2013-06-09 01:14:23 +08:00
|
|
|
#-*- coding:utf-8 -*-
|
2012-03-19 13:45:34 -05:00
|
|
|
# Copyright (c) 2010-2012 OpenStack, LLC.
|
2010-07-12 17:03:45 -05:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
|
|
# implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
2013-08-31 22:36:58 -04:00
|
|
|
"""Tests for swift.obj.server"""
|
2010-07-12 17:03:45 -05:00
|
|
|
|
|
|
|
import cPickle as pickle
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
import operator
|
2010-07-12 17:03:45 -05:00
|
|
|
import os
|
2012-12-17 06:39:25 -05:00
|
|
|
import mock
|
2010-07-12 17:03:45 -05:00
|
|
|
import unittest
|
|
|
|
from shutil import rmtree
|
|
|
|
from StringIO import StringIO
|
2013-03-26 20:42:26 +00:00
|
|
|
from time import gmtime, strftime, time
|
2011-01-19 14:18:37 -06:00
|
|
|
from tempfile import mkdtemp
|
2011-03-15 22:12:03 -07:00
|
|
|
from hashlib import md5
|
2010-07-12 17:03:45 -05:00
|
|
|
|
2012-02-07 14:02:28 -08:00
|
|
|
from eventlet import sleep, spawn, wsgi, listen, Timeout
|
2011-03-15 22:12:03 -07:00
|
|
|
from test.unit import FakeLogger
|
2010-07-12 17:03:45 -05:00
|
|
|
from test.unit import connect_tcp, readuntil2crlfs
|
2013-03-26 20:42:26 +00:00
|
|
|
from swift.obj import server as object_server
|
2013-07-17 16:32:35 -07:00
|
|
|
from swift.obj import diskfile
|
2011-10-26 21:42:24 +00:00
|
|
|
from swift.common import utils
|
2010-07-12 17:03:45 -05:00
|
|
|
from swift.common.utils import hash_path, mkdirs, normalize_timestamp, \
|
2013-05-23 20:16:21 +04:00
|
|
|
NullLogger, storage_directory, public, \
|
|
|
|
replication
|
2012-09-05 20:49:50 -07:00
|
|
|
from swift.common import constraints
|
2011-03-16 07:55:07 -07:00
|
|
|
from eventlet import tpool
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
from swift.common.swob import Request, HeaderKeyDict
|
2010-07-12 17:03:45 -05:00
|
|
|
|
2011-03-16 09:04:00 -07:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
class TestObjectController(unittest.TestCase):
|
2013-08-31 22:36:58 -04:00
|
|
|
"""Test swift.obj.server.ObjectController"""
|
2010-07-12 17:03:45 -05:00
|
|
|
|
|
|
|
def setUp(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
"""Set up for testing swift.object.server.ObjectController"""
|
2011-10-26 21:42:24 +00:00
|
|
|
utils.HASH_PATH_SUFFIX = 'endcap'
|
2013-03-20 01:35:41 +02:00
|
|
|
utils.HASH_PATH_PREFIX = 'startcap'
|
2011-01-19 14:18:37 -06:00
|
|
|
self.testdir = \
|
|
|
|
os.path.join(mkdtemp(), 'tmp_test_object_server_ObjectController')
|
2010-07-12 17:03:45 -05:00
|
|
|
mkdirs(os.path.join(self.testdir, 'sda1', 'tmp'))
|
|
|
|
conf = {'devices': self.testdir, 'mount_check': 'false'}
|
|
|
|
self.object_controller = object_server.ObjectController(conf)
|
2010-10-13 21:26:43 +00:00
|
|
|
self.object_controller.bytes_per_sync = 1
|
2013-07-17 16:32:35 -07:00
|
|
|
self._orig_tpool_exc = tpool.execute
|
|
|
|
tpool.execute = lambda f, *args, **kwargs: f(*args, **kwargs)
|
2010-07-12 17:03:45 -05:00
|
|
|
|
|
|
|
def tearDown(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
"""Tear down for testing swift.object.server.ObjectController"""
|
2011-01-24 17:12:38 -08:00
|
|
|
rmtree(os.path.dirname(self.testdir))
|
2013-08-16 17:13:00 -04:00
|
|
|
tpool.execute = self._orig_tpool_exc
|
2010-07-12 17:03:45 -05:00
|
|
|
|
2013-06-09 01:14:23 +08:00
|
|
|
def test_REQUEST_SPECIAL_CHARS(self):
|
|
|
|
obj = 'special昆%20/%'
|
|
|
|
path = '/sda1/p/a/c/%s' % obj
|
|
|
|
body = 'SPECIAL_STRING'
|
|
|
|
|
|
|
|
# create one
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank(path, environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',})
|
|
|
|
req.body = body
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-06-09 01:14:23 +08:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
# check it
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank(path, environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-06-09 01:14:23 +08:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.body, body)
|
|
|
|
|
|
|
|
# update it
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank(path, environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-06-09 01:14:23 +08:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
|
|
|
|
# head it
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank(path, environ={'REQUEST_METHOD': 'HEAD'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-06-09 01:14:23 +08:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
|
|
|
#delete it
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank(path, environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-06-09 01:14:23 +08:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_POST_update_meta(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.POST
|
2011-03-24 13:03:49 -05:00
|
|
|
original_headers = self.object_controller.allowed_headers
|
2011-03-22 20:05:44 -05:00
|
|
|
test_headers = 'content-encoding foo bar'.split()
|
|
|
|
self.object_controller.allowed_headers = set(test_headers)
|
2010-07-12 17:03:45 -05:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',
|
2011-03-22 20:05:44 -05:00
|
|
|
'Foo': 'fooheader',
|
|
|
|
'Baz': 'bazheader',
|
2010-07-12 17:03:45 -05:00
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-Two': 'Two'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
timestamp = normalize_timestamp(time())
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
2010-07-12 17:03:45 -05:00
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Object-Meta-3': 'Three',
|
|
|
|
'X-Object-Meta-4': 'Four',
|
2011-03-22 18:17:47 -05:00
|
|
|
'Content-Encoding': 'gzip',
|
2011-03-22 20:05:44 -05:00
|
|
|
'Foo': 'fooheader',
|
|
|
|
'Bar': 'barheader',
|
2010-07-12 17:03:45 -05:00
|
|
|
'Content-Type': 'application/x-test'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-24 13:03:49 -05:00
|
|
|
self.assert_("X-Object-Meta-1" not in resp.headers and
|
|
|
|
"X-Object-Meta-Two" not in resp.headers and
|
|
|
|
"X-Object-Meta-3" in resp.headers and
|
|
|
|
"X-Object-Meta-4" in resp.headers and
|
|
|
|
"Foo" in resp.headers and
|
|
|
|
"Bar" in resp.headers and
|
|
|
|
"Baz" not in resp.headers and
|
2011-03-22 18:17:47 -05:00
|
|
|
"Content-Encoding" in resp.headers)
|
|
|
|
self.assertEquals(resp.headers['Content-Type'], 'application/x-test')
|
|
|
|
|
2011-04-19 15:57:44 -05:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'HEAD'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-04-19 15:57:44 -05:00
|
|
|
self.assert_("X-Object-Meta-1" not in resp.headers and
|
|
|
|
"X-Object-Meta-Two" not in resp.headers and
|
|
|
|
"X-Object-Meta-3" in resp.headers and
|
|
|
|
"X-Object-Meta-4" in resp.headers and
|
|
|
|
"Foo" in resp.headers and
|
|
|
|
"Bar" in resp.headers and
|
|
|
|
"Baz" not in resp.headers and
|
|
|
|
"Content-Encoding" in resp.headers)
|
|
|
|
self.assertEquals(resp.headers['Content-Type'], 'application/x-test')
|
|
|
|
|
2011-03-22 18:17:47 -05:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-22 18:17:47 -05:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-24 13:03:49 -05:00
|
|
|
self.assert_("X-Object-Meta-3" not in resp.headers and
|
|
|
|
"X-Object-Meta-4" not in resp.headers and
|
|
|
|
"Foo" not in resp.headers and
|
|
|
|
"Bar" not in resp.headers and
|
2011-03-22 18:17:47 -05:00
|
|
|
"Content-Encoding" not in resp.headers)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.headers['Content-Type'], 'application/x-test')
|
|
|
|
|
2011-03-24 13:03:49 -05:00
|
|
|
# test defaults
|
|
|
|
self.object_controller.allowed_headers = original_headers
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',
|
|
|
|
'Foo': 'fooheader',
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Manifest': 'c/bar',
|
|
|
|
'Content-Encoding': 'gzip',
|
|
|
|
'Content-Disposition': 'bar',
|
|
|
|
})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-24 13:03:49 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-24 13:03:49 -05:00
|
|
|
self.assert_("X-Object-Meta-1" in resp.headers and
|
|
|
|
"Foo" not in resp.headers and
|
|
|
|
"Content-Encoding" in resp.headers and
|
|
|
|
"X-Object-Manifest" in resp.headers and
|
|
|
|
"Content-Disposition" in resp.headers)
|
|
|
|
self.assertEquals(resp.headers['Content-Type'], 'application/x-test')
|
|
|
|
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Object-Meta-3': 'Three',
|
|
|
|
'Foo': 'fooheader',
|
|
|
|
'Content-Type': 'application/x-test'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-24 13:03:49 -05:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-24 13:03:49 -05:00
|
|
|
self.assert_("X-Object-Meta-1" not in resp.headers and
|
|
|
|
"Foo" not in resp.headers and
|
|
|
|
"Content-Encoding" not in resp.headers and
|
|
|
|
"X-Object-Manifest" not in resp.headers and
|
|
|
|
"Content-Disposition" not in resp.headers and
|
2010-07-12 17:03:45 -05:00
|
|
|
"X-Object-Meta-3" in resp.headers)
|
|
|
|
self.assertEquals(resp.headers['Content-Type'], 'application/x-test')
|
|
|
|
|
2013-07-02 11:48:19 -04:00
|
|
|
def test_POST_old_timestamp(self):
|
|
|
|
ts = time()
|
|
|
|
timestamp = normalize_timestamp(ts)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-Two': 'Two'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
# Same timestamp should result in 409
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Object-Meta-3': 'Three',
|
|
|
|
'X-Object-Meta-4': 'Four',
|
|
|
|
'Content-Encoding': 'gzip',
|
|
|
|
'Content-Type': 'application/x-test'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 409)
|
|
|
|
|
|
|
|
# Earlier timestamp should result in 409
|
|
|
|
timestamp = normalize_timestamp(ts - 1)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Object-Meta-5': 'Five',
|
|
|
|
'X-Object-Meta-6': 'Six',
|
|
|
|
'Content-Encoding': 'gzip',
|
|
|
|
'Content-Type': 'application/x-test'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 409)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_POST_not_exist(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/fail',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
2010-07-12 17:03:45 -05:00
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-2': 'Two',
|
|
|
|
'Content-Type': 'text/plain'})
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
def test_POST_invalid_path(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c', environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-2': 'Two',
|
|
|
|
'Content-Type': 'text/plain'})
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_POST_container_connection(self):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def mock_http_connect(response, with_exc=False):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
class FakeConn(object):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def __init__(self, status, with_exc):
|
|
|
|
self.status = status
|
|
|
|
self.reason = 'Fake'
|
|
|
|
self.host = '1.2.3.4'
|
|
|
|
self.port = '1234'
|
|
|
|
self.with_exc = with_exc
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def getresponse(self):
|
|
|
|
if self.with_exc:
|
|
|
|
raise Exception('test')
|
|
|
|
return self
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def read(self, amt=None):
|
|
|
|
return ''
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
return lambda *args, **kwargs: FakeConn(response, with_exc)
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
old_http_connect = object_server.http_connect
|
|
|
|
try:
|
2013-07-02 11:48:19 -04:00
|
|
|
ts = time()
|
|
|
|
timestamp = normalize_timestamp(ts)
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD':
|
2013-08-16 17:13:00 -04:00
|
|
|
'PUT'}, headers={'X-Timestamp': timestamp, 'Content-Type':
|
2010-11-16 15:35:39 -08:00
|
|
|
'text/plain', 'Content-Length': '0'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
2013-07-02 11:48:19 -04:00
|
|
|
headers={'X-Timestamp': normalize_timestamp(ts + 1),
|
2010-07-12 17:03:45 -05:00
|
|
|
'X-Container-Host': '1.2.3.4:0',
|
|
|
|
'X-Container-Partition': '3',
|
|
|
|
'X-Container-Device': 'sda1',
|
|
|
|
'X-Container-Timestamp': '1',
|
|
|
|
'Content-Type': 'application/new1'})
|
|
|
|
object_server.http_connect = mock_http_connect(202)
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
2013-07-02 11:48:19 -04:00
|
|
|
headers={'X-Timestamp': normalize_timestamp(ts + 2),
|
2010-07-12 17:03:45 -05:00
|
|
|
'X-Container-Host': '1.2.3.4:0',
|
|
|
|
'X-Container-Partition': '3',
|
|
|
|
'X-Container-Device': 'sda1',
|
|
|
|
'X-Container-Timestamp': '1',
|
|
|
|
'Content-Type': 'application/new1'})
|
|
|
|
object_server.http_connect = mock_http_connect(202, with_exc=True)
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
2013-07-02 11:48:19 -04:00
|
|
|
headers={'X-Timestamp': normalize_timestamp(ts + 3),
|
2010-07-12 17:03:45 -05:00
|
|
|
'X-Container-Host': '1.2.3.4:0',
|
|
|
|
'X-Container-Partition': '3',
|
|
|
|
'X-Container-Device': 'sda1',
|
|
|
|
'X-Container-Timestamp': '1',
|
|
|
|
'Content-Type': 'application/new2'})
|
|
|
|
object_server.http_connect = mock_http_connect(500)
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = old_http_connect
|
|
|
|
|
2011-03-15 22:12:03 -07:00
|
|
|
def test_POST_quarantine_zbyte(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.GET
|
2011-03-15 22:12:03 -07:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2013-07-17 16:32:35 -07:00
|
|
|
file = diskfile.DiskFile(self.testdir, 'sda1', 'p', 'a', 'c', 'o',
|
2011-03-15 22:12:03 -07:00
|
|
|
FakeLogger(), keep_data_fp=True)
|
|
|
|
|
|
|
|
file_name = os.path.basename(file.data_file)
|
|
|
|
with open(file.data_file) as fp:
|
2013-07-17 16:32:35 -07:00
|
|
|
metadata = diskfile.read_metadata(fp)
|
2011-03-15 22:12:03 -07:00
|
|
|
os.unlink(file.data_file)
|
2011-03-16 09:04:00 -07:00
|
|
|
with open(file.data_file, 'w') as fp:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.write_metadata(fp, metadata)
|
2011-03-15 22:12:03 -07:00
|
|
|
|
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time())})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
|
|
|
self.assertEquals(os.listdir(quar_dir)[0], file_name)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_PUT_invalid_path(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c', environ={'REQUEST_METHOD': 'PUT'})
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_PUT_no_timestamp(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT',
|
|
|
|
'CONTENT_LENGTH': '0'})
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_PUT_no_content_type(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '6'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_PUT_invalid_content_type(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '6',
|
|
|
|
'Content-Type': '\xff\xff'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assert_('Content-Type' in resp.body)
|
|
|
|
|
|
|
|
def test_PUT_no_content_length(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'VERIFY'
|
|
|
|
del req.headers['Content-Length']
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 411)
|
|
|
|
|
2013-04-19 00:10:38 -04:00
|
|
|
def test_PUT_zero_content_length(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = ''
|
|
|
|
self.assertEquals(req.headers['Content-Length'], '0')
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-04-19 00:10:38 -04:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_PUT_common(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '6',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.data')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(open(objfile).read(), 'VERIFY')
|
2013-07-17 16:32:35 -07:00
|
|
|
self.assertEquals(diskfile.read_metadata(objfile),
|
2010-07-12 17:03:45 -05:00
|
|
|
{'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '6',
|
|
|
|
'ETag': '0b4c12d7e0a73840c1c4f148fda3b037',
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'name': '/a/c/o'})
|
|
|
|
|
|
|
|
def test_PUT_overwrite(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '6',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'Content-Encoding': 'gzip'})
|
|
|
|
req.body = 'VERIFY TWO'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.data')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(open(objfile).read(), 'VERIFY TWO')
|
2013-07-17 16:32:35 -07:00
|
|
|
self.assertEquals(diskfile.read_metadata(objfile),
|
2010-07-12 17:03:45 -05:00
|
|
|
{'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '10',
|
|
|
|
'ETag': 'b381a4c5dab1eaa1eb9711fa647cd039',
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'name': '/a/c/o',
|
|
|
|
'Content-Encoding': 'gzip'})
|
|
|
|
|
2013-07-02 11:48:19 -04:00
|
|
|
def test_PUT_old_timestamp(self):
|
|
|
|
ts = time()
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(ts),
|
|
|
|
'Content-Length': '6',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(ts),
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'Content-Encoding': 'gzip'})
|
|
|
|
req.body = 'VERIFY TWO'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 409)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(ts - 1),
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'Content-Encoding': 'gzip'})
|
|
|
|
req.body = 'VERIFY THREE'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 409)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_PUT_no_etag(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
2010-11-16 15:35:39 -08:00
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'text/plain'})
|
2010-07-12 17:03:45 -05:00
|
|
|
req.body = 'test'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
def test_PUT_invalid_etag(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
2010-11-16 15:35:39 -08:00
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'ETag': 'invalid'})
|
2010-07-12 17:03:45 -05:00
|
|
|
req.body = 'test'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 422)
|
|
|
|
|
|
|
|
def test_PUT_user_metadata(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'ETag': 'b114ab7b90d9ccac4bd5d99cc7ebb568',
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-Two': 'Two'})
|
|
|
|
req.body = 'VERIFY THREE'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.data')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(open(objfile).read(), 'VERIFY THREE')
|
2013-07-17 16:32:35 -07:00
|
|
|
self.assertEquals(diskfile.read_metadata(objfile),
|
2010-07-12 17:03:45 -05:00
|
|
|
{'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '12',
|
|
|
|
'ETag': 'b114ab7b90d9ccac4bd5d99cc7ebb568',
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'name': '/a/c/o',
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-Two': 'Two'})
|
|
|
|
|
|
|
|
def test_PUT_container_connection(self):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def mock_http_connect(response, with_exc=False):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
class FakeConn(object):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def __init__(self, status, with_exc):
|
|
|
|
self.status = status
|
|
|
|
self.reason = 'Fake'
|
|
|
|
self.host = '1.2.3.4'
|
|
|
|
self.port = '1234'
|
|
|
|
self.with_exc = with_exc
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def getresponse(self):
|
|
|
|
if self.with_exc:
|
|
|
|
raise Exception('test')
|
|
|
|
return self
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def read(self, amt=None):
|
|
|
|
return ''
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
return lambda *args, **kwargs: FakeConn(response, with_exc)
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
old_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
timestamp = normalize_timestamp(time())
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
2013-08-16 17:13:00 -04:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
2010-07-12 17:03:45 -05:00
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Container-Host': '1.2.3.4:0',
|
|
|
|
'X-Container-Partition': '3',
|
|
|
|
'X-Container-Device': 'sda1',
|
|
|
|
'X-Container-Timestamp': '1',
|
|
|
|
'Content-Type': 'application/new1',
|
|
|
|
'Content-Length': '0'})
|
|
|
|
object_server.http_connect = mock_http_connect(201)
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
2013-08-16 17:13:00 -04:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
2010-07-12 17:03:45 -05:00
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Container-Host': '1.2.3.4:0',
|
|
|
|
'X-Container-Partition': '3',
|
|
|
|
'X-Container-Device': 'sda1',
|
|
|
|
'X-Container-Timestamp': '1',
|
|
|
|
'Content-Type': 'application/new1',
|
|
|
|
'Content-Length': '0'})
|
|
|
|
object_server.http_connect = mock_http_connect(500)
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
2013-08-16 17:13:00 -04:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
2010-07-12 17:03:45 -05:00
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'X-Container-Host': '1.2.3.4:0',
|
|
|
|
'X-Container-Partition': '3',
|
|
|
|
'X-Container-Device': 'sda1',
|
|
|
|
'X-Container-Timestamp': '1',
|
|
|
|
'Content-Type': 'application/new1',
|
|
|
|
'Content-Length': '0'})
|
|
|
|
object_server.http_connect = mock_http_connect(500, with_exc=True)
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = old_http_connect
|
|
|
|
|
|
|
|
def test_HEAD(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.HEAD
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c', environ={'REQUEST_METHOD': 'HEAD'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'HEAD'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-Two': 'Two'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'HEAD'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.content_length, 6)
|
|
|
|
self.assertEquals(resp.content_type, 'application/x-test')
|
|
|
|
self.assertEquals(resp.headers['content-type'], 'application/x-test')
|
|
|
|
self.assertEquals(resp.headers['last-modified'],
|
|
|
|
strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp))))
|
|
|
|
self.assertEquals(resp.headers['etag'],
|
|
|
|
'"0b4c12d7e0a73840c1c4f148fda3b037"')
|
|
|
|
self.assertEquals(resp.headers['x-object-meta-1'], 'One')
|
|
|
|
self.assertEquals(resp.headers['x-object-meta-two'], 'Two')
|
|
|
|
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.data')
|
|
|
|
os.unlink(objfile)
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'HEAD'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-length': '6'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'HEAD'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
2011-03-15 22:12:03 -07:00
|
|
|
def test_HEAD_quarantine_zbyte(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.GET
|
2011-03-15 22:12:03 -07:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2013-07-17 16:32:35 -07:00
|
|
|
file = diskfile.DiskFile(self.testdir, 'sda1', 'p', 'a', 'c', 'o',
|
2011-03-15 22:12:03 -07:00
|
|
|
FakeLogger(), keep_data_fp=True)
|
|
|
|
|
|
|
|
file_name = os.path.basename(file.data_file)
|
|
|
|
with open(file.data_file) as fp:
|
2013-07-17 16:32:35 -07:00
|
|
|
metadata = diskfile.read_metadata(fp)
|
2011-03-15 22:12:03 -07:00
|
|
|
os.unlink(file.data_file)
|
2011-03-16 09:04:00 -07:00
|
|
|
with open(file.data_file, 'w') as fp:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.write_metadata(fp, metadata)
|
2011-03-15 22:12:03 -07:00
|
|
|
|
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'HEAD'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
|
|
|
self.assertEquals(os.listdir(quar_dir)[0], file_name)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_GET(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.GET
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c', environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test',
|
|
|
|
'X-Object-Meta-1': 'One',
|
|
|
|
'X-Object-Meta-Two': 'Two'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.body, 'VERIFY')
|
|
|
|
self.assertEquals(resp.content_length, 6)
|
|
|
|
self.assertEquals(resp.content_type, 'application/x-test')
|
|
|
|
self.assertEquals(resp.headers['content-length'], '6')
|
|
|
|
self.assertEquals(resp.headers['content-type'], 'application/x-test')
|
|
|
|
self.assertEquals(resp.headers['last-modified'],
|
|
|
|
strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp))))
|
|
|
|
self.assertEquals(resp.headers['etag'],
|
|
|
|
'"0b4c12d7e0a73840c1c4f148fda3b037"')
|
|
|
|
self.assertEquals(resp.headers['x-object-meta-1'], 'One')
|
|
|
|
self.assertEquals(resp.headers['x-object-meta-two'], 'Two')
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2010-07-12 17:03:45 -05:00
|
|
|
req.range = 'bytes=1-3'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 206)
|
|
|
|
self.assertEquals(resp.body, 'ERI')
|
|
|
|
self.assertEquals(resp.headers['content-length'], '3')
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2010-07-12 17:03:45 -05:00
|
|
|
req.range = 'bytes=1-'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 206)
|
|
|
|
self.assertEquals(resp.body, 'ERIFY')
|
|
|
|
self.assertEquals(resp.headers['content-length'], '5')
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2010-07-12 17:03:45 -05:00
|
|
|
req.range = 'bytes=-2'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 206)
|
|
|
|
self.assertEquals(resp.body, 'FY')
|
|
|
|
self.assertEquals(resp.headers['content-length'], '2')
|
|
|
|
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.data')
|
|
|
|
os.unlink(objfile)
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application:octet-stream',
|
|
|
|
'Content-Length': '6'})
|
|
|
|
req.body = 'VERIFY'
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-07-24 12:55:25 -07:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2013-07-24 12:55:25 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
def test_GET_if_match(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-Length': '4'})
|
|
|
|
req.body = 'test'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
etag = resp.etag
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Match': '*'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o2',
|
|
|
|
environ={'REQUEST_METHOD': 'GET'},
|
2010-07-12 17:03:45 -05:00
|
|
|
headers={'If-Match': '*'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Match': '"%s"' % etag})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Match':
|
|
|
|
'"11111111111111111111111111111111"'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Match':
|
|
|
|
'"11111111111111111111111111111111", "%s"' % etag})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Match':
|
|
|
|
'"11111111111111111111111111111111", '
|
|
|
|
'"22222222222222222222222222222222"'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
def test_GET_if_none_match(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-Length': '4'})
|
|
|
|
req.body = 'test'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
etag = resp.etag
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-None-Match': '*'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 304)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o2',
|
|
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-None-Match': '*'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-None-Match': '"%s"' % etag})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 304)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-None-Match':
|
|
|
|
'"11111111111111111111111111111111"'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-None-Match':
|
|
|
|
'"11111111111111111111111111111111", '
|
|
|
|
'"%s"' % etag})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 304)
|
|
|
|
self.assertEquals(resp.etag, etag)
|
|
|
|
|
|
|
|
def test_GET_if_modified_since(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-Length': '4'})
|
|
|
|
req.body = 'test'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
2012-09-04 14:02:19 -07:00
|
|
|
since = strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp) + 1))
|
2010-07-12 17:03:45 -05:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Modified-Since': since})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 304)
|
|
|
|
|
|
|
|
since = \
|
|
|
|
strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp) - 1))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Modified-Since': since})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
|
|
|
since = \
|
|
|
|
strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp) + 1))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Modified-Since': since})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 304)
|
|
|
|
|
|
|
|
def test_GET_if_unmodified_since(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-Length': '4'})
|
|
|
|
req.body = 'test'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
|
|
|
since = strftime('%a, %d %b %Y %H:%M:%S GMT',
|
|
|
|
gmtime(float(timestamp) + 1))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Unmodified-Since': since})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
|
|
|
since = \
|
|
|
|
strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp) - 9))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Unmodified-Since': since})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
since = \
|
|
|
|
strftime('%a, %d %b %Y %H:%M:%S GMT', gmtime(float(timestamp) + 9))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Unmodified-Since': since})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
2011-03-15 22:12:03 -07:00
|
|
|
def test_GET_quarantine(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.GET
|
2011-03-15 22:12:03 -07:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2013-07-17 16:32:35 -07:00
|
|
|
file = diskfile.DiskFile(self.testdir, 'sda1', 'p', 'a', 'c', 'o',
|
2011-03-15 22:12:03 -07:00
|
|
|
FakeLogger(), keep_data_fp=True)
|
|
|
|
file_name = os.path.basename(file.data_file)
|
|
|
|
etag = md5()
|
|
|
|
etag.update('VERIF')
|
|
|
|
etag = etag.hexdigest()
|
|
|
|
metadata = {'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': 6, 'ETag': etag}
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.write_metadata(file.fp, metadata)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
2012-02-07 14:02:28 -08:00
|
|
|
body = resp.body # actually does quarantining
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(body, 'VERIFY')
|
|
|
|
self.assertEquals(os.listdir(quar_dir)[0], file_name)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
def test_GET_quarantine_zbyte(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.GET
|
2011-03-15 22:12:03 -07:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2013-07-17 16:32:35 -07:00
|
|
|
file = diskfile.DiskFile(self.testdir, 'sda1', 'p', 'a', 'c', 'o',
|
2011-03-15 22:12:03 -07:00
|
|
|
FakeLogger(), keep_data_fp=True)
|
|
|
|
file_name = os.path.basename(file.data_file)
|
|
|
|
with open(file.data_file) as fp:
|
2013-07-17 16:32:35 -07:00
|
|
|
metadata = diskfile.read_metadata(fp)
|
2011-03-15 22:12:03 -07:00
|
|
|
os.unlink(file.data_file)
|
2011-03-16 09:04:00 -07:00
|
|
|
with open(file.data_file, 'w') as fp:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.write_metadata(fp, metadata)
|
2011-03-15 22:12:03 -07:00
|
|
|
|
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
|
|
|
self.assertEquals(os.listdir(quar_dir)[0], file_name)
|
|
|
|
|
|
|
|
def test_GET_quarantine_range(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.GET
|
2011-03-15 22:12:03 -07:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/x-test'})
|
|
|
|
req.body = 'VERIFY'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2013-07-17 16:32:35 -07:00
|
|
|
file = diskfile.DiskFile(self.testdir, 'sda1', 'p', 'a', 'c', 'o',
|
2011-03-15 22:12:03 -07:00
|
|
|
FakeLogger(), keep_data_fp=True)
|
|
|
|
file_name = os.path.basename(file.data_file)
|
|
|
|
etag = md5()
|
|
|
|
etag.update('VERIF')
|
|
|
|
etag = etag.hexdigest()
|
|
|
|
metadata = {'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': 6, 'ETag': etag}
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.write_metadata(file.fp, metadata)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
|
|
|
req.range = 'bytes=0-4' # partial
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
2013-07-23 16:41:45 -07:00
|
|
|
resp.body
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
|
|
|
self.assertFalse(os.path.isdir(quar_dir))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
|
|
|
req.range = 'bytes=1-6' # partial
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
2013-07-23 16:41:45 -07:00
|
|
|
resp.body
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
|
|
|
self.assertFalse(os.path.isdir(quar_dir))
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
|
|
|
req.range = 'bytes=0-14' # full
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
quar_dir = os.path.join(self.testdir, 'sda1', 'quarantined', 'objects',
|
|
|
|
os.path.basename(os.path.dirname(file.data_file)))
|
|
|
|
self.assertEquals(os.listdir(file.datadir)[0], file_name)
|
2013-07-23 16:41:45 -07:00
|
|
|
resp.body
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertTrue(os.path.isdir(quar_dir))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-03-15 22:12:03 -07:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_DELETE(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.DELETE
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
# self.assertRaises(KeyError, self.object_controller.DELETE, req)
|
|
|
|
|
2013-07-02 11:48:19 -04:00
|
|
|
# The following should have created a tombstone file
|
2010-07-12 17:03:45 -05:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
2013-07-02 11:48:19 -04:00
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
|
|
|
|
# The following should *not* have created a tombstone file.
|
|
|
|
timestamp = normalize_timestamp(float(timestamp) - 1)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assertFalse(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(len(os.listdir(os.path.dirname(objfile))), 1)
|
2010-07-12 17:03:45 -05:00
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-Length': '4',
|
|
|
|
})
|
|
|
|
req.body = 'test'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
2013-07-02 11:48:19 -04:00
|
|
|
# The following should *not* have created a tombstone file.
|
2010-07-12 17:03:45 -05:00
|
|
|
timestamp = normalize_timestamp(float(timestamp) - 1)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 409)
|
2010-07-12 17:03:45 -05:00
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertFalse(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(len(os.listdir(os.path.dirname(objfile))), 1)
|
2010-07-12 17:03:45 -05:00
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
|
2013-07-02 11:48:19 -04:00
|
|
|
def test_DELETE_container_updates(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.DELETE and container
|
2013-07-02 11:48:19 -04:00
|
|
|
# updates, making sure container update is called in the correct
|
|
|
|
# state.
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={
|
|
|
|
'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Content-Length': '4',
|
|
|
|
})
|
|
|
|
req.body = 'test'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
calls_made = [0]
|
|
|
|
|
|
|
|
def our_container_update(*args, **kwargs):
|
|
|
|
calls_made[0] += 1
|
|
|
|
|
|
|
|
orig_cu = self.object_controller.container_update
|
|
|
|
self.object_controller.container_update = our_container_update
|
|
|
|
try:
|
|
|
|
# The following request should return 409 (HTTP Conflict). A
|
|
|
|
# tombstone file should not have been created with this timestamp.
|
|
|
|
timestamp = normalize_timestamp(float(timestamp) - 1)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 409)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assertFalse(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(len(os.listdir(os.path.dirname(objfile))), 1)
|
|
|
|
self.assertEquals(0, calls_made[0])
|
|
|
|
|
|
|
|
# The following request should return 204, and the object should
|
|
|
|
# be truly deleted (container update is performed) because this
|
|
|
|
# timestamp is newer. A tombstone file should have been created
|
|
|
|
# with this timestamp.
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(1, calls_made[0])
|
|
|
|
self.assertEquals(len(os.listdir(os.path.dirname(objfile))), 1)
|
|
|
|
|
|
|
|
# The following request should return a 404, as the object should
|
|
|
|
# already have been deleted, but it should have also performed a
|
|
|
|
# container update because the timestamp is newer, and a tombstone
|
|
|
|
# file should also exist with this timestamp.
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(2, calls_made[0])
|
|
|
|
self.assertEquals(len(os.listdir(os.path.dirname(objfile))), 1)
|
|
|
|
|
|
|
|
# The following request should return a 404, as the object should
|
|
|
|
# already have been deleted, and it should not have performed a
|
|
|
|
# container update because the timestamp is older, or created a
|
|
|
|
# tombstone file with this timestamp.
|
|
|
|
timestamp = normalize_timestamp(float(timestamp) - 1)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2013-07-02 11:48:19 -04:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p',
|
|
|
|
hash_path('a', 'c', 'o')),
|
|
|
|
timestamp + '.ts')
|
|
|
|
self.assertFalse(os.path.isfile(objfile))
|
|
|
|
self.assertEquals(2, calls_made[0])
|
|
|
|
self.assertEquals(len(os.listdir(os.path.dirname(objfile))), 1)
|
|
|
|
finally:
|
|
|
|
self.object_controller.container_update = orig_cu
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def test_call(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test swift.obj.server.ObjectController.__call__
|
2010-07-12 17:03:45 -05:00
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
|
|
|
|
|
|
|
def start_response(*args):
|
2013-08-31 22:36:58 -04:00
|
|
|
"""Sends args to outbuf"""
|
2010-07-12 17:03:45 -05:00
|
|
|
outbuf.writelines(args)
|
|
|
|
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': 'PUT',
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c/o',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '400 ')
|
|
|
|
|
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': 'GET',
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c/o',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '404 ')
|
|
|
|
|
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': 'INVALID',
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c/o',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '405 ')
|
2012-06-01 16:39:35 +02:00
|
|
|
|
2013-03-22 09:00:40 +02:00
|
|
|
def my_check(*args):
|
|
|
|
return False
|
2013-07-23 16:41:45 -07:00
|
|
|
|
2013-03-22 09:00:40 +02:00
|
|
|
def my_storage_directory(*args):
|
|
|
|
return self.testdir+'/collide'
|
2013-07-17 16:32:35 -07:00
|
|
|
_storage_directory = diskfile.storage_directory
|
2013-03-22 09:00:40 +02:00
|
|
|
_check = object_server.check_object_creation
|
|
|
|
try:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.storage_directory = my_storage_directory
|
2013-03-22 09:00:40 +02:00
|
|
|
object_server.check_object_creation = my_check
|
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': 'PUT',
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c/o',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'CONTENT_TYPE': 'text/html',
|
2013-07-02 11:48:19 -04:00
|
|
|
'HTTP_X_TIMESTAMP': '1.2',
|
2013-03-22 09:00:40 +02:00
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '201 ')
|
|
|
|
|
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': 'PUT',
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/q/b/d/x',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'CONTENT_TYPE': 'text/html',
|
2013-07-02 11:48:19 -04:00
|
|
|
'HTTP_X_TIMESTAMP': '1.3',
|
2013-03-22 09:00:40 +02:00
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '403 ')
|
|
|
|
|
|
|
|
finally:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.storage_directory = _storage_directory
|
2013-03-22 09:00:40 +02:00
|
|
|
object_server.check_object_creation = _check
|
|
|
|
|
2012-06-01 16:39:35 +02:00
|
|
|
def test_invalid_method_doesnt_exist(self):
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
2013-07-23 16:41:45 -07:00
|
|
|
|
2012-06-01 16:39:35 +02:00
|
|
|
def start_response(*args):
|
|
|
|
outbuf.writelines(args)
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': 'method_doesnt_exist',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c/o'},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '405 ')
|
|
|
|
|
|
|
|
def test_invalid_method_is_not_public(self):
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
2013-07-23 16:41:45 -07:00
|
|
|
|
2012-06-01 16:39:35 +02:00
|
|
|
def start_response(*args):
|
|
|
|
outbuf.writelines(args)
|
|
|
|
self.object_controller.__call__({'REQUEST_METHOD': '__init__',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c/o'},
|
|
|
|
start_response)
|
|
|
|
self.assertEquals(errbuf.getvalue(), '')
|
|
|
|
self.assertEquals(outbuf.getvalue()[:4], '405 ')
|
2010-07-12 17:03:45 -05:00
|
|
|
|
|
|
|
def test_chunked_put(self):
|
|
|
|
listener = listen(('localhost', 0))
|
|
|
|
port = listener.getsockname()[1]
|
|
|
|
killer = spawn(wsgi.server, listener, self.object_controller,
|
|
|
|
NullLogger())
|
|
|
|
sock = connect_tcp(('localhost', port))
|
|
|
|
fd = sock.makefile()
|
|
|
|
fd.write('PUT /sda1/p/a/c/o HTTP/1.1\r\nHost: localhost\r\n'
|
|
|
|
'Content-Type: text/plain\r\n'
|
|
|
|
'Connection: close\r\nX-Timestamp: 1.0\r\n'
|
|
|
|
'Transfer-Encoding: chunked\r\n\r\n'
|
|
|
|
'2\r\noh\r\n4\r\n hai\r\n0\r\n\r\n')
|
|
|
|
fd.flush()
|
Rework to support RFC 2616 Sec 4.4 Message Length
RFC 2616 Sec 4.4 Message Length describes how the content-length and
transfer-encoding headers interact. Basically, if chunked transfer
encoding is used, the content-length header value is ignored and if
the content-length header is present, and the request is not using
chunked transfer-encoding, then the content-length must match the body
length.
The only Transfer-Coding value we support in the Transfer-Encoding
header (to date) is "chunked". RFC 2616 Sec 14.41 specifies that if
"multiple encodings have been applied to an entity, the
transfer-codings MUST be listed in the order in which they were
applied." Since we only supported "chunked". If the Transfer-Encoding
header value has multiple transfer-codings, we return a 501 (Not
Implemented) (see RFC 2616 Sec 3.6) without checking if chunked is the
last one specified. Finally, if transfer-encoding is anything but
"chunked", we return a 400 (Bad Request) to the client.
This patch adds a new method, message_length, to the swob request
object which will apply an algorithm based on RFC 2616 Sec 4.4
leveraging the existing content_length property.
In addition to these changes, the proxy server will now notice when
the message length specified by the content-length header is greater
than the configured object maximum size and fail the request with a
413, "Request Entity Too Large", before reading the entire body.
This work flows from https://review.openstack.org/27152.
Change-Id: I5d2a30b89092680dee9d946e1aafd017eaaef8c0
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2013-04-19 00:10:38 -04:00
|
|
|
headers = readuntil2crlfs(fd)
|
|
|
|
exp = 'HTTP/1.1 201'
|
|
|
|
self.assertEquals(headers[:len(exp)], exp)
|
|
|
|
sock = connect_tcp(('localhost', port))
|
|
|
|
fd = sock.makefile()
|
|
|
|
fd.write('GET /sda1/p/a/c/o HTTP/1.1\r\nHost: localhost\r\n'
|
|
|
|
'Connection: close\r\n\r\n')
|
|
|
|
fd.flush()
|
|
|
|
headers = readuntil2crlfs(fd)
|
|
|
|
exp = 'HTTP/1.1 200'
|
|
|
|
self.assertEquals(headers[:len(exp)], exp)
|
|
|
|
response = fd.read()
|
|
|
|
self.assertEquals(response, 'oh hai')
|
|
|
|
killer.kill()
|
|
|
|
|
|
|
|
def test_chunked_content_length_mismatch_zero(self):
|
|
|
|
listener = listen(('localhost', 0))
|
|
|
|
port = listener.getsockname()[1]
|
|
|
|
killer = spawn(wsgi.server, listener, self.object_controller,
|
|
|
|
NullLogger())
|
|
|
|
sock = connect_tcp(('localhost', port))
|
|
|
|
fd = sock.makefile()
|
|
|
|
fd.write('PUT /sda1/p/a/c/o HTTP/1.1\r\nHost: localhost\r\n'
|
|
|
|
'Content-Type: text/plain\r\n'
|
|
|
|
'Connection: close\r\nX-Timestamp: 1.0\r\n'
|
|
|
|
'Content-Length: 0\r\n'
|
|
|
|
'Transfer-Encoding: chunked\r\n\r\n'
|
|
|
|
'2\r\noh\r\n4\r\n hai\r\n0\r\n\r\n')
|
|
|
|
fd.flush()
|
|
|
|
headers = readuntil2crlfs(fd)
|
|
|
|
exp = 'HTTP/1.1 201'
|
|
|
|
self.assertEquals(headers[:len(exp)], exp)
|
2010-07-12 17:03:45 -05:00
|
|
|
sock = connect_tcp(('localhost', port))
|
|
|
|
fd = sock.makefile()
|
|
|
|
fd.write('GET /sda1/p/a/c/o HTTP/1.1\r\nHost: localhost\r\n'
|
|
|
|
'Connection: close\r\n\r\n')
|
|
|
|
fd.flush()
|
Rework to support RFC 2616 Sec 4.4 Message Length
RFC 2616 Sec 4.4 Message Length describes how the content-length and
transfer-encoding headers interact. Basically, if chunked transfer
encoding is used, the content-length header value is ignored and if
the content-length header is present, and the request is not using
chunked transfer-encoding, then the content-length must match the body
length.
The only Transfer-Coding value we support in the Transfer-Encoding
header (to date) is "chunked". RFC 2616 Sec 14.41 specifies that if
"multiple encodings have been applied to an entity, the
transfer-codings MUST be listed in the order in which they were
applied." Since we only supported "chunked". If the Transfer-Encoding
header value has multiple transfer-codings, we return a 501 (Not
Implemented) (see RFC 2616 Sec 3.6) without checking if chunked is the
last one specified. Finally, if transfer-encoding is anything but
"chunked", we return a 400 (Bad Request) to the client.
This patch adds a new method, message_length, to the swob request
object which will apply an algorithm based on RFC 2616 Sec 4.4
leveraging the existing content_length property.
In addition to these changes, the proxy server will now notice when
the message length specified by the content-length header is greater
than the configured object maximum size and fail the request with a
413, "Request Entity Too Large", before reading the entire body.
This work flows from https://review.openstack.org/27152.
Change-Id: I5d2a30b89092680dee9d946e1aafd017eaaef8c0
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2013-04-19 00:10:38 -04:00
|
|
|
headers = readuntil2crlfs(fd)
|
|
|
|
exp = 'HTTP/1.1 200'
|
|
|
|
self.assertEquals(headers[:len(exp)], exp)
|
2010-07-12 17:03:45 -05:00
|
|
|
response = fd.read()
|
|
|
|
self.assertEquals(response, 'oh hai')
|
|
|
|
killer.kill()
|
|
|
|
|
|
|
|
def test_max_object_name_length(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
2012-09-05 20:49:50 -07:00
|
|
|
max_name_len = constraints.MAX_OBJECT_NAME_LENGTH
|
|
|
|
req = Request.blank('/sda1/p/a/c/' + ('1' * max_name_len),
|
2010-07-12 17:03:45 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'DATA'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
2012-09-05 20:49:50 -07:00
|
|
|
req = Request.blank('/sda1/p/a/c/' + ('2' * (max_name_len + 1)),
|
2010-07-12 17:03:45 -05:00
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'DATA'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
|
|
|
|
def test_max_upload_time(self):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
class SlowBody():
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def __init__(self):
|
|
|
|
self.sent = 0
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def read(self, size=-1):
|
|
|
|
if self.sent < 4:
|
|
|
|
sleep(0.1)
|
|
|
|
self.sent += 1
|
|
|
|
return ' '
|
|
|
|
return ''
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT', 'wsgi.input': SlowBody()},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4', 'Content-Type': 'text/plain'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
self.object_controller.max_upload_time = 0.1
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT', 'wsgi.input': SlowBody()},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4', 'Content-Type': 'text/plain'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 408)
|
|
|
|
|
|
|
|
def test_short_body(self):
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
class ShortBody():
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def __init__(self):
|
|
|
|
self.sent = False
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
def read(self, size=-1):
|
|
|
|
if not self.sent:
|
|
|
|
self.sent = True
|
|
|
|
return ' '
|
|
|
|
return ''
|
2010-11-16 15:35:39 -08:00
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT', 'wsgi.input': ShortBody()},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4', 'Content-Type': 'text/plain'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 499)
|
|
|
|
|
|
|
|
def test_bad_sinces(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4', 'Content-Type': 'text/plain'},
|
|
|
|
body=' ')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Unmodified-Since': 'Not a valid date'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Modified-Since': 'Not a valid date'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Unmodified-Since': 'Sat, 29 Oct 1000 19:43:31 GMT'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'If-Modified-Since': 'Sat, 29 Oct 1000 19:43:31 GMT'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
def test_content_encoding(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4', 'Content-Type': 'text/plain',
|
|
|
|
'Content-Encoding': 'gzip'},
|
|
|
|
body=' ')
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['content-encoding'], 'gzip')
|
2010-11-16 15:35:39 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD':
|
|
|
|
'HEAD'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-07-12 17:03:45 -05:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers['content-encoding'], 'gzip')
|
|
|
|
|
2010-11-16 15:35:39 -08:00
|
|
|
def test_manifest_header(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'Content-Length': '0',
|
|
|
|
'X-Object-Manifest': 'c/o/'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-11-16 15:35:39 -08:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p', hash_path('a', 'c',
|
|
|
|
'o')), timestamp + '.data')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
2013-07-17 16:32:35 -07:00
|
|
|
self.assertEquals(diskfile.read_metadata(objfile),
|
2013-03-22 17:02:13 +04:00
|
|
|
{'X-Timestamp': timestamp,
|
2010-11-16 15:35:39 -08:00
|
|
|
'Content-Length': '0', 'Content-Type': 'text/plain', 'name':
|
|
|
|
'/a/c/o', 'X-Object-Manifest': 'c/o/', 'ETag':
|
|
|
|
'd41d8cd98f00b204e9800998ecf8427e'})
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2010-11-16 15:35:39 -08:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
self.assertEquals(resp.headers.get('x-object-manifest'), 'c/o/')
|
|
|
|
|
2012-09-04 14:02:19 -07:00
|
|
|
def test_manifest_head_request(self):
|
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Type': 'text/plain',
|
|
|
|
'Content-Length': '0',
|
|
|
|
'X-Object-Manifest': 'c/o/'})
|
|
|
|
req.body = 'hi'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2012-09-04 14:02:19 -07:00
|
|
|
objfile = os.path.join(self.testdir, 'sda1',
|
|
|
|
storage_directory(object_server.DATADIR, 'p', hash_path('a', 'c',
|
|
|
|
'o')), timestamp + '.data')
|
|
|
|
self.assert_(os.path.isfile(objfile))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'HEAD'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2012-09-04 14:02:19 -07:00
|
|
|
self.assertEquals(resp.body, '')
|
|
|
|
|
2011-10-26 21:42:24 +00:00
|
|
|
def test_async_update_http_connect(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_http_connect(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
raise Exception('test')
|
|
|
|
|
|
|
|
orig_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
object_server.http_connect = fake_http_connect
|
|
|
|
self.object_controller.async_update('PUT', 'a', 'c', 'o',
|
|
|
|
'127.0.0.1:1234', 1, 'sdc1',
|
|
|
|
{'x-timestamp': '1', 'x-out': 'set'}, 'sda1')
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = orig_http_connect
|
|
|
|
self.assertEquals(given_args, ['127.0.0.1', '1234', 'sdc1', 1, 'PUT',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'/a/c/o', {'x-timestamp': '1', 'x-out': 'set',
|
|
|
|
'user-agent': 'obj-server %s' % os.getpid()}])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
def test_updating_multiple_delete_at_container_servers(self):
|
|
|
|
self.object_controller.expiring_objects_account = 'exp'
|
|
|
|
self.object_controller.expiring_objects_container_divisor = 60
|
|
|
|
|
|
|
|
http_connect_args = []
|
2013-07-23 16:41:45 -07:00
|
|
|
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
def fake_http_connect(ipaddr, port, device, partition, method, path,
|
|
|
|
headers=None, query_string=None, ssl=False):
|
|
|
|
class SuccessfulFakeConn(object):
|
|
|
|
@property
|
|
|
|
def status(self):
|
|
|
|
return 200
|
|
|
|
|
|
|
|
def getresponse(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def read(self):
|
|
|
|
return ''
|
|
|
|
|
|
|
|
captured_args = {'ipaddr': ipaddr, 'port': port,
|
|
|
|
'device': device, 'partition': partition,
|
|
|
|
'method': method, 'path': path, 'ssl': ssl,
|
|
|
|
'headers': headers, 'query_string': query_string}
|
|
|
|
|
|
|
|
http_connect_args.append(
|
2013-07-23 16:41:45 -07:00
|
|
|
dict((k, v) for k, v in captured_args.iteritems()
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
if v is not None))
|
|
|
|
|
|
|
|
req = Request.blank(
|
|
|
|
'/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': '12345',
|
|
|
|
'Content-Type': 'application/burrito',
|
|
|
|
'Content-Length': '0',
|
|
|
|
'X-Container-Partition': '20',
|
|
|
|
'X-Container-Host': '1.2.3.4:5',
|
|
|
|
'X-Container-Device': 'sdb1',
|
|
|
|
'X-Delete-At': 9999999999,
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At-Container': '9999999960',
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
'X-Delete-At-Host': "10.1.1.1:6001,10.2.2.2:6002",
|
|
|
|
'X-Delete-At-Partition': '6237',
|
|
|
|
'X-Delete-At-Device': 'sdp,sdq'})
|
|
|
|
|
|
|
|
orig_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
object_server.http_connect = fake_http_connect
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
finally:
|
|
|
|
object_server.http_connect = orig_http_connect
|
|
|
|
|
|
|
|
self.assertEqual(resp.status_int, 201)
|
|
|
|
|
|
|
|
http_connect_args.sort(key=operator.itemgetter('ipaddr'))
|
|
|
|
|
|
|
|
self.assertEquals(len(http_connect_args), 3)
|
|
|
|
self.assertEquals(
|
|
|
|
http_connect_args[0],
|
|
|
|
{'ipaddr': '1.2.3.4',
|
|
|
|
'port': '5',
|
|
|
|
'path': '/a/c/o',
|
|
|
|
'device': 'sdb1',
|
|
|
|
'partition': '20',
|
|
|
|
'method': 'PUT',
|
|
|
|
'ssl': False,
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'headers': HeaderKeyDict({'x-content-type': 'application/burrito',
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-size': '0',
|
|
|
|
'x-timestamp': '12345',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'referer': 'PUT http://localhost/sda1/p/a/c/o',
|
|
|
|
'user-agent': 'obj-server %d' % os.getpid(),
|
|
|
|
'x-trans-id': '-'})})
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
self.assertEquals(
|
|
|
|
http_connect_args[1],
|
|
|
|
{'ipaddr': '10.1.1.1',
|
|
|
|
'port': '6001',
|
|
|
|
'path': '/exp/9999999960/9999999999-a/c/o',
|
|
|
|
'device': 'sdp',
|
|
|
|
'partition': '6237',
|
|
|
|
'method': 'PUT',
|
|
|
|
'ssl': False,
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'headers': HeaderKeyDict({'x-content-type': 'text/plain',
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-size': '0',
|
|
|
|
'x-timestamp': '12345',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'referer': 'PUT http://localhost/sda1/p/a/c/o',
|
|
|
|
'user-agent': 'obj-server %d' % os.getpid(),
|
|
|
|
'x-trans-id': '-'})})
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
self.assertEquals(
|
|
|
|
http_connect_args[2],
|
|
|
|
{'ipaddr': '10.2.2.2',
|
|
|
|
'port': '6002',
|
|
|
|
'path': '/exp/9999999960/9999999999-a/c/o',
|
|
|
|
'device': 'sdq',
|
|
|
|
'partition': '6237',
|
|
|
|
'method': 'PUT',
|
|
|
|
'ssl': False,
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'headers': HeaderKeyDict({'x-content-type': 'text/plain',
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-size': '0',
|
|
|
|
'x-timestamp': '12345',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'referer': 'PUT http://localhost/sda1/p/a/c/o',
|
|
|
|
'user-agent': 'obj-server %d' % os.getpid(),
|
|
|
|
'x-trans-id': '-'})})
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
|
|
|
|
def test_updating_multiple_container_servers(self):
|
|
|
|
http_connect_args = []
|
2013-07-23 16:41:45 -07:00
|
|
|
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
def fake_http_connect(ipaddr, port, device, partition, method, path,
|
|
|
|
headers=None, query_string=None, ssl=False):
|
|
|
|
class SuccessfulFakeConn(object):
|
|
|
|
@property
|
|
|
|
def status(self):
|
|
|
|
return 200
|
|
|
|
|
|
|
|
def getresponse(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def read(self):
|
|
|
|
return ''
|
|
|
|
|
|
|
|
captured_args = {'ipaddr': ipaddr, 'port': port,
|
|
|
|
'device': device, 'partition': partition,
|
|
|
|
'method': method, 'path': path, 'ssl': ssl,
|
|
|
|
'headers': headers, 'query_string': query_string}
|
|
|
|
|
|
|
|
http_connect_args.append(
|
2013-07-23 16:41:45 -07:00
|
|
|
dict((k, v) for k, v in captured_args.iteritems()
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
if v is not None))
|
|
|
|
|
|
|
|
req = Request.blank(
|
|
|
|
'/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': '12345',
|
|
|
|
'Content-Type': 'application/burrito',
|
|
|
|
'Content-Length': '0',
|
|
|
|
'X-Container-Partition': '20',
|
|
|
|
'X-Container-Host': '1.2.3.4:5, 6.7.8.9:10',
|
|
|
|
'X-Container-Device': 'sdb1, sdf1'})
|
|
|
|
|
|
|
|
orig_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
object_server.http_connect = fake_http_connect
|
|
|
|
self.object_controller.PUT(req)
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = orig_http_connect
|
|
|
|
|
|
|
|
http_connect_args.sort(key=operator.itemgetter('ipaddr'))
|
|
|
|
|
|
|
|
self.assertEquals(len(http_connect_args), 2)
|
|
|
|
self.assertEquals(
|
|
|
|
http_connect_args[0],
|
|
|
|
{'ipaddr': '1.2.3.4',
|
|
|
|
'port': '5',
|
|
|
|
'path': '/a/c/o',
|
|
|
|
'device': 'sdb1',
|
|
|
|
'partition': '20',
|
|
|
|
'method': 'PUT',
|
|
|
|
'ssl': False,
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'headers': HeaderKeyDict({'x-content-type': 'application/burrito',
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-size': '0',
|
|
|
|
'x-timestamp': '12345',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'referer': 'PUT http://localhost/sda1/p/a/c/o',
|
|
|
|
'user-agent': 'obj-server %d' % os.getpid(),
|
|
|
|
'x-trans-id': '-'})})
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
self.assertEquals(
|
|
|
|
http_connect_args[1],
|
|
|
|
{'ipaddr': '6.7.8.9',
|
|
|
|
'port': '10',
|
|
|
|
'path': '/a/c/o',
|
|
|
|
'device': 'sdf1',
|
|
|
|
'partition': '20',
|
|
|
|
'method': 'PUT',
|
|
|
|
'ssl': False,
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'headers': HeaderKeyDict({'x-content-type': 'application/burrito',
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-size': '0',
|
|
|
|
'x-timestamp': '12345',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'referer': 'PUT http://localhost/sda1/p/a/c/o',
|
|
|
|
'user-agent': 'obj-server %d' % os.getpid(),
|
|
|
|
'x-trans-id': '-'})})
|
Allow for multiple X-(Account|Container)-* headers.
When the number of account/container or container/object replicas are
different, Swift had a few misbehaviors. This commit fixes them.
* On an object PUT/POST/DELETE, if there were 3 object replicas and
only 2 container replicas, then only 2 requests would be made to
object servers. Now, 3 requests will be made, but the third won't
have any X-Container-* headers in it.
* On an object PUT/POST/DELETE, if there were 3 object replicas and 4
container replicas, then only 3/4 container servers would receive
immediate updates; the fourth would be ignored. Now one of the
object servers will receive multiple (comma-separated) values in the
X-Container-* headers and it will attempt to contact both of them.
One side effect is that multiple async_pendings may be written for
updates to the same object. They'll have differing timestamps,
though, so all but the newest will be deleted unread. To trigger
this behavior, you have to have more container replicas than object
replicas, 2 or more of the container servers must be down, and the
headers sent to one object server must reference 2 or more down
container servers; it's unlikely enough and the consequences are so
minor that it didn't seem worth fixing.
The situation with account/containers is analogous, only without the
async_pendings.
Change-Id: I98bc2de93fb6b2346d6de1d764213d7563653e8d
2012-12-12 17:47:04 -08:00
|
|
|
|
2011-10-26 21:42:24 +00:00
|
|
|
def test_async_update_saves_on_exception(self):
|
2013-03-20 01:35:41 +02:00
|
|
|
_prefix = utils.HASH_PATH_PREFIX
|
|
|
|
utils.HASH_PATH_PREFIX = ''
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def fake_http_connect(*args):
|
|
|
|
raise Exception('test')
|
|
|
|
|
|
|
|
orig_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
object_server.http_connect = fake_http_connect
|
|
|
|
self.object_controller.async_update('PUT', 'a', 'c', 'o',
|
|
|
|
'127.0.0.1:1234', 1, 'sdc1',
|
|
|
|
{'x-timestamp': '1', 'x-out': 'set'}, 'sda1')
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = orig_http_connect
|
2013-03-20 01:35:41 +02:00
|
|
|
utils.HASH_PATH_PREFIX = _prefix
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(
|
|
|
|
pickle.load(open(os.path.join(self.testdir, 'sda1',
|
|
|
|
'async_pending', 'a83',
|
|
|
|
'06fbf0b514e5199dfc4e00f42eb5ea83-0000000001.00000'))),
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
{'headers': {'x-timestamp': '1', 'x-out': 'set',
|
|
|
|
'user-agent': 'obj-server %s' % os.getpid()},
|
|
|
|
'account': 'a', 'container': 'c', 'obj': 'o', 'op': 'PUT'})
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def test_async_update_saves_on_non_2xx(self):
|
2013-03-20 01:35:41 +02:00
|
|
|
_prefix = utils.HASH_PATH_PREFIX
|
|
|
|
utils.HASH_PATH_PREFIX = ''
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def fake_http_connect(status):
|
|
|
|
|
|
|
|
class FakeConn(object):
|
|
|
|
|
|
|
|
def __init__(self, status):
|
|
|
|
self.status = status
|
|
|
|
|
|
|
|
def getresponse(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def read(self):
|
|
|
|
return ''
|
|
|
|
|
|
|
|
return lambda *args: FakeConn(status)
|
|
|
|
|
|
|
|
orig_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
for status in (199, 300, 503):
|
|
|
|
object_server.http_connect = fake_http_connect(status)
|
|
|
|
self.object_controller.async_update('PUT', 'a', 'c', 'o',
|
|
|
|
'127.0.0.1:1234', 1, 'sdc1',
|
|
|
|
{'x-timestamp': '1', 'x-out': str(status)}, 'sda1')
|
|
|
|
self.assertEquals(
|
|
|
|
pickle.load(open(os.path.join(self.testdir, 'sda1',
|
|
|
|
'async_pending', 'a83',
|
|
|
|
'06fbf0b514e5199dfc4e00f42eb5ea83-0000000001.00000'))),
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
{'headers': {'x-timestamp': '1', 'x-out': str(status),
|
|
|
|
'user-agent': 'obj-server %s' % os.getpid()},
|
2011-10-26 21:42:24 +00:00
|
|
|
'account': 'a', 'container': 'c', 'obj': 'o',
|
|
|
|
'op': 'PUT'})
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = orig_http_connect
|
2013-03-20 01:35:41 +02:00
|
|
|
utils.HASH_PATH_PREFIX = _prefix
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def test_async_update_does_not_save_on_2xx(self):
|
|
|
|
|
|
|
|
def fake_http_connect(status):
|
|
|
|
|
|
|
|
class FakeConn(object):
|
|
|
|
|
|
|
|
def __init__(self, status):
|
|
|
|
self.status = status
|
|
|
|
|
|
|
|
def getresponse(self):
|
|
|
|
return self
|
|
|
|
|
|
|
|
def read(self):
|
|
|
|
return ''
|
|
|
|
|
|
|
|
return lambda *args: FakeConn(status)
|
|
|
|
|
|
|
|
orig_http_connect = object_server.http_connect
|
|
|
|
try:
|
|
|
|
for status in (200, 299):
|
|
|
|
object_server.http_connect = fake_http_connect(status)
|
|
|
|
self.object_controller.async_update('PUT', 'a', 'c', 'o',
|
|
|
|
'127.0.0.1:1234', 1, 'sdc1',
|
|
|
|
{'x-timestamp': '1', 'x-out': str(status)}, 'sda1')
|
|
|
|
self.assertFalse(
|
|
|
|
os.path.exists(os.path.join(self.testdir, 'sda1',
|
|
|
|
'async_pending', 'a83',
|
|
|
|
'06fbf0b514e5199dfc4e00f42eb5ea83-0000000001.00000')))
|
|
|
|
finally:
|
|
|
|
object_server.http_connect = orig_http_connect
|
|
|
|
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
def test_container_update_no_async_update(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '1234'})
|
|
|
|
self.object_controller.container_update('PUT', 'a', 'c', 'o', req,
|
|
|
|
{'x-size': '0', 'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-content-type': 'text/plain', 'x-timestamp': '1'}, 'sda1')
|
|
|
|
self.assertEquals(given_args, [])
|
|
|
|
|
|
|
|
def test_container_update(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '123',
|
|
|
|
'X-Container-Host': 'chost',
|
|
|
|
'X-Container-Partition': 'cpartition',
|
|
|
|
'X-Container-Device': 'cdevice'})
|
|
|
|
self.object_controller.container_update('PUT', 'a', 'c', 'o', req,
|
|
|
|
{'x-size': '0', 'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-content-type': 'text/plain', 'x-timestamp': '1'}, 'sda1')
|
|
|
|
self.assertEquals(given_args, ['PUT', 'a', 'c', 'o', 'chost',
|
|
|
|
'cpartition', 'cdevice',
|
|
|
|
{'x-size': '0', 'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
|
|
|
'x-content-type': 'text/plain', 'x-timestamp': '1',
|
|
|
|
'x-trans-id': '123', 'referer': 'PUT http://localhost/v1/a/c/o'},
|
|
|
|
'sda1'])
|
|
|
|
|
2013-06-03 23:50:05 +00:00
|
|
|
def test_delete_at_update_on_put(self):
|
|
|
|
# Test how delete_at_update works when issued a delete for old
|
|
|
|
# expiration info after a new put with no new expiration info.
|
2011-10-26 21:42:24 +00:00
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '123'})
|
2013-06-03 23:50:05 +00:00
|
|
|
self.object_controller.delete_at_update('DELETE', 2, 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1')
|
2013-06-03 23:50:05 +00:00
|
|
|
self.assertEquals(given_args, ['DELETE', '.expiring_objects', '0',
|
2011-10-26 21:42:24 +00:00
|
|
|
'2-a/c/o', None, None, None,
|
2013-06-03 23:50:05 +00:00
|
|
|
HeaderKeyDict({'x-timestamp': '1',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'x-trans-id': '123', 'referer': 'PUT http://localhost/v1/a/c/o'}),
|
2011-10-26 21:42:24 +00:00
|
|
|
'sda1'])
|
|
|
|
|
2012-08-06 20:53:24 +00:00
|
|
|
def test_delete_at_negative(self):
|
2013-06-03 23:50:05 +00:00
|
|
|
# Test how delete_at_update works when issued a delete for old
|
|
|
|
# expiration info after a new put with no new expiration info.
|
2012-08-06 20:53:24 +00:00
|
|
|
# Test negative is reset to 0
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '1234'})
|
2012-08-06 20:53:24 +00:00
|
|
|
self.object_controller.delete_at_update(
|
2013-06-03 23:50:05 +00:00
|
|
|
'DELETE', -2, 'a', 'c', 'o', req, 'sda1')
|
2012-08-06 20:53:24 +00:00
|
|
|
self.assertEquals(given_args, [
|
2013-06-03 23:50:05 +00:00
|
|
|
'DELETE', '.expiring_objects', '0', '0-a/c/o', None, None, None,
|
|
|
|
HeaderKeyDict({'x-timestamp': '1',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'x-trans-id': '1234', 'referer': 'PUT http://localhost/v1/a/c/o'}),
|
2012-08-06 20:53:24 +00:00
|
|
|
'sda1'])
|
|
|
|
|
|
|
|
def test_delete_at_cap(self):
|
2013-06-03 23:50:05 +00:00
|
|
|
# Test how delete_at_update works when issued a delete for old
|
|
|
|
# expiration info after a new put with no new expiration info.
|
2012-08-06 20:53:24 +00:00
|
|
|
# Test past cap is reset to cap
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '1234'})
|
2012-08-06 20:53:24 +00:00
|
|
|
self.object_controller.delete_at_update(
|
2013-06-03 23:50:05 +00:00
|
|
|
'DELETE', 12345678901, 'a', 'c', 'o', req, 'sda1')
|
2012-08-06 20:53:24 +00:00
|
|
|
self.assertEquals(given_args, [
|
2013-06-03 23:50:05 +00:00
|
|
|
'DELETE', '.expiring_objects', '9999936000', '9999999999-a/c/o',
|
|
|
|
None, None, None,
|
|
|
|
HeaderKeyDict({'x-timestamp': '1',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'x-trans-id': '1234', 'referer': 'PUT http://localhost/v1/a/c/o'}),
|
2012-08-06 20:53:24 +00:00
|
|
|
'sda1'])
|
|
|
|
|
2011-10-26 21:42:24 +00:00
|
|
|
def test_delete_at_update_put_with_info(self):
|
2013-06-03 23:50:05 +00:00
|
|
|
# Keep next test,
|
|
|
|
# test_delete_at_update_put_with_info_but_missing_container, in sync
|
|
|
|
# with this one but just missing the X-Delete-At-Container header.
|
2011-10-26 21:42:24 +00:00
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '1234',
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At-Container': '0',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'X-Delete-At-Host': '127.0.0.1:1234',
|
|
|
|
'X-Delete-At-Partition': '3',
|
|
|
|
'X-Delete-At-Device': 'sdc1'})
|
2011-10-26 21:42:24 +00:00
|
|
|
self.object_controller.delete_at_update('PUT', 2, 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1')
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(given_args, ['PUT', '.expiring_objects', '0',
|
|
|
|
'2-a/c/o', '127.0.0.1:1234', '3', 'sdc1',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
HeaderKeyDict({'x-size': '0',
|
|
|
|
'x-etag': 'd41d8cd98f00b204e9800998ecf8427e',
|
2011-10-26 21:42:24 +00:00
|
|
|
'x-content-type': 'text/plain', 'x-timestamp': '1',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
'x-trans-id': '1234', 'referer': 'PUT http://localhost/v1/a/c/o'}),
|
2011-10-26 21:42:24 +00:00
|
|
|
'sda1'])
|
|
|
|
|
2013-06-03 23:50:05 +00:00
|
|
|
def test_delete_at_update_put_with_info_but_missing_container(self):
|
|
|
|
# Same as previous test, test_delete_at_update_put_with_info, but just
|
|
|
|
# missing the X-Delete-At-Container header.
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
|
|
|
self.object_controller.logger = FakeLogger()
|
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '1234',
|
|
|
|
'X-Delete-At-Host': '127.0.0.1:1234',
|
|
|
|
'X-Delete-At-Partition': '3',
|
|
|
|
'X-Delete-At-Device': 'sdc1'})
|
|
|
|
self.object_controller.delete_at_update('PUT', 2, 'a', 'c', 'o',
|
|
|
|
req, 'sda1')
|
|
|
|
self.assertEquals(
|
|
|
|
self.object_controller.logger.log_dict['warning'],
|
|
|
|
[(('X-Delete-At-Container header must be specified for expiring '
|
|
|
|
'objects background PUT to work properly. Making best guess as '
|
|
|
|
'to the container name for now.',), {})])
|
|
|
|
|
2011-10-26 21:42:24 +00:00
|
|
|
def test_delete_at_update_delete(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_async_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.async_update = fake_async_update
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req = Request.blank('/v1/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': 1,
|
|
|
|
'X-Trans-Id': '1234'})
|
2011-10-26 21:42:24 +00:00
|
|
|
self.object_controller.delete_at_update('DELETE', 2, 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1')
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(given_args, ['DELETE', '.expiring_objects', '0',
|
|
|
|
'2-a/c/o', None, None, None,
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
HeaderKeyDict({'x-timestamp': '1', 'x-trans-id': '1234',
|
|
|
|
'referer': 'DELETE http://localhost/v1/a/c/o'}), 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def test_POST_calls_delete_at(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_delete_at_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.delete_at_update = fake_delete_at_update
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
|
|
|
resp = self.object_controller.PUT(req)
|
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
self.assertEquals(given_args, [])
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Type': 'application/x-test'})
|
|
|
|
resp = self.object_controller.POST(req)
|
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
self.assertEquals(given_args, [])
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp1 = normalize_timestamp(time())
|
|
|
|
delete_at_timestamp1 = str(int(time() + 1000))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp1,
|
|
|
|
'Content-Type': 'application/x-test',
|
|
|
|
'X-Delete-At': delete_at_timestamp1})
|
|
|
|
resp = self.object_controller.POST(req)
|
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
self.assertEquals(given_args, [
|
|
|
|
'PUT', int(delete_at_timestamp1), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
while given_args:
|
|
|
|
given_args.pop()
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp2 = normalize_timestamp(time())
|
|
|
|
delete_at_timestamp2 = str(int(time() + 2000))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': timestamp2,
|
|
|
|
'Content-Type': 'application/x-test',
|
|
|
|
'X-Delete-At': delete_at_timestamp2})
|
|
|
|
resp = self.object_controller.POST(req)
|
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
self.assertEquals(given_args, [
|
|
|
|
'PUT', int(delete_at_timestamp2), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1',
|
2011-10-26 21:42:24 +00:00
|
|
|
'DELETE', int(delete_at_timestamp1), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def test_PUT_calls_delete_at(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_delete_at_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.delete_at_update = fake_delete_at_update
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
|
|
|
resp = self.object_controller.PUT(req)
|
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
self.assertEquals(given_args, [])
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp1 = normalize_timestamp(time())
|
|
|
|
delete_at_timestamp1 = str(int(time() + 1000))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp1,
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'X-Delete-At': delete_at_timestamp1})
|
|
|
|
req.body = 'TEST'
|
|
|
|
resp = self.object_controller.PUT(req)
|
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
self.assertEquals(given_args, [
|
|
|
|
'PUT', int(delete_at_timestamp1), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
while given_args:
|
|
|
|
given_args.pop()
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp2 = normalize_timestamp(time())
|
|
|
|
delete_at_timestamp2 = str(int(time() + 2000))
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp2,
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'X-Delete-At': delete_at_timestamp2})
|
|
|
|
req.body = 'TEST'
|
|
|
|
resp = self.object_controller.PUT(req)
|
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
self.assertEquals(given_args, [
|
|
|
|
'PUT', int(delete_at_timestamp2), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1',
|
2011-10-26 21:42:24 +00:00
|
|
|
'DELETE', int(delete_at_timestamp1), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def test_GET_but_expired(self):
|
|
|
|
test_time = time() + 10000
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(test_time + 100)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 2000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-10-26 21:42:24 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
2011-11-01 23:16:11 +00:00
|
|
|
orig_time = object_server.time.time
|
|
|
|
try:
|
|
|
|
t = time()
|
|
|
|
object_server.time.time = lambda: t
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(t + 1)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-11-01 23:16:11 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 1000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-11-01 23:16:11 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-11-01 23:16:11 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-11-01 23:16:11 +00:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
finally:
|
|
|
|
object_server.time.time = orig_time
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
orig_time = object_server.time.time
|
|
|
|
try:
|
|
|
|
t = time() + 2
|
|
|
|
object_server.time.time = lambda: t
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'GET'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(t)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
finally:
|
|
|
|
object_server.time.time = orig_time
|
|
|
|
|
|
|
|
def test_HEAD_but_expired(self):
|
|
|
|
test_time = time() + 10000
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(test_time + 100)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 2000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-10-26 21:42:24 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
|
2011-11-01 23:16:11 +00:00
|
|
|
orig_time = object_server.time.time
|
|
|
|
try:
|
|
|
|
t = time()
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(t + 1)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-11-01 23:16:11 +00:00
|
|
|
object_server.time.time = lambda: t
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 1000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-11-01 23:16:11 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-11-01 23:16:11 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-11-01 23:16:11 +00:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
finally:
|
|
|
|
object_server.time.time = orig_time
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
orig_time = object_server.time.time
|
|
|
|
try:
|
|
|
|
t = time() + 2
|
|
|
|
object_server.time.time = lambda: t
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'HEAD'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time())})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
finally:
|
|
|
|
object_server.time.time = orig_time
|
|
|
|
|
|
|
|
def test_POST_but_expired(self):
|
|
|
|
test_time = time() + 10000
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(test_time + 100)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 2000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-10-26 21:42:24 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 1500)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 202)
|
|
|
|
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(time() + 1)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 1000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-10-26 21:42:24 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
orig_time = object_server.time.time
|
|
|
|
try:
|
|
|
|
t = time() + 2
|
|
|
|
object_server.time.time = lambda: t
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time())})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
finally:
|
|
|
|
object_server.time.time = orig_time
|
|
|
|
|
2012-11-08 15:22:01 -08:00
|
|
|
def test_DELETE_but_expired(self):
|
|
|
|
test_time = time() + 10000
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(test_time + 100)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2012-11-08 15:22:01 -08:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 2000),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2012-11-08 15:22:01 -08:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2012-11-08 15:22:01 -08:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
orig_time = object_server.time.time
|
|
|
|
try:
|
|
|
|
t = test_time + 100
|
|
|
|
object_server.time.time = lambda: float(t)
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time())})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2012-11-08 15:22:01 -08:00
|
|
|
self.assertEquals(resp.status_int, 404)
|
|
|
|
finally:
|
|
|
|
object_server.time.time = orig_time
|
|
|
|
|
2011-10-26 21:42:24 +00:00
|
|
|
def test_DELETE_if_delete_at(self):
|
|
|
|
test_time = time() + 10000
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 99),
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 98)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(test_time - 1)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 97),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-10-26 21:42:24 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 95),
|
|
|
|
'X-If-Delete-At': str(int(test_time))})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 95)})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp = int(test_time - 1)
|
|
|
|
delete_at_container = str(
|
|
|
|
delete_at_timestamp /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 94),
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp),
|
|
|
|
'X-Delete-At-Container': delete_at_container,
|
2011-10-26 21:42:24 +00:00
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 92),
|
|
|
|
'X-If-Delete-At': str(int(test_time))})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 412)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(test_time - 92),
|
|
|
|
'X-If-Delete-At': delete_at_timestamp})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
|
|
|
|
def test_DELETE_calls_delete_at(self):
|
|
|
|
given_args = []
|
|
|
|
|
|
|
|
def fake_delete_at_update(*args):
|
|
|
|
given_args.extend(args)
|
|
|
|
|
|
|
|
self.object_controller.delete_at_update = fake_delete_at_update
|
|
|
|
|
|
|
|
timestamp1 = normalize_timestamp(time())
|
2013-06-03 23:50:05 +00:00
|
|
|
delete_at_timestamp1 = int(time() + 1000)
|
|
|
|
delete_at_container1 = str(
|
|
|
|
delete_at_timestamp1 /
|
|
|
|
self.object_controller.expiring_objects_container_divisor *
|
|
|
|
self.object_controller.expiring_objects_container_divisor)
|
2011-10-26 21:42:24 +00:00
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': timestamp1,
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream',
|
2013-06-03 23:50:05 +00:00
|
|
|
'X-Delete-At': str(delete_at_timestamp1),
|
|
|
|
'X-Delete-At-Container': delete_at_container1})
|
2011-10-26 21:42:24 +00:00
|
|
|
req.body = 'TEST'
|
|
|
|
resp = self.object_controller.PUT(req)
|
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
self.assertEquals(given_args, [
|
|
|
|
'PUT', int(delete_at_timestamp1), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
while given_args:
|
|
|
|
given_args.pop()
|
|
|
|
|
|
|
|
sleep(.00001)
|
|
|
|
timestamp2 = normalize_timestamp(time())
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'DELETE'},
|
|
|
|
headers={'X-Timestamp': timestamp2,
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
resp = self.object_controller.DELETE(req)
|
|
|
|
self.assertEquals(resp.status_int, 204)
|
|
|
|
self.assertEquals(given_args, [
|
|
|
|
'DELETE', int(delete_at_timestamp1), 'a', 'c', 'o',
|
Enhance log msg to report referer and user-agent
Enhance internally logged messages to report referer and user-agent.
Pass the referering URL and METHOD between internal servers (when
known), and set the user-agent to be the server type (obj-server,
container-server, proxy-server, obj-updater, obj-replicator,
container-updater, direct-client, etc.) with the process PID. In
conjunction with the transaction ID, it helps to track down which PID
from a given system was responsible for initiating the request and
what that server was working on to make this request.
This has been helpful in tracking down interactions between object,
container and account servers.
We also take things a bit further performaing a bit of refactoring to
consolidate calls to transfer_headers() now that we have a helper
method for constructing them.
Finally we performed further changes to avoid header key duplication
due to string literal header key values and the various objects
representing headers for requests and responses. See below for more
details.
====
Header Keys
There seems to be a bit of a problem with the case of the various
string literals used for header keys and the interchangable way
standard Python dictionaries, HeaderKeyDict() and HeaderEnvironProxy()
objects are used.
If one is not careful, a header object of some sort (one that does not
normalize its keys, and that is not necessarily a dictionary) can be
constructed containing header keys which differ only by the case of
their string literals. E.g.:
{ 'x-trans-id': '1234', 'X-Trans-Id': '5678' }
Such an object, when passed to http_connect() will result in an
on-the-wire header where the key values are merged together, comma
separated, that looks something like:
HTTP_X_TRANS_ID: 1234,5678
For some headers in some contexts, this is behavior is desirable. For
example, one can also use a list of tuples which enumerate the multiple
values a single header should have.
However, in almost all of the contexts used in the code base, this is
not desirable.
This behavior arises from a combination of factors:
1. Header strings are not constants and different lower-case and
title-case header strings values are used interchangably in the
code at times
It might be worth the effort to make a pass through the code to
stop using string literals and use constants instead, but there
are plusses and minuses to doing that, so this was not attempted
in this effort
2. HeaderEnvironProxy() objects report their keys in ".title()"
case, but normalize all other key references to the form
expected by the Request class's environ field
swob.Request.headers fields are HeaderEnvironProxy() objects.
3. HeaderKeyDict() objects report their keys in ".lower()" case,
and normalize all other key references to ".lower()" case
swob.Response.headers fields are HeaderKeyDict() objects.
Depending on which object is used and how it is used, one can end up
with such a mismatch.
This commit takes the following steps as a (PROPOSED) solution:
1. Change HeaderKeyDict() to normalize using ".title()" case to
match HeaderEnvironProxy()
2. Replace standard python dictionary objects with HeaderKeyDict()
objects where possible
This gives us an object that normalizes key references to avoid
fixing the code to normalize the string literals.
3. Fix up a few places to use title case string literals to match
the new defaults
Change-Id: Ied56a1df83ffac793ee85e796424d7d20f18f469
Signed-off-by: Peter Portante <peter.portante@redhat.com>
2012-11-15 16:34:45 -05:00
|
|
|
req, 'sda1'])
|
2011-10-26 21:42:24 +00:00
|
|
|
|
|
|
|
def test_PUT_delete_at_in_past(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'X-Delete-At': str(int(time() - 1)),
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertTrue('X-Delete-At in past' in resp.body)
|
|
|
|
|
|
|
|
def test_POST_delete_at_in_past(self):
|
|
|
|
req = Request.blank('/sda1/p/a/c/o', environ={'REQUEST_METHOD': 'PUT'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time()),
|
|
|
|
'Content-Length': '4',
|
|
|
|
'Content-Type': 'application/octet-stream'})
|
|
|
|
req.body = 'TEST'
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 201)
|
|
|
|
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'POST'},
|
|
|
|
headers={'X-Timestamp': normalize_timestamp(time() + 1),
|
|
|
|
'X-Delete-At': str(int(time() - 1))})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2011-10-26 21:42:24 +00:00
|
|
|
self.assertEquals(resp.status_int, 400)
|
|
|
|
self.assertTrue('X-Delete-At in past' in resp.body)
|
|
|
|
|
2012-02-07 14:02:28 -08:00
|
|
|
def test_REPLICATE_works(self):
|
|
|
|
|
|
|
|
def fake_get_hashes(*args, **kwargs):
|
|
|
|
return 0, {1: 2}
|
|
|
|
|
2012-08-21 12:51:59 -07:00
|
|
|
def my_tpool_execute(func, *args, **kwargs):
|
2012-02-07 14:02:28 -08:00
|
|
|
return func(*args, **kwargs)
|
|
|
|
|
2012-08-21 12:51:59 -07:00
|
|
|
was_get_hashes = object_server.get_hashes
|
|
|
|
object_server.get_hashes = fake_get_hashes
|
2012-02-07 14:02:28 -08:00
|
|
|
was_tpool_exe = tpool.execute
|
|
|
|
tpool.execute = my_tpool_execute
|
|
|
|
try:
|
|
|
|
req = Request.blank('/sda1/p/suff',
|
|
|
|
environ={'REQUEST_METHOD': 'REPLICATE'},
|
|
|
|
headers={})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2012-02-07 14:02:28 -08:00
|
|
|
self.assertEquals(resp.status_int, 200)
|
|
|
|
p_data = pickle.loads(resp.body)
|
|
|
|
self.assertEquals(p_data, {1: 2})
|
|
|
|
finally:
|
|
|
|
tpool.execute = was_tpool_exe
|
2012-08-21 12:51:59 -07:00
|
|
|
object_server.get_hashes = was_get_hashes
|
2012-02-07 14:02:28 -08:00
|
|
|
|
|
|
|
def test_REPLICATE_timeout(self):
|
|
|
|
|
|
|
|
def fake_get_hashes(*args, **kwargs):
|
|
|
|
raise Timeout()
|
|
|
|
|
2012-08-21 12:51:59 -07:00
|
|
|
def my_tpool_execute(func, *args, **kwargs):
|
2012-02-07 14:02:28 -08:00
|
|
|
return func(*args, **kwargs)
|
|
|
|
|
2012-08-21 12:51:59 -07:00
|
|
|
was_get_hashes = object_server.get_hashes
|
|
|
|
object_server.get_hashes = fake_get_hashes
|
2012-02-07 14:02:28 -08:00
|
|
|
was_tpool_exe = tpool.execute
|
|
|
|
tpool.execute = my_tpool_execute
|
|
|
|
try:
|
|
|
|
req = Request.blank('/sda1/p/suff',
|
|
|
|
environ={'REQUEST_METHOD': 'REPLICATE'},
|
|
|
|
headers={})
|
|
|
|
self.assertRaises(Timeout, self.object_controller.REPLICATE, req)
|
|
|
|
finally:
|
|
|
|
tpool.execute = was_tpool_exe
|
2012-08-21 12:51:59 -07:00
|
|
|
object_server.get_hashes = was_get_hashes
|
2010-07-12 17:03:45 -05:00
|
|
|
|
2012-08-27 14:44:41 -07:00
|
|
|
def test_PUT_with_full_drive(self):
|
|
|
|
|
|
|
|
class IgnoredBody():
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self.read_called = False
|
|
|
|
|
|
|
|
def read(self, size=-1):
|
|
|
|
if not self.read_called:
|
|
|
|
self.read_called = True
|
|
|
|
return 'VERIFY'
|
|
|
|
return ''
|
|
|
|
|
|
|
|
def fake_fallocate(fd, size):
|
|
|
|
raise OSError(42, 'Unable to fallocate(%d)' % size)
|
|
|
|
|
2013-07-17 16:32:35 -07:00
|
|
|
orig_fallocate = diskfile.fallocate
|
2012-08-27 14:44:41 -07:00
|
|
|
try:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.fallocate = fake_fallocate
|
2012-08-27 14:44:41 -07:00
|
|
|
timestamp = normalize_timestamp(time())
|
|
|
|
body_reader = IgnoredBody()
|
|
|
|
req = Request.blank('/sda1/p/a/c/o',
|
|
|
|
environ={'REQUEST_METHOD': 'PUT',
|
|
|
|
'wsgi.input': body_reader},
|
|
|
|
headers={'X-Timestamp': timestamp,
|
|
|
|
'Content-Length': '6',
|
|
|
|
'Content-Type': 'application/octet-stream',
|
|
|
|
'Expect': '100-continue'})
|
2013-08-16 17:13:00 -04:00
|
|
|
resp = req.get_response(self.object_controller)
|
2012-08-27 14:44:41 -07:00
|
|
|
self.assertEquals(resp.status_int, 507)
|
|
|
|
self.assertFalse(body_reader.read_called)
|
|
|
|
finally:
|
2013-07-17 16:32:35 -07:00
|
|
|
diskfile.fallocate = orig_fallocate
|
2012-08-27 14:44:41 -07:00
|
|
|
|
2012-12-17 06:39:25 -05:00
|
|
|
def test_serv_reserv(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test replication_server flag was set from configuration file.
|
2012-12-17 06:39:25 -05:00
|
|
|
conf = {'devices': self.testdir, 'mount_check': 'false'}
|
|
|
|
self.assertEquals(
|
|
|
|
object_server.ObjectController(conf).replication_server, None)
|
|
|
|
for val in [True, '1', 'True', 'true']:
|
|
|
|
conf['replication_server'] = val
|
|
|
|
self.assertTrue(
|
|
|
|
object_server.ObjectController(conf).replication_server)
|
|
|
|
for val in [False, 0, '0', 'False', 'false', 'test_string']:
|
|
|
|
conf['replication_server'] = val
|
|
|
|
self.assertFalse(
|
|
|
|
object_server.ObjectController(conf).replication_server)
|
|
|
|
|
|
|
|
def test_list_allowed_methods(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test list of allowed_methods
|
2013-05-23 20:16:21 +04:00
|
|
|
obj_methods = ['DELETE', 'PUT', 'HEAD', 'GET', 'POST']
|
|
|
|
repl_methods = ['REPLICATE']
|
|
|
|
for method_name in obj_methods:
|
|
|
|
method = getattr(self.object_controller, method_name)
|
|
|
|
self.assertFalse(hasattr(method, 'replication'))
|
|
|
|
for method_name in repl_methods:
|
|
|
|
method = getattr(self.object_controller, method_name)
|
|
|
|
self.assertEquals(method.replication, True)
|
2012-12-17 06:39:25 -05:00
|
|
|
|
|
|
|
def test_correct_allowed_method(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test correct work for allowed method using
|
|
|
|
# swift.obj.server.ObjectController.__call__
|
2012-12-17 06:39:25 -05:00
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
2013-05-23 20:16:21 +04:00
|
|
|
self.object_controller = object_server.ObjectController(
|
|
|
|
{'devices': self.testdir, 'mount_check': 'false',
|
|
|
|
'replication_server': 'false'})
|
2012-12-17 06:39:25 -05:00
|
|
|
|
|
|
|
def start_response(*args):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Sends args to outbuf
|
2012-12-17 06:39:25 -05:00
|
|
|
outbuf.writelines(args)
|
|
|
|
|
2013-05-23 20:16:21 +04:00
|
|
|
method = 'PUT'
|
2012-12-17 06:39:25 -05:00
|
|
|
env = {'REQUEST_METHOD': method,
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False}
|
|
|
|
|
2013-05-23 20:16:21 +04:00
|
|
|
method_res = mock.MagicMock()
|
|
|
|
mock_method = public(lambda x: mock.MagicMock(return_value=method_res))
|
2012-12-17 06:39:25 -05:00
|
|
|
with mock.patch.object(self.object_controller, method,
|
2013-05-23 20:16:21 +04:00
|
|
|
new=mock_method):
|
2012-12-17 06:39:25 -05:00
|
|
|
response = self.object_controller.__call__(env, start_response)
|
2013-05-23 20:16:21 +04:00
|
|
|
self.assertEqual(response, method_res)
|
2012-12-17 06:39:25 -05:00
|
|
|
|
|
|
|
def test_not_allowed_method(self):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Test correct work for NOT allowed method using
|
|
|
|
# swift.obj.server.ObjectController.__call__
|
2012-12-17 06:39:25 -05:00
|
|
|
inbuf = StringIO()
|
|
|
|
errbuf = StringIO()
|
|
|
|
outbuf = StringIO()
|
2013-05-23 20:16:21 +04:00
|
|
|
self.object_controller = object_server.ObjectController(
|
|
|
|
{'devices': self.testdir, 'mount_check': 'false',
|
|
|
|
'replication_server': 'false'})
|
2012-12-17 06:39:25 -05:00
|
|
|
|
|
|
|
def start_response(*args):
|
2013-08-31 22:36:58 -04:00
|
|
|
# Sends args to outbuf
|
2012-12-17 06:39:25 -05:00
|
|
|
outbuf.writelines(args)
|
|
|
|
|
2013-05-23 20:16:21 +04:00
|
|
|
method = 'PUT'
|
2012-12-17 06:39:25 -05:00
|
|
|
|
|
|
|
env = {'REQUEST_METHOD': method,
|
|
|
|
'SCRIPT_NAME': '',
|
|
|
|
'PATH_INFO': '/sda1/p/a/c',
|
|
|
|
'SERVER_NAME': '127.0.0.1',
|
|
|
|
'SERVER_PORT': '8080',
|
|
|
|
'SERVER_PROTOCOL': 'HTTP/1.0',
|
|
|
|
'CONTENT_LENGTH': '0',
|
|
|
|
'wsgi.version': (1, 0),
|
|
|
|
'wsgi.url_scheme': 'http',
|
|
|
|
'wsgi.input': inbuf,
|
|
|
|
'wsgi.errors': errbuf,
|
|
|
|
'wsgi.multithread': False,
|
|
|
|
'wsgi.multiprocess': False,
|
|
|
|
'wsgi.run_once': False}
|
|
|
|
|
|
|
|
answer = ['<html><h1>Method Not Allowed</h1><p>The method is not '
|
|
|
|
'allowed for this resource.</p></html>']
|
2013-05-23 20:16:21 +04:00
|
|
|
mock_method = replication(public(lambda x: mock.MagicMock()))
|
2012-12-17 06:39:25 -05:00
|
|
|
with mock.patch.object(self.object_controller, method,
|
2013-05-23 20:16:21 +04:00
|
|
|
new=mock_method):
|
|
|
|
mock_method.replication = True
|
2012-12-17 06:39:25 -05:00
|
|
|
response = self.object_controller.__call__(env, start_response)
|
|
|
|
self.assertEqual(response, answer)
|
|
|
|
|
|
|
|
|
2010-07-12 17:03:45 -05:00
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main()
|