2013-09-20 01:00:54 +08:00
|
|
|
# Copyright (c) 2010-2012 OpenStack Foundation
|
2013-03-30 15:55:29 +03:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
|
|
# implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import mock
|
|
|
|
import unittest
|
|
|
|
|
|
|
|
from swift.common.swob import Request
|
|
|
|
from swift.proxy import server as proxy_server
|
|
|
|
from swift.proxy.controllers.base import headers_to_account_info
|
2013-10-28 17:28:57 -07:00
|
|
|
from swift.common.constraints import MAX_ACCOUNT_NAME_LENGTH as MAX_ANAME_LEN
|
2013-03-30 15:55:29 +03:00
|
|
|
from test.unit import fake_http_connect, FakeRing, FakeMemcache
|
2013-12-03 22:02:39 +00:00
|
|
|
from swift.common.request_helpers import get_sys_meta_prefix
|
2013-03-30 15:55:29 +03:00
|
|
|
|
|
|
|
|
|
|
|
class TestAccountController(unittest.TestCase):
|
|
|
|
def setUp(self):
|
|
|
|
self.app = proxy_server.Application(None, FakeMemcache(),
|
|
|
|
account_ring=FakeRing(),
|
|
|
|
container_ring=FakeRing(),
|
2013-06-13 11:24:29 -07:00
|
|
|
object_ring=FakeRing())
|
2013-03-30 15:55:29 +03:00
|
|
|
|
|
|
|
def test_account_info_in_response_env(self):
|
|
|
|
controller = proxy_server.AccountController(self.app, 'AUTH_bob')
|
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
2013-10-28 17:28:57 -07:00
|
|
|
fake_http_connect(200, body='')):
|
Stop mutating PATH_INFO in proxy server
The proxy server was calling swob.Request.path_info_pop() prior to
instantiating a controller so that req.path_info was just /a/c/o (sans
/v1). The version got moved over into SCRIPT_NAME.
This lead to some unfortunate behavior when trying to re-use a request
from middleware. Something like this:
# Imagine we're a WSGIContext object here.
#
# To start, SCRIPT_NAME = '' and PATH_INFO='/v1/a/c/o'
resp_iter = self._app_call(env, start_response)
# Now SCRIPT_NAME='/v1' and PATH_INFO ='/a/c/o'
if something_special in self._response_headers:
env['REQUEST_METHOD'] = 'GET'
env.pop('HTTP_RANGE', None)
# 404 SURPRISE! The proxy calls path_info_pop() again,
# and now SCRIPT_NAME='/v1/a' and PATH_INFO='/c/o', so this
# gets treated as a container request. Yikes.
resp_iter = self._app_call(env, start_response)
Now we just leave SCRIPT_NAME and PATH_INFO alone. To make life easy
for everyone who does want just /a/c/o, I defined
swob.Request.swift_entity_path, which just strips off the /v1.
Note that there's still one call to path_info_pop() in tempauth, but
that's only for requests going to /auth, so it won't affect Swift API
requests. It might be a good idea to remove that one later, but let's
do one thing at a time.
Change-Id: I87557a11c01f3f3889b610578cda6ba7d3933e7a
2013-12-03 22:18:46 -08:00
|
|
|
req = Request.blank('/v1/AUTH_bob', {'PATH_INFO': '/v1/AUTH_bob'})
|
2013-03-30 15:55:29 +03:00
|
|
|
resp = controller.HEAD(req)
|
|
|
|
self.assertEqual(2, resp.status_int // 100)
|
|
|
|
self.assertTrue('swift.account/AUTH_bob' in resp.environ)
|
|
|
|
self.assertEqual(headers_to_account_info(resp.headers),
|
|
|
|
resp.environ['swift.account/AUTH_bob'])
|
|
|
|
|
2013-06-27 14:11:25 +00:00
|
|
|
def test_swift_owner(self):
|
|
|
|
owner_headers = {
|
|
|
|
'x-account-meta-temp-url-key': 'value',
|
|
|
|
'x-account-meta-temp-url-key-2': 'value'}
|
|
|
|
controller = proxy_server.AccountController(self.app, 'a')
|
|
|
|
|
Stop mutating PATH_INFO in proxy server
The proxy server was calling swob.Request.path_info_pop() prior to
instantiating a controller so that req.path_info was just /a/c/o (sans
/v1). The version got moved over into SCRIPT_NAME.
This lead to some unfortunate behavior when trying to re-use a request
from middleware. Something like this:
# Imagine we're a WSGIContext object here.
#
# To start, SCRIPT_NAME = '' and PATH_INFO='/v1/a/c/o'
resp_iter = self._app_call(env, start_response)
# Now SCRIPT_NAME='/v1' and PATH_INFO ='/a/c/o'
if something_special in self._response_headers:
env['REQUEST_METHOD'] = 'GET'
env.pop('HTTP_RANGE', None)
# 404 SURPRISE! The proxy calls path_info_pop() again,
# and now SCRIPT_NAME='/v1/a' and PATH_INFO='/c/o', so this
# gets treated as a container request. Yikes.
resp_iter = self._app_call(env, start_response)
Now we just leave SCRIPT_NAME and PATH_INFO alone. To make life easy
for everyone who does want just /a/c/o, I defined
swob.Request.swift_entity_path, which just strips off the /v1.
Note that there's still one call to path_info_pop() in tempauth, but
that's only for requests going to /auth, so it won't affect Swift API
requests. It might be a good idea to remove that one later, but let's
do one thing at a time.
Change-Id: I87557a11c01f3f3889b610578cda6ba7d3933e7a
2013-12-03 22:18:46 -08:00
|
|
|
req = Request.blank('/v1/a')
|
2013-06-27 14:11:25 +00:00
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
2013-10-28 17:28:57 -07:00
|
|
|
fake_http_connect(200, headers=owner_headers)):
|
2013-06-27 14:11:25 +00:00
|
|
|
resp = controller.HEAD(req)
|
|
|
|
self.assertEquals(2, resp.status_int // 100)
|
|
|
|
for key in owner_headers:
|
|
|
|
self.assertTrue(key not in resp.headers)
|
|
|
|
|
Stop mutating PATH_INFO in proxy server
The proxy server was calling swob.Request.path_info_pop() prior to
instantiating a controller so that req.path_info was just /a/c/o (sans
/v1). The version got moved over into SCRIPT_NAME.
This lead to some unfortunate behavior when trying to re-use a request
from middleware. Something like this:
# Imagine we're a WSGIContext object here.
#
# To start, SCRIPT_NAME = '' and PATH_INFO='/v1/a/c/o'
resp_iter = self._app_call(env, start_response)
# Now SCRIPT_NAME='/v1' and PATH_INFO ='/a/c/o'
if something_special in self._response_headers:
env['REQUEST_METHOD'] = 'GET'
env.pop('HTTP_RANGE', None)
# 404 SURPRISE! The proxy calls path_info_pop() again,
# and now SCRIPT_NAME='/v1/a' and PATH_INFO='/c/o', so this
# gets treated as a container request. Yikes.
resp_iter = self._app_call(env, start_response)
Now we just leave SCRIPT_NAME and PATH_INFO alone. To make life easy
for everyone who does want just /a/c/o, I defined
swob.Request.swift_entity_path, which just strips off the /v1.
Note that there's still one call to path_info_pop() in tempauth, but
that's only for requests going to /auth, so it won't affect Swift API
requests. It might be a good idea to remove that one later, but let's
do one thing at a time.
Change-Id: I87557a11c01f3f3889b610578cda6ba7d3933e7a
2013-12-03 22:18:46 -08:00
|
|
|
req = Request.blank('/v1/a', environ={'swift_owner': True})
|
2013-06-27 14:11:25 +00:00
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
2013-10-28 17:28:57 -07:00
|
|
|
fake_http_connect(200, headers=owner_headers)):
|
2013-06-27 14:11:25 +00:00
|
|
|
resp = controller.HEAD(req)
|
|
|
|
self.assertEquals(2, resp.status_int // 100)
|
|
|
|
for key in owner_headers:
|
|
|
|
self.assertTrue(key in resp.headers)
|
|
|
|
|
2013-10-28 17:28:57 -07:00
|
|
|
def test_get_deleted_account(self):
|
|
|
|
resp_headers = {
|
|
|
|
'x-account-status': 'deleted',
|
|
|
|
}
|
|
|
|
controller = proxy_server.AccountController(self.app, 'a')
|
|
|
|
|
Stop mutating PATH_INFO in proxy server
The proxy server was calling swob.Request.path_info_pop() prior to
instantiating a controller so that req.path_info was just /a/c/o (sans
/v1). The version got moved over into SCRIPT_NAME.
This lead to some unfortunate behavior when trying to re-use a request
from middleware. Something like this:
# Imagine we're a WSGIContext object here.
#
# To start, SCRIPT_NAME = '' and PATH_INFO='/v1/a/c/o'
resp_iter = self._app_call(env, start_response)
# Now SCRIPT_NAME='/v1' and PATH_INFO ='/a/c/o'
if something_special in self._response_headers:
env['REQUEST_METHOD'] = 'GET'
env.pop('HTTP_RANGE', None)
# 404 SURPRISE! The proxy calls path_info_pop() again,
# and now SCRIPT_NAME='/v1/a' and PATH_INFO='/c/o', so this
# gets treated as a container request. Yikes.
resp_iter = self._app_call(env, start_response)
Now we just leave SCRIPT_NAME and PATH_INFO alone. To make life easy
for everyone who does want just /a/c/o, I defined
swob.Request.swift_entity_path, which just strips off the /v1.
Note that there's still one call to path_info_pop() in tempauth, but
that's only for requests going to /auth, so it won't affect Swift API
requests. It might be a good idea to remove that one later, but let's
do one thing at a time.
Change-Id: I87557a11c01f3f3889b610578cda6ba7d3933e7a
2013-12-03 22:18:46 -08:00
|
|
|
req = Request.blank('/v1/a')
|
2013-10-28 17:28:57 -07:00
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
|
|
|
fake_http_connect(404, headers=resp_headers)):
|
|
|
|
resp = controller.HEAD(req)
|
|
|
|
self.assertEquals(410, resp.status_int)
|
|
|
|
|
|
|
|
def test_long_acct_names(self):
|
|
|
|
long_acct_name = '%sLongAccountName' % ('Very' * (MAX_ANAME_LEN // 4))
|
|
|
|
controller = proxy_server.AccountController(self.app, long_acct_name)
|
|
|
|
|
Stop mutating PATH_INFO in proxy server
The proxy server was calling swob.Request.path_info_pop() prior to
instantiating a controller so that req.path_info was just /a/c/o (sans
/v1). The version got moved over into SCRIPT_NAME.
This lead to some unfortunate behavior when trying to re-use a request
from middleware. Something like this:
# Imagine we're a WSGIContext object here.
#
# To start, SCRIPT_NAME = '' and PATH_INFO='/v1/a/c/o'
resp_iter = self._app_call(env, start_response)
# Now SCRIPT_NAME='/v1' and PATH_INFO ='/a/c/o'
if something_special in self._response_headers:
env['REQUEST_METHOD'] = 'GET'
env.pop('HTTP_RANGE', None)
# 404 SURPRISE! The proxy calls path_info_pop() again,
# and now SCRIPT_NAME='/v1/a' and PATH_INFO='/c/o', so this
# gets treated as a container request. Yikes.
resp_iter = self._app_call(env, start_response)
Now we just leave SCRIPT_NAME and PATH_INFO alone. To make life easy
for everyone who does want just /a/c/o, I defined
swob.Request.swift_entity_path, which just strips off the /v1.
Note that there's still one call to path_info_pop() in tempauth, but
that's only for requests going to /auth, so it won't affect Swift API
requests. It might be a good idea to remove that one later, but let's
do one thing at a time.
Change-Id: I87557a11c01f3f3889b610578cda6ba7d3933e7a
2013-12-03 22:18:46 -08:00
|
|
|
req = Request.blank('/v1/%s' % long_acct_name)
|
2013-10-28 17:28:57 -07:00
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
|
|
|
fake_http_connect(200)):
|
|
|
|
resp = controller.HEAD(req)
|
|
|
|
self.assertEquals(400, resp.status_int)
|
|
|
|
|
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
|
|
|
fake_http_connect(200)):
|
|
|
|
resp = controller.GET(req)
|
|
|
|
self.assertEquals(400, resp.status_int)
|
|
|
|
|
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
|
|
|
fake_http_connect(200)):
|
|
|
|
resp = controller.POST(req)
|
|
|
|
self.assertEquals(400, resp.status_int)
|
|
|
|
|
2013-12-03 22:02:39 +00:00
|
|
|
def _make_callback_func(self, context):
|
|
|
|
def callback(ipaddr, port, device, partition, method, path,
|
|
|
|
headers=None, query_string=None, ssl=False):
|
|
|
|
context['method'] = method
|
|
|
|
context['path'] = path
|
|
|
|
context['headers'] = headers or {}
|
|
|
|
return callback
|
|
|
|
|
|
|
|
def test_sys_meta_headers_PUT(self):
|
|
|
|
# check that headers in sys meta namespace make it through
|
|
|
|
# the proxy controller
|
|
|
|
sys_meta_key = '%stest' % get_sys_meta_prefix('account')
|
|
|
|
sys_meta_key = sys_meta_key.title()
|
|
|
|
user_meta_key = 'X-Account-Meta-Test'
|
|
|
|
# allow PUTs to account...
|
|
|
|
self.app.allow_account_management = True
|
|
|
|
controller = proxy_server.AccountController(self.app, 'a')
|
|
|
|
context = {}
|
|
|
|
callback = self._make_callback_func(context)
|
|
|
|
hdrs_in = {sys_meta_key: 'foo',
|
|
|
|
user_meta_key: 'bar',
|
|
|
|
'x-timestamp': '1.0'}
|
|
|
|
req = Request.blank('/v1/a', headers=hdrs_in)
|
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
|
|
|
fake_http_connect(200, 200, give_connect=callback)):
|
|
|
|
controller.PUT(req)
|
|
|
|
self.assertEqual(context['method'], 'PUT')
|
|
|
|
self.assertTrue(sys_meta_key in context['headers'])
|
|
|
|
self.assertEqual(context['headers'][sys_meta_key], 'foo')
|
|
|
|
self.assertTrue(user_meta_key in context['headers'])
|
|
|
|
self.assertEqual(context['headers'][user_meta_key], 'bar')
|
|
|
|
self.assertNotEqual(context['headers']['x-timestamp'], '1.0')
|
|
|
|
|
|
|
|
def test_sys_meta_headers_POST(self):
|
|
|
|
# check that headers in sys meta namespace make it through
|
|
|
|
# the proxy controller
|
|
|
|
sys_meta_key = '%stest' % get_sys_meta_prefix('account')
|
|
|
|
sys_meta_key = sys_meta_key.title()
|
|
|
|
user_meta_key = 'X-Account-Meta-Test'
|
|
|
|
controller = proxy_server.AccountController(self.app, 'a')
|
|
|
|
context = {}
|
|
|
|
callback = self._make_callback_func(context)
|
|
|
|
hdrs_in = {sys_meta_key: 'foo',
|
|
|
|
user_meta_key: 'bar',
|
|
|
|
'x-timestamp': '1.0'}
|
|
|
|
req = Request.blank('/v1/a', headers=hdrs_in)
|
|
|
|
with mock.patch('swift.proxy.controllers.base.http_connect',
|
|
|
|
fake_http_connect(200, 200, give_connect=callback)):
|
|
|
|
controller.POST(req)
|
|
|
|
self.assertEqual(context['method'], 'POST')
|
|
|
|
self.assertTrue(sys_meta_key in context['headers'])
|
|
|
|
self.assertEqual(context['headers'][sys_meta_key], 'foo')
|
|
|
|
self.assertTrue(user_meta_key in context['headers'])
|
|
|
|
self.assertEqual(context['headers'][user_meta_key], 'bar')
|
|
|
|
self.assertNotEqual(context['headers']['x-timestamp'], '1.0')
|
|
|
|
|
2013-03-30 15:55:29 +03:00
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main()
|