf_src = _in_process_find_conf_file(conf_src_dir, 'swift.conf')
|
|
_info('Using swift config from %s' % swift_conf_src)
|
|
|
|
global _testdir
|
|
_testdir = os.path.join(mkdtemp(), 'tmp_functional')
|
|
utils.mkdirs(_testdir)
|
|
rmtree(_testdir)
|
|
utils.mkdirs(os.path.join(_testdir, 'sda1'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sda1', 'tmp'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sdb1'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sdb1', 'tmp'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sdc1'))
|
|
utils.mkdirs(os.path.join(_testdir, 'sdc1', 'tmp'))
|
|
|
|
swift_conf = _in_process_setup_swift_conf(swift_conf_src, _testdir)
|
|
_info('prepared swift.conf: %s' % swift_conf)
|
|
|
|
# load s3api and staticweb configs
|
|
proxy_conf, swift_conf = _load_s3api(proxy_conf, swift_conf)
|
|
proxy_conf, swift_conf = _load_domain_remap_staticweb(proxy_conf,
|
|
swift_conf)
|
|
|
|
# Call the associated method for the value of
|
|
# 'SWIFT_TEST_IN_PROCESS_CONF_LOADER', if one exists
|
|
conf_loader_label = os.environ.get(
|
|
'SWIFT_TEST_IN_PROCESS_CONF_LOADER')
|
|
if conf_loader_label is not None:
|
|
try:
|
|
conf_loader = conf_loaders[conf_loader_label]
|
|
_debug('Calling method %s mapped to conf loader %s' %
|
|
(conf_loader.__name__, conf_loader_label))
|
|
except KeyError as missing_key:
|
|
raise InProcessException('No function mapped for conf loader %s' %
|
|
missing_key)
|
|
|
|
try:
|
|
# Pass-in proxy_conf, swift_conf files
|
|
proxy_conf, swift_conf = conf_loader(proxy_conf, swift_conf)
|
|
_debug('Now using proxy conf %s' % proxy_conf)
|
|
_debug('Now using swift conf %s' % swift_conf)
|
|
except Exception as err: # noqa
|
|
raise InProcessException(err)
|
|
|
|
obj_sockets = _in_process_setup_ring(swift_conf, conf_src_dir, _testdir)
|
|
|
|
# load new swift.conf file
|
|
if set_swift_dir(os.path.dirname(swift_conf)):
|
|
constraints.reload_constraints()
|
|
storage_policy.reload_storage_policies()
|
|
|
|
global config
|
|
if constraints.SWIFT_CONSTRAINTS_LOADED:
|
|
# Use the swift constraints that are loaded for the test framework
|
|
# configuration
|
|
_c = dict((k, str(v))
|
|
for k, v in constraints.EFFECTIVE_CONSTRAINTS.items())
|
|
config.update(_c)
|
|
else:
|
|
# In-process swift constraints were not loaded, somethings wrong
|
|
raise SkipTest
|
|
|
|
global _test_socks
|
|
_test_socks = []
|
|
# We create the proxy server listening socket to get its port number so
|
|
# that we can add it as the "auth_port" value for the functional test
|
|
# clients.
|
|
prolis = listen_zero()
|
|
_test_socks.append(prolis)
|
|
|
|
# The following set of configuration values is used both for the
|
|
# functional test frame work and for the various proxy, account, container
|
|
# and object servers.
|
|
config.update({
|
|
# Values needed by the various in-process swift servers
|
|
'devices': _testdir,
|
|
'swift_dir': _testdir,
|
|
'mount_check': 'false',
|
|
'client_timeout': '4',
|
|
'container_update_timeout': '3',
|
|
'allow_account_management': 'true',
|
|
'account_autocreate': 'true',
|
|
'allow_versions': 'True',
|
|
'allow_versioned_writes': 'True',
|
|
# Below are values used by the functional test framework, as well as
|
|
# by the various in-process swift servers
|
|
'auth_uri': 'http://127.0.0.1:%d/auth/v1.0/' % prolis.getsockname()[1],
|
|
's3_storage_url': 'http://%s:%d/' % prolis.getsockname(),
|
|
# Primary functional test account (needs admin access to the
|
|
# account)
|
|
'account': 'test',
|
|
'username': 'tester',
|
|
'password': 'testing',
|
|
's3_access_key': 'test:tester',
|
|
's3_secret_key': 'testing',
|
|
# Secondary user of the primary test account (needs admin access
|
|
# to the account) for s3api
|
|
's3_access_key2': 'test:tester2',
|
|
's3_secret_key2': 'testing2',
|
|
# User on a second account (needs admin access to the account)
|
|
'account2': 'test2',
|
|
'username2': 'tester2',
|
|
'password2': 'testing2',
|
|
# User on same account as first, but without admin access
|
|
'username3': 'tester3',
|
|
'password3': 'testing3',
|
|
's3_access_key3': 'test:tester3',
|
|
's3_secret_key3': 'testing3',
|
|
# Service user and prefix (emulates glance, cinder, etc. user)
|
|
'account5': 'test5',
|
|
'username5': 'tester5',
|
|
'password5': 'testing5',
|
|
'service_prefix': 'SERVICE',
|
|
# For tempauth middleware. Update reseller_prefix
|
|
'reseller_prefix': 'AUTH, SERVICE',
|
|
'SERVICE_require_group': 'service',
|
|
# Reseller admin user (needs reseller_admin_role)
|
|
'account6': 'test6',
|
|
'username6': 'tester6',
|
|
'password6': 'testing6'
|
|
})
|
|
|
|
acc1lis = listen_zero()
|
|
acc2lis = listen_zero()
|
|
con1lis = listen_zero()
|
|
con2lis = listen_zero()
|
|
_test_socks += [acc1lis, acc2lis, con1lis, con2lis] + obj_sockets
|
|
|
|
account_ring_path = os.path.join(_testdir, 'account.ring.gz')
|
|
with closing(GzipFile(account_ring_path, 'wb')) as f:
|
|
pickle.dump(ring.RingData([[0, 1, 0, 1], [1, 0, 1, 0]],
|
|
[{'id': 0, 'zone': 0, 'device': 'sda1', 'ip': '127.0.0.1',
|
|
'port': acc1lis.getsockname()[1]},
|
|
{'id': 1, 'zone': 1, 'device': 'sdb1', 'ip': '127.0.0.1',
|
|
'port': acc2lis.getsockname()[1]}], 30),
|
|
f)
|
|
container_ring_path = os.path.join(_testdir, 'container.ring.gz')
|
|
with closing(GzipFile(container_ring_path, 'wb')) as f:
|
|
pickle.dump(ring.RingData([[0, 1, 0, 1], [1, 0, 1, 0]],
|
|
[{'id': 0, 'zone': 0, 'device': 'sda1', 'ip': '127.0.0.1',
|
|
'port': con1lis.getsockname()[1]},
|
|
{'id': 1, 'zone': 1, 'device': 'sdb1', 'ip': '127.0.0.1',
|
|
'port': con2lis.getsockname()[1]}], 30),
|
|
f)
|
|
|
|
def get_logger_name(name):
|
|
if show_debug_logs:
|
|
return debug_logger(name)
|
|
else:
|
|
return None
|
|
|
|
acc1srv = account_server.AccountController(
|
|
config, logger=get_logger_name('acct1'))
|
|
acc2srv = account_server.AccountController(
|
|
config, logger=get_logger_name('acct2'))
|
|
con1srv = container_server.ContainerController(
|
|
config, logger=get_logger_name('cont1'))
|
|
con2srv = container_server.ContainerController(
|
|
config, logger=get_logger_name('cont2'))
|
|
|
|
objsrvs = [
|
|
(obj_sockets[index],
|
|
the_object_server.ObjectController(
|
|
config, logger=get_logger_name('obj%d' % (index + 1))))
|
|
for index in range(len(obj_sockets))
|
|
]
|
|
|
|
if show_debug_logs:
|
|
logger = get_logger_name('proxy')
|
|
else:
|
|
logger = utils.get_logger(config, 'wsgi-server', log_route='wsgi')
|
|
|
|
def get_logger(name, *args, **kwargs):
|
|
return logger
|
|
|
|
with mock.patch('swift.common.utils.get_logger', get_logger):
|
|
with mock.patch('swift.common.middleware.memcache.MemcacheMiddleware',
|
|
FakeMemcacheMiddleware):
|
|
try:
|
|
app = loadapp(proxy_conf, global_conf=config)
|
|
except Exception as e:
|
|
raise InProcessException(e)
|
|
|
|
nl = utils.NullLogger()
|
|
global proxy_srv
|
|
proxy_srv = prolis
|
|
prospa = eventlet.spawn(eventlet.wsgi.server, prolis, app, nl,
|
|
protocol=SwiftHttpProtocol)
|
|
acc1spa = eventlet.spawn(eventlet.wsgi.server, acc1lis, acc1srv, nl,
|
|
protocol=SwiftHttpProtocol)
|
|
acc2spa = eventlet.spawn(eventlet.wsgi.server, acc2lis, acc2srv, nl,
|
|
protocol=SwiftHttpProtocol)
|
|
con1spa = eventlet.spawn(eventlet.wsgi.server, con1lis, con1srv, nl,
|
|
protocol=SwiftHttpProtocol)
|
|
con2spa = eventlet.spawn(eventlet.wsgi.server, con2lis, con2srv, nl,
|
|
protocol=SwiftHttpProtocol)
|
|
|
|
objspa = [eventlet.spawn(eventlet.wsgi.server, objsrv[0], objsrv[1], nl,
|
|
protocol=SwiftHttpProtocol)
|
|
for objsrv in objsrvs]
|
|
|
|
global _test_coros
|
|
_test_coros = \
|
|
(prospa, acc1spa, acc2spa, con1spa, con2spa) + tuple(objspa)
|
|
|
|
# Create accounts "test" and "test2"
|
|
def create_account(act):
|
|
ts = utils.normalize_timestamp(time())
|
|
account_ring = Ring(_testdir, ring_name='account')
|
|
partition, nodes = account_ring.get_nodes(act)
|
|
for node in nodes:
|
|
# Note: we are just using the http_connect method in the object
|
|
# controller here to talk to the account server nodes.
|
|
conn = swift.proxy.controllers.obj.http_connect(
|
|
node['ip'], node['port'], node['device'], partition, 'PUT',
|
|
'/' + act, {'X-Timestamp': ts, 'x-trans-id': act})
|
|
resp = conn.getresponse()
|
|
assert resp.status == 201, 'Unable to create account: %s\n%s' % (
|
|
resp.status, resp.read())
|
|
|
|
create_account('AUTH_test')
|
|
create_account('AUTH_test2')
|
|
|
|
|
|
cluster_info = {}
|
|
|
|
|
|
def get_cluster_info():
|
|
# The fallback constraints used for testing will come from the current
|
|
# effective constraints.
|
|
eff_constraints = dict(constraints.EFFECTIVE_CONSTRAINTS)
|
|
|
|
# We'll update those constraints based on what the /info API provides, if
|
|
# anything.
|
|
global cluster_info
|
|
global config
|
|
try:
|
|
conn = Connection(config)
|
|
conn.authenticate()
|
|
cluster_info.update(conn.cluster_info())
|
|
except (ResponseError, socket.error, SkipTest):
|
|
# Failed to get cluster_information via /info API, so fall back on
|
|
# test.conf data
|
|
pass
|
|
else:
|
|
try:
|
|
eff_constraints.update(cluster_info['swift'])
|
|
except KeyError:
|
|
# Most likely the swift cluster has "expose_info = false" set
|
|
# in its proxy-server.conf file, so we'll just do the best we
|
|
# can.
|
|
print("** Swift Cluster not exposing /info **", file=sys.stderr)
|
|
|
|
# Finally, we'll allow any constraint present in the swift-constraints
|
|
# section of test.conf to override everything. Note that only those
|
|
# constraints defined in the constraints module are converted to integers.
|
|
test_constraints = get_config('swift-constraints')
|
|
for k in constraints.DEFAULT_CONSTRAINTS:
|
|
try:
|
|
test_constraints[k] = int(test_constraints[k])
|
|
except KeyError:
|
|
pass
|
|
except ValueError:
|
|
print("Invalid constraint value: %s = %s" % (
|
|
k, test_constraints[k]), file=sys.stderr)
|
|
eff_constraints.update(test_constraints)
|
|
|
|
# Just make it look like these constraints were loaded from a /info call,
|
|
# even if the /info call failed, or when they are overridden by values
|
|
# from the swift-constraints section of test.conf
|
|
cluster_info['swift'] = eff_constraints
|
|
|
|
|
|
def setup_package():
|
|
|
|
global policy_specified
|
|
global skip_if_no_xattrs
|
|
policy_specified = os.environ.get('SWIFT_TEST_POLICY')
|
|
in_process_env = os.environ.get('SWIFT_TEST_IN_PROCESS')
|
|
if in_process_env is not None:
|
|
use_in_process = utils.config_true_value(in_process_env)
|
|
else:
|
|
use_in_process = None
|
|
|
|
global in_process
|
|
|
|
global config
|
|
if use_in_process:
|
|
# Explicitly set to True, so barrel on ahead with in-process
|
|
# functional test setup.
|
|
in_process = True
|
|
# NOTE: No attempt is made to a read local test.conf file.
|
|
else:
|
|
if use_in_process is None:
|
|
# Not explicitly set, default to using in-process functional tests
|
|
# if the test.conf file is not found, or does not provide a usable
|
|
# configuration.
|
|
config.update(get_config('func_test'))
|
|
if not config:
|
|
in_process = True
|
|
# else... leave in_process value unchanged. It may be that
|
|
# setup_package is called twice, in which case in_process_setup may
|
|
# have loaded config before we reach here a second time, so the
|
|
# existence of config is not reliable to determine that in_process
|
|
# should be False. Anyway, it's default value is False.
|
|
else:
|
|
# Explicitly set to False, do not attempt to use in-process
|
|
# functional tests, be sure we attempt to read from local
|
|
# test.conf file.
|
|
in_process = False
|
|
config.update(get_config('func_test'))
|
|
|
|
if in_process:
|
|
in_mem_obj_env = os.environ.get('SWIFT_TEST_IN_MEMORY_OBJ')
|
|
in_mem_obj = utils.config_true_value(in_mem_obj_env)
|
|
skip_if_no_xattrs = real_skip_if_no_xattrs
|
|
try:
|
|
in_process_setup(the_object_server=(
|
|
mem_object_server if in_mem_obj else object_server))
|
|
except InProcessException as exc:
|
|
print(('Exception during in-process setup: %s'
|
|
% str(exc)), file=sys.stderr)
|
|
raise
|
|
else:
|
|
skip_if_no_xattrs = lambda: None
|
|
|
|
global web_front_end
|
|
web_front_end = config.get('web_front_end', 'integral')
|
|
global normalized_urls
|
|
normalized_urls = config.get('normalized_urls', False)
|
|
|
|
global orig_collate
|
|
orig_collate = locale.setlocale(locale.LC_COLLATE)
|
|
locale.setlocale(locale.LC_COLLATE, config.get('collate', 'C'))
|
|
|
|
global insecure
|
|
insecure = config_true_value(config.get('insecure', False))
|
|
|
|
global swift_test_auth_version
|
|
global swift_test_auth
|
|
global swift_test_user
|
|
global swift_test_key
|
|
global swift_test_tenant
|
|
global swift_test_perm
|
|
global swift_test_domain
|
|
global swift_test_service_prefix
|
|
|
|
swift_test_service_prefix = None
|
|
|
|
if config:
|
|
swift_test_auth_version = str(config.get('auth_version', '1'))
|
|
|
|
if 'auth_uri' in config:
|
|
swift_test_auth = config['auth_uri']
|
|
# Back-fill the individual parts -- really, we should just need
|
|
# host and port for s3_test_client, and that's only until we
|
|
# improve it to take a s3_storage_url option
|
|
parsed = urlsplit(config['auth_uri'])
|
|
config.update({
|
|
'auth_ssl': str(parsed.scheme == 'https'),
|
|
'auth_host': parsed.hostname,
|
|
'auth_port': str(
|
|
parsed.port if parsed.port is not None else
|
|
443 if parsed.scheme == 'https' else 80),
|
|
'auth_prefix': parsed.path,
|
|
})
|
|
config.setdefault('s3_storage_url',
|
|
urlunsplit(parsed[:2] + ('', None, None)))
|
|
elif 'auth_host' in config:
|
|
scheme = 'http'
|
|
if config_true_value(config.get('auth_ssl', 'no')):
|
|
scheme = 'https'
|
|
netloc = config['auth_host']
|
|
if 'auth_port' in config:
|
|
netloc += ':' + config['auth_port']
|
|
auth_prefix = config.get('auth_prefix', '/')
|
|
if swift_test_auth_version == "1":
|
|
auth_prefix += 'v1.0'
|
|
config['auth_uri'] = swift_test_auth = urlunsplit(
|
|
(scheme, netloc, auth_prefix, None, None))
|
|
config.setdefault('s3_storage_url', urlunsplit(
|
|
(scheme, netloc, '', None, None)))
|
|
# else, neither auth_uri nor auth_host; swift_test_auth will be unset
|
|
# and we'll skip everything later
|
|
|
|
if 'service_prefix' in config:
|
|
swift_test_service_prefix = utils.append_underscore(
|
|
config['service_prefix'])
|
|
|
|
if swift_test_auth_version == "1":
|
|
|
|
try:
|
|
if 'account' in config:
|
|
swift_test_user[0] = '%(account)s:%(username)s' % config
|
|
else:
|
|
swift_test_user[0] = '%(username)s' % config
|
|
swift_test_key[0] = config['password']
|
|
except KeyError:
|
|
# bad config, no account/username configured, tests cannot be
|
|
# run
|
|
pass
|
|
try:
|
|
swift_test_user[1] = '%s%s' % (
|
|
'%s:' % config['account2'] if 'account2' in config else '',
|
|
config['username2'])
|
|
swift_test_key[1] = config['password2']
|
|
except KeyError:
|
|
pass # old config, no second account tests can be run
|
|
try:
|
|
swift_test_user[2] = '%s%s' % (
|
|
'%s:' % config['account'] if 'account'
|
|
in config else '', config['username3'])
|
|
swift_test_key[2] = config['password3']
|
|
except KeyError:
|
|
pass # old config, no third account tests can be run
|
|
try:
|
|
swift_test_user[4] = '%s%s' % (
|
|
'%s:' % config['account5'], config['username5'])
|
|
swift_test_key[4] = config['password5']
|
|
swift_test_tenant[4] = config['account5']
|
|
except KeyError:
|
|
pass # no service token tests can be run
|
|
|
|
for _ in range(3):
|
|
swift_test_perm[_] = swift_test_user[_]
|
|
|
|
else:
|
|
swift_test_user[0] = config['username']
|
|
swift_test_tenant[0] = config['account']
|
|
swift_test_key[0] = config['password']
|
|
if 'domain' in config:
|
|
swift_test_domain[0] = config['domain']
|
|
swift_test_user[1] = config['username2']
|
|
swift_test_tenant[1] = config['account2']
|
|
swift_test_key[1] = config['password2']
|
|
if 'domain2' in config:
|
|
swift_test_domain[1] = config['domain2']
|
|
swift_test_user[2] = config['username3']
|
|
swift_test_tenant[2] = config['account']
|
|
swift_test_key[2] = config['password3']
|
|
if 'domain3' in config:
|
|
swift_test_domain[2] = config['domain3']
|
|
if 'username4' in config:
|
|
swift_test_user[3] = config['username4']
|
|
swift_test_tenant[3] = config['account4']
|
|
swift_test_key[3] = config['password4']
|
|
swift_test_domain[3] = config['domain4']
|
|
if 'username5' in config:
|
|
swift_test_user[4] = config['username5']
|
|
swift_test_tenant[4] = config['account5']
|
|
swift_test_key[4] = config['password5']
|
|
if 'domain5' in config:
|
|
swift_test_domain[4] = config['domain5']
|
|
if 'username6' in config:
|
|
swift_test_user[5] = config['username6']
|
|
swift_test_tenant[5] = config['account6']
|
|
swift_test_key[5] = config['password6']
|
|
if 'domain6' in config:
|
|
swift_test_domain[5] = config['domain6']
|
|
|
|
for _ in range(5):
|
|
swift_test_perm[_] = swift_test_tenant[_] + ':' \
|
|
+ swift_test_user[_]
|
|
|
|
global skip
|
|
if not skip:
|
|
skip = not all([swift_test_auth, swift_test_user[0],
|
|
swift_test_key[0]])
|
|
if skip:
|
|
print('SKIPPING FUNCTIONAL TESTS DUE TO NO CONFIG',
|
|
file=sys.stderr)
|
|
|
|
global skip2
|
|
if not skip2:
|
|
skip2 = not all([not skip, swift_test_user[1], swift_test_key[1]])
|
|
if not skip and skip2:
|
|
print('SKIPPING SECOND ACCOUNT FUNCTIONAL TESTS '
|
|
'DUE TO NO CONFIG FOR THEM', file=sys.stderr)
|
|
|
|
global skip3
|
|
if not skip3:
|
|
skip3 = not all([not skip, swift_test_user[2], swift_test_key[2]])
|
|
if not skip and skip3:
|
|
print('SKIPPING THIRD ACCOUNT FUNCTIONAL TESTS '
|
|
'DUE TO NO CONFIG FOR THEM', file=sys.stderr)
|
|
|
|
global skip_if_not_v3
|
|
if not skip_if_not_v3:
|
|
skip_if_not_v3 = (swift_test_auth_version != '3'
|
|
or not all([not skip,
|
|
swift_test_user[3],
|
|
swift_test_key[3]]))
|
|
if not skip and skip_if_not_v3:
|
|
print('SKIPPING FUNCTIONAL TESTS SPECIFIC TO AUTH VERSION 3',
|
|
file=sys.stderr)
|
|
|
|
global skip_service_tokens
|
|
if not skip_service_tokens:
|
|
skip_service_tokens = not all([not skip, swift_test_user[4],
|
|
swift_test_key[4], swift_test_tenant[4],
|
|
swift_test_service_prefix])
|
|
if not skip and skip_service_tokens:
|
|
print(
|
|
'SKIPPING FUNCTIONAL TESTS SPECIFIC TO SERVICE TOKENS',
|
|
file=sys.stderr)
|
|
|
|
if policy_specified:
|
|
policies = FunctionalStoragePolicyCollection.from_info()
|
|
for p in policies:
|
|
# policy names are case-insensitive
|
|
if policy_specified.lower() == p['name'].lower():
|
|
_info('Using specified policy %s' % policy_specified)
|
|
FunctionalStoragePolicyCollection.policy_specified = p
|
|
Container.policy_specified = policy_specified
|
|
break
|
|
else:
|
|
_info(
|
|
'SKIPPING FUNCTIONAL TESTS: Failed to find specified policy %s'
|
|
% policy_specified)
|
|
raise Exception('Failed to find specified policy %s'
|
|
% policy_specified)
|
|
|
|
global skip_if_no_reseller_admin
|
|
if not skip_if_no_reseller_admin:
|
|
skip_if_no_reseller_admin = not all([not skip, swift_test_user[5],
|
|
swift_test_key[5],
|
|
swift_test_tenant[5]])
|
|
if not skip and skip_if_no_reseller_admin:
|
|
print('SKIPPING FUNCTIONAL TESTS DUE TO NO CONFIG FOR '
|
|
'RESELLER ADMIN', file=sys.stderr)
|
|
|
|
get_cluster_info()
|
|
|
|
|
|
def teardown_package():
|
|
global orig_collate
|
|
locale.setlocale(locale.LC_COLLATE, orig_collate)
|
|
|
|
# clean up containers and objects left behind after running tests
|
|
global config
|
|
|
|
if config:
|
|
try:
|
|
conn = Connection(config)
|
|
conn.authenticate()
|
|
account = Account(conn, config.get('account', config['username']))
|
|
account.delete_containers()
|
|
except (SkipTest):
|
|
pass
|
|
|
|
global in_process
|
|
global _test_socks
|
|
if in_process:
|
|
try:
|
|
for i, server in enumerate(_test_coros):
|
|
server.kill()
|
|
if not server.dead:
|
|
# kill it from the socket level
|
|
_test_socks[i].close()
|
|
except Exception:
|
|
pass
|
|
try:
|
|
rmtree(os.path.dirname(_testdir))
|
|
except Exception:
|
|
pass
|
|
|
|
reset_globals()
|
|
|
|
|
|
class AuthError(Exception):
|
|
pass
|
|
|
|
|
|
class InternalServerError(Exception):
|
|
pass
|
|
|
|
|
|
url = [None, None, None, None, None]
|
|
token = [None, None, None, None, None]
|
|
service_token = [None, None, None, None, None]
|
|
parsed = [None, None, None, None, None]
|
|
conn = [None, None, None, None, None]
|
|
|
|
|
|
def reset_globals():
|
|
global url, token, service_token, parsed, conn, config
|
|
url = [None, None, None, None, None]
|
|
token = [None, None, None, None, None]
|
|
service_token = [None, None, None, None, None]
|
|
parsed = [None, None, None, None, None]
|
|
conn = [None, None, None, None, None]
|
|
if config:
|
|
config = {}
|
|
|
|
|
|
def connection(url):
|
|
if has_insecure:
|
|
parsed_url, http_conn = http_connection(url, insecure=insecure)
|
|
else:
|
|
parsed_url, http_conn = http_connection(url)
|
|
|
|
orig_request = http_conn.request
|
|
|
|
# Add the policy header if policy_specified is set
|
|
def request_with_policy(method, url, body=None, headers={}):
|
|
version, account, container, obj = split_path(url, 1, 4, True)
|
|
if policy_specified and method == 'PUT' and container and not obj \
|
|
and 'X-Storage-Policy' not in headers:
|
|
headers['X-Storage-Policy'] = policy_specified
|
|
|
|
return orig_request(method, url, body, headers)
|
|
|
|
http_conn.request = request_with_policy
|
|
|
|
return parsed_url, http_conn
|
|
|
|
|
|
def get_url_token(user_index, os_options):
|
|
authargs = dict(snet=False,
|
|
tenant_name=swift_test_tenant[user_index],
|
|
auth_version=swift_test_auth_version,
|
|
os_options=os_options,
|
|
insecure=insecure)
|
|
url, token = get_auth(swift_test_auth,
|
|
swift_test_user[user_index],
|
|
swift_test_key[user_index],
|
|
**authargs)
|
|
if six.PY2 and not isinstance(url, bytes):
|
|
url = url.encode('utf-8')
|
|
if six.PY2 and not isinstance(token, bytes):
|
|
token = token.encode('utf-8')
|
|
return url, token
|
|
|
|
|
|
def retry(func, *args, **kwargs):
|
|
"""
|
|
You can use the kwargs to override:
|
|
'retries' (default: 5)
|
|
'use_account' (default: 1) - which user's token to pass
|
|
'url_account' (default: matches 'use_account') - which user's storage URL
|
|
'resource' (default: url[url_account] - URL to connect to; retry()
|
|
will interpolate the variable :storage_url: if present
|
|
'service_user' - add a service token from this user (1 indexed)
|
|
"""
|
|
global url, token, service_token, parsed, conn
|
|
retries = kwargs.get('retries', 5)
|
|
attempts, backoff = 0, 1
|
|
|
|
# use account #1 by default; turn user's 1-indexed account into 0-indexed
|
|
use_account = kwargs.pop('use_account', 1) - 1
|
|
service_user = kwargs.pop('service_user', None)
|
|
if service_user:
|
|
service_user -= 1 # 0-index
|
|
|
|
# access our own account by default
|
|
url_account = kwargs.pop('url_account', use_account + 1) - 1
|
|
os_options = {'user_domain_name': swift_test_domain[use_account],
|
|
'project_domain_name': swift_test_domain[use_account]}
|
|
while attempts <= retries:
|
|
auth_failure = False
|
|
attempts += 1
|
|
try:
|
|
if not url[use_account] or not token[use_account]:
|
|
url[use_account], token[use_account] = get_url_token(
|
|
use_account, os_options)
|
|
parsed[use_account] = conn[use_account] = None
|
|
if not parsed[use_account] or not conn[use_account]:
|
|
parsed[use_account], conn[use_account] = \
|
|
connection(url[use_account])
|
|
|
|
# default resource is the account url[url_account]
|
|
resource = kwargs.pop('resource', '%(storage_url)s')
|
|
template_vars = {'storage_url': url[url_account]}
|
|
parsed_result = urlparse(resource % template_vars)
|
|
if isinstance(service_user, int):
|
|
if not service_token[service_user]:
|
|
dummy, service_token[service_user] = get_url_token(
|
|
service_user, os_options)
|
|
kwargs['service_token'] = service_token[service_user]
|
|
return func(url[url_account], token[use_account],
|
|
parsed_result, conn[url_account],
|
|
*args, **kwargs)
|
|
except (socket.error, HTTPException):
|
|
if attempts > retries:
|
|
raise
|
|
parsed[use_account] = conn[use_account] = None
|
|
if service_user:
|
|
service_token[service_user] = None
|
|
except AuthError:
|
|
auth_failure = True
|
|
url[use_account] = token[use_account] = None
|
|
if service_user:
|
|
service_token[service_user] = None
|
|
except InternalServerError:
|
|
pass
|
|
if attempts <= retries:
|
|
if not auth_failure:
|
|
sleep(backoff)
|
|
backoff *= 2
|
|
raise Exception('No result after %s retries.' % retries)
|
|
|
|
|
|
def check_response(conn):
|
|
resp = conn.getresponse()
|
|
if resp.status == 401:
|
|
resp.read()
|
|
raise AuthError()
|
|
elif resp.status // 100 == 5:
|
|
resp.read()
|
|
raise InternalServerError()
|
|
return resp
|
|
|
|
|
|
def load_constraint(name):
|
|
global cluster_info
|
|
try:
|
|
c = cluster_info['swift'][name]
|
|
except KeyError:
|
|
raise SkipTest("Missing constraint: %s" % name)
|
|
if not isinstance(c, int):
|
|
raise SkipTest("Bad value, %r, for constraint: %s" % (c, name))
|
|
return c
|
|
|
|
|
|
def get_storage_policy_from_cluster_info(info):
|
|
policies = info['swift'].get('policies', {})
|
|
default_policy = []
|
|
non_default_policies = []
|
|
for p in policies:
|
|
if p.get('default', {}):
|
|
default_policy.append(p)
|
|
else:
|
|
non_default_policies.append(p)
|
|
return default_policy, non_default_policies
|
|
|
|
|
|
def reset_acl():
|
|
def post(url, token, parsed, conn):
|
|
conn.request('POST', parsed.path, '', {
|
|
'X-Auth-Token': token,
|
|
'X-Account-Access-Control': '{}'
|
|
})
|
|
return check_response(conn)
|
|
resp = retry(post, use_account=1)
|
|
resp.read()
|
|
|
|
|
|
def requires_acls(f):
|
|
@functools.wraps(f)
|
|
def wrapper(*args, **kwargs):
|
|
global skip, cluster_info
|
|
if skip or not cluster_info:
|
|
raise SkipTest('Requires account ACLs')
|
|
# Determine whether this cluster has account ACLs; if not, skip test
|
|
if not cluster_info.get('tempauth', {}).get('account_acls'):
|
|
raise SkipTest('Requires account ACLs')
|
|
if swift_test_auth_version != '1':
|
|
# remove when keystoneauth supports account acls
|
|
raise SkipTest('Requires account ACLs')
|
|
reset_acl()
|
|
try:
|
|
rv = f(*args, **kwargs)
|
|
finally:
|
|
reset_acl()
|
|
return rv
|
|
return wrapper
|
|
|
|
|
|
class FunctionalStoragePolicyCollection(object):
|
|
|
|
# policy_specified is set in __init__.py when tests are being set up.
|
|
policy_specified = None
|
|
|
|
def __init__(self, policies):
|
|
self._all = policies
|
|
self.default = None
|
|
for p in self:
|
|
if p.get('default', False):
|
|
assert self.default is None, 'Found multiple default ' \
|
|
'policies %r and %r' % (self.default, p)
|
|
self.default = p
|
|
|
|
@classmethod
|
|
def from_info(cls, info=None):
|
|
if not (info or cluster_info):
|
|
get_cluster_info()
|
|
info = info or cluster_info
|
|
try:
|
|
policy_info = info['swift']['policies']
|
|
except KeyError:
|
|
raise AssertionError('Did not find any policy info in %r' % info)
|
|
policies = cls(policy_info)
|
|
assert policies.default, \
|
|
'Did not find default policy in %r' % policy_info
|
|
return policies
|
|
|
|
def __len__(self):
|
|
return len(self._all)
|
|
|
|
def __iter__(self):
|
|
return iter(self._all)
|
|
|
|
def __getitem__(self, index):
|
|
return self._all[index]
|
|
|
|
def filter(self, **kwargs):
|
|
return self.__class__([p for p in self if all(
|
|
p.get(k) == v for k, v in kwargs.items())])
|
|
|
|
def exclude(self, **kwargs):
|
|
return self.__class__([p for p in self if all(
|
|
p.get(k) != v for k, v in kwargs.items())])
|
|
|
|
def select(self):
|
|
# check that a policy was specified and that it is available
|
|
# in the current list (i.e., hasn't been excluded of the current list)
|
|
if self.policy_specified and self.policy_specified in self:
|
|
return self.policy_specified
|
|
else:
|
|
return random.choice(self)
|
|
|
|
|
|
def requires_policies(f):
|
|
@functools.wraps(f)
|
|
def wrapper(self, *args, **kwargs):
|
|
if skip:
|
|
raise SkipTest
|
|
try:
|
|
self.policies = FunctionalStoragePolicyCollection.from_info()
|
|
except AssertionError:
|
|
raise SkipTest("Unable to determine available policies")
|
|
if len(self.policies) < 2:
|
|
raise SkipTest("Multiple policies not enabled")
|
|
return f(self, *args, **kwargs)
|
|
|
|
return wrapper
|
|
|
|
|
|
def requires_bulk(f):
|
|
@functools.wraps(f)
|
|
def wrapper(*args, **kwargs):
|
|
if skip or not cluster_info:
|
|
raise SkipTest('Requires bulk middleware')
|
|
# Determine whether this cluster has bulk middleware; if not, skip test
|
|
if not cluster_info.get('bulk_upload', {}):
|
|
raise SkipTest('Requires bulk middleware')
|
|
return f(*args, **kwargs)
|
|
return wrapper
|