4181 lines
183 KiB
Python
4181 lines
183 KiB
Python
# -*- coding: utf-8 -*-
|
|
# Copyright (c) 2013 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
import base64
|
|
import hashlib
|
|
import json
|
|
import time
|
|
import unittest
|
|
|
|
from mock import patch
|
|
|
|
import six
|
|
from io import BytesIO
|
|
|
|
from swift.common import swob, utils
|
|
from swift.common.header_key_dict import HeaderKeyDict
|
|
from swift.common.middleware import slo
|
|
from swift.common.swob import Request, HTTPException, str_to_wsgi
|
|
from swift.common.utils import quote, closing_if_possible, close_if_possible, \
|
|
parse_content_type, iter_multipart_mime_documents, parse_mime_headers
|
|
from test.unit.common.middleware.helpers import FakeSwift
|
|
|
|
|
|
test_xml_data = '''<?xml version="1.0" encoding="UTF-8"?>
|
|
<static_large_object>
|
|
<object_segment>
|
|
<path>/cont/object</path>
|
|
<etag>etagoftheobjectsegment</etag>
|
|
<size_bytes>100</size_bytes>
|
|
</object_segment>
|
|
</static_large_object>
|
|
'''
|
|
test_json_data = json.dumps([{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
|
|
|
|
def fake_start_response(*args, **kwargs):
|
|
pass
|
|
|
|
|
|
def md5hex(s):
|
|
if not isinstance(s, bytes):
|
|
s = s.encode('ascii')
|
|
return hashlib.md5(s).hexdigest()
|
|
|
|
|
|
class SloTestCase(unittest.TestCase):
|
|
def setUp(self):
|
|
self.app = FakeSwift()
|
|
slo_conf = {'rate_limit_under_size': '0'}
|
|
self.slo = slo.filter_factory(slo_conf)(self.app)
|
|
self.slo.logger = self.app.logger
|
|
self.manifest_abcd_etag = md5hex(
|
|
md5hex("a" * 5) + md5hex(md5hex("b" * 10) + md5hex("c" * 15)) +
|
|
md5hex("d" * 20))
|
|
|
|
def call_app(self, req, app=None):
|
|
if app is None:
|
|
app = self.app
|
|
|
|
req.headers.setdefault("User-Agent", "Mozzarella Foxfire")
|
|
|
|
status = [None]
|
|
headers = [None]
|
|
|
|
def start_response(s, h, ei=None):
|
|
status[0] = s
|
|
headers[0] = h
|
|
|
|
body_iter = app(req.environ, start_response)
|
|
body = b''
|
|
# appease the close-checker
|
|
with closing_if_possible(body_iter):
|
|
for chunk in body_iter:
|
|
body += chunk
|
|
return status[0], headers[0], body
|
|
|
|
def call_slo(self, req, **kwargs):
|
|
return self.call_app(req, app=self.slo, **kwargs)
|
|
|
|
|
|
class TestSloMiddleware(SloTestCase):
|
|
|
|
def setUp(self):
|
|
super(TestSloMiddleware, self).setUp()
|
|
|
|
self.app.register(
|
|
'GET', '/', swob.HTTPOk, {}, b'passed')
|
|
self.app.register(
|
|
'PUT', '/', swob.HTTPOk, {}, b'passed')
|
|
|
|
def test_handle_multipart_no_obj(self):
|
|
req = Request.blank('/')
|
|
resp_iter = self.slo(req.environ, fake_start_response)
|
|
self.assertEqual(self.app.calls, [('GET', '/')])
|
|
self.assertEqual(b''.join(resp_iter), b'passed')
|
|
|
|
def test_slo_header_assigned(self):
|
|
req = Request.blank(
|
|
'/v1/a/c/o', headers={'x-static-large-object': "true"},
|
|
environ={'REQUEST_METHOD': 'PUT'})
|
|
resp = b''.join(self.slo(req.environ, fake_start_response))
|
|
self.assertTrue(
|
|
resp.startswith(b'X-Static-Large-Object is a reserved header'))
|
|
|
|
def test_slo_PUT_env_override(self):
|
|
path = '/v1/a/c/o'
|
|
body = b'manifest body not checked when override flag set'
|
|
resp_status = []
|
|
|
|
def start_response(status, headers, *args):
|
|
resp_status.append(status)
|
|
|
|
req = Request.blank(
|
|
path, headers={'x-static-large-object': "true"},
|
|
environ={'REQUEST_METHOD': 'PUT', 'swift.slo_override': True},
|
|
body=body)
|
|
self.app.register('PUT', path, swob.HTTPCreated, {})
|
|
resp_iter = self.slo(req.environ, start_response)
|
|
self.assertEqual(b'', b''.join(resp_iter))
|
|
self.assertEqual(self.app.calls, [('PUT', path)])
|
|
self.assertEqual(body, self.app.uploaded[path][1])
|
|
self.assertEqual(resp_status[0], '201 Created')
|
|
|
|
def _put_bogus_slo(self, manifest_text,
|
|
manifest_path='/v1/a/c/the-manifest'):
|
|
with self.assertRaises(HTTPException) as catcher:
|
|
slo.parse_and_validate_input(manifest_text, manifest_path)
|
|
self.assertEqual(400, catcher.exception.status_int)
|
|
return catcher.exception.body.decode('utf-8')
|
|
|
|
def _put_slo(self, manifest_text, manifest_path='/v1/a/c/the-manifest'):
|
|
return slo.parse_and_validate_input(manifest_text, manifest_path)
|
|
|
|
def test_bogus_input(self):
|
|
self.assertEqual('Manifest must be valid JSON.\n',
|
|
self._put_bogus_slo('some non json'))
|
|
|
|
self.assertEqual('Manifest must be a list.\n',
|
|
self._put_bogus_slo('{}'))
|
|
|
|
self.assertEqual('Index 0: not a JSON object\n',
|
|
self._put_bogus_slo('["zombocom"]'))
|
|
|
|
def test_bogus_input_bad_keys(self):
|
|
self.assertEqual(
|
|
"Index 0: extraneous keys \"baz\", \"foo\"\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100,
|
|
'foo': 'bar', 'baz': 'quux'}])))
|
|
|
|
# This also catches typos
|
|
self.assertEqual(
|
|
'Index 0: extraneous keys "egat"\n',
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'egat': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}])))
|
|
self.assertEqual(
|
|
'Index 0: extraneous keys "siez_bytes"\n',
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'etagoftheobjectsegment',
|
|
'siez_bytes': 100}])))
|
|
|
|
def test_bogus_input_ranges(self):
|
|
self.assertEqual(
|
|
"Index 0: invalid range\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'blah',
|
|
'size_bytes': 100, 'range': 'non-range value'}])))
|
|
|
|
self.assertEqual(
|
|
"Index 0: multiple ranges (only one allowed)\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'blah',
|
|
'size_bytes': 100, 'range': '1-20,30-40'}])))
|
|
|
|
def test_bogus_input_unsatisfiable_range(self):
|
|
self.assertEqual(
|
|
"Index 0: unsatisfiable range\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'blah',
|
|
'size_bytes': 100, 'range': '8888-9999'}])))
|
|
|
|
# since size is optional, we have to be able to defer this check
|
|
segs = self._put_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'blah',
|
|
'size_bytes': None, 'range': '8888-9999'}]))
|
|
self.assertEqual(1, len(segs))
|
|
|
|
def test_bogus_input_path(self):
|
|
self.assertEqual(
|
|
"Index 0: path does not refer to an object. Path must be of the "
|
|
"form /container/object.\n"
|
|
"Index 1: path does not refer to an object. Path must be of the "
|
|
"form /container/object.\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont', 'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/c-trailing-slash/', 'etag': 'e',
|
|
'size_bytes': 100},
|
|
{'path': '/con/obj', 'etag': 'e',
|
|
'size_bytes': 100},
|
|
{'path': '/con/obj-trailing-slash/', 'etag': 'e',
|
|
'size_bytes': 100},
|
|
{'path': '/con/obj/with/slashes', 'etag': 'e',
|
|
'size_bytes': 100}])))
|
|
|
|
def test_bogus_input_multiple(self):
|
|
self.assertEqual(
|
|
"Index 0: invalid range\nIndex 1: not a JSON object\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100, 'range': 'non-range value'},
|
|
None])))
|
|
|
|
def test_bogus_input_size_bytes(self):
|
|
self.assertEqual(
|
|
"Index 0: invalid size_bytes\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'blah', 'size_bytes': "fht"},
|
|
{'path': '/cont/object', 'etag': 'blah', 'size_bytes': None},
|
|
{'path': '/cont/object', 'etag': 'blah', 'size_bytes': 100}],
|
|
)))
|
|
|
|
self.assertEqual(
|
|
"Index 0: invalid size_bytes\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'blah', 'size_bytes': []}],
|
|
)))
|
|
|
|
def test_bogus_input_self_referential(self):
|
|
self.assertEqual(
|
|
"Index 0: manifest must not include itself as a segment\n",
|
|
self._put_bogus_slo(json.dumps(
|
|
[{'path': '/c/the-manifest', 'etag': 'gate',
|
|
'size_bytes': 100, 'range': 'non-range value'}])))
|
|
|
|
def test_bogus_input_self_referential_non_ascii(self):
|
|
self.assertEqual(
|
|
"Index 0: manifest must not include itself as a segment\n",
|
|
self._put_bogus_slo(
|
|
json.dumps([{'path': u'/c/あ_1',
|
|
'etag': 'a', 'size_bytes': 1}]),
|
|
manifest_path=quote(u'/v1/a/c/あ_1')))
|
|
|
|
def test_bogus_input_self_referential_last_segment(self):
|
|
test_json_data = json.dumps([
|
|
{'path': '/c/seg_1', 'etag': 'a', 'size_bytes': 1},
|
|
{'path': '/c/seg_2', 'etag': 'a', 'size_bytes': 1},
|
|
{'path': '/c/seg_3', 'etag': 'a', 'size_bytes': 1},
|
|
{'path': '/c/the-manifest', 'etag': 'a', 'size_bytes': 1},
|
|
]).encode('ascii')
|
|
self.assertEqual(
|
|
"Index 3: manifest must not include itself as a segment\n",
|
|
self._put_bogus_slo(
|
|
test_json_data,
|
|
manifest_path=quote('/v1/a/c/the-manifest')))
|
|
|
|
def test_bogus_input_undersize_segment(self):
|
|
self.assertEqual(
|
|
"Index 1: too small; each segment "
|
|
"must be at least 1 byte.\n"
|
|
"Index 2: too small; each segment "
|
|
"must be at least 1 byte.\n",
|
|
self._put_bogus_slo(
|
|
json.dumps([
|
|
{'path': u'/c/s1', 'etag': 'a', 'size_bytes': 1},
|
|
{'path': u'/c/s2', 'etag': 'b', 'size_bytes': 0},
|
|
{'path': u'/c/s3', 'etag': 'c', 'size_bytes': 0},
|
|
# No error for this one since size_bytes is unspecified
|
|
{'path': u'/c/s4', 'etag': 'd', 'size_bytes': None},
|
|
{'path': u'/c/s5', 'etag': 'e', 'size_bytes': 1000}])))
|
|
|
|
def test_valid_input(self):
|
|
data = json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}])
|
|
self.assertEqual(
|
|
'/cont/object',
|
|
slo.parse_and_validate_input(data, '/v1/a/cont/man')[0]['path'])
|
|
|
|
data = json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100, 'range': '0-40'}])
|
|
parsed = slo.parse_and_validate_input(data, '/v1/a/cont/man')
|
|
self.assertEqual('/cont/object', parsed[0]['path'])
|
|
self.assertEqual([(0, 40)], parsed[0]['range'].ranges)
|
|
|
|
data = json.dumps(
|
|
[{'path': '/cont/object', 'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': None, 'range': '0-40'}])
|
|
parsed = slo.parse_and_validate_input(data, '/v1/a/cont/man')
|
|
self.assertEqual('/cont/object', parsed[0]['path'])
|
|
self.assertIsNone(parsed[0]['size_bytes'])
|
|
self.assertEqual([(0, 40)], parsed[0]['range'].ranges)
|
|
|
|
def test_container_listing(self):
|
|
listing_json = json.dumps([{
|
|
"bytes": 104857600,
|
|
"content_type": "application/x-troff-me",
|
|
"hash": "8de7b0b1551660da51d8d96a53b85531; this=that;"
|
|
"slo_etag=dc9947c2b53a3f55fe20c1394268e216",
|
|
"last_modified": "2018-07-12T03:14:39.532020",
|
|
"name": "test.me"
|
|
}]).encode('ascii')
|
|
self.app.register(
|
|
'GET', '/v1/a/c',
|
|
swob.HTTPOk,
|
|
{'Content-Type': 'application/json',
|
|
'Content-Length': len(listing_json)},
|
|
listing_json)
|
|
req = Request.blank('/v1/a/c', method='GET')
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(json.loads(body), [{
|
|
"slo_etag": '"dc9947c2b53a3f55fe20c1394268e216"',
|
|
"hash": "8de7b0b1551660da51d8d96a53b85531; this=that",
|
|
"name": "test.me",
|
|
"bytes": 104857600,
|
|
"last_modified": "2018-07-12T03:14:39.532020",
|
|
"content_type": "application/x-troff-me",
|
|
}])
|
|
|
|
|
|
class TestSloPutManifest(SloTestCase):
|
|
|
|
def setUp(self):
|
|
super(TestSloPutManifest, self).setUp()
|
|
|
|
self.app.register(
|
|
'GET', '/', swob.HTTPOk, {}, b'passed')
|
|
self.app.register(
|
|
'PUT', '/', swob.HTTPOk, {}, b'passed')
|
|
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/cont/missing-object',
|
|
swob.HTTPNotFound, {}, None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/cont/object',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '100', 'Etag': 'etagoftheobjectsegment'},
|
|
None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/cont/object2',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '100', 'Etag': 'etagoftheobjectsegment'},
|
|
None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/cont/object\xe2\x99\xa1',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '100', 'Etag': 'etagoftheobjectsegment'},
|
|
None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/cont/small_object',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '10', 'Etag': 'etagoftheobjectsegment'},
|
|
None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/cont/empty_object',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '0', 'Etag': 'etagoftheobjectsegment'},
|
|
None)
|
|
self.app.register(
|
|
'HEAD', u'/v1/AUTH_test/cont/あ_1',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '1', 'Etag': 'a'},
|
|
None)
|
|
self.app.register(
|
|
'PUT', '/v1/AUTH_test/c/man', swob.HTTPCreated,
|
|
{'Last-Modified': 'Fri, 01 Feb 2012 20:38:36 GMT'}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/c/man', swob.HTTPNoContent, {}, None)
|
|
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/checktest/a_1',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '1', 'Etag': 'a'},
|
|
None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/checktest/badreq',
|
|
swob.HTTPBadRequest, {}, None)
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/checktest/b_2',
|
|
swob.HTTPOk,
|
|
{'Content-Length': '2', 'Etag': 'b',
|
|
'Last-Modified': 'Fri, 01 Feb 2012 20:38:36 GMT'},
|
|
None)
|
|
|
|
_manifest_json = json.dumps(
|
|
[{'name': '/checktest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'}]).encode('ascii')
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/checktest/slob',
|
|
swob.HTTPOk,
|
|
{'X-Static-Large-Object': 'true', 'Etag': 'slob-etag',
|
|
'Content-Type': 'cat/picture',
|
|
'Content-Length': len(_manifest_json)},
|
|
_manifest_json)
|
|
|
|
self.app.register(
|
|
'PUT', '/v1/AUTH_test/checktest/man_3', swob.HTTPCreated, {}, None)
|
|
|
|
def test_put_manifest_too_quick_fail(self):
|
|
req = Request.blank('/v1/a/c/o?multipart-manifest=put', method='PUT')
|
|
req.content_length = self.slo.max_manifest_size + 1
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '413 Request Entity Too Large')
|
|
|
|
with patch.object(self.slo, 'max_manifest_segments', 0):
|
|
req = Request.blank('/v1/a/c/o?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '413 Request Entity Too Large')
|
|
|
|
req = Request.blank('/v1/a/c/o?multipart-manifest=put', method='PUT',
|
|
headers={'X-Copy-From': 'lala'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '405 Method Not Allowed')
|
|
|
|
# we already validated that there are enough path segments in __call__
|
|
for path in ('/', '/v1/', '/v1/a/', '/v1/a/c/'):
|
|
req = Request.blank(
|
|
path + '?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=test_json_data)
|
|
with self.assertRaises(ValueError):
|
|
list(self.slo.handle_multipart_put(req, fake_start_response))
|
|
|
|
req = Request.blank(
|
|
path.rstrip('/') + '?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=test_json_data)
|
|
with self.assertRaises(ValueError):
|
|
list(self.slo.handle_multipart_put(req, fake_start_response))
|
|
|
|
def test_handle_multipart_put_success(self):
|
|
override_header = 'X-Object-Sysmeta-Container-Update-Override-Etag'
|
|
headers = {
|
|
'Accept': 'test',
|
|
override_header: '; params=are important',
|
|
}
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers=headers,
|
|
body=test_json_data)
|
|
for h in ('X-Static-Large-Object', 'X-Object-Sysmeta-Slo-Etag',
|
|
'X-Object-Sysmeta-Slo-Size'):
|
|
# Sanity
|
|
self.assertNotIn(h, req.headers)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
gen_etag = '"' + md5hex('etagoftheobjectsegment') + '"'
|
|
self.assertIn(('Etag', gen_etag), headers)
|
|
self.assertIn('X-Static-Large-Object', req.headers)
|
|
self.assertEqual(req.headers['X-Static-Large-Object'], 'True')
|
|
self.assertIn('Etag', req.headers)
|
|
self.assertIn('X-Object-Sysmeta-Slo-Etag', req.headers)
|
|
self.assertIn('X-Object-Sysmeta-Container-Update-Override-Etag',
|
|
req.headers)
|
|
self.assertEqual(req.headers['X-Object-Sysmeta-Slo-Etag'],
|
|
gen_etag.strip('"'))
|
|
self.assertEqual(
|
|
req.headers['X-Object-Sysmeta-Container-Update-Override-Etag'],
|
|
'%s; params=are important; slo_etag=%s' % (
|
|
req.headers['Etag'], gen_etag.strip('"')))
|
|
self.assertIn('X-Object-Sysmeta-Slo-Size', req.headers)
|
|
self.assertEqual(req.headers['X-Object-Sysmeta-Slo-Size'], '100')
|
|
self.assertIn('Content-Type', req.headers)
|
|
self.assertTrue(
|
|
req.headers['Content-Type'].endswith(';swift_bytes=100'),
|
|
'Content-Type %r does not end with swift_bytes=100' %
|
|
req.headers['Content-Type'])
|
|
|
|
@patch('swift.common.middleware.slo.time')
|
|
def test_handle_multipart_put_fast_heartbeat(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
1, # first segment's fast
|
|
2, # second segment's also fast!
|
|
]
|
|
test_json_data = json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put&heartbeat=on',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers={'Accept': 'test'},
|
|
body=test_json_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('202 Accepted', status)
|
|
headers_found = [h.lower() for h, v in headers]
|
|
self.assertNotIn('etag', headers_found)
|
|
gen_etag = '"' + md5hex('etagoftheobjectsegment' * 2) + '"'
|
|
self.assertTrue(body.startswith(b' \r\n\r\n'),
|
|
'Expected body to start with single space and two '
|
|
'blank lines; got %r' % body)
|
|
self.assertIn(b'\nResponse Status: 201 Created\n', body)
|
|
self.assertIn(b'\nResponse Body: \n', body)
|
|
self.assertIn(('\nEtag: %s\n' % gen_etag).encode('ascii'), body)
|
|
self.assertIn(b'\nLast Modified: Fri, 01 Feb 2012 20:38:36 GMT\n',
|
|
body)
|
|
|
|
@patch('swift.common.middleware.slo.time')
|
|
def test_handle_multipart_long_running_put_success(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
1, # first segment's fast
|
|
20, # second segment's slow
|
|
]
|
|
test_json_data = json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put&heartbeat=on',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers={'Accept': 'test'},
|
|
body=test_json_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('202 Accepted', status)
|
|
headers_found = [h.lower() for h, v in headers]
|
|
self.assertNotIn('etag', headers_found)
|
|
gen_etag = '"' + md5hex('etagoftheobjectsegment' * 2) + '"'
|
|
self.assertTrue(body.startswith(b' \r\n\r\n'),
|
|
'Expected body to start with two spaces and two '
|
|
'blank lines; got %r' % body)
|
|
self.assertIn(b'\nResponse Status: 201 Created\n', body)
|
|
self.assertIn(b'\nResponse Body: \n', body)
|
|
self.assertIn(('\nEtag: %s\n' % gen_etag).encode('ascii'), body)
|
|
self.assertIn(b'\nLast Modified: Fri, 01 Feb 2012 20:38:36 GMT\n',
|
|
body)
|
|
|
|
@patch('swift.common.middleware.slo.time')
|
|
def test_handle_multipart_long_running_put_success_json(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
11, # first segment's slow
|
|
22, # second segment's also slow
|
|
]
|
|
test_json_data = json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put&heartbeat=on',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'Accept': 'application/json'},
|
|
body=test_json_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('202 Accepted', status)
|
|
headers_found = [h.lower() for h, v in headers]
|
|
self.assertNotIn('etag', headers_found)
|
|
gen_etag = '"' + md5hex('etagoftheobjectsegment' * 2) + '"'
|
|
self.assertTrue(body.startswith(b' \r\n\r\n'),
|
|
'Expected body to start with three spaces and two '
|
|
'blank lines; got %r' % body)
|
|
body = json.loads(body)
|
|
self.assertEqual(body['Response Status'], '201 Created')
|
|
self.assertEqual(body['Response Body'], '')
|
|
self.assertEqual(body['Etag'], gen_etag)
|
|
self.assertEqual(body['Last Modified'],
|
|
'Fri, 01 Feb 2012 20:38:36 GMT')
|
|
|
|
@patch('swift.common.middleware.slo.time')
|
|
def test_handle_multipart_long_running_put_failure(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
1, # first segment's fast
|
|
20, # second segment's slow
|
|
]
|
|
test_json_data = json.dumps([{'path': u'/cont/missing-object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 99}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put&heartbeat=on',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers={'Accept': 'test'},
|
|
body=test_json_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('202 Accepted', status)
|
|
headers_found = [h.lower() for h, v in headers]
|
|
self.assertNotIn('etag', headers_found)
|
|
body = body.split(b'\n')
|
|
self.assertEqual([b' \r', b'\r'], body[:2],
|
|
'Expected body to start with two spaces and two '
|
|
'blank lines; got %r' % b'\n'.join(body))
|
|
self.assertIn(b'Response Status: 400 Bad Request', body[2:5])
|
|
self.assertIn(b'Response Body: Bad Request', body)
|
|
self.assertIn(b'The server could not comply with the request since it '
|
|
b'is either malformed or otherwise incorrect.', body)
|
|
self.assertFalse(any(line.startswith(b'Etag: ') for line in body))
|
|
self.assertFalse(any(line.startswith(b'Last Modified: ')
|
|
for line in body))
|
|
self.assertEqual(body[-4], b'Errors:')
|
|
self.assertEqual(sorted(body[-3:-1]), [
|
|
b'/cont/missing-object, 404 Not Found',
|
|
b'/cont/object, Size Mismatch',
|
|
])
|
|
self.assertEqual(body[-1], b'')
|
|
|
|
@patch('swift.common.middleware.slo.time')
|
|
def test_handle_multipart_long_running_put_failure_json(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
11, # first segment's slow
|
|
22, # second segment's also slow
|
|
]
|
|
test_json_data = json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 99},
|
|
{'path': '/cont/object',
|
|
'etag': 'some other etag',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put&heartbeat=on',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'Accept': 'application/json'},
|
|
body=test_json_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('202 Accepted', status)
|
|
headers_found = [h.lower() for h, v in headers]
|
|
self.assertNotIn('etag', headers_found)
|
|
self.assertTrue(body.startswith(b' \r\n\r\n'),
|
|
'Expected body to start with three spaces and two '
|
|
'blank lines; got %r' % body)
|
|
body = json.loads(body)
|
|
self.assertEqual(body['Response Status'], '400 Bad Request')
|
|
self.assertEqual(body['Response Body'], 'Bad Request\nThe server '
|
|
'could not comply with the request since it is '
|
|
'either malformed or otherwise incorrect.')
|
|
self.assertNotIn('Etag', body)
|
|
self.assertNotIn('Last Modified', body)
|
|
self.assertEqual(sorted(body['Errors']), [
|
|
['/cont/object', 'Etag Mismatch'],
|
|
[quote(u'/cont/object\u2661'.encode('utf8')).decode('ascii'),
|
|
'Size Mismatch'],
|
|
])
|
|
|
|
@patch('swift.common.middleware.slo.time')
|
|
def test_handle_multipart_long_running_put_bad_etag_json(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
11, # first segment's slow
|
|
22, # second segment's also slow
|
|
]
|
|
test_json_data = json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put&heartbeat=on',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'Accept': 'application/json', 'ETag': 'bad etag'},
|
|
body=test_json_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('202 Accepted', status)
|
|
headers_found = [h.lower() for h, v in headers]
|
|
self.assertNotIn('etag', headers_found)
|
|
self.assertTrue(body.startswith(b' \r\n\r\n'),
|
|
'Expected body to start with three spaces and two '
|
|
'blank lines; got %r' % body)
|
|
body = json.loads(body)
|
|
self.assertEqual(body['Response Status'], '422 Unprocessable Entity')
|
|
self.assertEqual('Unprocessable Entity\nUnable to process the '
|
|
'contained instructions', body['Response Body'])
|
|
self.assertNotIn('Etag', body)
|
|
self.assertNotIn('Last Modified', body)
|
|
self.assertEqual(body['Errors'], [])
|
|
|
|
def test_manifest_put_no_etag_success(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
resp = req.get_response(self.slo)
|
|
self.assertEqual(resp.status_int, 201)
|
|
|
|
def test_manifest_put_with_etag_success(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
req.headers['Etag'] = md5hex('etagoftheobjectsegment')
|
|
resp = req.get_response(self.slo)
|
|
self.assertEqual(resp.status_int, 201)
|
|
|
|
def test_manifest_put_with_etag_with_quotes_success(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
req.headers['Etag'] = '"%s"' % md5hex('etagoftheobjectsegment')
|
|
resp = req.get_response(self.slo)
|
|
self.assertEqual(resp.status_int, 201)
|
|
|
|
def test_manifest_put_bad_etag_fail(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
req.headers['Etag'] = md5hex('NOTetagoftheobjectsegment')
|
|
resp = req.get_response(self.slo)
|
|
self.assertEqual(resp.status_int, 422)
|
|
|
|
def test_handle_multipart_put_disallow_empty_first_segment(self):
|
|
test_json_data = json.dumps([{'path': '/cont/small_object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 0},
|
|
{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank('/v1/a/c/o?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '400 Bad Request')
|
|
|
|
def test_handle_multipart_put_allow_empty_last_segment(self):
|
|
test_json_data = json.dumps([{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'path': '/cont/empty_object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 0}]).encode('ascii')
|
|
req = Request.blank('/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '201 Created')
|
|
|
|
def test_handle_multipart_put_invalid_data(self):
|
|
def do_test(bad_data):
|
|
test_json_data = json.dumps([{'path': '/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100},
|
|
{'data': bad_data}]).encode('ascii')
|
|
req = Request.blank('/v1/a/c/o', body=test_json_data)
|
|
with self.assertRaises(HTTPException) as catcher:
|
|
self.slo.handle_multipart_put(req, fake_start_response)
|
|
self.assertEqual(catcher.exception.status_int, 400)
|
|
|
|
do_test('invalid') # insufficient padding
|
|
do_test(12345)
|
|
do_test(0)
|
|
do_test(True)
|
|
do_test(False)
|
|
do_test(None)
|
|
do_test({})
|
|
do_test([])
|
|
# Empties are no good, either
|
|
do_test('')
|
|
do_test('====')
|
|
|
|
def test_handle_multipart_put_success_unicode(self):
|
|
test_json_data = json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers={'Accept': 'test'},
|
|
body=test_json_data)
|
|
self.assertNotIn('X-Static-Large-Object', req.headers)
|
|
self.call_slo(req)
|
|
self.assertIn('X-Static-Large-Object', req.headers)
|
|
self.assertEqual(req.environ['PATH_INFO'], '/v1/AUTH_test/c/man')
|
|
self.assertIn(('HEAD', '/v1/AUTH_test/cont/object\xe2\x99\xa1'),
|
|
self.app.calls)
|
|
|
|
def test_handle_multipart_put_no_xml(self):
|
|
req = Request.blank(
|
|
'/test_good/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers={'Accept': 'test'},
|
|
body=test_xml_data)
|
|
no_xml = list(self.slo(req.environ, fake_start_response))
|
|
self.assertEqual(no_xml, [b'Manifest must be valid JSON.\n'])
|
|
|
|
def test_handle_multipart_put_bad_data(self):
|
|
bad_data = json.dumps([{'path': '/cont/object',
|
|
'etag': 'etagoftheobj',
|
|
'size_bytes': 'lala'}])
|
|
req = Request.blank(
|
|
'/test_good/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=bad_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '400 Bad Request')
|
|
self.assertIn(b'invalid size_bytes', body)
|
|
|
|
for bad_data in [
|
|
json.dumps([{'path': '/cont', 'etag': 'etagoftheobj',
|
|
'size_bytes': 100}]),
|
|
json.dumps('asdf'), json.dumps(None), json.dumps(5),
|
|
'not json', '1234', '', json.dumps({'path': None}),
|
|
json.dumps([{'path': '/cont/object', 'etag': None,
|
|
'size_bytes': 12}]),
|
|
json.dumps([{'path': '/cont/object', 'etag': 'asdf',
|
|
'size_bytes': 'sd'}]),
|
|
json.dumps([{'path': 12, 'etag': 'etagoftheobj',
|
|
'size_bytes': 100}]),
|
|
json.dumps([{'path': u'/cont/object\u2661',
|
|
'etag': 'etagoftheobj', 'size_bytes': 100}]),
|
|
json.dumps([{'path': 12, 'size_bytes': 100}]),
|
|
json.dumps([{'path': 12, 'size_bytes': 100}]),
|
|
json.dumps([{'path': '/c/o', 'etag': 123, 'size_bytes': 100}]),
|
|
json.dumps([{'path': None, 'etag': 'etagoftheobj',
|
|
'size_bytes': 100}])]:
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=bad_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '400 Bad Request')
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=None)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '411 Length Required')
|
|
|
|
def test_handle_multipart_put_check_data(self):
|
|
good_data = json.dumps(
|
|
[{'path': '/checktest/a_1', 'etag': 'a', 'size_bytes': '1'},
|
|
{'path': '/checktest/b_2', 'etag': 'b', 'size_bytes': '2'}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=good_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.app.call_count, 3)
|
|
|
|
# go behind SLO's back and see what actually got stored
|
|
req = Request.blank(
|
|
# this string looks weird, but it's just an artifact
|
|
# of FakeSwift
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_app(req)
|
|
headers = dict(headers)
|
|
manifest_data = json.loads(body)
|
|
self.assertTrue(headers['Content-Type'].endswith(';swift_bytes=3'))
|
|
self.assertEqual(len(manifest_data), 2)
|
|
self.assertEqual(manifest_data[0]['hash'], 'a')
|
|
self.assertEqual(manifest_data[0]['bytes'], 1)
|
|
self.assertTrue(
|
|
not manifest_data[0]['last_modified'].startswith('2012'))
|
|
self.assertTrue(manifest_data[1]['last_modified'].startswith('2012'))
|
|
|
|
def test_handle_multipart_put_check_data_bad(self):
|
|
bad_data = json.dumps(
|
|
[{'path': '/checktest/a_1', 'etag': 'a', 'size_bytes': '2'},
|
|
{'path': '/checktest/badreq', 'etag': 'a', 'size_bytes': '1'},
|
|
{'path': '/checktest/b_2', 'etag': 'not-b', 'size_bytes': '2'},
|
|
{'path': '/checktest/slob', 'etag': 'not-slob',
|
|
'size_bytes': '12345'}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
headers={'Accept': 'application/json'},
|
|
body=bad_data)
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.app.call_count, 5)
|
|
errors = json.loads(body)['Errors']
|
|
|
|
self.assertEqual([
|
|
[u'/checktest/a_1', u'Size Mismatch'],
|
|
[u'/checktest/b_2', u'Etag Mismatch'],
|
|
[u'/checktest/badreq', u'400 Bad Request'],
|
|
[u'/checktest/slob', u'Etag Mismatch'],
|
|
[u'/checktest/slob', u'Size Mismatch'],
|
|
], sorted(errors))
|
|
|
|
def test_handle_multipart_put_skip_size_check(self):
|
|
good_data = json.dumps([
|
|
# Explicit None will skip it
|
|
{'path': '/checktest/a_1', 'etag': 'a', 'size_bytes': None},
|
|
# ...as will omitting it entirely
|
|
{'path': '/checktest/b_2', 'etag': 'b'}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=good_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.app.call_count, 3)
|
|
|
|
# Check that we still populated the manifest properly from our HEADs
|
|
req = Request.blank(
|
|
# this string looks weird, but it's just an artifact
|
|
# of FakeSwift
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_app(req)
|
|
manifest_data = json.loads(body)
|
|
self.assertEqual(1, manifest_data[0]['bytes'])
|
|
self.assertEqual(2, manifest_data[1]['bytes'])
|
|
|
|
def test_handle_multipart_put_skip_size_check_still_uses_min_size(self):
|
|
test_json_data = json.dumps([{'path': '/cont/empty_object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': None},
|
|
{'path': '/cont/small_object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank('/v1/AUTH_test/c/o?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '400 Bad Request')
|
|
self.assertIn(b'Too small; each segment must be at least 1 byte', body)
|
|
|
|
def test_handle_multipart_put_skip_size_check_no_early_bailout(self):
|
|
# The first is too small (it's 0 bytes), and
|
|
# the second has a bad etag. Make sure both errors show up in
|
|
# the response.
|
|
test_json_data = json.dumps([{'path': '/cont/empty_object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': None},
|
|
{'path': '/cont/object2',
|
|
'etag': 'wrong wrong wrong',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank('/v1/AUTH_test/c/o?multipart-manifest=put',
|
|
method='PUT', body=test_json_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '400 Bad Request')
|
|
self.assertIn(b'at least 1 byte', body)
|
|
self.assertIn(b'Etag Mismatch', body)
|
|
|
|
def test_handle_multipart_put_skip_etag_check(self):
|
|
good_data = json.dumps([
|
|
# Explicit None will skip it
|
|
{'path': '/checktest/a_1', 'etag': None, 'size_bytes': 1},
|
|
# ...as will omitting it entirely
|
|
{'path': '/checktest/b_2', 'size_bytes': 2}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=good_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.app.call_count, 3)
|
|
|
|
# Check that we still populated the manifest properly from our HEADs
|
|
req = Request.blank(
|
|
# this string looks weird, but it's just an artifact
|
|
# of FakeSwift
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_app(req)
|
|
manifest_data = json.loads(body)
|
|
self.assertEqual('a', manifest_data[0]['hash'])
|
|
self.assertEqual('b', manifest_data[1]['hash'])
|
|
|
|
def test_handle_multipart_put_with_manipulator_callback(self):
|
|
def data_inserter(manifest):
|
|
for i in range(len(manifest), -1, -1):
|
|
manifest.insert(i, {'data': 'WA=='})
|
|
|
|
good_data = json.dumps([
|
|
{'path': '/checktest/a_1'},
|
|
{'path': '/checktest/b_2'}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT',
|
|
'swift.callback.slo_manifest_hook': data_inserter},
|
|
body=good_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.app.call_count, 3)
|
|
|
|
# Check that we still populated the manifest properly from our HEADs
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_app(req)
|
|
manifest_data = json.loads(body)
|
|
self.assertEqual([
|
|
{k: v for k, v in item.items()
|
|
if k in ('name', 'bytes', 'hash', 'data')}
|
|
for item in manifest_data
|
|
], [
|
|
{'data': 'WA=='},
|
|
{'name': '/checktest/a_1', 'bytes': 1, 'hash': 'a'},
|
|
{'data': 'WA=='},
|
|
{'name': '/checktest/b_2', 'bytes': 2, 'hash': 'b'},
|
|
{'data': 'WA=='},
|
|
])
|
|
|
|
def test_handle_multipart_put_with_validator_callback(self):
|
|
def complainer(manifest):
|
|
return [(item['name'], "Don't wanna") for item in manifest]
|
|
|
|
good_data = json.dumps([
|
|
{'path': '/checktest/a_1'},
|
|
{'path': '/checktest/b_2'}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT',
|
|
'swift.callback.slo_manifest_hook': complainer},
|
|
body=good_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.app.call_count, 2)
|
|
self.assertEqual(status, '400 Bad Request')
|
|
body = body.split(b'\n')
|
|
self.assertIn(b"/checktest/a_1, Don't wanna", body)
|
|
self.assertIn(b"/checktest/b_2, Don't wanna", body)
|
|
|
|
def test_handle_unsatisfiable_ranges(self):
|
|
bad_data = json.dumps(
|
|
[{'path': '/checktest/a_1', 'etag': None,
|
|
'size_bytes': None, 'range': '1-'}])
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=bad_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual('400 Bad Request', status)
|
|
self.assertIn(b"Unsatisfiable Range", body)
|
|
|
|
def test_handle_multipart_put_success_conditional(self):
|
|
test_json_data = json.dumps([{'path': u'/cont/object',
|
|
'etag': 'etagoftheobjectsegment',
|
|
'size_bytes': 100}]).encode('ascii')
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/c/man?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, headers={'If-None-Match': '*'},
|
|
body=test_json_data)
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(('201 Created', b''), (status, body))
|
|
self.assertEqual([
|
|
('HEAD', '/v1/AUTH_test/cont/object'),
|
|
('PUT', '/v1/AUTH_test/c/man?multipart-manifest=put'),
|
|
], self.app.calls)
|
|
# HEAD shouldn't be conditional
|
|
self.assertNotIn('If-None-Match', self.app.headers[0])
|
|
# But the PUT should be
|
|
self.assertIn('If-None-Match', self.app.headers[1])
|
|
self.assertEqual('*', self.app.headers[1]['If-None-Match'])
|
|
|
|
def test_handle_single_ranges(self):
|
|
good_data = json.dumps(
|
|
[{'path': '/checktest/a_1', 'etag': None,
|
|
'size_bytes': None, 'range': '0-0'},
|
|
{'path': '/checktest/b_2', 'etag': None,
|
|
'size_bytes': 2, 'range': '-1'},
|
|
{'path': '/checktest/b_2', 'etag': None,
|
|
'size_bytes': 2, 'range': '0-0'},
|
|
{'path': '/checktest/a_1', 'etag': None,
|
|
'size_bytes': None},
|
|
{'path': '/cont/object', 'etag': None,
|
|
'size_bytes': None, 'range': '10-40'}])
|
|
override_header = 'X-Object-Sysmeta-Container-Update-Override-Etag'
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'PUT'}, body=good_data,
|
|
headers={override_header: 'my custom etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(('201 Created', b''), (status, body))
|
|
expected_etag = '"%s"' % md5hex(
|
|
'ab:1-1;b:0-0;aetagoftheobjectsegment:10-40;')
|
|
self.assertEqual(expected_etag, dict(headers)['Etag'])
|
|
self.assertEqual([
|
|
('HEAD', '/v1/AUTH_test/checktest/a_1'), # Only once!
|
|
('HEAD', '/v1/AUTH_test/checktest/b_2'), # Only once!
|
|
('HEAD', '/v1/AUTH_test/cont/object'),
|
|
], sorted(self.app.calls[:-1]))
|
|
self.assertEqual(
|
|
('PUT', '/v1/AUTH_test/checktest/man_3?multipart-manifest=put'),
|
|
self.app.calls[-1])
|
|
self.assertEqual(
|
|
'my custom etag; slo_etag=%s' % expected_etag.strip('"'),
|
|
self.app.headers[-1].get(override_header))
|
|
|
|
# Check that we still populated the manifest properly from our HEADs
|
|
req = Request.blank(
|
|
# this string looks weird, but it's just an artifact
|
|
# of FakeSwift
|
|
'/v1/AUTH_test/checktest/man_3?multipart-manifest=put',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_app(req)
|
|
manifest_data = json.loads(body)
|
|
self.assertEqual(len(manifest_data), 5)
|
|
|
|
self.assertEqual('a', manifest_data[0]['hash'])
|
|
self.assertNotIn('range', manifest_data[0])
|
|
|
|
self.assertEqual('b', manifest_data[1]['hash'])
|
|
self.assertEqual('1-1', manifest_data[1]['range'])
|
|
|
|
self.assertEqual('b', manifest_data[2]['hash'])
|
|
self.assertEqual('0-0', manifest_data[2]['range'])
|
|
|
|
self.assertEqual('a', manifest_data[3]['hash'])
|
|
self.assertNotIn('range', manifest_data[3])
|
|
|
|
self.assertEqual('etagoftheobjectsegment', manifest_data[4]['hash'])
|
|
self.assertEqual('10-40', manifest_data[4]['range'])
|
|
|
|
|
|
class TestSloDeleteManifest(SloTestCase):
|
|
|
|
def setUp(self):
|
|
super(TestSloDeleteManifest, self).setUp()
|
|
|
|
_submanifest_data = json.dumps(
|
|
[{'name': '/deltest/b_2', 'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/c_3', 'hash': 'b', 'bytes': '2'}])
|
|
_submanifest_data = _submanifest_data.encode('ascii')
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/man_404',
|
|
swob.HTTPNotFound, {}, None)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/man',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/gone', 'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/b_2', 'hash': 'b', 'bytes': '2'}]).
|
|
encode('ascii'))
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/man',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/man-all-there',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/b_2', 'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/c_3', 'hash': 'b', 'bytes': '2'}]).
|
|
encode('ascii'))
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test-un\xc3\xafcode/deltest/man-all-there',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/b_2', 'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/c_3', 'hash': 'b', 'bytes': '2'}]).
|
|
encode('ascii'))
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/man-all-there',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/gone',
|
|
swob.HTTPNotFound, {}, None)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/a_1',
|
|
swob.HTTPOk, {'Content-Length': '1'}, 'a')
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/a_1',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/b_2',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/c_3',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/d_3',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test-un\xc3\xafcode/deltest/man-all-there',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test-un\xc3\xafcode/deltest/b_2',
|
|
swob.HTTPNoContent, {}, None)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test-un\xc3\xafcode/deltest/c_3',
|
|
swob.HTTPNoContent, {}, None)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/manifest-with-submanifest',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/a_1',
|
|
'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/submanifest', 'sub_slo': True,
|
|
'hash': 'submanifest-etag',
|
|
'bytes': len(_submanifest_data)},
|
|
{'name': '/deltest/d_3',
|
|
'hash': 'd', 'bytes': '3'}]).encode('ascii'))
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/manifest-with-submanifest',
|
|
swob.HTTPNoContent, {}, None)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/submanifest',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
_submanifest_data)
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/submanifest',
|
|
swob.HTTPNoContent, {}, None)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/manifest-missing-submanifest',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/a_1', 'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/missing-submanifest',
|
|
'hash': 'a', 'bytes': '2', 'sub_slo': True},
|
|
{'name': '/deltest/d_3', 'hash': 'd', 'bytes': '3'}]).
|
|
encode('ascii'))
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/manifest-missing-submanifest',
|
|
swob.HTTPNoContent, {}, None)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/missing-submanifest',
|
|
swob.HTTPNotFound, {}, None)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/manifest-badjson',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
b"[not {json (at ++++all")
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/manifest-with-unauth-segment',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/a_1', 'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest-unauth/q_17',
|
|
'hash': '11', 'bytes': '17'}]).encode('ascii'))
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest/manifest-with-unauth-segment',
|
|
swob.HTTPNoContent, {}, None)
|
|
|
|
self.app.register(
|
|
'DELETE', '/v1/AUTH_test/deltest-unauth/q_17',
|
|
swob.HTTPUnauthorized, {}, None)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/manifest-with-too-many-segs',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/deltest/a_1',
|
|
'hash': 'a', 'bytes': '1'},
|
|
{'name': '/deltest/multi-submanifest', 'sub_slo': True,
|
|
'hash': 'submanifest-etag',
|
|
'bytes': len(_submanifest_data)},
|
|
{'name': '/deltest/b_2',
|
|
'hash': 'b', 'bytes': '1'},
|
|
{'name': '/deltest/c_3',
|
|
'hash': 'c', 'bytes': '1'},
|
|
{'name': '/deltest/d_4',
|
|
'hash': 'b', 'bytes': '1'},
|
|
{'name': '/deltest/e_5',
|
|
'hash': 'c', 'bytes': '1'},
|
|
{'name': '/deltest/f_6',
|
|
'hash': 'b', 'bytes': '1'},
|
|
{'name': '/deltest/g_8',
|
|
'hash': 'c', 'bytes': '1'},
|
|
{'name': '/deltest/g_8',
|
|
'hash': 'c', 'bytes': '1'},
|
|
{'name': '/deltest/h_9',
|
|
'hash': 'd', 'bytes': '3'}]))
|
|
|
|
def test_handle_multipart_delete_man(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/man',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
self.slo(req.environ, fake_start_response)
|
|
self.assertEqual(self.app.call_count, 1)
|
|
|
|
def test_handle_multipart_delete_bad_utf8(self):
|
|
req = Request.blank(
|
|
b'/v1/AUTH_test/deltest/man\xff\xfe?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '200 OK')
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(resp_data['Response Status'],
|
|
'412 Precondition Failed')
|
|
|
|
def test_handle_multipart_delete_whole_404(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/man_404?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET',
|
|
'/v1/AUTH_test/deltest/man_404?multipart-manifest=get')])
|
|
self.assertEqual(resp_data['Response Status'], '200 OK')
|
|
self.assertEqual(resp_data['Response Body'], '')
|
|
self.assertEqual(resp_data['Number Deleted'], 0)
|
|
self.assertEqual(resp_data['Number Not Found'], 1)
|
|
self.assertEqual(resp_data['Errors'], [])
|
|
|
|
def test_handle_multipart_delete_segment_404(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/man?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(
|
|
set(self.app.calls),
|
|
set([('GET',
|
|
'/v1/AUTH_test/deltest/man?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/gone'),
|
|
('DELETE', '/v1/AUTH_test/deltest/b_2'),
|
|
('DELETE', '/v1/AUTH_test/deltest/man')]))
|
|
self.assertEqual(resp_data['Response Status'], '200 OK')
|
|
self.assertEqual(resp_data['Number Deleted'], 2)
|
|
self.assertEqual(resp_data['Number Not Found'], 1)
|
|
|
|
def test_handle_multipart_delete_whole(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/man-all-there?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
self.call_slo(req)
|
|
self.assertEqual(set(self.app.calls), set([
|
|
('GET',
|
|
'/v1/AUTH_test/deltest/man-all-there?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/b_2'),
|
|
('DELETE', '/v1/AUTH_test/deltest/c_3'),
|
|
('DELETE', ('/v1/AUTH_test/deltest/man-all-there'))]))
|
|
|
|
def test_handle_multipart_delete_non_ascii(self):
|
|
if six.PY2:
|
|
acct = u'AUTH_test-un\u00efcode'.encode('utf-8')
|
|
else:
|
|
acct = str_to_wsgi(u'AUTH_test-un\u00efcode')
|
|
req = Request.blank(
|
|
'/v1/%s/deltest/man-all-there?multipart-manifest=delete' % acct,
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
status, _, body = self.call_slo(req)
|
|
self.assertEqual('200 OK', status)
|
|
lines = body.split(b'\n')
|
|
for l in lines:
|
|
parts = l.split(b':')
|
|
if len(parts) == 1:
|
|
continue
|
|
key, value = parts
|
|
if key == 'Response Status':
|
|
delete_status = int(value.split()[0])
|
|
self.assertEqual(200, delete_status)
|
|
|
|
self.assertEqual(set(self.app.calls), set([
|
|
('GET',
|
|
'/v1/%s/deltest/man-all-there?multipart-manifest=get' % acct),
|
|
('DELETE', '/v1/%s/deltest/b_2' % acct),
|
|
('DELETE', '/v1/%s/deltest/c_3' % acct),
|
|
('DELETE', ('/v1/%s/deltest/man-all-there' % acct))]))
|
|
|
|
def test_handle_multipart_delete_nested(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/manifest-with-submanifest?' +
|
|
'multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
|
self.call_slo(req)
|
|
self.assertEqual(
|
|
set(self.app.calls),
|
|
{('GET', '/v1/AUTH_test/deltest/' +
|
|
'manifest-with-submanifest?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/deltest/' +
|
|
'submanifest?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/a_1'),
|
|
('DELETE', '/v1/AUTH_test/deltest/b_2'),
|
|
('DELETE', '/v1/AUTH_test/deltest/c_3'),
|
|
('DELETE', '/v1/AUTH_test/deltest/submanifest'),
|
|
('DELETE', '/v1/AUTH_test/deltest/d_3'),
|
|
('DELETE', '/v1/AUTH_test/deltest/manifest-with-submanifest')})
|
|
|
|
def test_handle_multipart_delete_nested_too_many_segments(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/manifest-with-too-many-segs?' +
|
|
'multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
with patch.object(self.slo, 'max_manifest_segments', 1):
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '200 OK')
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(resp_data['Response Status'], '400 Bad Request')
|
|
self.assertEqual(resp_data['Response Body'],
|
|
'Too many buffered slo segments to delete.')
|
|
|
|
def test_handle_multipart_delete_nested_404(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/manifest-missing-submanifest' +
|
|
'?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(set(self.app.calls), {
|
|
('GET', '/v1/AUTH_test/deltest/' +
|
|
'manifest-missing-submanifest?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/a_1'),
|
|
('GET', '/v1/AUTH_test/deltest/' +
|
|
'missing-submanifest?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/d_3'),
|
|
('DELETE', '/v1/AUTH_test/deltest/manifest-missing-submanifest'),
|
|
})
|
|
self.assertEqual(resp_data['Response Status'], '200 OK')
|
|
self.assertEqual(resp_data['Response Body'], '')
|
|
self.assertEqual(resp_data['Number Deleted'], 3)
|
|
self.assertEqual(resp_data['Number Not Found'], 1)
|
|
self.assertEqual(resp_data['Errors'], [])
|
|
|
|
def test_handle_multipart_delete_nested_401(self):
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/submanifest',
|
|
swob.HTTPUnauthorized, {}, None)
|
|
|
|
req = Request.blank(
|
|
('/v1/AUTH_test/deltest/manifest-with-submanifest' +
|
|
'?multipart-manifest=delete'),
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '200 OK')
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(resp_data['Response Status'], '400 Bad Request')
|
|
self.assertEqual(resp_data['Errors'],
|
|
[['/deltest/submanifest', '401 Unauthorized']])
|
|
|
|
def test_handle_multipart_delete_nested_500(self):
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/deltest/submanifest',
|
|
swob.HTTPServerError, {}, None)
|
|
|
|
req = Request.blank(
|
|
('/v1/AUTH_test/deltest/manifest-with-submanifest' +
|
|
'?multipart-manifest=delete'),
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '200 OK')
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(resp_data['Response Status'], '400 Bad Request')
|
|
self.assertEqual(resp_data['Errors'],
|
|
[['/deltest/submanifest',
|
|
'Unable to load SLO manifest or segment.']])
|
|
|
|
def test_handle_multipart_delete_not_a_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/a_1?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/deltest/a_1?multipart-manifest=get')])
|
|
self.assertEqual(resp_data['Response Status'], '400 Bad Request')
|
|
self.assertEqual(resp_data['Response Body'], '')
|
|
self.assertEqual(resp_data['Number Deleted'], 0)
|
|
self.assertEqual(resp_data['Number Not Found'], 0)
|
|
self.assertEqual(resp_data['Errors'],
|
|
[['/deltest/a_1', 'Not an SLO manifest']])
|
|
|
|
def test_handle_multipart_delete_bad_json(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/manifest-badjson?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(self.app.calls,
|
|
[('GET', '/v1/AUTH_test/deltest/' +
|
|
'manifest-badjson?multipart-manifest=get')])
|
|
self.assertEqual(resp_data['Response Status'], '400 Bad Request')
|
|
self.assertEqual(resp_data['Response Body'], '')
|
|
self.assertEqual(resp_data['Number Deleted'], 0)
|
|
self.assertEqual(resp_data['Number Not Found'], 0)
|
|
self.assertEqual(resp_data['Errors'],
|
|
[['/deltest/manifest-badjson',
|
|
'Unable to load SLO manifest']])
|
|
|
|
def test_handle_multipart_delete_401(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/manifest-with-unauth-segment' +
|
|
'?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(
|
|
set(self.app.calls),
|
|
set([('GET', '/v1/AUTH_test/deltest/' +
|
|
'manifest-with-unauth-segment?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/a_1'),
|
|
('DELETE', '/v1/AUTH_test/deltest-unauth/q_17'),
|
|
('DELETE', '/v1/AUTH_test/deltest/' +
|
|
'manifest-with-unauth-segment')]))
|
|
self.assertEqual(resp_data['Response Status'], '400 Bad Request')
|
|
self.assertEqual(resp_data['Response Body'], '')
|
|
self.assertEqual(resp_data['Number Deleted'], 2)
|
|
self.assertEqual(resp_data['Number Not Found'], 0)
|
|
self.assertEqual(resp_data['Errors'],
|
|
[['/deltest-unauth/q_17', '401 Unauthorized']])
|
|
|
|
def test_handle_multipart_delete_client_content_type(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/deltest/man-all-there?multipart-manifest=delete',
|
|
environ={'REQUEST_METHOD': 'DELETE', 'CONTENT_TYPE': 'foo/bar'},
|
|
headers={'Accept': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
resp_data = json.loads(body)
|
|
self.assertEqual(resp_data["Number Deleted"], 3)
|
|
|
|
self.assertEqual(set(self.app.calls), set([
|
|
('GET',
|
|
'/v1/AUTH_test/deltest/man-all-there?multipart-manifest=get'),
|
|
('DELETE', '/v1/AUTH_test/deltest/b_2'),
|
|
('DELETE', '/v1/AUTH_test/deltest/c_3'),
|
|
('DELETE', '/v1/AUTH_test/deltest/man-all-there')]))
|
|
|
|
|
|
class TestSloHeadOldManifest(SloTestCase):
|
|
slo_etag = md5hex("seg01-hashseg02-hash")
|
|
|
|
def setUp(self):
|
|
super(TestSloHeadOldManifest, self).setUp()
|
|
manifest_json = json.dumps([
|
|
{'name': '/gettest/seg01',
|
|
'bytes': '100',
|
|
'hash': 'seg01-hash',
|
|
'content_type': 'text/plain',
|
|
'last_modified': '2013-11-19T11:33:45.137446'},
|
|
{'name': '/gettest/seg02',
|
|
'bytes': '200',
|
|
'hash': 'seg02-hash',
|
|
'content_type': 'text/plain',
|
|
'last_modified': '2013-11-19T11:33:45.137447'}])
|
|
self.manifest_json_etag = md5hex(manifest_json)
|
|
manifest_headers = {
|
|
'Content-Length': str(len(manifest_json)),
|
|
'Content-Type': 'test/data',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Sysmeta-Artisanal-Etag': 'bespoke',
|
|
'Etag': self.manifest_json_etag}
|
|
manifest_headers.update(getattr(self, 'extra_manifest_headers', {}))
|
|
self.manifest_has_sysmeta = all(h in manifest_headers for h in (
|
|
'X-Object-Sysmeta-Slo-Etag', 'X-Object-Sysmeta-Slo-Size'))
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/headtest/man',
|
|
swob.HTTPOk, manifest_headers, manifest_json.encode('ascii'))
|
|
|
|
def test_etag_is_hash_of_segment_etags(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/headtest/man',
|
|
environ={'REQUEST_METHOD': 'HEAD'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('X-Manifest-Etag', self.manifest_json_etag), headers)
|
|
self.assertIn(('Content-Length', '300'), headers)
|
|
self.assertIn(('Content-Type', 'test/data'), headers)
|
|
self.assertEqual(body, b'') # it's a HEAD request, after all
|
|
|
|
expected_app_calls = [('HEAD', '/v1/AUTH_test/headtest/man')]
|
|
if not self.manifest_has_sysmeta:
|
|
expected_app_calls.append(('GET', '/v1/AUTH_test/headtest/man'))
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
|
|
def test_if_none_match_etag_matching(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/headtest/man',
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
headers={'If-None-Match': self.slo_etag})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '304 Not Modified')
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Content-Type', 'test/data'), headers)
|
|
|
|
expected_app_calls = [('HEAD', '/v1/AUTH_test/headtest/man')]
|
|
if not self.manifest_has_sysmeta:
|
|
expected_app_calls.append(('GET', '/v1/AUTH_test/headtest/man'))
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
|
|
def test_if_match_etag_not_matching(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/headtest/man',
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
headers={'If-Match': 'zzz'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '412 Precondition Failed')
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Content-Type', 'test/data'), headers)
|
|
|
|
expected_app_calls = [('HEAD', '/v1/AUTH_test/headtest/man')]
|
|
if not self.manifest_has_sysmeta:
|
|
expected_app_calls.append(('GET', '/v1/AUTH_test/headtest/man'))
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
|
|
def test_if_none_match_etag_matching_with_override(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/headtest/man',
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
headers={
|
|
'If-None-Match': 'bespoke',
|
|
'X-Backend-Etag-Is-At': 'X-Object-Sysmeta-Artisanal-Etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '304 Not Modified')
|
|
# We *are not* responsible for replacing the etag; whoever set
|
|
# x-backend-etag-is-at is responsible
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Content-Type', 'test/data'), headers)
|
|
|
|
expected_app_calls = [('HEAD', '/v1/AUTH_test/headtest/man')]
|
|
if not self.manifest_has_sysmeta:
|
|
expected_app_calls.append(('GET', '/v1/AUTH_test/headtest/man'))
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
|
|
def test_if_match_etag_not_matching_with_override(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/headtest/man',
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
headers={
|
|
'If-Match': self.slo_etag,
|
|
'X-Backend-Etag-Is-At': 'X-Object-Sysmeta-Artisanal-Etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '412 Precondition Failed')
|
|
# We *are not* responsible for replacing the etag; whoever set
|
|
# x-backend-etag-is-at is responsible
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Content-Type', 'test/data'), headers)
|
|
|
|
expected_app_calls = [('HEAD', '/v1/AUTH_test/headtest/man')]
|
|
if not self.manifest_has_sysmeta:
|
|
expected_app_calls.append(('GET', '/v1/AUTH_test/headtest/man'))
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
|
|
|
|
class TestSloHeadManifest(TestSloHeadOldManifest):
|
|
def setUp(self):
|
|
self.extra_manifest_headers = {
|
|
'X-Object-Sysmeta-Slo-Etag': self.slo_etag,
|
|
'X-Object-Sysmeta-Slo-Size': '300',
|
|
}
|
|
super(TestSloHeadManifest, self).setUp()
|
|
|
|
|
|
class TestSloGetRawManifest(SloTestCase):
|
|
|
|
def setUp(self):
|
|
super(TestSloGetRawManifest, self).setUp()
|
|
|
|
_bc_manifest_json = json.dumps(
|
|
[{'name': '/gettest/b_10', 'hash': md5hex('b' * 10), 'bytes': '10',
|
|
'content_type': 'text/plain',
|
|
'last_modified': '1970-01-01T00:00:00.000000'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15), 'bytes': '15',
|
|
'content_type': 'text/plain',
|
|
'last_modified': '1970-01-01T00:00:00.000000'},
|
|
{'name': '/gettest/d_10',
|
|
'hash': md5hex(md5hex("e" * 5) + md5hex("f" * 5)), 'bytes': '10',
|
|
'content_type': 'application/json',
|
|
'sub_slo': True,
|
|
'last_modified': '1970-01-01T00:00:00.000000'}])
|
|
self.bc_etag = md5hex(_bc_manifest_json)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-bc',
|
|
# proxy obj controller removes swift_bytes from content-type
|
|
swob.HTTPOk, {'Content-Type': 'text/plain',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Plant': 'Ficus',
|
|
'Etag': md5hex(_bc_manifest_json)},
|
|
_bc_manifest_json)
|
|
|
|
_bc_manifest_json_ranges = json.dumps(
|
|
[{'name': '/gettest/b_10', 'hash': md5hex('b' * 10), 'bytes': '10',
|
|
'last_modified': '1970-01-01T00:00:00.000000',
|
|
'content_type': 'text/plain', 'range': '1-99'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15), 'bytes': '15',
|
|
'last_modified': '1970-01-01T00:00:00.000000',
|
|
'content_type': 'text/plain', 'range': '100-200'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-bc-r',
|
|
# proxy obj controller removes swift_bytes from content-type
|
|
swob.HTTPOk, {'Content-Type': 'text/plain',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Plant': 'Ficus',
|
|
'Etag': md5hex(_bc_manifest_json_ranges)},
|
|
_bc_manifest_json_ranges)
|
|
|
|
def test_get_raw_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-bc'
|
|
'?multipart-manifest=get&format=raw',
|
|
environ={'REQUEST_METHOD': 'GET',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
expected_body = json.dumps([
|
|
{'etag': md5hex('b' * 10), 'size_bytes': '10',
|
|
'path': '/gettest/b_10'},
|
|
{'etag': md5hex('c' * 15), 'size_bytes': '15',
|
|
'path': '/gettest/c_15'},
|
|
{'etag': md5hex(md5hex("e" * 5) + md5hex("f" * 5)),
|
|
'size_bytes': '10',
|
|
'path': '/gettest/d_10'}], sort_keys=True)
|
|
expected_etag = md5hex(expected_body)
|
|
if six.PY3:
|
|
expected_body = expected_body.encode('utf-8')
|
|
|
|
self.assertEqual(body, expected_body)
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertTrue(('Etag', expected_etag) in headers, headers)
|
|
self.assertTrue(('X-Static-Large-Object', 'true') in headers, headers)
|
|
# raw format should return the actual manifest object content-type
|
|
self.assertIn(('Content-Type', 'text/plain'), headers)
|
|
|
|
try:
|
|
json.loads(body)
|
|
except ValueError:
|
|
self.fail("Invalid JSON in manifest GET: %r" % body)
|
|
|
|
def test_get_raw_manifest_passthrough_with_ranges(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-bc-r'
|
|
'?multipart-manifest=get&format=raw',
|
|
environ={'REQUEST_METHOD': 'GET',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
# raw format should return the actual manifest object content-type
|
|
self.assertIn(('Content-Type', 'text/plain'), headers)
|
|
try:
|
|
resp_data = json.loads(body)
|
|
except ValueError:
|
|
self.fail("Invalid JSON in manifest GET: %r" % body)
|
|
|
|
self.assertEqual(
|
|
resp_data,
|
|
[{'etag': md5hex('b' * 10), 'size_bytes': '10',
|
|
'path': '/gettest/b_10', 'range': '1-99'},
|
|
{'etag': md5hex('c' * 15), 'size_bytes': '15',
|
|
'path': '/gettest/c_15', 'range': '100-200'}],
|
|
body)
|
|
|
|
|
|
class TestSloGetManifest(SloTestCase):
|
|
def setUp(self):
|
|
super(TestSloGetManifest, self).setUp()
|
|
|
|
# some plain old objects
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/a_5',
|
|
swob.HTTPOk, {'Content-Length': '5',
|
|
'Etag': md5hex('a' * 5)},
|
|
'a' * 5)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/b_10',
|
|
swob.HTTPOk, {'Content-Length': '10',
|
|
'Etag': md5hex('b' * 10)},
|
|
'b' * 10)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/c_15',
|
|
swob.HTTPOk, {'Content-Length': '15',
|
|
'Etag': md5hex('c' * 15)},
|
|
'c' * 15)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/d_20',
|
|
swob.HTTPOk, {'Content-Length': '20',
|
|
'Etag': md5hex('d' * 20)},
|
|
'd' * 20)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/e_25',
|
|
swob.HTTPOk, {'Content-Length': '25',
|
|
'Etag': md5hex('e' * 25)},
|
|
'e' * 25)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/f_30',
|
|
swob.HTTPOk, {'Content-Length': '30',
|
|
'Etag': md5hex('f' * 30)},
|
|
'f' * 30)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/g_35',
|
|
swob.HTTPOk, {'Content-Length': '35',
|
|
'Etag': md5hex('g' * 35)},
|
|
'g' * 35)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/h_40',
|
|
swob.HTTPOk, {'Content-Length': '40',
|
|
'Etag': md5hex('h' * 40)},
|
|
'h' * 40)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/i_45',
|
|
swob.HTTPOk, {'Content-Length': '45',
|
|
'Etag': md5hex('i' * 45)},
|
|
'i' * 45)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/j_50',
|
|
swob.HTTPOk, {'Content-Length': '50',
|
|
'Etag': md5hex('j' * 50)},
|
|
'j' * 50)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/k_55',
|
|
swob.HTTPOk, {'Content-Length': '55',
|
|
'Etag': md5hex('k' * 55)},
|
|
'k' * 55)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/l_60',
|
|
swob.HTTPOk, {'Content-Length': '60',
|
|
'Etag': md5hex('l' * 60)},
|
|
'l' * 60)
|
|
|
|
_bc_manifest_json = json.dumps(
|
|
[{'name': '/gettest/b_10', 'hash': md5hex('b' * 10), 'bytes': '10',
|
|
'content_type': 'text/plain'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15), 'bytes': '15',
|
|
'content_type': 'text/plain'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-bc',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Plant': 'Ficus',
|
|
'Etag': md5hex(_bc_manifest_json)},
|
|
_bc_manifest_json)
|
|
|
|
_abcd_manifest_json = json.dumps(
|
|
[{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/manifest-bc', 'sub_slo': True,
|
|
'content_type': 'application/json',
|
|
'hash': md5hex(md5hex("b" * 10) + md5hex("c" * 15)),
|
|
'bytes': 25},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20'}])
|
|
self.abcd_manifest_json_etag = md5hex(_abcd_manifest_json)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-abcd',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': self.abcd_manifest_json_etag},
|
|
_abcd_manifest_json)
|
|
|
|
# A submanifest segment is created using the response headers from a
|
|
# HEAD on the submanifest. That HEAD is passed through SLO which will
|
|
# modify the response content-length to be equal to the size of the
|
|
# submanifest's large object. The swift_bytes value appended to the
|
|
# submanifest's content-type will have been removed. So the sub-slo
|
|
# segment dict that is written to the parent manifest should have the
|
|
# correct bytes and content-type values. However, if somehow the
|
|
# submanifest HEAD response wasn't modified by SLO (maybe
|
|
# historically?) and we ended up with the parent manifest sub-slo entry
|
|
# having swift_bytes appended to it's content-type and the actual
|
|
# submanifest size in its bytes field, then SLO can cope, so we create
|
|
# a deviant manifest to verify that SLO can deal with it.
|
|
_abcd_manifest_json_alt = json.dumps(
|
|
[{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/manifest-bc', 'sub_slo': True,
|
|
'content_type': 'application/json; swift_bytes=25',
|
|
'hash': md5hex(md5hex("b" * 10) + md5hex("c" * 15)),
|
|
'bytes': len(_bc_manifest_json)},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-abcd-alt',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': md5hex(_abcd_manifest_json_alt)},
|
|
_abcd_manifest_json_alt)
|
|
|
|
_abcdefghijkl_manifest_json = json.dumps(
|
|
[{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/b_10', 'hash': md5hex("b" * 10),
|
|
'content_type': 'text/plain', 'bytes': '10'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex("c" * 15),
|
|
'content_type': 'text/plain', 'bytes': '15'},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20'},
|
|
{'name': '/gettest/e_25', 'hash': md5hex("e" * 25),
|
|
'content_type': 'text/plain', 'bytes': '25'},
|
|
{'name': '/gettest/f_30', 'hash': md5hex("f" * 30),
|
|
'content_type': 'text/plain', 'bytes': '30'},
|
|
{'name': '/gettest/g_35', 'hash': md5hex("g" * 35),
|
|
'content_type': 'text/plain', 'bytes': '35'},
|
|
{'name': '/gettest/h_40', 'hash': md5hex("h" * 40),
|
|
'content_type': 'text/plain', 'bytes': '40'},
|
|
{'name': '/gettest/i_45', 'hash': md5hex("i" * 45),
|
|
'content_type': 'text/plain', 'bytes': '45'},
|
|
{'name': '/gettest/j_50', 'hash': md5hex("j" * 50),
|
|
'content_type': 'text/plain', 'bytes': '50'},
|
|
{'name': '/gettest/k_55', 'hash': md5hex("k" * 55),
|
|
'content_type': 'text/plain', 'bytes': '55'},
|
|
{'name': '/gettest/l_60', 'hash': md5hex("l" * 60),
|
|
'content_type': 'text/plain', 'bytes': '60'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-abcdefghijkl',
|
|
swob.HTTPOk, {
|
|
'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': md5hex(_abcdefghijkl_manifest_json)},
|
|
_abcdefghijkl_manifest_json)
|
|
|
|
_bc_ranges_manifest_json = json.dumps(
|
|
[{'name': '/gettest/b_10', 'hash': md5hex('b' * 10),
|
|
'content_type': 'text/plain', 'bytes': '10',
|
|
'range': '4-7'},
|
|
{'name': '/gettest/b_10', 'hash': md5hex('b' * 10),
|
|
'content_type': 'text/plain', 'bytes': '10',
|
|
'range': '2-5'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15),
|
|
'content_type': 'text/plain', 'bytes': '15',
|
|
'range': '0-3'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15),
|
|
'content_type': 'text/plain', 'bytes': '15',
|
|
'range': '11-14'}])
|
|
self.bc_ranges_etag = md5hex(_bc_ranges_manifest_json)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-bc-ranges',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Plant': 'Ficus',
|
|
'Etag': self.bc_ranges_etag},
|
|
_bc_ranges_manifest_json)
|
|
|
|
_abcd_ranges_manifest_json = json.dumps(
|
|
[{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5',
|
|
'range': '0-3'},
|
|
{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5',
|
|
'range': '1-4'},
|
|
{'name': '/gettest/manifest-bc-ranges', 'sub_slo': True,
|
|
'content_type': 'application/json',
|
|
'hash': self.bc_ranges_etag,
|
|
'bytes': 16,
|
|
'range': '8-15'},
|
|
{'name': '/gettest/manifest-bc-ranges', 'sub_slo': True,
|
|
'content_type': 'application/json',
|
|
'hash': self.bc_ranges_etag,
|
|
'bytes': len(_bc_ranges_manifest_json),
|
|
'range': '0-7'},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20',
|
|
'range': '0-3'},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20',
|
|
'range': '8-11'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': md5hex(_abcd_ranges_manifest_json)},
|
|
_abcd_ranges_manifest_json)
|
|
|
|
_abcd_subranges_manifest_json = json.dumps(
|
|
[{'name': '/gettest/manifest-abcd-ranges', 'sub_slo': True,
|
|
'hash': md5hex("a" * 8),
|
|
'content_type': 'text/plain', 'bytes': '32',
|
|
'range': '6-10'},
|
|
{'name': '/gettest/manifest-abcd-ranges', 'sub_slo': True,
|
|
'hash': md5hex("a" * 8),
|
|
'content_type': 'text/plain', 'bytes': '32',
|
|
'range': '31-31'},
|
|
{'name': '/gettest/manifest-abcd-ranges', 'sub_slo': True,
|
|
'hash': md5hex("a" * 8),
|
|
'content_type': 'text/plain', 'bytes': '32',
|
|
'range': '14-18'},
|
|
{'name': '/gettest/manifest-abcd-ranges', 'sub_slo': True,
|
|
'hash': md5hex("a" * 8),
|
|
'content_type': 'text/plain', 'bytes': '32',
|
|
'range': '0-0'},
|
|
{'name': '/gettest/manifest-abcd-ranges', 'sub_slo': True,
|
|
'hash': md5hex("a" * 8),
|
|
'content_type': 'text/plain', 'bytes': '32',
|
|
'range': '22-26'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-abcd-subranges',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': md5hex(_abcd_subranges_manifest_json)},
|
|
_abcd_subranges_manifest_json)
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-badjson',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Fish': 'Bass'},
|
|
"[not {json (at ++++all")
|
|
|
|
def tearDown(self):
|
|
self.assertEqual(self.app.unclosed_requests, {})
|
|
|
|
def test_get_manifest_passthrough(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-bc?multipart-manifest=get',
|
|
environ={'REQUEST_METHOD': 'GET',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertIn(
|
|
('Content-Type', 'application/json; charset=utf-8'), headers)
|
|
try:
|
|
resp_data = json.loads(body)
|
|
except ValueError:
|
|
self.fail("Invalid JSON in manifest GET: %r" % body)
|
|
|
|
self.assertEqual(
|
|
resp_data,
|
|
[{'hash': md5hex('b' * 10), 'bytes': '10', 'name': '/gettest/b_10',
|
|
'content_type': 'text/plain'},
|
|
{'hash': md5hex('c' * 15), 'bytes': '15', 'name': '/gettest/c_15',
|
|
'content_type': 'text/plain'}],
|
|
body)
|
|
self.assertIn(('Etag', md5hex(body)), headers)
|
|
|
|
def test_get_nonmanifest_passthrough(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/a_5',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(body, b'aaaaa')
|
|
|
|
def test_get_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-bc',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
manifest_etag = md5hex(md5hex("b" * 10) + md5hex("c" * 15))
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '25')
|
|
self.assertEqual(headers['Etag'], '"%s"' % manifest_etag)
|
|
self.assertEqual(headers['X-Object-Meta-Plant'], 'Ficus')
|
|
self.assertEqual(body, b'bbbbbbbbbbccccccccccccccc')
|
|
|
|
for _, _, hdrs in self.app.calls_with_headers[1:]:
|
|
ua = hdrs.get("User-Agent", "")
|
|
self.assertTrue("SLO MultipartGET" in ua)
|
|
self.assertFalse("SLO MultipartGET SLO MultipartGET" in ua)
|
|
# the first request goes through unaltered
|
|
first_ua = self.app.calls_with_headers[0][2].get("User-Agent")
|
|
self.assertFalse(
|
|
"SLO MultipartGET" in first_ua)
|
|
|
|
def test_get_manifest_repeated_segments(self):
|
|
_aabbccdd_manifest_json = json.dumps(
|
|
[{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
|
|
{'name': '/gettest/b_10', 'hash': md5hex("b" * 10),
|
|
'content_type': 'text/plain', 'bytes': '10'},
|
|
{'name': '/gettest/b_10', 'hash': md5hex("b" * 10),
|
|
'content_type': 'text/plain', 'bytes': '10'},
|
|
|
|
{'name': '/gettest/c_15', 'hash': md5hex("c" * 15),
|
|
'content_type': 'text/plain', 'bytes': '15'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex("c" * 15),
|
|
'content_type': 'text/plain', 'bytes': '15'},
|
|
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20'},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20'}])
|
|
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-aabbccdd',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': md5hex(_aabbccdd_manifest_json)},
|
|
_aabbccdd_manifest_json)
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-aabbccdd',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(body, (
|
|
b'aaaaaaaaaabbbbbbbbbbbbbbbbbbbbcccccccccccccccccccccccccccccc'
|
|
b'dddddddddddddddddddddddddddddddddddddddd'))
|
|
|
|
self.assertEqual(self.app.calls, [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-aabbccdd'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
None,
|
|
'bytes=0-4,0-4',
|
|
'bytes=0-9,0-9',
|
|
'bytes=0-14,0-14',
|
|
'bytes=0-19,0-19'])
|
|
|
|
def test_get_manifest_ratelimiting(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcdefghijkl',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
the_time = [time.time()]
|
|
sleeps = []
|
|
|
|
def mock_time():
|
|
return the_time[0]
|
|
|
|
def mock_sleep(duration):
|
|
sleeps.append(duration)
|
|
the_time[0] += duration
|
|
|
|
with patch('time.time', mock_time), \
|
|
patch('eventlet.sleep', mock_sleep), \
|
|
patch.object(self.slo, 'rate_limit_under_size', 999999999), \
|
|
patch.object(self.slo, 'rate_limit_after_segment', 0):
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK') # sanity check
|
|
self.assertEqual(sleeps, [2.0, 2.0, 2.0, 2.0, 2.0])
|
|
|
|
# give the client the first 4 segments without ratelimiting; we'll
|
|
# sleep less
|
|
del sleeps[:]
|
|
with patch('time.time', mock_time), \
|
|
patch('eventlet.sleep', mock_sleep), \
|
|
patch.object(self.slo, 'rate_limit_under_size', 999999999), \
|
|
patch.object(self.slo, 'rate_limit_after_segment', 4):
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK') # sanity check
|
|
self.assertEqual(sleeps, [2.0, 2.0, 2.0])
|
|
|
|
# ratelimit segments under 35 bytes; this affects a-f
|
|
del sleeps[:]
|
|
with patch('time.time', mock_time), \
|
|
patch('eventlet.sleep', mock_sleep), \
|
|
patch.object(self.slo, 'rate_limit_under_size', 35), \
|
|
patch.object(self.slo, 'rate_limit_after_segment', 0):
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK') # sanity check
|
|
self.assertEqual(sleeps, [2.0, 2.0])
|
|
|
|
# ratelimit segments under 36 bytes; this now affects a-g, netting
|
|
# us one more sleep than before
|
|
del sleeps[:]
|
|
with patch('time.time', mock_time), \
|
|
patch('eventlet.sleep', mock_sleep), \
|
|
patch.object(self.slo, 'rate_limit_under_size', 36), \
|
|
patch.object(self.slo, 'rate_limit_after_segment', 0):
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK') # sanity check
|
|
self.assertEqual(sleeps, [2.0, 2.0, 2.0])
|
|
|
|
def test_get_manifest_with_submanifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '50')
|
|
self.assertEqual(headers['Etag'], '"%s"' % self.manifest_abcd_etag)
|
|
self.assertEqual(headers['X-Manifest-Etag'],
|
|
self.abcd_manifest_json_etag)
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
def test_get_manifest_with_submanifest_bytes_in_content_type(self):
|
|
# verify correct content-length when the sub-slo segment in the
|
|
# manifest has its actual object content-length appended as swift_bytes
|
|
# to the content-type, and the submanifest length in the bytes field.
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd-alt',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '50')
|
|
self.assertEqual(headers['Etag'], '"%s"' % self.manifest_abcd_etag)
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
def test_range_get_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=3-17'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '15')
|
|
self.assertEqual(headers['Etag'], '"%s"' % self.manifest_abcd_etag)
|
|
self.assertEqual(body, b'aabbbbbbbbbbccc')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
'bytes=3-17',
|
|
None,
|
|
None,
|
|
'bytes=3-',
|
|
None,
|
|
'bytes=0-2'])
|
|
ignore_range_headers = [
|
|
c[2].get('X-Backend-Ignore-Range-If-Metadata-Present')
|
|
for c in self.app.calls_with_headers]
|
|
self.assertEqual(ignore_range_headers, [
|
|
'X-Static-Large-Object',
|
|
None,
|
|
None,
|
|
None,
|
|
None,
|
|
None])
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1))
|
|
|
|
def test_multiple_ranges_get_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=3-17,20-24,35-999999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
|
|
ct, params = parse_content_type(headers['Content-Type'])
|
|
params = dict(params)
|
|
self.assertEqual(ct, 'multipart/byteranges')
|
|
boundary = params.get('boundary')
|
|
self.assertTrue(boundary is not None)
|
|
if six.PY3:
|
|
boundary = boundary.encode('utf-8')
|
|
|
|
self.assertEqual(len(body), int(headers['Content-Length']))
|
|
|
|
got_mime_docs = []
|
|
for mime_doc_fh in iter_multipart_mime_documents(
|
|
BytesIO(body), boundary):
|
|
headers = parse_mime_headers(mime_doc_fh)
|
|
body = mime_doc_fh.read()
|
|
got_mime_docs.append((headers, body))
|
|
self.assertEqual(len(got_mime_docs), 3)
|
|
|
|
first_range_headers = got_mime_docs[0][0]
|
|
first_range_body = got_mime_docs[0][1]
|
|
self.assertEqual(first_range_headers['Content-Range'],
|
|
'bytes 3-17/50')
|
|
self.assertEqual(first_range_headers['Content-Type'],
|
|
'application/json')
|
|
self.assertEqual(first_range_body, b'aabbbbbbbbbbccc')
|
|
|
|
second_range_headers = got_mime_docs[1][0]
|
|
second_range_body = got_mime_docs[1][1]
|
|
self.assertEqual(second_range_headers['Content-Range'],
|
|
'bytes 20-24/50')
|
|
self.assertEqual(second_range_headers['Content-Type'],
|
|
'application/json')
|
|
self.assertEqual(second_range_body, b'ccccc')
|
|
|
|
third_range_headers = got_mime_docs[2][0]
|
|
third_range_body = got_mime_docs[2][1]
|
|
self.assertEqual(third_range_headers['Content-Range'],
|
|
'bytes 35-49/50')
|
|
self.assertEqual(third_range_headers['Content-Type'],
|
|
'application/json')
|
|
self.assertEqual(third_range_body, b'ddddddddddddddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
'bytes=3-17,20-24,35-999999', # initial GET
|
|
None, # re-fetch top-level manifest
|
|
None, # fetch manifest-bc as sub-slo
|
|
'bytes=3-', # a_5
|
|
None, # b_10
|
|
'bytes=0-2,5-9', # c_15
|
|
'bytes=5-']) # d_20
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1))
|
|
|
|
def test_multiple_ranges_including_suffix_get_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=3-17,-21'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
|
|
ct, params = parse_content_type(headers['Content-Type'])
|
|
params = dict(params)
|
|
self.assertEqual(ct, 'multipart/byteranges')
|
|
boundary = params.get('boundary')
|
|
self.assertTrue(boundary is not None)
|
|
if six.PY3:
|
|
boundary = boundary.encode('utf-8')
|
|
|
|
got_mime_docs = []
|
|
for mime_doc_fh in iter_multipart_mime_documents(
|
|
BytesIO(body), boundary):
|
|
headers = parse_mime_headers(mime_doc_fh)
|
|
body = mime_doc_fh.read()
|
|
got_mime_docs.append((headers, body))
|
|
self.assertEqual(len(got_mime_docs), 2)
|
|
|
|
first_range_headers = got_mime_docs[0][0]
|
|
first_range_body = got_mime_docs[0][1]
|
|
self.assertEqual(first_range_headers['Content-Range'],
|
|
'bytes 3-17/50')
|
|
self.assertEqual(first_range_body, b'aabbbbbbbbbbccc')
|
|
|
|
second_range_headers = got_mime_docs[1][0]
|
|
second_range_body = got_mime_docs[1][1]
|
|
self.assertEqual(second_range_headers['Content-Range'],
|
|
'bytes 29-49/50')
|
|
self.assertEqual(second_range_body, b'cdddddddddddddddddddd')
|
|
|
|
def test_range_get_includes_whole_manifest(self):
|
|
# If the first range GET results in retrieval of the entire manifest
|
|
# body (which we can detect by looking at Content-Range), then we
|
|
# should not go make a second, non-ranged request just to retrieve the
|
|
# same bytes again.
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=0-999999999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
def test_range_get_beyond_manifest(self):
|
|
big = 'e' * 1024 * 1024
|
|
big_etag = md5hex(big)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/big_seg',
|
|
swob.HTTPOk, {'Content-Type': 'application/foo',
|
|
'Etag': big_etag}, big)
|
|
big_manifest = json.dumps(
|
|
[{'name': '/gettest/big_seg', 'hash': big_etag,
|
|
'bytes': 1024 * 1024, 'content_type': 'application/foo'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/big_manifest',
|
|
swob.HTTPOk, {'Content-Type': 'application/octet-stream',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': md5hex(big_manifest)},
|
|
big_manifest)
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/big_manifest',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100000-199999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
if six.PY3:
|
|
count_e = sum(1 if x == 'e' else 0
|
|
for x in body.decode('ascii', errors='replace'))
|
|
else:
|
|
count_e = sum(1 if x == 'e' else 0 for x in body)
|
|
self.assertEqual(count_e, 100000)
|
|
self.assertEqual(len(body) - count_e, 0)
|
|
|
|
self.assertEqual(
|
|
self.app.calls, [
|
|
# has Range header, gets 416
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
# retry the first one
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
('GET',
|
|
'/v1/AUTH_test/gettest/big_seg?multipart-manifest=get')])
|
|
|
|
def test_range_get_beyond_manifest_refetch_fails(self):
|
|
big = 'e' * 1024 * 1024
|
|
big_etag = md5hex(big)
|
|
big_manifest = json.dumps(
|
|
[{'name': '/gettest/big_seg', 'hash': big_etag,
|
|
'bytes': 1024 * 1024, 'content_type': 'application/foo'}])
|
|
self.app.register_responses(
|
|
'GET', '/v1/AUTH_test/gettest/big_manifest',
|
|
[(swob.HTTPOk, {'Content-Type': 'application/octet-stream',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Backend-Timestamp': '1234',
|
|
'Etag': md5hex(big_manifest)},
|
|
big_manifest),
|
|
(swob.HTTPNotFound, {}, None)])
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/big_manifest',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100000-199999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '503 Service Unavailable')
|
|
self.assertNotIn('X-Static-Large-Object', headers)
|
|
self.assertEqual(self.app.calls, [
|
|
# has Range header, gets 416
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
# retry the first one
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
])
|
|
|
|
def test_range_get_beyond_manifest_refetch_finds_old(self):
|
|
big = 'e' * 1024 * 1024
|
|
big_etag = md5hex(big)
|
|
big_manifest = json.dumps(
|
|
[{'name': '/gettest/big_seg', 'hash': big_etag,
|
|
'bytes': 1024 * 1024, 'content_type': 'application/foo'}])
|
|
self.app.register_responses(
|
|
'GET', '/v1/AUTH_test/gettest/big_manifest',
|
|
[(swob.HTTPOk, {'Content-Type': 'application/octet-stream',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Backend-Timestamp': '1234',
|
|
'Etag': md5hex(big_manifest)},
|
|
big_manifest),
|
|
(swob.HTTPOk, {'X-Backend-Timestamp': '1233'}, [b'small body'])])
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/big_manifest',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100000-199999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '503 Service Unavailable')
|
|
self.assertNotIn('X-Static-Large-Object', headers)
|
|
self.assertEqual(self.app.calls, [
|
|
# has Range header, gets 416
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
# retry the first one
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
])
|
|
|
|
def test_range_get_beyond_manifest_refetch_small_non_slo(self):
|
|
big = 'e' * 1024 * 1024
|
|
big_etag = md5hex(big)
|
|
big_manifest = json.dumps(
|
|
[{'name': '/gettest/big_seg', 'hash': big_etag,
|
|
'bytes': 1024 * 1024, 'content_type': 'application/foo'}])
|
|
self.app.register_responses(
|
|
'GET', '/v1/AUTH_test/gettest/big_manifest',
|
|
[(swob.HTTPOk, {'Content-Type': 'application/octet-stream',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Backend-Timestamp': '1234',
|
|
'Etag': md5hex(big_manifest)},
|
|
big_manifest),
|
|
(swob.HTTPOk, {'X-Backend-Timestamp': '1235'}, [b'small body'])])
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/big_manifest',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100000-199999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '416 Requested Range Not Satisfiable')
|
|
self.assertNotIn('X-Static-Large-Object', headers)
|
|
self.assertEqual(self.app.calls, [
|
|
# has Range header, gets 416
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
# retry the first one
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
])
|
|
|
|
def test_range_get_beyond_manifest_refetch_big_non_slo(self):
|
|
big = 'e' * 1024 * 1024
|
|
big_etag = md5hex(big)
|
|
big_manifest = json.dumps(
|
|
[{'name': '/gettest/big_seg', 'hash': big_etag,
|
|
'bytes': 1024 * 1024, 'content_type': 'application/foo'}])
|
|
self.app.register_responses(
|
|
'GET', '/v1/AUTH_test/gettest/big_manifest',
|
|
[(swob.HTTPOk, {'Content-Type': 'application/octet-stream',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Backend-Timestamp': '1234',
|
|
'Etag': md5hex(big_manifest)},
|
|
big_manifest),
|
|
(swob.HTTPOk, {'X-Backend-Timestamp': '1235'},
|
|
[b'x' * 1024 * 1024])])
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/big_manifest',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100000-199999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK') # NOT 416 or 206!
|
|
self.assertNotIn('X-Static-Large-Object', headers)
|
|
self.assertEqual(len(body), 1024 * 1024)
|
|
self.assertEqual(body, b'x' * 1024 * 1024)
|
|
self.assertEqual(self.app.calls, [
|
|
# has Range header, gets 416
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
# retry the first one
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
])
|
|
|
|
def test_range_get_beyond_manifest_refetch_tombstone(self):
|
|
big = 'e' * 1024 * 1024
|
|
big_etag = md5hex(big)
|
|
big_manifest = json.dumps(
|
|
[{'name': '/gettest/big_seg', 'hash': big_etag,
|
|
'bytes': 1024 * 1024, 'content_type': 'application/foo'}])
|
|
self.app.register_responses(
|
|
'GET', '/v1/AUTH_test/gettest/big_manifest',
|
|
[(swob.HTTPOk, {'Content-Type': 'application/octet-stream',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Backend-Timestamp': '1234',
|
|
'Etag': md5hex(big_manifest)},
|
|
big_manifest),
|
|
(swob.HTTPNotFound, {'X-Backend-Timestamp': '1345'}, None)])
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/big_manifest',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100000-199999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '404 Not Found')
|
|
self.assertNotIn('X-Static-Large-Object', headers)
|
|
self.assertEqual(self.app.calls, [
|
|
# has Range header, gets 416
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
# retry the first one
|
|
('GET', '/v1/AUTH_test/gettest/big_manifest'),
|
|
])
|
|
|
|
def test_range_get_bogus_content_range(self):
|
|
# Just a little paranoia; Swift currently sends back valid
|
|
# Content-Range headers, but if somehow someone sneaks an invalid one
|
|
# in there, we'll ignore it.
|
|
|
|
def content_range_breaker_factory(app):
|
|
def content_range_breaker(env, start_response):
|
|
req = swob.Request(env)
|
|
resp = req.get_response(app)
|
|
resp.headers['Content-Range'] = 'triscuits'
|
|
return resp(env, start_response)
|
|
return content_range_breaker
|
|
|
|
self.slo = slo.filter_factory({})(
|
|
content_range_breaker_factory(self.app))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=0-999999999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
def test_range_get_manifest_on_segment_boundaries(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=5-29'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '25')
|
|
self.assertEqual(headers['Etag'], '"%s"' % self.manifest_abcd_etag)
|
|
self.assertEqual(body, b'bbbbbbbbbbccccccccccccccc')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get')])
|
|
|
|
headers = [c[2] for c in self.app.calls_with_headers]
|
|
self.assertEqual(headers[0].get('Range'), 'bytes=5-29')
|
|
self.assertIsNone(headers[1].get('Range'))
|
|
self.assertIsNone(headers[2].get('Range'))
|
|
self.assertIsNone(headers[3].get('Range'))
|
|
self.assertIsNone(headers[4].get('Range'))
|
|
|
|
def test_range_get_manifest_first_byte(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=0-0'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '1')
|
|
self.assertEqual(body, b'a')
|
|
|
|
# Make sure we don't get any objects we don't need, including
|
|
# submanifests.
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get')])
|
|
|
|
def test_range_get_manifest_sub_slo(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=25-30'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '6')
|
|
self.assertEqual(body, b'cccccd')
|
|
|
|
# Make sure we don't get any objects we don't need, including
|
|
# submanifests.
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
def test_range_get_manifest_overlapping_end(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=45-55'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '5')
|
|
self.assertEqual(body, b'ddddd')
|
|
|
|
def test_range_get_manifest_unsatisfiable(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=100-200'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '416 Requested Range Not Satisfiable')
|
|
|
|
def test_get_segment_with_non_ascii_path(self):
|
|
segment_body = u"a møøse once bit my sister".encode("utf-8")
|
|
segment_etag = hashlib.md5(segment_body).hexdigest()
|
|
if six.PY2:
|
|
path = u'/v1/AUTH_test/ünicode/öbject-segment'.encode('utf-8')
|
|
else:
|
|
path = str_to_wsgi(u'/v1/AUTH_test/ünicode/öbject-segment')
|
|
self.app.register(
|
|
'GET', path,
|
|
swob.HTTPOk, {'Content-Length': str(len(segment_body)),
|
|
'Etag': segment_etag},
|
|
segment_body)
|
|
|
|
manifest_json = json.dumps([{'name': u'/ünicode/öbject-segment',
|
|
'hash': segment_etag,
|
|
'content_type': 'text/plain',
|
|
'bytes': len(segment_body)}])
|
|
if six.PY2:
|
|
path = u'/v1/AUTH_test/ünicode/manifest'.encode('utf-8')
|
|
else:
|
|
path = str_to_wsgi(u'/v1/AUTH_test/ünicode/manifest')
|
|
self.app.register(
|
|
'GET', path,
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'Content-Length': str(len(manifest_json)),
|
|
'X-Static-Large-Object': 'true'},
|
|
manifest_json.encode('ascii'))
|
|
|
|
req = Request.blank(
|
|
str_to_wsgi('/v1/AUTH_test/ünicode/manifest'),
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(body, segment_body)
|
|
|
|
def test_get_range_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd-ranges',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '32')
|
|
self.assertEqual(headers['Content-Type'], 'application/json')
|
|
self.assertEqual(body, b'aaaaaaaaccccccccbbbbbbbbdddddddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
None,
|
|
None,
|
|
'bytes=0-3,1-',
|
|
'bytes=0-3,11-',
|
|
'bytes=4-7,2-5',
|
|
'bytes=0-3,8-11'])
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(
|
|
self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1)
|
|
)
|
|
self.assertEqual(md5hex(''.join([
|
|
md5hex('a' * 5), ':0-3;',
|
|
md5hex('a' * 5), ':1-4;',
|
|
self.bc_ranges_etag, ':8-15;',
|
|
self.bc_ranges_etag, ':0-7;',
|
|
md5hex('d' * 20), ':0-3;',
|
|
md5hex('d' * 20), ':8-11;',
|
|
])), headers['Etag'].strip('"'))
|
|
|
|
def test_get_subrange_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd-subranges',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '17')
|
|
self.assertEqual(headers['Content-Type'], 'application/json')
|
|
self.assertEqual(body, b'aacccdccbbbabbddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd-subranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
None,
|
|
None,
|
|
None,
|
|
'bytes=3-',
|
|
'bytes=0-2',
|
|
'bytes=11-11',
|
|
'bytes=13-',
|
|
'bytes=4-6',
|
|
'bytes=0-0',
|
|
'bytes=4-5',
|
|
'bytes=0-2'])
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1))
|
|
|
|
def test_range_get_range_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd-ranges',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=7-26'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '20')
|
|
self.assertEqual(headers['Content-Type'], 'application/json')
|
|
self.assertIn('Etag', headers)
|
|
self.assertEqual(body, b'accccccccbbbbbbbbddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
'bytes=7-26',
|
|
None,
|
|
None,
|
|
'bytes=4-',
|
|
'bytes=0-3,11-',
|
|
'bytes=4-7,2-5',
|
|
'bytes=0-2'])
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1))
|
|
|
|
def test_range_get_subrange_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd-subranges',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=4-12'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '9')
|
|
self.assertEqual(headers['Content-Type'], 'application/json')
|
|
self.assertEqual(body, b'cdccbbbab')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd-subranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd-subranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
'bytes=4-12',
|
|
None,
|
|
None,
|
|
None,
|
|
'bytes=2-2',
|
|
'bytes=11-11',
|
|
'bytes=13-',
|
|
'bytes=4-6',
|
|
'bytes=0-0',
|
|
'bytes=4-4'])
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1))
|
|
|
|
def test_range_get_includes_whole_range_manifest(self):
|
|
# If the first range GET results in retrieval of the entire manifest
|
|
# body (which we can detect by looking at Content-Range), then we
|
|
# should not go make a second, non-ranged request just to retrieve the
|
|
# same bytes again.
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd-ranges',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=0-999999999'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(headers['Content-Length'], '32')
|
|
self.assertEqual(headers['Content-Type'], 'application/json')
|
|
self.assertEqual(body, b'aaaaaaaaccccccccbbbbbbbbdddddddd')
|
|
|
|
self.assertEqual(
|
|
self.app.calls,
|
|
[('GET', '/v1/AUTH_test/gettest/manifest-abcd-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc-ranges'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get')])
|
|
|
|
ranges = [c[2].get('Range') for c in self.app.calls_with_headers]
|
|
self.assertEqual(ranges, [
|
|
'bytes=0-999999999',
|
|
None,
|
|
'bytes=0-3,1-',
|
|
'bytes=0-3,11-',
|
|
'bytes=4-7,2-5',
|
|
'bytes=0-3,8-11'])
|
|
# we set swift.source for everything but the first request
|
|
self.assertIsNone(self.app.swift_sources[0])
|
|
self.assertEqual(self.app.swift_sources[1:],
|
|
['SLO'] * (len(self.app.swift_sources) - 1))
|
|
|
|
def test_get_bogus_manifest(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-badjson',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '0')
|
|
self.assertEqual(headers['X-Object-Meta-Fish'], 'Bass')
|
|
self.assertEqual(body, b'')
|
|
|
|
def test_generator_closure(self):
|
|
# Test that the SLO WSGI iterable closes its internal .app_iter when
|
|
# it receives a close() message.
|
|
#
|
|
# This is sufficient to fix a memory leak. The memory leak arises
|
|
# due to cyclic references involving a running generator; a running
|
|
# generator sometimes preventes the GC from collecting it in the
|
|
# same way that an object with a defined __del__ does.
|
|
#
|
|
# There are other ways to break the cycle and fix the memory leak as
|
|
# well; calling .close() on the generator is sufficient, but not
|
|
# necessary. However, having this test is better than nothing for
|
|
# preventing regressions.
|
|
leaks = [0]
|
|
|
|
class LeakTracker(object):
|
|
def __init__(self, inner_iter):
|
|
leaks[0] += 1
|
|
self.inner_iter = iter(inner_iter)
|
|
|
|
def __iter__(self):
|
|
return self
|
|
|
|
def next(self):
|
|
return next(self.inner_iter)
|
|
__next__ = next
|
|
|
|
def close(self):
|
|
leaks[0] -= 1
|
|
close_if_possible(self.inner_iter)
|
|
|
|
class LeakTrackingSegmentedIterable(slo.SegmentedIterable):
|
|
def _internal_iter(self, *a, **kw):
|
|
it = super(
|
|
LeakTrackingSegmentedIterable, self)._internal_iter(
|
|
*a, **kw)
|
|
return LeakTracker(it)
|
|
|
|
status = [None]
|
|
headers = [None]
|
|
|
|
def start_response(s, h, ei=None):
|
|
status[0] = s
|
|
headers[0] = h
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET',
|
|
'HTTP_ACCEPT': 'application/json'})
|
|
|
|
# can't self.call_slo() here since we don't want to consume the
|
|
# whole body
|
|
with patch.object(slo, 'SegmentedIterable',
|
|
LeakTrackingSegmentedIterable):
|
|
app_resp = self.slo(req.environ, start_response)
|
|
self.assertEqual(status[0], '200 OK') # sanity check
|
|
body_iter = iter(app_resp)
|
|
chunk = next(body_iter)
|
|
self.assertEqual(chunk, b'aaaaa') # sanity check
|
|
|
|
app_resp.close()
|
|
self.assertEqual(0, leaks[0])
|
|
|
|
def test_head_manifest_is_efficient(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'HEAD'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], '50')
|
|
self.assertEqual(headers['Etag'], '"%s"' % self.manifest_abcd_etag)
|
|
self.assertEqual(headers['X-Manifest-Etag'],
|
|
self.abcd_manifest_json_etag)
|
|
self.assertEqual(body, b'')
|
|
# Note the lack of recursive descent into manifest-bc. We know the
|
|
# content-length from the outer manifest, so there's no need for any
|
|
# submanifest fetching here, but a naïve implementation might do it
|
|
# anyway.
|
|
self.assertEqual(self.app.calls, [
|
|
('HEAD', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd')])
|
|
|
|
def test_recursion_limit(self):
|
|
# man1 points to obj1 and man2, man2 points to obj2 and man3...
|
|
for i in range(20):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/obj%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'text/plain',
|
|
'Etag': md5hex('body%02d' % i)},
|
|
b'body%02d' % i)
|
|
|
|
manifest_json = json.dumps([{'name': '/gettest/obj20',
|
|
'hash': md5hex('body20'),
|
|
'content_type': 'text/plain',
|
|
'bytes': '6'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/man%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': 'man%d' % i},
|
|
manifest_json.encode('ascii'))
|
|
|
|
submanifest_bytes = 6
|
|
for i in range(19, 0, -1):
|
|
manifest_data = [
|
|
{'name': '/gettest/obj%d' % i,
|
|
'hash': md5hex('body%02d' % i),
|
|
'bytes': '6',
|
|
'content_type': 'text/plain'},
|
|
{'data': base64.b64encode(b'-' * 3).decode('ascii')},
|
|
{'name': '/gettest/man%d' % (i + 1),
|
|
'hash': 'man%d' % (i + 1),
|
|
'sub_slo': True,
|
|
'bytes': submanifest_bytes,
|
|
'content_type': 'application/json'}]
|
|
|
|
submanifest_bytes += 9
|
|
manifest_json = json.dumps(manifest_data)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/man%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': 'man%d' % i},
|
|
manifest_json.encode('ascii'))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/man1',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
# we don't know at header-sending time that things are going to go
|
|
# wrong, so we end up with a 200 and a truncated body
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(headers['Content-Length'], str(9 * 19 + 6))
|
|
self.assertEqual(body, (
|
|
b'body01---body02---body03---body04---body05---'
|
|
b'body06---body07---body08---body09---body10---'))
|
|
# but the error shows up in logs
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
"While processing manifest '/v1/AUTH_test/gettest/man1', "
|
|
"max recursion depth was exceeded"
|
|
])
|
|
# make sure we didn't keep asking for segments
|
|
self.assertEqual(self.app.call_count, 20)
|
|
|
|
def test_sub_slo_recursion(self):
|
|
# man1 points to man2 and obj1, man2 points to man3 and obj2...
|
|
for i in range(11):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/obj%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'text/plain',
|
|
'Content-Length': '6',
|
|
'Etag': md5hex('body%02d' % i)},
|
|
b'body%02d' % i)
|
|
|
|
manifest_json = json.dumps([{'name': '/gettest/obj%d' % i,
|
|
'hash': md5hex('body%2d' % i),
|
|
'content_type': 'text/plain',
|
|
'bytes': '6'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/man%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': 'man%d' % i},
|
|
manifest_json.encode('ascii'))
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/gettest/obj%d' % i,
|
|
swob.HTTPOk, {'Content-Length': '6',
|
|
'Etag': md5hex('body%2d' % i)},
|
|
None)
|
|
|
|
for i in range(9, 0, -1):
|
|
manifest_data = [
|
|
{'name': '/gettest/man%d' % (i + 1),
|
|
'hash': 'man%d' % (i + 1),
|
|
'sub_slo': True,
|
|
'bytes': (10 - i) * 6,
|
|
'content_type': 'application/json'},
|
|
{'name': '/gettest/obj%d' % i,
|
|
'hash': md5hex('body%02d' % i),
|
|
'bytes': '6',
|
|
'content_type': 'text/plain'}]
|
|
|
|
manifest_json = json.dumps(manifest_data)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/man%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': 'man%d' % i},
|
|
manifest_json.encode('ascii'))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/man1',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(body, (b'body10body09body08body07body06'
|
|
b'body05body04body03body02body01'))
|
|
|
|
self.assertEqual(self.app.call_count, 20)
|
|
|
|
def test_sub_slo_recursion_limit(self):
|
|
# man1 points to man2 and obj1, man2 points to man3 and obj2...
|
|
for i in range(12):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/obj%d' % i,
|
|
swob.HTTPOk,
|
|
{'Content-Type': 'text/plain',
|
|
'Content-Length': '6',
|
|
'Etag': md5hex('body%02d' % i)},
|
|
b'body%02d' % i)
|
|
|
|
manifest_json = json.dumps([{'name': '/gettest/obj%d' % i,
|
|
'hash': md5hex('body%2d' % i),
|
|
'content_type': 'text/plain',
|
|
'bytes': '6'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/man%d' % i,
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': 'man%d' % i},
|
|
manifest_json.encode('ascii'))
|
|
self.app.register(
|
|
'HEAD', '/v1/AUTH_test/gettest/obj%d' % i,
|
|
swob.HTTPOk, {'Content-Length': '6',
|
|
'Etag': md5hex('body%2d' % i)},
|
|
None)
|
|
|
|
for i in range(11, 0, -1):
|
|
manifest_data = [
|
|
{'name': '/gettest/man%d' % (i + 1),
|
|
'hash': 'man%d' % (i + 1),
|
|
'sub_slo': True,
|
|
'bytes': (12 - i) * 6,
|
|
'content_type': 'application/json'},
|
|
{'name': '/gettest/obj%d' % i,
|
|
'hash': md5hex('body%02d' % i),
|
|
'bytes': '6',
|
|
'content_type': 'text/plain'}]
|
|
manifest_json = json.dumps(manifest_data)
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/man%d' % i,
|
|
swob.HTTPOk,
|
|
{'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': 'man%d' % i},
|
|
manifest_json.encode('ascii'))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/man1',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '409 Conflict')
|
|
self.assertEqual(self.app.call_count, 10)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
"While processing manifest '/v1/AUTH_test/gettest/man1', "
|
|
"max recursion depth was exceeded"
|
|
])
|
|
|
|
def test_get_with_if_modified_since(self):
|
|
# It's important not to pass the If-[Un]Modified-Since header to the
|
|
# proxy for segment or submanifest GET requests, as it may result in
|
|
# 304 Not Modified responses, and those don't contain any useful data.
|
|
req = swob.Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Modified-Since': 'Wed, 12 Feb 2014 22:24:52 GMT',
|
|
'If-Unmodified-Since': 'Thu, 13 Feb 2014 23:25:53 GMT'})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [])
|
|
|
|
for _, _, hdrs in self.app.calls_with_headers[1:]:
|
|
self.assertFalse('If-Modified-Since' in hdrs)
|
|
self.assertFalse('If-Unmodified-Since' in hdrs)
|
|
|
|
def test_error_fetching_segment(self):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/c_15',
|
|
swob.HTTPUnauthorized, {}, None)
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
headers = HeaderKeyDict(headers)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'While processing manifest /v1/AUTH_test/gettest/manifest-abcd, '
|
|
'got 401 while retrieving /v1/AUTH_test/gettest/c_15'
|
|
])
|
|
self.assertEqual(self.app.calls, [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
# This one has the error, and so is the last one we fetch.
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get')])
|
|
|
|
def test_error_fetching_submanifest(self):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/manifest-bc',
|
|
swob.HTTPUnauthorized, {}, None)
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual("200 OK", status)
|
|
self.assertEqual(b"aaaaa", body)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'while fetching /v1/AUTH_test/gettest/manifest-abcd, GET of '
|
|
'submanifest /v1/AUTH_test/gettest/manifest-bc failed with '
|
|
'status 401'
|
|
])
|
|
self.assertEqual(self.app.calls, [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
# This one has the error, and so is the last one we fetch.
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
# But we were looking ahead to see if we could combine ranges,
|
|
# so we still get the first segment out
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get')])
|
|
|
|
def test_error_fetching_first_segment_submanifest(self):
|
|
# This differs from the normal submanifest error because this one
|
|
# happens before we've actually sent any response body.
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-a',
|
|
swob.HTTPForbidden, {}, None)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-manifest-a',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/gettest/manifest-a', 'sub_slo': True,
|
|
'content_type': 'application/json',
|
|
'hash': 'manifest-a',
|
|
'bytes': '12345'}]))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-manifest-a',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('409 Conflict', status)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'while fetching /v1/AUTH_test/gettest/manifest-manifest-a, GET '
|
|
'of submanifest /v1/AUTH_test/gettest/manifest-a failed with '
|
|
'status 403'
|
|
])
|
|
|
|
def test_invalid_json_submanifest(self):
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-bc',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Plant': 'Ficus'},
|
|
"[this {isn't (JSON")
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'aaaaa')
|
|
if six.PY2:
|
|
error = "No JSON object could be decoded"
|
|
else:
|
|
error = "Expecting value: line 1 column 2 (char 1)"
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'while fetching /v1/AUTH_test/gettest/manifest-abcd, '
|
|
'JSON-decoding of submanifest /v1/AUTH_test/gettest/manifest-bc '
|
|
'failed with %s' % error
|
|
])
|
|
|
|
def test_mismatched_etag(self):
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-a-b-badetag-c',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/gettest/a_5', 'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/b_10', 'hash': 'wrong!',
|
|
'content_type': 'text/plain', 'bytes': '10'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15),
|
|
'content_type': 'text/plain', 'bytes': '15'}]))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-a-b-badetag-c',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'aaaaa')
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'Object segment no longer valid: /v1/AUTH_test/gettest/b_10 '
|
|
'etag: 82136b4240d6ce4ea7d03e51469a393b != wrong! or 10 != 10.'
|
|
])
|
|
|
|
def test_mismatched_size(self):
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-a-b-badsize-c',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/gettest/a_5', 'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/b_10', 'hash': md5hex('b' * 10),
|
|
'content_type': 'text/plain', 'bytes': '999999'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15),
|
|
'content_type': 'text/plain', 'bytes': '15'}]))
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-a-b-badsize-c',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'aaaaa')
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'Object segment no longer valid: /v1/AUTH_test/gettest/b_10 '
|
|
'etag: 82136b4240d6ce4ea7d03e51469a393b != '
|
|
'82136b4240d6ce4ea7d03e51469a393b or 10 != 999999.'
|
|
])
|
|
|
|
def test_first_segment_mismatched_etag(self):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/manifest-badetag',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/gettest/a_5',
|
|
'hash': 'wrong!',
|
|
'content_type': 'text/plain',
|
|
'bytes': '5'}]))
|
|
|
|
req = Request.blank('/v1/AUTH_test/gettest/manifest-badetag',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('409 Conflict', status)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'Object segment no longer valid: /v1/AUTH_test/gettest/a_5 '
|
|
'etag: 594f803b380a41396ed63dca39503542 != wrong! or 5 != 5.'
|
|
])
|
|
|
|
def test_first_segment_mismatched_size(self):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/manifest-badsize',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/gettest/a_5',
|
|
'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain',
|
|
'bytes': '999999'}]))
|
|
|
|
req = Request.blank('/v1/AUTH_test/gettest/manifest-badsize',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('409 Conflict', status)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'Object segment no longer valid: /v1/AUTH_test/gettest/a_5 '
|
|
'etag: 594f803b380a41396ed63dca39503542 != '
|
|
'594f803b380a41396ed63dca39503542 or 5 != 999999.'
|
|
])
|
|
|
|
@patch('swift.common.request_helpers.time')
|
|
def test_download_takes_too_long(self, mock_time):
|
|
mock_time.time.side_effect = [
|
|
0, # start time
|
|
10 * 3600, # a_5
|
|
20 * 3600, # b_10
|
|
30 * 3600, # c_15, but then we time out
|
|
]
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'While processing manifest /v1/AUTH_test/gettest/manifest-abcd, '
|
|
'max LO GET time of 86400s exceeded'
|
|
])
|
|
self.assertEqual(self.app.calls, [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get')])
|
|
|
|
def test_first_segment_not_exists(self):
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/not_exists_obj',
|
|
swob.HTTPNotFound, {}, None)
|
|
self.app.register('GET', '/v1/AUTH_test/gettest/manifest-not-exists',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'},
|
|
json.dumps([{'name': '/gettest/not_exists_obj',
|
|
'hash': md5hex('not_exists_obj'),
|
|
'content_type': 'text/plain',
|
|
'bytes': '%d' % len('not_exists_obj')
|
|
}]))
|
|
|
|
req = Request.blank('/v1/AUTH_test/gettest/manifest-not-exists',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('409 Conflict', status)
|
|
self.assertEqual(self.slo.logger.get_lines_for_level('error'), [
|
|
'While processing manifest /v1/AUTH_test/gettest/'
|
|
'manifest-not-exists, got 404 while retrieving /v1/AUTH_test/'
|
|
'gettest/not_exists_obj'
|
|
])
|
|
|
|
def test_leading_data_segment(self):
|
|
slo_etag = md5hex(
|
|
md5hex('preamble') +
|
|
md5hex('a' * 5)
|
|
)
|
|
preamble = base64.b64encode(b'preamble')
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-single-preamble',
|
|
swob.HTTPOk,
|
|
{
|
|
'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'
|
|
},
|
|
json.dumps([{
|
|
'data': preamble.decode('ascii')
|
|
}, {
|
|
'name': '/gettest/a_5',
|
|
'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain',
|
|
'bytes': '5',
|
|
}])
|
|
)
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-preamble',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'preambleaaaaa')
|
|
self.assertIn(('Etag', '"%s"' % slo_etag), headers)
|
|
self.assertIn(('Content-Length', '13'), headers)
|
|
|
|
def test_trailing_data_segment(self):
|
|
slo_etag = md5hex(
|
|
md5hex('a' * 5) +
|
|
md5hex('postamble')
|
|
)
|
|
postamble = base64.b64encode(b'postamble')
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-single-postamble',
|
|
swob.HTTPOk,
|
|
{
|
|
'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'
|
|
},
|
|
json.dumps([{
|
|
'name': '/gettest/a_5',
|
|
'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain',
|
|
'bytes': '5',
|
|
}, {
|
|
'data': postamble.decode('ascii')
|
|
}]).encode('ascii')
|
|
)
|
|
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-postamble',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'aaaaapostamble')
|
|
self.assertIn(('Etag', '"%s"' % slo_etag), headers)
|
|
self.assertIn(('Content-Length', '14'), headers)
|
|
|
|
def test_data_segment_sandwich(self):
|
|
slo_etag = md5hex(
|
|
md5hex('preamble') +
|
|
md5hex('a' * 5) +
|
|
md5hex('postamble')
|
|
)
|
|
preamble = base64.b64encode(b'preamble')
|
|
postamble = base64.b64encode(b'postamble')
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
swob.HTTPOk,
|
|
{
|
|
'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'
|
|
},
|
|
json.dumps([{
|
|
'data': preamble.decode('ascii'),
|
|
}, {
|
|
'name': '/gettest/a_5',
|
|
'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain',
|
|
'bytes': '5',
|
|
}, {
|
|
'data': postamble.decode('ascii')
|
|
}])
|
|
)
|
|
|
|
# Test the whole SLO
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'preambleaaaaapostamble')
|
|
self.assertIn(('Etag', '"%s"' % slo_etag), headers)
|
|
self.assertIn(('Content-Length', '22'), headers)
|
|
|
|
# Test complete preamble only
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=0-7'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'preamble')
|
|
|
|
# Test range within preamble only
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=1-5'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'reamb')
|
|
|
|
# Test complete postamble only
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=13-21'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'postamble')
|
|
|
|
# Test partial pre and postamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=4-16'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'mbleaaaaapost')
|
|
|
|
# Test partial preamble and first byte of data
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=1-8'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'reamblea')
|
|
|
|
# Test last byte of segment data and partial postamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-single-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=12-16'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'apost')
|
|
|
|
def test_bunches_of_data_segments(self):
|
|
slo_etag = md5hex(
|
|
md5hex('ABCDEF') +
|
|
md5hex('a' * 5) +
|
|
md5hex('123456') +
|
|
md5hex('GHIJKL') +
|
|
md5hex('b' * 10) +
|
|
md5hex('7890@#')
|
|
)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
swob.HTTPOk,
|
|
{
|
|
'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true'
|
|
},
|
|
json.dumps([
|
|
{
|
|
'data': base64.b64encode(b'ABCDEF').decode('ascii')
|
|
},
|
|
{
|
|
'name': '/gettest/a_5',
|
|
'hash': md5hex('a' * 5),
|
|
'content_type': 'text/plain',
|
|
'bytes': '5',
|
|
},
|
|
{
|
|
'data': base64.b64encode(b'123456').decode('ascii')
|
|
},
|
|
{
|
|
'data': base64.b64encode(b'GHIJKL').decode('ascii')
|
|
},
|
|
{
|
|
'name': '/gettest/b_10',
|
|
'hash': md5hex('b' * 10),
|
|
'content_type': 'text/plain',
|
|
'bytes': '10',
|
|
},
|
|
{
|
|
'data': base64.b64encode(b'7890@#').decode('ascii')
|
|
}
|
|
])
|
|
)
|
|
|
|
# Test the whole SLO
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('200 OK', status)
|
|
self.assertEqual(body, b'ABCDEFaaaaa123456GHIJKLbbbbbbbbbb7890@#')
|
|
self.assertIn(('Etag', '"%s"' % slo_etag), headers)
|
|
self.assertIn(('Content-Length', '39'), headers)
|
|
|
|
# Test last byte first pre-amble to first byte of second postamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=5-33'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'Faaaaa123456GHIJKLbbbbbbbbbb7')
|
|
|
|
# Test only second complete preamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=17-22'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'GHIJKL')
|
|
|
|
# Test only first complete postamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=11-16'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'123456')
|
|
|
|
# Test only range within first postamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=12-15'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'2345')
|
|
|
|
# Test only range within first postamble and second preamble
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-multi-prepostamble',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=12-18'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual('206 Partial Content', status)
|
|
self.assertEqual(body, b'23456GH')
|
|
|
|
|
|
class TestSloConditionalGetOldManifest(SloTestCase):
|
|
slo_data = [
|
|
{'name': '/gettest/a_5', 'hash': md5hex("a" * 5),
|
|
'content_type': 'text/plain', 'bytes': '5'},
|
|
{'name': '/gettest/manifest-bc', 'sub_slo': True,
|
|
'content_type': 'application/json',
|
|
'hash': md5hex(md5hex("b" * 10) + md5hex("c" * 15)),
|
|
'bytes': 25},
|
|
{'name': '/gettest/d_20', 'hash': md5hex("d" * 20),
|
|
'content_type': 'text/plain', 'bytes': '20'}]
|
|
slo_etag = md5hex(''.join(seg['hash'] for seg in slo_data))
|
|
|
|
def setUp(self):
|
|
super(TestSloConditionalGetOldManifest, self).setUp()
|
|
|
|
# some plain old objects
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/a_5',
|
|
swob.HTTPOk, {'Content-Length': '5',
|
|
'Etag': md5hex('a' * 5)},
|
|
b'a' * 5)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/b_10',
|
|
swob.HTTPOk, {'Content-Length': '10',
|
|
'Etag': md5hex('b' * 10)},
|
|
b'b' * 10)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/c_15',
|
|
swob.HTTPOk, {'Content-Length': '15',
|
|
'Etag': md5hex('c' * 15)},
|
|
b'c' * 15)
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/d_20',
|
|
swob.HTTPOk, {'Content-Length': '20',
|
|
'Etag': md5hex('d' * 20)},
|
|
b'd' * 20)
|
|
|
|
_bc_manifest_json = json.dumps(
|
|
[{'name': '/gettest/b_10', 'hash': md5hex('b' * 10), 'bytes': '10',
|
|
'content_type': 'text/plain'},
|
|
{'name': '/gettest/c_15', 'hash': md5hex('c' * 15), 'bytes': '15',
|
|
'content_type': 'text/plain'}])
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-bc',
|
|
swob.HTTPOk, {'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'X-Object-Meta-Plant': 'Ficus',
|
|
'Etag': md5hex(_bc_manifest_json)},
|
|
_bc_manifest_json)
|
|
|
|
_abcd_manifest_json = json.dumps(self.slo_data)
|
|
self.abcd_manifest_json_etag = md5hex(_abcd_manifest_json)
|
|
manifest_headers = {
|
|
'Content-Length': str(len(_abcd_manifest_json)),
|
|
'Content-Type': 'application/json',
|
|
'X-Static-Large-Object': 'true',
|
|
'Etag': self.abcd_manifest_json_etag,
|
|
'X-Object-Sysmeta-Custom-Etag': 'a custom etag'}
|
|
manifest_headers.update(getattr(self, 'extra_manifest_headers', {}))
|
|
self.manifest_has_sysmeta = all(h in manifest_headers for h in (
|
|
'X-Object-Sysmeta-Slo-Etag', 'X-Object-Sysmeta-Slo-Size'))
|
|
self.app.register(
|
|
'GET', '/v1/AUTH_test/gettest/manifest-abcd',
|
|
swob.HTTPOk, manifest_headers,
|
|
_abcd_manifest_json.encode('ascii'))
|
|
|
|
def test_if_none_match_matches(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-None-Match': self.slo_etag})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '304 Not Modified')
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertEqual(body, b'')
|
|
|
|
expected_app_calls = [('GET', '/v1/AUTH_test/gettest/manifest-abcd')]
|
|
if not self.manifest_has_sysmeta:
|
|
# We *still* verify the first segment
|
|
expected_app_calls.extend([
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
])
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_none_match_does_not_match(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-None-Match': "not-%s" % self.slo_etag})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertIn(('Content-Length', '50'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
expected_app_calls = [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get'),
|
|
]
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_match_matches(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Match': self.slo_etag})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertIn(('Content-Length', '50'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
expected_app_calls = [('GET', '/v1/AUTH_test/gettest/manifest-abcd')]
|
|
if not self.manifest_has_sysmeta:
|
|
# Manifest never matches -> got back a 412; need to re-fetch
|
|
expected_app_calls.append(
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'))
|
|
expected_app_calls.extend([
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get'),
|
|
])
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_match_does_not_match(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Match': "not-%s" % self.slo_etag})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '412 Precondition Failed')
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertEqual(body, b'')
|
|
|
|
expected_app_calls = [('GET', '/v1/AUTH_test/gettest/manifest-abcd')]
|
|
if not self.manifest_has_sysmeta:
|
|
# We *still* verify the first segment
|
|
expected_app_calls.extend([
|
|
# Manifest never matches -> got back a 412; need to re-fetch
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
])
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_none_match_matches_with_override(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-None-Match': '"a custom etag"',
|
|
'X-Backend-Etag-Is-At': 'X-Object-Sysmeta-Custom-Etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '304 Not Modified')
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('X-Object-Sysmeta-Custom-Etag', 'a custom etag'),
|
|
headers)
|
|
self.assertEqual(body, b'')
|
|
|
|
expected_app_calls = [('GET', '/v1/AUTH_test/gettest/manifest-abcd')]
|
|
if not self.manifest_has_sysmeta:
|
|
# NB: no known middleware would have written a custom etag with
|
|
# old-style manifests. but if there *was*, here's what'd happen
|
|
expected_app_calls.extend([
|
|
# 304, so gotta refetch
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
# Since the "authoritative" etag didn't come from slo, we still
|
|
# verify the first segment
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
])
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(
|
|
self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'X-Object-Sysmeta-Custom-Etag,x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_none_match_does_not_match_with_override(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-None-Match': "%s" % self.slo_etag,
|
|
'X-Backend-Etag-Is-At': 'X-Object-Sysmeta-Custom-Etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertIn(('Content-Length', '50'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('X-Object-Sysmeta-Custom-Etag', 'a custom etag'),
|
|
headers)
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
expected_app_calls = [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get'),
|
|
]
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(
|
|
self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'X-Object-Sysmeta-Custom-Etag,x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_match_matches_with_override(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Match': '"a custom etag"',
|
|
'X-Backend-Etag-Is-At': 'X-Object-Sysmeta-Custom-Etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
self.assertIn(('Content-Length', '50'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('X-Object-Sysmeta-Custom-Etag', 'a custom etag'),
|
|
headers)
|
|
self.assertEqual(
|
|
body, b'aaaaabbbbbbbbbbcccccccccccccccdddddddddddddddddddd')
|
|
|
|
expected_app_calls = [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
# Match on the override from left of us; no need to refetch
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/c_15?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/d_20?multipart-manifest=get'),
|
|
]
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(
|
|
self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'X-Object-Sysmeta-Custom-Etag,x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_match_does_not_match_with_override(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Match': "%s" % self.slo_etag,
|
|
'X-Backend-Etag-Is-At': 'X-Object-Sysmeta-Custom-Etag'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '412 Precondition Failed')
|
|
self.assertIn(('Content-Length', '0'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.slo_etag), headers)
|
|
self.assertIn(('X-Object-Sysmeta-Custom-Etag', 'a custom etag'),
|
|
headers)
|
|
self.assertEqual(body, b'')
|
|
|
|
expected_app_calls = [('GET', '/v1/AUTH_test/gettest/manifest-abcd')]
|
|
if not self.manifest_has_sysmeta:
|
|
# NB: no known middleware would have written a custom etag with
|
|
# old-style manifests. but if there *was*, here's what'd happen
|
|
expected_app_calls.extend([
|
|
# Manifest never matches -> got back a 412; need to re-fetch
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
# We *still* verify the first segment, even though we'll 412
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
])
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(
|
|
self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'X-Object-Sysmeta-Custom-Etag,x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_match_matches_and_range(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Match': self.slo_etag,
|
|
'Range': 'bytes=3-6'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertIn(('Content-Length', '4'), headers)
|
|
self.assertIn(('Etag', '"%s"' % self.manifest_abcd_etag), headers)
|
|
self.assertEqual(body, b'aabb')
|
|
|
|
expected_app_calls = [
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
# Needed to re-fetch because Range (and, for old manifests, 412)
|
|
('GET', '/v1/AUTH_test/gettest/manifest-abcd'),
|
|
('GET', '/v1/AUTH_test/gettest/manifest-bc'),
|
|
('GET', '/v1/AUTH_test/gettest/a_5?multipart-manifest=get'),
|
|
('GET', '/v1/AUTH_test/gettest/b_10?multipart-manifest=get'),
|
|
]
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertEqual(self.app.headers[0].get('X-Backend-Etag-Is-At'),
|
|
'x-object-sysmeta-slo-etag')
|
|
|
|
def test_if_match_matches_passthrough(self):
|
|
# first fetch and stash the manifest etag
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd?multipart-manifest=get',
|
|
environ={'REQUEST_METHOD': 'GET'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '200 OK')
|
|
headers = HeaderKeyDict(headers)
|
|
self.assertEqual('application/json; charset=utf-8',
|
|
headers['Content-Type'])
|
|
manifest_etag = headers['Etag']
|
|
|
|
# now use it as a condition and expect to match
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd?multipart-manifest=get',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'If-Match': manifest_etag})
|
|
status, headers, body = self.call_slo(req)
|
|
self.assertEqual(status, '200 OK')
|
|
headers = HeaderKeyDict(headers)
|
|
self.assertEqual(manifest_etag, headers['Etag'])
|
|
|
|
expected_app_calls = [
|
|
('GET',
|
|
'/v1/AUTH_test/gettest/manifest-abcd?multipart-manifest=get')] * 2
|
|
self.assertEqual(self.app.calls, expected_app_calls)
|
|
self.assertNotIn('X-Backend-Etag-Is-At', self.app.headers[0])
|
|
self.assertNotIn('X-Backend-Etag-Is-At', self.app.headers[1])
|
|
|
|
def test_range_resume_download(self):
|
|
req = Request.blank(
|
|
'/v1/AUTH_test/gettest/manifest-abcd',
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
headers={'Range': 'bytes=20-'})
|
|
status, headers, body = self.call_slo(req)
|
|
|
|
self.assertEqual(status, '206 Partial Content')
|
|
self.assertEqual(body, b'ccccccccccdddddddddddddddddddd')
|
|
|
|
|
|
class TestSloConditionalGetNewManifest(TestSloConditionalGetOldManifest):
|
|
def setUp(self):
|
|
self.extra_manifest_headers = {
|
|
'X-Object-Sysmeta-Slo-Etag': self.slo_etag,
|
|
'X-Object-Sysmeta-Slo-Size': '50',
|
|
}
|
|
super(TestSloConditionalGetNewManifest, self).setUp()
|
|
|
|
|
|
class TestSloBulkDeleter(unittest.TestCase):
|
|
def test_reused_logger(self):
|
|
slo_mware = slo.filter_factory({})('fake app')
|
|
self.assertTrue(slo_mware.logger is slo_mware.bulk_deleter.logger)
|
|
|
|
def test_passes_through_concurrency(self):
|
|
slo_mware = slo.filter_factory({'delete_concurrency': 5})('fake app')
|
|
self.assertEqual(5, slo_mware.bulk_deleter.delete_concurrency)
|
|
|
|
def test_uses_big_max_deletes(self):
|
|
slo_mware = slo.filter_factory(
|
|
{'max_manifest_segments': 123456789})('fake app')
|
|
self.assertGreaterEqual(
|
|
slo_mware.bulk_deleter.max_deletes_per_request,
|
|
123456789)
|
|
|
|
|
|
class TestSwiftInfo(unittest.TestCase):
|
|
def setUp(self):
|
|
utils._swift_info = {}
|
|
utils._swift_admin_info = {}
|
|
|
|
def test_registered_defaults(self):
|
|
mware = slo.filter_factory({})('have to pass in an app')
|
|
swift_info = utils.get_swift_info()
|
|
self.assertTrue('slo' in swift_info)
|
|
self.assertEqual(swift_info['slo'].get('max_manifest_segments'),
|
|
mware.max_manifest_segments)
|
|
self.assertEqual(swift_info['slo'].get('min_segment_size'), 1)
|
|
self.assertEqual(swift_info['slo'].get('max_manifest_size'),
|
|
mware.max_manifest_size)
|
|
self.assertEqual(1000, mware.max_manifest_segments)
|
|
self.assertEqual(8388608, mware.max_manifest_size)
|
|
self.assertEqual(1048576, mware.rate_limit_under_size)
|
|
self.assertEqual(10, mware.rate_limit_after_segment)
|
|
self.assertEqual(1, mware.rate_limit_segments_per_sec)
|
|
self.assertEqual(10, mware.yield_frequency)
|
|
self.assertEqual(2, mware.concurrency)
|
|
self.assertEqual(2, mware.bulk_deleter.delete_concurrency)
|
|
|
|
def test_registered_non_defaults(self):
|
|
conf = dict(
|
|
max_manifest_segments=500, max_manifest_size=1048576,
|
|
rate_limit_under_size=2097152, rate_limit_after_segment=20,
|
|
rate_limit_segments_per_sec=2, yield_frequency=5, concurrency=1,
|
|
delete_concurrency=3)
|
|
mware = slo.filter_factory(conf)('have to pass in an app')
|
|
swift_info = utils.get_swift_info()
|
|
self.assertTrue('slo' in swift_info)
|
|
self.assertEqual(swift_info['slo'].get('max_manifest_segments'), 500)
|
|
self.assertEqual(swift_info['slo'].get('min_segment_size'), 1)
|
|
self.assertEqual(swift_info['slo'].get('max_manifest_size'), 1048576)
|
|
self.assertEqual(500, mware.max_manifest_segments)
|
|
self.assertEqual(1048576, mware.max_manifest_size)
|
|
self.assertEqual(2097152, mware.rate_limit_under_size)
|
|
self.assertEqual(20, mware.rate_limit_after_segment)
|
|
self.assertEqual(2, mware.rate_limit_segments_per_sec)
|
|
self.assertEqual(5, mware.yield_frequency)
|
|
self.assertEqual(1, mware.concurrency)
|
|
self.assertEqual(3, mware.bulk_deleter.delete_concurrency)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
unittest.main()
|