7d0e5ebe69
This commit lets the object server use splice() and tee() to move data from disk to the network without ever copying it into user space. Requires Linux. Sorry, FreeBSD folks. You still have the old mechanism, as does anyone who doesn't want to use splice. This requires a relatively recent kernel (2.6.38+) to work, which includes the two most recent Ubuntu LTS releases (Precise and Trusty) as well as RHEL 7. However, it excludes Lucid and RHEL 6. On those systems, setting "splice = on" will result in warnings in the logs but no actual use of splice. Note that this only applies to GET responses without Range headers. It can easily be extended to single-range GET requests, but this commit leaves that for future work. Same goes for PUT requests, or at least non-chunked ones. On some real hardware I had laying around (not a VM), this produced a 37% reduction in CPU usage for GETs made directly to the object server. Measurements were done by looking at /proc/<pid>/stat, specifically the utime and stime fields (user and kernel CPU jiffies, respectively). Note: There is a Python module called "splicetee" available on PyPi, but it's licensed under the GPL, so it cannot easily be added to OpenStack's requirements. That's why this patch uses ctypes instead. Also fixed a long-standing annoyance in FakeLogger: >>> fake_logger.warn('stuff') >>> fake_logger.get_lines_for_level('warn') [] >>> This, of course, is because the correct log level is 'warning'. Now you get a KeyError if you call get_lines_for_level with a bogus log level. Change-Id: Ic6d6b833a5b04ca2019be94b1b90d941929d21c8
188 lines
7.1 KiB
Python
188 lines
7.1 KiB
Python
# Copyright (c) 2013 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import os
|
|
import unittest
|
|
import uuid
|
|
|
|
from swift.common.container_sync_realms import ContainerSyncRealms
|
|
from test.unit import FakeLogger, temptree
|
|
|
|
|
|
class TestUtils(unittest.TestCase):
|
|
|
|
def test_no_file_there(self):
|
|
unique = uuid.uuid4().hex
|
|
logger = FakeLogger()
|
|
csr = ContainerSyncRealms(unique, logger)
|
|
self.assertEqual(
|
|
logger.all_log_lines(),
|
|
{'debug': [
|
|
"Could not load '%s': [Errno 2] No such file or directory: "
|
|
"'%s'" % (unique, unique)]})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
self.assertEqual(csr.realms(), [])
|
|
|
|
def test_os_error(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = ''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
os.chmod(tempdir, 0)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
try:
|
|
self.assertEqual(
|
|
logger.all_log_lines(),
|
|
{'error': [
|
|
"Could not load '%s': [Errno 13] Permission denied: "
|
|
"'%s'" % (fpath, fpath)]})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
self.assertEqual(csr.realms(), [])
|
|
finally:
|
|
os.chmod(tempdir, 0700)
|
|
|
|
def test_empty(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = ''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(logger.all_log_lines(), {})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
self.assertEqual(csr.realms(), [])
|
|
|
|
def test_error_parsing(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = 'invalid'
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(
|
|
logger.all_log_lines(),
|
|
{'error': [
|
|
"Could not load '%s': File contains no section headers.\n"
|
|
"file: %s, line: 1\n"
|
|
"'invalid'" % (fpath, fpath)]})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
self.assertEqual(csr.realms(), [])
|
|
|
|
def test_one_realm(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = '''
|
|
[US]
|
|
key = 9ff3b71c849749dbaec4ccdd3cbab62b
|
|
cluster_dfw1 = http://dfw1.host/v1/
|
|
'''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(logger.all_log_lines(), {})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
self.assertEqual(csr.realms(), ['US'])
|
|
self.assertEqual(csr.key('US'), '9ff3b71c849749dbaec4ccdd3cbab62b')
|
|
self.assertEqual(csr.key2('US'), None)
|
|
self.assertEqual(csr.clusters('US'), ['DFW1'])
|
|
self.assertEqual(
|
|
csr.endpoint('US', 'DFW1'), 'http://dfw1.host/v1/')
|
|
|
|
def test_two_realms_and_change_a_default(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = '''
|
|
[DEFAULT]
|
|
mtime_check_interval = 60
|
|
|
|
[US]
|
|
key = 9ff3b71c849749dbaec4ccdd3cbab62b
|
|
cluster_dfw1 = http://dfw1.host/v1/
|
|
|
|
[UK]
|
|
key = e9569809dc8b4951accc1487aa788012
|
|
key2 = f6351bd1cc36413baa43f7ba1b45e51d
|
|
cluster_lon3 = http://lon3.host/v1/
|
|
'''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(logger.all_log_lines(), {})
|
|
self.assertEqual(csr.mtime_check_interval, 60)
|
|
self.assertEqual(sorted(csr.realms()), ['UK', 'US'])
|
|
self.assertEqual(csr.key('US'), '9ff3b71c849749dbaec4ccdd3cbab62b')
|
|
self.assertEqual(csr.key2('US'), None)
|
|
self.assertEqual(csr.clusters('US'), ['DFW1'])
|
|
self.assertEqual(
|
|
csr.endpoint('US', 'DFW1'), 'http://dfw1.host/v1/')
|
|
self.assertEqual(csr.key('UK'), 'e9569809dc8b4951accc1487aa788012')
|
|
self.assertEqual(
|
|
csr.key2('UK'), 'f6351bd1cc36413baa43f7ba1b45e51d')
|
|
self.assertEqual(csr.clusters('UK'), ['LON3'])
|
|
self.assertEqual(
|
|
csr.endpoint('UK', 'LON3'), 'http://lon3.host/v1/')
|
|
|
|
def test_empty_realm(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = '''
|
|
[US]
|
|
'''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(logger.all_log_lines(), {})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
self.assertEqual(csr.realms(), ['US'])
|
|
self.assertEqual(csr.key('US'), None)
|
|
self.assertEqual(csr.key2('US'), None)
|
|
self.assertEqual(csr.clusters('US'), [])
|
|
self.assertEqual(csr.endpoint('US', 'JUST_TESTING'), None)
|
|
|
|
def test_bad_mtime_check_interval(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = '''
|
|
[DEFAULT]
|
|
mtime_check_interval = invalid
|
|
'''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(
|
|
logger.all_log_lines(),
|
|
{'error': [
|
|
"Error in '%s' with mtime_check_interval: invalid literal "
|
|
"for int() with base 10: 'invalid'" % fpath]})
|
|
self.assertEqual(csr.mtime_check_interval, 300)
|
|
|
|
def test_get_sig(self):
|
|
fname = 'container-sync-realms.conf'
|
|
fcontents = ''
|
|
with temptree([fname], [fcontents]) as tempdir:
|
|
logger = FakeLogger()
|
|
fpath = os.path.join(tempdir, fname)
|
|
csr = ContainerSyncRealms(fpath, logger)
|
|
self.assertEqual(
|
|
csr.get_sig(
|
|
'GET', '/some/path', '1387212345.67890', 'my_nonce',
|
|
'realm_key', 'user_key'),
|
|
'5a6eb486eb7b44ae1b1f014187a94529c3f9c8f9')
|
|
|
|
|
|
if __name__ == '__main__':
|
|
unittest.main()
|