698717d886
Reserve the namespace starting with the NULL byte for internal use-cases. Backend services will allow path names to include the NULL byte in urls and validate names in the reserved namespace. Database services will filter all names starting with the NULL byte from responses unless the request includes the header: X-Backend-Allow-Reserved-Names: true The proxy server will not allow path names to include the NULL byte in urls unless a middlware has set the X-Backend-Allow-Reserved-Names header. Middlewares can use the reserved namespace to create objects and containers that can not be directly manipulated by clients. Any objects and bytes created in the reserved namespace will be aggregated to the user's account totals. When deploying internal proxys developers and operators may configure the gatekeeper middleware to translate the X-Allow-Reserved-Names header to the Backend header so they can manipulate the reserved namespace directly through the normal API. UpgradeImpact: it's not safe to rollback from this change Change-Id: If912f71d8b0d03369680374e8233da85d8d38f85
132 lines
5.2 KiB
Python
132 lines
5.2 KiB
Python
#!/usr/bin/python -u
|
|
# Copyright (c) 2019 OpenStack Foundation
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
|
# implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
import unittest
|
|
|
|
from io import BytesIO
|
|
from uuid import uuid4
|
|
|
|
from swift.common.request_helpers import get_reserved_name
|
|
|
|
from test.probe.common import ReplProbeTest
|
|
|
|
from swiftclient import client, ClientException
|
|
|
|
|
|
class TestReservedNames(ReplProbeTest):
|
|
|
|
def test_simple_crud(self):
|
|
int_client = self.make_internal_client()
|
|
|
|
# Create reserve named container
|
|
user_cont = 'container-%s' % uuid4()
|
|
reserved_cont = get_reserved_name('container-%s' % uuid4())
|
|
client.put_container(self.url, self.token, user_cont)
|
|
int_client.create_container(self.account, reserved_cont)
|
|
|
|
# Check that we can list both reserved and non-reserved containers
|
|
self.assertEqual([reserved_cont, user_cont], [
|
|
c['name'] for c in int_client.iter_containers(self.account)])
|
|
|
|
# sanity, user can't get to reserved name
|
|
with self.assertRaises(ClientException) as cm:
|
|
client.head_container(self.url, self.token, reserved_cont)
|
|
self.assertEqual(412, cm.exception.http_status)
|
|
|
|
user_obj = 'obj-%s' % uuid4()
|
|
reserved_obj = get_reserved_name('obj-%s' % uuid4())
|
|
|
|
# InternalClient can write & read reserved names fine
|
|
int_client.upload_object(
|
|
BytesIO(b'data'), self.account, reserved_cont, reserved_obj)
|
|
int_client.get_object_metadata(
|
|
self.account, reserved_cont, reserved_obj)
|
|
_, _, app_iter = int_client.get_object(
|
|
self.account, reserved_cont, reserved_obj)
|
|
self.assertEqual(b''.join(app_iter), b'data')
|
|
self.assertEqual([reserved_obj], [
|
|
o['name']
|
|
for o in int_client.iter_objects(self.account, reserved_cont)])
|
|
|
|
# But reserved objects must be in reserved containers, and
|
|
# user objects must be in user containers (at least for now)
|
|
int_client.upload_object(
|
|
BytesIO(b'data'), self.account, reserved_cont, user_obj,
|
|
acceptable_statuses=(400,))
|
|
|
|
int_client.upload_object(
|
|
BytesIO(b'data'), self.account, user_cont, reserved_obj,
|
|
acceptable_statuses=(400,))
|
|
|
|
# Make sure we can clean up, too
|
|
int_client.delete_object(self.account, reserved_cont, reserved_obj)
|
|
int_client.delete_container(self.account, reserved_cont)
|
|
|
|
def test_symlink_target(self):
|
|
if 'symlink' not in self.cluster_info:
|
|
raise unittest.SkipTest(
|
|
"Symlink not enabled in proxy; can't test "
|
|
"symlink to reserved name")
|
|
int_client = self.make_internal_client()
|
|
|
|
# create link container first, ensure account gets created too
|
|
client.put_container(self.url, self.token, 'c1')
|
|
|
|
# Create reserve named container
|
|
tgt_cont = get_reserved_name('container-%s' % uuid4())
|
|
int_client.create_container(self.account, tgt_cont)
|
|
|
|
# sanity, user can't get to reserved name
|
|
with self.assertRaises(ClientException) as cm:
|
|
client.head_container(self.url, self.token, tgt_cont)
|
|
self.assertEqual(412, cm.exception.http_status)
|
|
|
|
tgt_obj = get_reserved_name('obj-%s' % uuid4())
|
|
int_client.upload_object(
|
|
BytesIO(b'target object'), self.account, tgt_cont, tgt_obj)
|
|
metadata = int_client.get_object_metadata(
|
|
self.account, tgt_cont, tgt_obj)
|
|
etag = metadata['etag']
|
|
|
|
# users can write a dynamic symlink that targets a reserved
|
|
# name object
|
|
client.put_object(
|
|
self.url, self.token, 'c1', 'symlink',
|
|
headers={
|
|
'X-Symlink-Target': '%s/%s' % (tgt_cont, tgt_obj),
|
|
'Content-Type': 'application/symlink',
|
|
})
|
|
|
|
# but can't read the symlink
|
|
with self.assertRaises(ClientException) as cm:
|
|
client.get_object(self.url, self.token, 'c1', 'symlink')
|
|
self.assertEqual(412, cm.exception.http_status)
|
|
|
|
# user's can't create static symlink to reserved name
|
|
with self.assertRaises(ClientException) as cm:
|
|
client.put_object(
|
|
self.url, self.token, 'c1', 'static-symlink',
|
|
headers={
|
|
'X-Symlink-Target': '%s/%s' % (tgt_cont, tgt_obj),
|
|
'X-Symlink-Target-Etag': etag,
|
|
'Content-Type': 'application/symlink',
|
|
})
|
|
self.assertEqual(412, cm.exception.http_status)
|
|
|
|
# clean-up
|
|
client.delete_object(self.url, self.token, 'c1', 'symlink')
|
|
int_client.delete_object(self.account, tgt_cont, tgt_obj)
|
|
int_client.delete_container(self.account, tgt_cont)
|