2013-11-21 17:31:16 -08:00
|
|
|
# Copyright (c) 2013 OpenStack Foundation
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
|
|
# implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
# This stuff can't live in test/unit/__init__.py due to its swob dependency.
|
|
|
|
|
Get better at closing WSGI iterables.
PEP 333 (WSGI) says: "If the iterable returned by the application has
a close() method, the server or gateway must call that method upon
completion of the current request[.]"
There's a bunch of places where we weren't doing that; some of them
matter more than others. Calling .close() can prevent a connection
leak in some cases. In others, it just provides a certain pedantic
smugness. Either way, we should do what WSGI requires.
Noteworthy goofs include:
* If a client is downloading a large object and disconnects halfway
through, a proxy -> obj connection may be leaked. In this case,
the WSGI iterable is a SegmentedIterable, which lacked a close()
method. Thus, when the WSGI server noticed the client disconnect,
it had no way of telling the SegmentedIterable about it, and so
the underlying iterable for the segment's data didn't get
closed.
Here, it seems likely (though unproven) that the object server
would time out and kill the connection, or that a
ChunkWriteTimeout would fire down in the proxy server, so the
leaked connection would eventually go away. However, a flurry of
client disconnects could leave a big pile of useless connections.
* If a conditional request receives a 304 or 412, the underlying
app_iter is not closed. This mostly affects conditional requests
for large objects.
The leaked connections were noticed by this patch's co-author, who
made the changes to SegmentedIterable. Those changes helped, but did
not completely fix, the issue. The rest of the patch is an attempt to
plug the rest of the holes.
Co-Authored-By: Romain LE DISEZ <romain.ledisez@ovh.net>
Change-Id: I168e147aae7c1728e7e3fdabb7fba6f2d747d937
Closes-Bug: #1466549
2015-06-18 12:58:03 -07:00
|
|
|
from collections import defaultdict
|
2013-11-21 17:31:16 -08:00
|
|
|
from copy import deepcopy
|
|
|
|
from hashlib import md5
|
|
|
|
from swift.common import swob
|
|
|
|
from swift.common.utils import split_path
|
|
|
|
|
2014-04-28 20:03:48 -07:00
|
|
|
from test.unit import FakeLogger, FakeRing
|
|
|
|
|
2013-11-21 17:31:16 -08:00
|
|
|
|
Get better at closing WSGI iterables.
PEP 333 (WSGI) says: "If the iterable returned by the application has
a close() method, the server or gateway must call that method upon
completion of the current request[.]"
There's a bunch of places where we weren't doing that; some of them
matter more than others. Calling .close() can prevent a connection
leak in some cases. In others, it just provides a certain pedantic
smugness. Either way, we should do what WSGI requires.
Noteworthy goofs include:
* If a client is downloading a large object and disconnects halfway
through, a proxy -> obj connection may be leaked. In this case,
the WSGI iterable is a SegmentedIterable, which lacked a close()
method. Thus, when the WSGI server noticed the client disconnect,
it had no way of telling the SegmentedIterable about it, and so
the underlying iterable for the segment's data didn't get
closed.
Here, it seems likely (though unproven) that the object server
would time out and kill the connection, or that a
ChunkWriteTimeout would fire down in the proxy server, so the
leaked connection would eventually go away. However, a flurry of
client disconnects could leave a big pile of useless connections.
* If a conditional request receives a 304 or 412, the underlying
app_iter is not closed. This mostly affects conditional requests
for large objects.
The leaked connections were noticed by this patch's co-author, who
made the changes to SegmentedIterable. Those changes helped, but did
not completely fix, the issue. The rest of the patch is an attempt to
plug the rest of the holes.
Co-Authored-By: Romain LE DISEZ <romain.ledisez@ovh.net>
Change-Id: I168e147aae7c1728e7e3fdabb7fba6f2d747d937
Closes-Bug: #1466549
2015-06-18 12:58:03 -07:00
|
|
|
class LeakTrackingIter(object):
|
|
|
|
def __init__(self, inner_iter, fake_swift, path):
|
|
|
|
self.inner_iter = inner_iter
|
|
|
|
self.fake_swift = fake_swift
|
|
|
|
self.path = path
|
|
|
|
|
|
|
|
def __iter__(self):
|
|
|
|
for x in self.inner_iter:
|
|
|
|
yield x
|
|
|
|
|
|
|
|
def close(self):
|
|
|
|
self.fake_swift.mark_closed(self.path)
|
|
|
|
|
|
|
|
|
2013-11-21 17:31:16 -08:00
|
|
|
class FakeSwift(object):
|
|
|
|
"""
|
|
|
|
A good-enough fake Swift proxy server to use in testing middleware.
|
|
|
|
"""
|
|
|
|
|
|
|
|
def __init__(self):
|
|
|
|
self._calls = []
|
Get better at closing WSGI iterables.
PEP 333 (WSGI) says: "If the iterable returned by the application has
a close() method, the server or gateway must call that method upon
completion of the current request[.]"
There's a bunch of places where we weren't doing that; some of them
matter more than others. Calling .close() can prevent a connection
leak in some cases. In others, it just provides a certain pedantic
smugness. Either way, we should do what WSGI requires.
Noteworthy goofs include:
* If a client is downloading a large object and disconnects halfway
through, a proxy -> obj connection may be leaked. In this case,
the WSGI iterable is a SegmentedIterable, which lacked a close()
method. Thus, when the WSGI server noticed the client disconnect,
it had no way of telling the SegmentedIterable about it, and so
the underlying iterable for the segment's data didn't get
closed.
Here, it seems likely (though unproven) that the object server
would time out and kill the connection, or that a
ChunkWriteTimeout would fire down in the proxy server, so the
leaked connection would eventually go away. However, a flurry of
client disconnects could leave a big pile of useless connections.
* If a conditional request receives a 304 or 412, the underlying
app_iter is not closed. This mostly affects conditional requests
for large objects.
The leaked connections were noticed by this patch's co-author, who
made the changes to SegmentedIterable. Those changes helped, but did
not completely fix, the issue. The rest of the patch is an attempt to
plug the rest of the holes.
Co-Authored-By: Romain LE DISEZ <romain.ledisez@ovh.net>
Change-Id: I168e147aae7c1728e7e3fdabb7fba6f2d747d937
Closes-Bug: #1466549
2015-06-18 12:58:03 -07:00
|
|
|
self._unclosed_req_paths = defaultdict(int)
|
2013-11-21 17:31:16 -08:00
|
|
|
self.req_method_paths = []
|
2014-02-05 11:57:20 -08:00
|
|
|
self.swift_sources = []
|
2013-11-21 17:31:16 -08:00
|
|
|
self.uploaded = {}
|
|
|
|
# mapping of (method, path) --> (response class, headers, body)
|
|
|
|
self._responses = {}
|
2014-04-28 20:03:48 -07:00
|
|
|
self.logger = FakeLogger('fake-swift')
|
|
|
|
self.account_ring = FakeRing()
|
|
|
|
self.container_ring = FakeRing()
|
|
|
|
self.get_object_ring = lambda policy_index: FakeRing()
|
|
|
|
|
|
|
|
def _get_response(self, method, path):
|
|
|
|
resp = self._responses[(method, path)]
|
|
|
|
if isinstance(resp, list):
|
|
|
|
try:
|
|
|
|
resp = resp.pop(0)
|
|
|
|
except IndexError:
|
|
|
|
raise IndexError("Didn't find any more %r "
|
|
|
|
"in allowed responses" % (
|
|
|
|
(method, path),))
|
|
|
|
return resp
|
2013-11-21 17:31:16 -08:00
|
|
|
|
|
|
|
def __call__(self, env, start_response):
|
|
|
|
method = env['REQUEST_METHOD']
|
|
|
|
path = env['PATH_INFO']
|
|
|
|
_, acc, cont, obj = split_path(env['PATH_INFO'], 0, 4,
|
|
|
|
rest_with_last=True)
|
|
|
|
if env.get('QUERY_STRING'):
|
|
|
|
path += '?' + env['QUERY_STRING']
|
|
|
|
|
2014-03-06 07:47:42 -08:00
|
|
|
if 'swift.authorize' in env:
|
|
|
|
resp = env['swift.authorize']()
|
|
|
|
if resp:
|
|
|
|
return resp(env, start_response)
|
|
|
|
|
2014-04-28 20:03:48 -07:00
|
|
|
req_headers = swob.Request(env).headers
|
2014-02-05 11:57:20 -08:00
|
|
|
self.swift_sources.append(env.get('swift.source'))
|
2013-11-21 17:31:16 -08:00
|
|
|
|
|
|
|
try:
|
2014-04-28 20:03:48 -07:00
|
|
|
resp_class, raw_headers, body = self._get_response(method, path)
|
2013-11-21 17:31:16 -08:00
|
|
|
headers = swob.HeaderKeyDict(raw_headers)
|
|
|
|
except KeyError:
|
|
|
|
if (env.get('QUERY_STRING')
|
|
|
|
and (method, env['PATH_INFO']) in self._responses):
|
2014-04-28 20:03:48 -07:00
|
|
|
resp_class, raw_headers, body = self._get_response(
|
|
|
|
method, env['PATH_INFO'])
|
2013-11-21 17:31:16 -08:00
|
|
|
headers = swob.HeaderKeyDict(raw_headers)
|
|
|
|
elif method == 'HEAD' and ('GET', path) in self._responses:
|
2014-04-28 20:03:48 -07:00
|
|
|
resp_class, raw_headers, body = self._get_response('GET', path)
|
2013-11-21 17:31:16 -08:00
|
|
|
body = None
|
|
|
|
headers = swob.HeaderKeyDict(raw_headers)
|
|
|
|
elif method == 'GET' and obj and path in self.uploaded:
|
|
|
|
resp_class = swob.HTTPOk
|
|
|
|
headers, body = self.uploaded[path]
|
|
|
|
else:
|
2014-04-28 20:03:48 -07:00
|
|
|
raise KeyError("Didn't find %r in allowed responses" % (
|
|
|
|
(method, path),))
|
|
|
|
|
|
|
|
self._calls.append((method, path, req_headers))
|
2013-11-21 17:31:16 -08:00
|
|
|
|
|
|
|
# simulate object PUT
|
|
|
|
if method == 'PUT' and obj:
|
|
|
|
input = env['wsgi.input'].read()
|
|
|
|
etag = md5(input).hexdigest()
|
|
|
|
headers.setdefault('Etag', etag)
|
|
|
|
headers.setdefault('Content-Length', len(input))
|
|
|
|
|
|
|
|
# keep it for subsequent GET requests later
|
|
|
|
self.uploaded[path] = (deepcopy(headers), input)
|
|
|
|
if "CONTENT_TYPE" in env:
|
|
|
|
self.uploaded[path][0]['Content-Type'] = env["CONTENT_TYPE"]
|
|
|
|
|
|
|
|
# range requests ought to work, hence conditional_response=True
|
|
|
|
req = swob.Request(env)
|
|
|
|
resp = resp_class(req=req, headers=headers, body=body,
|
|
|
|
conditional_response=True)
|
Get better at closing WSGI iterables.
PEP 333 (WSGI) says: "If the iterable returned by the application has
a close() method, the server or gateway must call that method upon
completion of the current request[.]"
There's a bunch of places where we weren't doing that; some of them
matter more than others. Calling .close() can prevent a connection
leak in some cases. In others, it just provides a certain pedantic
smugness. Either way, we should do what WSGI requires.
Noteworthy goofs include:
* If a client is downloading a large object and disconnects halfway
through, a proxy -> obj connection may be leaked. In this case,
the WSGI iterable is a SegmentedIterable, which lacked a close()
method. Thus, when the WSGI server noticed the client disconnect,
it had no way of telling the SegmentedIterable about it, and so
the underlying iterable for the segment's data didn't get
closed.
Here, it seems likely (though unproven) that the object server
would time out and kill the connection, or that a
ChunkWriteTimeout would fire down in the proxy server, so the
leaked connection would eventually go away. However, a flurry of
client disconnects could leave a big pile of useless connections.
* If a conditional request receives a 304 or 412, the underlying
app_iter is not closed. This mostly affects conditional requests
for large objects.
The leaked connections were noticed by this patch's co-author, who
made the changes to SegmentedIterable. Those changes helped, but did
not completely fix, the issue. The rest of the patch is an attempt to
plug the rest of the holes.
Co-Authored-By: Romain LE DISEZ <romain.ledisez@ovh.net>
Change-Id: I168e147aae7c1728e7e3fdabb7fba6f2d747d937
Closes-Bug: #1466549
2015-06-18 12:58:03 -07:00
|
|
|
wsgi_iter = resp(env, start_response)
|
|
|
|
self.mark_opened(path)
|
|
|
|
return LeakTrackingIter(wsgi_iter, self, path)
|
|
|
|
|
|
|
|
def mark_opened(self, path):
|
|
|
|
self._unclosed_req_paths[path] += 1
|
|
|
|
|
|
|
|
def mark_closed(self, path):
|
|
|
|
self._unclosed_req_paths[path] -= 1
|
|
|
|
|
|
|
|
@property
|
|
|
|
def unclosed_requests(self):
|
|
|
|
return {path: count
|
|
|
|
for path, count in self._unclosed_req_paths.items()
|
|
|
|
if count > 0}
|
2013-11-21 17:31:16 -08:00
|
|
|
|
|
|
|
@property
|
|
|
|
def calls(self):
|
|
|
|
return [(method, path) for method, path, headers in self._calls]
|
|
|
|
|
2014-04-28 20:03:48 -07:00
|
|
|
@property
|
|
|
|
def headers(self):
|
|
|
|
return [headers for method, path, headers in self._calls]
|
|
|
|
|
2013-11-21 17:31:16 -08:00
|
|
|
@property
|
|
|
|
def calls_with_headers(self):
|
|
|
|
return self._calls
|
|
|
|
|
|
|
|
@property
|
|
|
|
def call_count(self):
|
|
|
|
return len(self._calls)
|
|
|
|
|
2014-04-16 17:16:57 -07:00
|
|
|
def register(self, method, path, response_class, headers, body=''):
|
2013-11-21 17:31:16 -08:00
|
|
|
self._responses[(method, path)] = (response_class, headers, body)
|
2014-04-28 20:03:48 -07:00
|
|
|
|
|
|
|
def register_responses(self, method, path, responses):
|
|
|
|
self._responses[(method, path)] = list(responses)
|