Rebase to Swift 2.5.0 (liberty)
Change-Id: I2743c6fd2b2579751b5d03dacf320401f08563b1 Signed-off-by: Prashanth Pai <ppai@redhat.com>
This commit is contained in:
parent
55857a2e21
commit
a8f474d844
@ -8,5 +8,6 @@ greenlet>=0.3.1
|
||||
netifaces>=0.5,!=0.10.0,!=0.10.1
|
||||
pastedeploy>=1.3.3
|
||||
simplejson>=2.0.9
|
||||
six>=1.9.0
|
||||
xattr>=0.4
|
||||
PyECLib==1.0.7
|
||||
|
@ -29,7 +29,7 @@ from contextlib import contextmanager
|
||||
from swiftonfile.swift.common.exceptions import AlreadyExistsAsFile, \
|
||||
AlreadyExistsAsDir
|
||||
from swift.common.utils import ThreadPool, hash_path, \
|
||||
normalize_timestamp, fallocate
|
||||
normalize_timestamp, fallocate, Timestamp
|
||||
from swift.common.exceptions import DiskFileNotExist, DiskFileError, \
|
||||
DiskFileNoSpace, DiskFileDeviceUnavailable, DiskFileNotOpen, \
|
||||
DiskFileExpired
|
||||
@ -51,7 +51,7 @@ from swift.obj.diskfile import get_async_dir
|
||||
|
||||
# FIXME: Hopefully we'll be able to move to Python 2.7+ where O_CLOEXEC will
|
||||
# be back ported. See http://www.python.org/dev/peps/pep-0433/
|
||||
O_CLOEXEC = 02000000
|
||||
O_CLOEXEC = 0o2000000
|
||||
|
||||
MAX_RENAME_ATTEMPTS = 10
|
||||
MAX_OPEN_ATTEMPTS = 10
|
||||
@ -569,7 +569,7 @@ class DiskFile(object):
|
||||
"""
|
||||
def __init__(self, mgr, dev_path, threadpool, partition,
|
||||
account=None, container=None, obj=None,
|
||||
policy=None, uid=DEFAULT_UID, gid=DEFAULT_GID):
|
||||
policy=None, uid=DEFAULT_UID, gid=DEFAULT_GID, **kwargs):
|
||||
# Variables partition and policy is currently unused.
|
||||
self._mgr = mgr
|
||||
self._device_path = dev_path
|
||||
@ -603,6 +603,18 @@ class DiskFile(object):
|
||||
|
||||
self._data_file = os.path.join(self._put_datadir, self._obj)
|
||||
|
||||
@property
|
||||
def timestamp(self):
|
||||
if self._metadata is None:
|
||||
raise DiskFileNotOpen()
|
||||
return Timestamp(self._metadata.get('X-Timestamp'))
|
||||
|
||||
@property
|
||||
def data_timestamp(self):
|
||||
if self._metadata is None:
|
||||
raise DiskFileNotOpen()
|
||||
return Timestamp(self._metadata.get('X-Timestamp'))
|
||||
|
||||
def open(self):
|
||||
"""
|
||||
Open the object.
|
||||
@ -719,7 +731,6 @@ class DiskFile(object):
|
||||
the REST API *before* the object has actually been read. It is the
|
||||
responsibility of the implementation to properly handle that.
|
||||
"""
|
||||
self._metadata = None
|
||||
self._close_fd()
|
||||
|
||||
def get_metadata(self):
|
||||
|
@ -3,7 +3,7 @@
|
||||
# process, which may cause wedges in the gate later.
|
||||
|
||||
# Hacking already pins down pep8, pyflakes and flake8
|
||||
hacking>=0.8.0,<0.9
|
||||
hacking>=0.10.0,<0.11
|
||||
coverage
|
||||
nose
|
||||
nosexcover
|
||||
|
@ -15,7 +15,7 @@
|
||||
|
||||
# See http://code.google.com/p/python-nose/issues/detail?id=373
|
||||
# The code below enables nosetests to work with i18n _() blocks
|
||||
|
||||
from __future__ import print_function
|
||||
import sys
|
||||
import os
|
||||
try:
|
||||
@ -63,15 +63,12 @@ def get_config(section_name=None, defaults=None):
|
||||
config = readconf(config_file, section_name)
|
||||
except SystemExit:
|
||||
if not os.path.exists(config_file):
|
||||
print >>sys.stderr, \
|
||||
'Unable to read test config %s - file not found' \
|
||||
% config_file
|
||||
print('Unable to read test config %s - file not found'
|
||||
% config_file, file=sys.stderr)
|
||||
elif not os.access(config_file, os.R_OK):
|
||||
print >>sys.stderr, \
|
||||
'Unable to read test config %s - permission denied' \
|
||||
% config_file
|
||||
print('Unable to read test config %s - permission denied'
|
||||
% config_file, file=sys.stderr)
|
||||
else:
|
||||
print >>sys.stderr, \
|
||||
'Unable to read test config %s - section %s not found' \
|
||||
% (config_file, section_name)
|
||||
print('Unable to read test config %s - section %s not found'
|
||||
% (config_file, section_name), file=sys.stderr)
|
||||
return config
|
@ -13,6 +13,7 @@
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
from __future__ import print_function
|
||||
import mock
|
||||
import os
|
||||
import sys
|
||||
@ -23,20 +24,24 @@ import eventlet
|
||||
import eventlet.debug
|
||||
import functools
|
||||
import random
|
||||
from ConfigParser import ConfigParser, NoSectionError
|
||||
|
||||
from time import time, sleep
|
||||
from httplib import HTTPException
|
||||
from urlparse import urlparse
|
||||
from nose import SkipTest
|
||||
from contextlib import closing
|
||||
from gzip import GzipFile
|
||||
from shutil import rmtree
|
||||
from tempfile import mkdtemp
|
||||
|
||||
from six.moves.configparser import ConfigParser, NoSectionError
|
||||
from six.moves import http_client
|
||||
from six.moves.http_client import HTTPException
|
||||
|
||||
from swift.common.middleware.memcache import MemcacheMiddleware
|
||||
from swift.common.storage_policy import parse_storage_policies, PolicyError
|
||||
|
||||
from test import get_config
|
||||
from test.functional.swift_test_client import Account, Connection, \
|
||||
from test.functional.swift_test_client import Account, Connection, Container, \
|
||||
ResponseError
|
||||
# This has the side effect of mocking out the xattr module so that unit tests
|
||||
# (and in this case, when in-process functional tests are called for) can run
|
||||
@ -46,13 +51,13 @@ from test.unit import debug_logger, FakeMemcache
|
||||
from swift.common import constraints, utils, ring, storage_policy
|
||||
from swift.common.ring import Ring
|
||||
from swift.common.wsgi import monkey_patch_mimetools, loadapp
|
||||
from swift.common.utils import config_true_value
|
||||
from swift.common.utils import config_true_value, split_path
|
||||
from swift.account import server as account_server
|
||||
from swift.container import server as container_server
|
||||
from swift.obj import server as object_server, mem_server as mem_object_server
|
||||
import swift.proxy.controllers.obj
|
||||
|
||||
|
||||
http_client._MAXHEADERS = constraints.MAX_HEADER_COUNT
|
||||
DEBUG = True
|
||||
|
||||
# In order to get the proper blocking behavior of sockets without using
|
||||
@ -105,6 +110,7 @@ orig_swift_conf_name = None
|
||||
|
||||
in_process = False
|
||||
_testdir = _test_servers = _test_coros = None
|
||||
policy_specified = None
|
||||
|
||||
|
||||
class FakeMemcacheMiddleware(MemcacheMiddleware):
|
||||
@ -123,7 +129,7 @@ class InProcessException(BaseException):
|
||||
|
||||
|
||||
def _info(msg):
|
||||
print >> sys.stderr, msg
|
||||
print(msg, file=sys.stderr)
|
||||
|
||||
|
||||
def _debug(msg):
|
||||
@ -209,7 +215,6 @@ def _in_process_setup_ring(swift_conf, conf_src_dir, testdir):
|
||||
for policy in policies:
|
||||
conf.remove_section(sp_prefix + str(policy.idx))
|
||||
|
||||
policy_specified = os.environ.get('SWIFT_TEST_POLICY')
|
||||
if policy_specified:
|
||||
policy_to_test = policies.get_by_name(policy_specified)
|
||||
if policy_to_test is None:
|
||||
@ -497,7 +502,7 @@ def get_cluster_info():
|
||||
# Most likely the swift cluster has "expose_info = false" set
|
||||
# in its proxy-server.conf file, so we'll just do the best we
|
||||
# can.
|
||||
print >>sys.stderr, "** Swift Cluster not exposing /info **"
|
||||
print("** Swift Cluster not exposing /info **", file=sys.stderr)
|
||||
|
||||
# Finally, we'll allow any constraint present in the swift-constraints
|
||||
# section of test.conf to override everything. Note that only those
|
||||
@ -509,8 +514,8 @@ def get_cluster_info():
|
||||
except KeyError:
|
||||
pass
|
||||
except ValueError:
|
||||
print >>sys.stderr, "Invalid constraint value: %s = %s" % (
|
||||
k, test_constraints[k])
|
||||
print("Invalid constraint value: %s = %s" % (
|
||||
k, test_constraints[k]), file=sys.stderr)
|
||||
eff_constraints.update(test_constraints)
|
||||
|
||||
# Just make it look like these constraints were loaded from a /info call,
|
||||
@ -520,6 +525,9 @@ def get_cluster_info():
|
||||
|
||||
|
||||
def setup_package():
|
||||
|
||||
global policy_specified
|
||||
policy_specified = os.environ.get('SWIFT_TEST_POLICY')
|
||||
in_process_env = os.environ.get('SWIFT_TEST_IN_PROCESS')
|
||||
if in_process_env is not None:
|
||||
use_in_process = utils.config_true_value(in_process_env)
|
||||
@ -557,8 +565,8 @@ def setup_package():
|
||||
in_process_setup(the_object_server=(
|
||||
mem_object_server if in_mem_obj else object_server))
|
||||
except InProcessException as exc:
|
||||
print >> sys.stderr, ('Exception during in-process setup: %s'
|
||||
% str(exc))
|
||||
print(('Exception during in-process setup: %s'
|
||||
% str(exc)), file=sys.stderr)
|
||||
raise
|
||||
|
||||
global web_front_end
|
||||
@ -667,20 +675,19 @@ def setup_package():
|
||||
global skip
|
||||
skip = not all([swift_test_auth, swift_test_user[0], swift_test_key[0]])
|
||||
if skip:
|
||||
print >>sys.stderr, 'SKIPPING FUNCTIONAL TESTS DUE TO NO CONFIG'
|
||||
print('SKIPPING FUNCTIONAL TESTS DUE TO NO CONFIG', file=sys.stderr)
|
||||
|
||||
global skip2
|
||||
skip2 = not all([not skip, swift_test_user[1], swift_test_key[1]])
|
||||
if not skip and skip2:
|
||||
print >>sys.stderr, \
|
||||
'SKIPPING SECOND ACCOUNT FUNCTIONAL TESTS' \
|
||||
' DUE TO NO CONFIG FOR THEM'
|
||||
print('SKIPPING SECOND ACCOUNT FUNCTIONAL TESTS '
|
||||
'DUE TO NO CONFIG FOR THEM', file=sys.stderr)
|
||||
|
||||
global skip3
|
||||
skip3 = not all([not skip, swift_test_user[2], swift_test_key[2]])
|
||||
if not skip and skip3:
|
||||
print >>sys.stderr, \
|
||||
'SKIPPING THIRD ACCOUNT FUNCTIONAL TESTS DUE TO NO CONFIG FOR THEM'
|
||||
print('SKIPPING THIRD ACCOUNT FUNCTIONAL TESTS'
|
||||
'DUE TO NO CONFIG FOR THEM', file=sys.stderr)
|
||||
|
||||
global skip_if_not_v3
|
||||
skip_if_not_v3 = (swift_test_auth_version != '3'
|
||||
@ -688,16 +695,33 @@ def setup_package():
|
||||
swift_test_user[3],
|
||||
swift_test_key[3]]))
|
||||
if not skip and skip_if_not_v3:
|
||||
print >>sys.stderr, \
|
||||
'SKIPPING FUNCTIONAL TESTS SPECIFIC TO AUTH VERSION 3'
|
||||
print('SKIPPING FUNCTIONAL TESTS SPECIFIC TO AUTH VERSION 3',
|
||||
file=sys.stderr)
|
||||
|
||||
global skip_service_tokens
|
||||
skip_service_tokens = not all([not skip, swift_test_user[4],
|
||||
swift_test_key[4], swift_test_tenant[4],
|
||||
swift_test_service_prefix])
|
||||
if not skip and skip_service_tokens:
|
||||
print >>sys.stderr, \
|
||||
'SKIPPING FUNCTIONAL TESTS SPECIFIC TO SERVICE TOKENS'
|
||||
print(
|
||||
'SKIPPING FUNCTIONAL TESTS SPECIFIC TO SERVICE TOKENS',
|
||||
file=sys.stderr)
|
||||
|
||||
if policy_specified:
|
||||
policies = FunctionalStoragePolicyCollection.from_info()
|
||||
for p in policies:
|
||||
# policy names are case-insensitive
|
||||
if policy_specified.lower() == p['name'].lower():
|
||||
_info('Using specified policy %s' % policy_specified)
|
||||
FunctionalStoragePolicyCollection.policy_specified = p
|
||||
Container.policy_specified = policy_specified
|
||||
break
|
||||
else:
|
||||
_info(
|
||||
'SKIPPING FUNCTIONAL TESTS: Failed to find specified policy %s'
|
||||
% policy_specified)
|
||||
raise Exception('Failed to find specified policy %s'
|
||||
% policy_specified)
|
||||
|
||||
get_cluster_info()
|
||||
|
||||
@ -746,8 +770,24 @@ conn = [None, None, None, None, None]
|
||||
|
||||
def connection(url):
|
||||
if has_insecure:
|
||||
return http_connection(url, insecure=insecure)
|
||||
return http_connection(url)
|
||||
parsed_url, http_conn = http_connection(url, insecure=insecure)
|
||||
else:
|
||||
parsed_url, http_conn = http_connection(url)
|
||||
|
||||
orig_request = http_conn.request
|
||||
|
||||
# Add the policy header if policy_specified is set
|
||||
def request_with_policy(method, url, body=None, headers={}):
|
||||
version, account, container, obj = split_path(url, 1, 4, True)
|
||||
if policy_specified and method == 'PUT' and container and not obj \
|
||||
and 'X-Storage-Policy' not in headers:
|
||||
headers['X-Storage-Policy'] = policy_specified
|
||||
|
||||
return orig_request(method, url, body, headers)
|
||||
|
||||
http_conn.request = request_with_policy
|
||||
|
||||
return parsed_url, http_conn
|
||||
|
||||
|
||||
def get_url_token(user_index, os_options):
|
||||
@ -898,6 +938,9 @@ def requires_acls(f):
|
||||
|
||||
class FunctionalStoragePolicyCollection(object):
|
||||
|
||||
# policy_specified is set in __init__.py when tests are being set up.
|
||||
policy_specified = None
|
||||
|
||||
def __init__(self, policies):
|
||||
self._all = policies
|
||||
self.default = None
|
||||
@ -939,6 +982,11 @@ class FunctionalStoragePolicyCollection(object):
|
||||
p.get(k) != v for k, v in kwargs.items())])
|
||||
|
||||
def select(self):
|
||||
# check that a policy was specified and that it is available
|
||||
# in the current list (i.e., hasn't been excluded of the current list)
|
||||
if self.policy_specified and self.policy_specified in self:
|
||||
return self.policy_specified
|
||||
else:
|
||||
return random.choice(self)
|
||||
|
||||
|
||||
|
@ -14,25 +14,27 @@
|
||||
# limitations under the License.
|
||||
|
||||
import hashlib
|
||||
import httplib
|
||||
import os
|
||||
import random
|
||||
import socket
|
||||
import StringIO
|
||||
import time
|
||||
import urllib
|
||||
|
||||
import simplejson as json
|
||||
|
||||
from nose import SkipTest
|
||||
from xml.dom import minidom
|
||||
|
||||
import six
|
||||
from six.moves import http_client
|
||||
from swiftclient import get_auth
|
||||
|
||||
from swift.common import constraints
|
||||
from swift.common.utils import config_true_value
|
||||
|
||||
from test import safe_repr
|
||||
|
||||
http_client._MAXHEADERS = constraints.MAX_HEADER_COUNT
|
||||
|
||||
|
||||
class AuthenticationFailed(Exception):
|
||||
pass
|
||||
@ -68,7 +70,7 @@ class ResponseError(Exception):
|
||||
|
||||
|
||||
def listing_empty(method):
|
||||
for i in xrange(6):
|
||||
for i in range(6):
|
||||
if len(method()) == 0:
|
||||
return True
|
||||
|
||||
@ -163,10 +165,10 @@ class Connection(object):
|
||||
x = storage_url.split('/')
|
||||
|
||||
if x[0] == 'http:':
|
||||
self.conn_class = httplib.HTTPConnection
|
||||
self.conn_class = http_client.HTTPConnection
|
||||
self.storage_port = 80
|
||||
elif x[0] == 'https:':
|
||||
self.conn_class = httplib.HTTPSConnection
|
||||
self.conn_class = http_client.HTTPSConnection
|
||||
self.storage_port = 443
|
||||
else:
|
||||
raise ValueError('unexpected protocol %s' % (x[0]))
|
||||
@ -181,7 +183,11 @@ class Connection(object):
|
||||
self.storage_url = str('/%s/%s' % (x[3], x[4]))
|
||||
self.account_name = str(x[4])
|
||||
self.auth_user = auth_user
|
||||
self.storage_token = storage_token
|
||||
# With v2 keystone, storage_token is unicode.
|
||||
# We want it to be string otherwise this would cause
|
||||
# troubles when doing query with already encoded
|
||||
# non ascii characters in its headers.
|
||||
self.storage_token = str(storage_token)
|
||||
self.user_acl = '%s:%s' % (self.account, self.username)
|
||||
|
||||
self.http_connect()
|
||||
@ -230,6 +236,9 @@ class Connection(object):
|
||||
if not cfg.get('no_auth_token'):
|
||||
headers['X-Auth-Token'] = self.storage_token
|
||||
|
||||
if cfg.get('use_token'):
|
||||
headers['X-Auth-Token'] = cfg.get('use_token')
|
||||
|
||||
if isinstance(hdrs, dict):
|
||||
headers.update(hdrs)
|
||||
return headers
|
||||
@ -276,7 +285,7 @@ class Connection(object):
|
||||
|
||||
try:
|
||||
self.response = try_request()
|
||||
except httplib.HTTPException as e:
|
||||
except http_client.HTTPException as e:
|
||||
fail_messages.append(safe_repr(e))
|
||||
continue
|
||||
|
||||
@ -330,7 +339,7 @@ class Connection(object):
|
||||
port=self.storage_port)
|
||||
# self.connection.set_debuglevel(3)
|
||||
self.connection.putrequest('PUT', path)
|
||||
for key, value in headers.iteritems():
|
||||
for key, value in headers.items():
|
||||
self.connection.putheader(key, value)
|
||||
self.connection.endheaders()
|
||||
|
||||
@ -481,6 +490,9 @@ class Account(Base):
|
||||
|
||||
|
||||
class Container(Base):
|
||||
# policy_specified is set in __init__.py when tests are being set up.
|
||||
policy_specified = None
|
||||
|
||||
def __init__(self, conn, account, name):
|
||||
self.conn = conn
|
||||
self.account = str(account)
|
||||
@ -493,9 +505,23 @@ class Container(Base):
|
||||
parms = {}
|
||||
if cfg is None:
|
||||
cfg = {}
|
||||
if self.policy_specified and 'X-Storage-Policy' not in hdrs:
|
||||
hdrs['X-Storage-Policy'] = self.policy_specified
|
||||
return self.conn.make_request('PUT', self.path, hdrs=hdrs,
|
||||
parms=parms, cfg=cfg) in (201, 202)
|
||||
|
||||
def update_metadata(self, hdrs=None, cfg=None):
|
||||
if hdrs is None:
|
||||
hdrs = {}
|
||||
if cfg is None:
|
||||
cfg = {}
|
||||
|
||||
self.conn.make_request('POST', self.path, hdrs=hdrs, cfg=cfg)
|
||||
if not 200 <= self.conn.response.status <= 299:
|
||||
raise ResponseError(self.conn.response, 'POST',
|
||||
self.conn.make_path(self.path))
|
||||
return True
|
||||
|
||||
def delete(self, hdrs=None, parms=None):
|
||||
if hdrs is None:
|
||||
hdrs = {}
|
||||
@ -626,6 +652,9 @@ class File(Base):
|
||||
else:
|
||||
headers['Content-Length'] = 0
|
||||
|
||||
if cfg.get('use_token'):
|
||||
headers['X-Auth-Token'] = cfg.get('use_token')
|
||||
|
||||
if cfg.get('no_content_type'):
|
||||
pass
|
||||
elif self.content_type:
|
||||
@ -643,7 +672,7 @@ class File(Base):
|
||||
block_size = 4096
|
||||
|
||||
if isinstance(data, str):
|
||||
data = StringIO.StringIO(data)
|
||||
data = six.StringIO(data)
|
||||
|
||||
checksum = hashlib.md5()
|
||||
buff = data.read(block_size)
|
||||
@ -700,13 +729,13 @@ class File(Base):
|
||||
return self.conn.make_request('COPY', self.path, hdrs=headers,
|
||||
parms=parms) == 201
|
||||
|
||||
def delete(self, hdrs=None, parms=None):
|
||||
def delete(self, hdrs=None, parms=None, cfg=None):
|
||||
if hdrs is None:
|
||||
hdrs = {}
|
||||
if parms is None:
|
||||
parms = {}
|
||||
if self.conn.make_request('DELETE', self.path, hdrs=hdrs,
|
||||
parms=parms) != 204:
|
||||
cfg=cfg, parms=parms) != 204:
|
||||
|
||||
raise ResponseError(self.conn.response, 'DELETE',
|
||||
self.conn.make_path(self.path))
|
||||
@ -847,7 +876,7 @@ class File(Base):
|
||||
finally:
|
||||
fobj.close()
|
||||
|
||||
def sync_metadata(self, metadata=None, cfg=None):
|
||||
def sync_metadata(self, metadata=None, cfg=None, parms=None):
|
||||
if metadata is None:
|
||||
metadata = {}
|
||||
if cfg is None:
|
||||
@ -864,7 +893,8 @@ class File(Base):
|
||||
else:
|
||||
headers['Content-Length'] = 0
|
||||
|
||||
self.conn.make_request('POST', self.path, hdrs=headers, cfg=cfg)
|
||||
self.conn.make_request('POST', self.path, hdrs=headers,
|
||||
parms=parms, cfg=cfg)
|
||||
|
||||
if self.conn.response.status not in (201, 202):
|
||||
raise ResponseError(self.conn.response, 'POST',
|
||||
@ -917,7 +947,7 @@ class File(Base):
|
||||
pass
|
||||
self.size = int(os.fstat(data.fileno())[6])
|
||||
else:
|
||||
data = StringIO.StringIO(data)
|
||||
data = six.StringIO(data)
|
||||
self.size = data.len
|
||||
|
||||
headers = self.make_headers(cfg=cfg)
|
||||
@ -969,7 +999,7 @@ class File(Base):
|
||||
if not self.write(data, hdrs=hdrs, parms=parms, cfg=cfg):
|
||||
raise ResponseError(self.conn.response, 'PUT',
|
||||
self.conn.make_path(self.path))
|
||||
self.md5 = self.compute_md5sum(StringIO.StringIO(data))
|
||||
self.md5 = self.compute_md5sum(six.StringIO(data))
|
||||
return data
|
||||
|
||||
def write_random_return_resp(self, size=None, hdrs=None, parms=None,
|
||||
@ -986,5 +1016,28 @@ class File(Base):
|
||||
return_resp=True)
|
||||
if not resp:
|
||||
raise ResponseError(self.conn.response)
|
||||
self.md5 = self.compute_md5sum(StringIO.StringIO(data))
|
||||
self.md5 = self.compute_md5sum(six.StringIO(data))
|
||||
return resp
|
||||
|
||||
def post(self, hdrs=None, parms=None, cfg=None, return_resp=False):
|
||||
if hdrs is None:
|
||||
hdrs = {}
|
||||
if parms is None:
|
||||
parms = {}
|
||||
if cfg is None:
|
||||
cfg = {}
|
||||
|
||||
headers = self.make_headers(cfg=cfg)
|
||||
headers.update(hdrs)
|
||||
|
||||
self.conn.make_request('POST', self.path, hdrs=headers,
|
||||
parms=parms, cfg=cfg)
|
||||
|
||||
if self.conn.response.status not in (201, 202):
|
||||
raise ResponseError(self.conn.response, 'POST',
|
||||
self.conn.make_path(self.path))
|
||||
|
||||
if return_resp:
|
||||
return self.conn.response
|
||||
|
||||
return True
|
||||
|
@ -21,6 +21,7 @@ from uuid import uuid4
|
||||
from nose import SkipTest
|
||||
from string import letters
|
||||
|
||||
from six.moves import range
|
||||
from swift.common.middleware.acl import format_acl
|
||||
|
||||
from test.functional import check_response, retry, requires_acls, \
|
||||
@ -88,22 +89,22 @@ class TestAccount(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-account-meta-test'), None)
|
||||
resp = retry(get)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-account-meta-test'), None)
|
||||
resp = retry(post, 'Value')
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-account-meta-test'), 'Value')
|
||||
resp = retry(get)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-account-meta-test'), 'Value')
|
||||
|
||||
def test_invalid_acls(self):
|
||||
@ -189,7 +190,7 @@ class TestAccount(unittest.TestCase):
|
||||
# cannot read account
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -203,7 +204,7 @@ class TestAccount(unittest.TestCase):
|
||||
# read-only can read account headers
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204))
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
# but not acls
|
||||
self.assertEqual(resp.getheader('X-Account-Access-Control'), None)
|
||||
|
||||
@ -220,7 +221,7 @@ class TestAccount(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204))
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-Test'), 'value')
|
||||
|
||||
@requires_acls
|
||||
@ -240,7 +241,7 @@ class TestAccount(unittest.TestCase):
|
||||
# cannot read account
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-write access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -254,7 +255,7 @@ class TestAccount(unittest.TestCase):
|
||||
# read-write can read account headers
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204))
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
# but not acls
|
||||
self.assertEqual(resp.getheader('X-Account-Access-Control'), None)
|
||||
|
||||
@ -281,7 +282,7 @@ class TestAccount(unittest.TestCase):
|
||||
# cannot read account
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant admin access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -295,7 +296,7 @@ class TestAccount(unittest.TestCase):
|
||||
# admin can read account headers
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204))
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
# including acls
|
||||
self.assertEqual(resp.getheader('X-Account-Access-Control'),
|
||||
acl_json_str)
|
||||
@ -308,7 +309,7 @@ class TestAccount(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204))
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-Test'), value)
|
||||
|
||||
# admin can even revoke their own access
|
||||
@ -320,7 +321,7 @@ class TestAccount(unittest.TestCase):
|
||||
# and again, cannot read account
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
@requires_acls
|
||||
def test_protected_tempurl(self):
|
||||
@ -358,7 +359,8 @@ class TestAccount(unittest.TestCase):
|
||||
# read-only tester3 can read account metadata
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204),
|
||||
self.assertTrue(
|
||||
resp.status in (200, 204),
|
||||
'Expected status in (200, 204), got %s' % resp.status)
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-Test'), value)
|
||||
# but not temp-url-key
|
||||
@ -376,7 +378,8 @@ class TestAccount(unittest.TestCase):
|
||||
# read-write tester3 can read account metadata
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204),
|
||||
self.assertTrue(
|
||||
resp.status in (200, 204),
|
||||
'Expected status in (200, 204), got %s' % resp.status)
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-Test'), value)
|
||||
# but not temp-url-key
|
||||
@ -394,7 +397,8 @@ class TestAccount(unittest.TestCase):
|
||||
# admin tester3 can read account metadata
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204),
|
||||
self.assertTrue(
|
||||
resp.status in (200, 204),
|
||||
'Expected status in (200, 204), got %s' % resp.status)
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-Test'), value)
|
||||
# including temp-url-key
|
||||
@ -411,7 +415,8 @@ class TestAccount(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204),
|
||||
self.assertTrue(
|
||||
resp.status in (200, 204),
|
||||
'Expected status in (200, 204), got %s' % resp.status)
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-Temp-Url-Key'),
|
||||
secret)
|
||||
@ -688,17 +693,17 @@ class TestAccount(unittest.TestCase):
|
||||
if (tf.web_front_end == 'integral'):
|
||||
resp = retry(post, uni_key, '1')
|
||||
resp.read()
|
||||
self.assertTrue(resp.status in (201, 204))
|
||||
self.assertIn(resp.status, (201, 204))
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader(uni_key.encode('utf-8')), '1')
|
||||
resp = retry(post, 'X-Account-Meta-uni', uni_value)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('X-Account-Meta-uni'),
|
||||
uni_value.encode('utf-8'))
|
||||
if (tf.web_front_end == 'integral'):
|
||||
@ -707,7 +712,7 @@ class TestAccount(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader(uni_key.encode('utf-8')),
|
||||
uni_value.encode('utf-8'))
|
||||
|
||||
@ -729,24 +734,23 @@ class TestAccount(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-account-meta-one'), '1')
|
||||
resp = retry(post, 'X-Account-Meta-Two', '2')
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-account-meta-one'), '1')
|
||||
self.assertEqual(resp.getheader('x-account-meta-two'), '2')
|
||||
|
||||
def test_bad_metadata(self):
|
||||
|
||||
raise SkipTest('SOF constraints middleware enforces constraints.')
|
||||
|
||||
if tf.skip:
|
||||
raise SkipTest
|
||||
|
||||
raise SkipTest('SOF constraints middleware enforces constraints.')
|
||||
|
||||
def post(url, token, parsed, conn, extra_headers):
|
||||
headers = {'X-Auth-Token': token}
|
||||
headers.update(extra_headers)
|
||||
@ -793,13 +797,13 @@ class TestAccount(unittest.TestCase):
|
||||
resp = retry(post, headers)
|
||||
|
||||
headers = {}
|
||||
for x in xrange(self.max_meta_count):
|
||||
for x in range(self.max_meta_count):
|
||||
headers['X-Account-Meta-%d' % x] = 'v'
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
headers = {}
|
||||
for x in xrange(self.max_meta_count + 1):
|
||||
for x in range(self.max_meta_count + 1):
|
||||
headers['X-Account-Meta-%d' % x] = 'v'
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
@ -830,8 +834,23 @@ class TestAccount(unittest.TestCase):
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
# this POST includes metadata size that is over limit
|
||||
headers['X-Account-Meta-k'] = \
|
||||
'v' * (self.max_meta_overall_size - size)
|
||||
'x' * (self.max_meta_overall_size - size)
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 400)
|
||||
# this POST would be ok and the aggregate backend metadata
|
||||
# size is on the border
|
||||
headers = {'X-Account-Meta-k':
|
||||
'y' * (self.max_meta_overall_size - size - 1)}
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
# this last POST would be ok by itself but takes the aggregate
|
||||
# backend metadata size over limit
|
||||
headers = {'X-Account-Meta-k':
|
||||
'z' * (self.max_meta_overall_size - size)}
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 400)
|
||||
@ -862,7 +881,7 @@ class TestAccountInNonDefaultDomain(unittest.TestCase):
|
||||
resp = retry(head, use_account=4)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertTrue('X-Account-Project-Domain-Id' in resp.headers)
|
||||
self.assertIn('X-Account-Project-Domain-Id', resp.headers)
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
@ -24,6 +24,8 @@ from test.functional import check_response, retry, requires_acls, \
|
||||
load_constraint, requires_policies
|
||||
import test.functional as tf
|
||||
|
||||
from six.moves import range
|
||||
|
||||
|
||||
class TestContainer(unittest.TestCase):
|
||||
|
||||
@ -70,7 +72,7 @@ class TestContainer(unittest.TestCase):
|
||||
body = resp.read()
|
||||
if resp.status == 404:
|
||||
break
|
||||
self.assert_(resp.status // 100 == 2, resp.status)
|
||||
self.assertTrue(resp.status // 100 == 2, resp.status)
|
||||
objs = json.loads(body)
|
||||
if not objs:
|
||||
break
|
||||
@ -91,7 +93,7 @@ class TestContainer(unittest.TestCase):
|
||||
# container may have not been created
|
||||
resp = retry(delete, self.container)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (204, 404))
|
||||
self.assertIn(resp.status, (204, 404))
|
||||
|
||||
def test_multi_metadata(self):
|
||||
if tf.skip:
|
||||
@ -112,14 +114,14 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-one'), '1')
|
||||
resp = retry(post, 'X-Container-Meta-Two', '2')
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-one'), '1')
|
||||
self.assertEqual(resp.getheader('x-container-meta-two'), '2')
|
||||
|
||||
@ -145,14 +147,14 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader(uni_key.encode('utf-8')), '1')
|
||||
resp = retry(post, 'X-Container-Meta-uni', uni_value)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-uni'),
|
||||
uni_value.encode('utf-8'))
|
||||
if (tf.web_front_end == 'integral'):
|
||||
@ -161,7 +163,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader(uni_key.encode('utf-8')),
|
||||
uni_value.encode('utf-8'))
|
||||
|
||||
@ -196,11 +198,11 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(head, name)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), 'Value')
|
||||
resp = retry(get, name)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), 'Value')
|
||||
resp = retry(delete, name)
|
||||
resp.read()
|
||||
@ -212,11 +214,11 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(head, name)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), None)
|
||||
resp = retry(get, name)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), None)
|
||||
resp = retry(delete, name)
|
||||
resp.read()
|
||||
@ -244,22 +246,22 @@ class TestContainer(unittest.TestCase):
|
||||
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), None)
|
||||
resp = retry(get)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), None)
|
||||
resp = retry(post, 'Value')
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), 'Value')
|
||||
resp = retry(get)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (200, 204), resp.status)
|
||||
self.assertIn(resp.status, (200, 204))
|
||||
self.assertEqual(resp.getheader('x-container-meta-test'), 'Value')
|
||||
|
||||
def test_PUT_bad_metadata(self):
|
||||
@ -319,7 +321,7 @@ class TestContainer(unittest.TestCase):
|
||||
|
||||
name = uuid4().hex
|
||||
headers = {}
|
||||
for x in xrange(self.max_meta_count):
|
||||
for x in range(self.max_meta_count):
|
||||
headers['X-Container-Meta-%d' % x] = 'v'
|
||||
resp = retry(put, name, headers)
|
||||
resp.read()
|
||||
@ -329,7 +331,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
name = uuid4().hex
|
||||
headers = {}
|
||||
for x in xrange(self.max_meta_count + 1):
|
||||
for x in range(self.max_meta_count + 1):
|
||||
headers['X-Container-Meta-%d' % x] = 'v'
|
||||
resp = retry(put, name, headers)
|
||||
resp.read()
|
||||
@ -368,12 +370,11 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 404)
|
||||
|
||||
def test_POST_bad_metadata(self):
|
||||
|
||||
raise SkipTest('SOF constraints middleware enforces constraints.')
|
||||
|
||||
if tf.skip:
|
||||
raise SkipTest
|
||||
|
||||
raise SkipTest('SOF constraints middleware enforces constraints.')
|
||||
|
||||
def post(url, token, parsed, conn, extra_headers):
|
||||
headers = {'X-Auth-Token': token}
|
||||
headers.update(extra_headers)
|
||||
@ -415,13 +416,13 @@ class TestContainer(unittest.TestCase):
|
||||
return check_response(conn)
|
||||
|
||||
headers = {}
|
||||
for x in xrange(self.max_meta_count):
|
||||
for x in range(self.max_meta_count):
|
||||
headers['X-Container-Meta-%d' % x] = 'v'
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
headers = {}
|
||||
for x in xrange(self.max_meta_count + 1):
|
||||
for x in range(self.max_meta_count + 1):
|
||||
headers['X-Container-Meta-%d' % x] = 'v'
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
@ -452,8 +453,23 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
# this POST includes metadata size that is over limit
|
||||
headers['X-Container-Meta-k'] = \
|
||||
'v' * (self.max_meta_overall_size - size)
|
||||
'x' * (self.max_meta_overall_size - size)
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 400)
|
||||
# this POST would be ok and the aggregate backend metadata
|
||||
# size is on the border
|
||||
headers = {'X-Container-Meta-k':
|
||||
'y' * (self.max_meta_overall_size - size - 1)}
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
# this last POST would be ok by itself but takes the aggregate
|
||||
# backend metadata size over limit
|
||||
headers = {'X-Container-Meta-k':
|
||||
'z' * (self.max_meta_overall_size - size)}
|
||||
resp = retry(post, headers)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 400)
|
||||
@ -470,7 +486,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(get)
|
||||
raise Exception('Should not have been able to GET')
|
||||
except Exception as err:
|
||||
self.assert_(str(err).startswith('No result after '), err)
|
||||
self.assertTrue(str(err).startswith('No result after '), err)
|
||||
|
||||
def post(url, token, parsed, conn):
|
||||
conn.request('POST', parsed.path + '/' + self.name, '',
|
||||
@ -497,7 +513,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(get)
|
||||
raise Exception('Should not have been able to GET')
|
||||
except Exception as err:
|
||||
self.assert_(str(err).startswith('No result after '), err)
|
||||
self.assertTrue(str(err).startswith('No result after '), err)
|
||||
|
||||
def test_cross_account_container(self):
|
||||
if tf.skip or tf.skip2:
|
||||
@ -715,7 +731,7 @@ class TestContainer(unittest.TestCase):
|
||||
# cannot list containers
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-only access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -728,23 +744,23 @@ class TestContainer(unittest.TestCase):
|
||||
# read-only can list containers
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(self.name in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(self.name, listing)
|
||||
|
||||
# read-only can not create containers
|
||||
new_container_name = str(uuid4())
|
||||
resp = retry(put, new_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# but it can see newly created ones
|
||||
resp = retry(put, new_container_name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(new_container_name in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(new_container_name, listing)
|
||||
|
||||
@requires_acls
|
||||
def test_read_only_acl_metadata(self):
|
||||
@ -774,13 +790,13 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
# cannot see metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-only access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -800,7 +816,7 @@ class TestContainer(unittest.TestCase):
|
||||
# read-only can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
@requires_acls
|
||||
@ -830,7 +846,7 @@ class TestContainer(unittest.TestCase):
|
||||
# cannot list containers
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-write access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -843,36 +859,36 @@ class TestContainer(unittest.TestCase):
|
||||
# can list containers
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(self.name in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(self.name, listing)
|
||||
|
||||
# can create new containers
|
||||
new_container_name = str(uuid4())
|
||||
resp = retry(put, new_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(new_container_name in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(new_container_name, listing)
|
||||
|
||||
# can also delete them
|
||||
resp = retry(delete, new_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(new_container_name not in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertNotIn(new_container_name, listing)
|
||||
|
||||
# even if they didn't create them
|
||||
empty_container_name = str(uuid4())
|
||||
resp = retry(put, empty_container_name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(delete, empty_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
|
||||
@requires_acls
|
||||
def test_read_write_acl_metadata(self):
|
||||
@ -902,13 +918,13 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
# cannot see metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-write access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -921,7 +937,7 @@ class TestContainer(unittest.TestCase):
|
||||
# read-write can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
# read-write can also write container metadata
|
||||
@ -929,20 +945,20 @@ class TestContainer(unittest.TestCase):
|
||||
headers = {'x-container-meta-test': new_value}
|
||||
resp = retry(post, self.name, headers=headers, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), new_value)
|
||||
|
||||
# and remove it
|
||||
headers = {'x-remove-container-meta-test': 'true'}
|
||||
resp = retry(post, self.name, headers=headers, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), None)
|
||||
|
||||
@requires_acls
|
||||
@ -972,7 +988,7 @@ class TestContainer(unittest.TestCase):
|
||||
# cannot list containers
|
||||
resp = retry(get, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant admin access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -985,36 +1001,36 @@ class TestContainer(unittest.TestCase):
|
||||
# can list containers
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(self.name in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(self.name, listing)
|
||||
|
||||
# can create new containers
|
||||
new_container_name = str(uuid4())
|
||||
resp = retry(put, new_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(new_container_name in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(new_container_name, listing)
|
||||
|
||||
# can also delete them
|
||||
resp = retry(delete, new_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(new_container_name not in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertNotIn(new_container_name, listing)
|
||||
|
||||
# even if they didn't create them
|
||||
empty_container_name = str(uuid4())
|
||||
resp = retry(put, empty_container_name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(delete, empty_container_name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
|
||||
@requires_acls
|
||||
def test_admin_acl_metadata(self):
|
||||
@ -1044,13 +1060,13 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
# cannot see metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -1063,7 +1079,7 @@ class TestContainer(unittest.TestCase):
|
||||
# can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
# can also write container metadata
|
||||
@ -1071,20 +1087,20 @@ class TestContainer(unittest.TestCase):
|
||||
headers = {'x-container-meta-test': new_value}
|
||||
resp = retry(post, self.name, headers=headers, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), new_value)
|
||||
|
||||
# and remove it
|
||||
headers = {'x-remove-container-meta-test': 'true'}
|
||||
resp = retry(post, self.name, headers=headers, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), None)
|
||||
|
||||
@requires_acls
|
||||
@ -1118,7 +1134,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), 'secret')
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
|
||||
@ -1133,7 +1149,7 @@ class TestContainer(unittest.TestCase):
|
||||
# can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
# but not sync-key
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), None)
|
||||
@ -1155,7 +1171,7 @@ class TestContainer(unittest.TestCase):
|
||||
# can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
# but not sync-key
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), None)
|
||||
@ -1163,7 +1179,7 @@ class TestContainer(unittest.TestCase):
|
||||
# sanity check sync-key w/ account1
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), 'secret')
|
||||
|
||||
# and can write
|
||||
@ -1177,7 +1193,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1) # validate w/ account1
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), new_value)
|
||||
# but can not write sync-key
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), 'secret')
|
||||
@ -1193,7 +1209,7 @@ class TestContainer(unittest.TestCase):
|
||||
# admin can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), new_value)
|
||||
# and ALSO sync-key
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), 'secret')
|
||||
@ -1206,7 +1222,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Sync-Key'), new_secret)
|
||||
|
||||
@requires_acls
|
||||
@ -1241,7 +1257,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), 'jdoe')
|
||||
self.assertEqual(resp.getheader('X-Container-Write'), 'jdoe')
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
@ -1257,7 +1273,7 @@ class TestContainer(unittest.TestCase):
|
||||
# can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
# but not container acl
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), None)
|
||||
@ -1283,7 +1299,7 @@ class TestContainer(unittest.TestCase):
|
||||
# can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), value)
|
||||
# but not container acl
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), None)
|
||||
@ -1292,7 +1308,7 @@ class TestContainer(unittest.TestCase):
|
||||
# sanity check container acls with account1
|
||||
resp = retry(get, self.name, use_account=1)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), 'jdoe')
|
||||
self.assertEqual(resp.getheader('X-Container-Write'), 'jdoe')
|
||||
|
||||
@ -1308,7 +1324,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=1) # validate w/ account1
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), new_value)
|
||||
# but can not write container acls
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), 'jdoe')
|
||||
@ -1325,7 +1341,7 @@ class TestContainer(unittest.TestCase):
|
||||
# admin can read container metadata
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Meta-Test'), new_value)
|
||||
# and ALSO container acls
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), 'jdoe')
|
||||
@ -1341,7 +1357,7 @@ class TestContainer(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 204)
|
||||
resp = retry(get, self.name, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
self.assertEqual(resp.getheader('X-Container-Read'), '.r:*')
|
||||
|
||||
def test_long_name_content_type(self):
|
||||
@ -1384,8 +1400,11 @@ class TestContainer(unittest.TestCase):
|
||||
raise SkipTest()
|
||||
|
||||
def put(url, token, parsed, conn):
|
||||
# using the empty storage policy header value here to ensure
|
||||
# that the default policy is chosen in case policy_specified is set
|
||||
# see __init__.py for details on policy_specified
|
||||
conn.request('PUT', parsed.path + '/' + self.container, '',
|
||||
{'X-Auth-Token': token})
|
||||
{'X-Auth-Token': token, 'X-Storage-Policy': ''})
|
||||
return check_response(conn)
|
||||
resp = retry(put)
|
||||
resp.read()
|
||||
@ -1398,7 +1417,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('x-storage-policy'),
|
||||
self.assertEqual(headers.get('x-storage-policy'),
|
||||
default_policy['name'])
|
||||
|
||||
def test_error_invalid_storage_policy_name(self):
|
||||
@ -1436,7 +1455,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('x-storage-policy'),
|
||||
self.assertEqual(headers.get('x-storage-policy'),
|
||||
policy['name'])
|
||||
|
||||
# and test recreate with-out specifying Storage Policy
|
||||
@ -1447,7 +1466,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('x-storage-policy'),
|
||||
self.assertEqual(headers.get('x-storage-policy'),
|
||||
policy['name'])
|
||||
|
||||
# delete it
|
||||
@ -1463,7 +1482,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('x-storage-policy'), None)
|
||||
self.assertEqual(headers.get('x-storage-policy'), None)
|
||||
|
||||
@requires_policies
|
||||
def test_conflict_change_storage_policy_with_put(self):
|
||||
@ -1493,7 +1512,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('x-storage-policy'),
|
||||
self.assertEqual(headers.get('x-storage-policy'),
|
||||
policy['name'])
|
||||
|
||||
@requires_policies
|
||||
@ -1530,7 +1549,7 @@ class TestContainer(unittest.TestCase):
|
||||
resp = retry(head)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('x-storage-policy'),
|
||||
self.assertEqual(headers.get('x-storage-policy'),
|
||||
policy['name'])
|
||||
|
||||
|
||||
@ -1578,7 +1597,7 @@ class BaseTestContainerACLs(unittest.TestCase):
|
||||
while True:
|
||||
resp = retry(get, use_account=self.account)
|
||||
body = resp.read()
|
||||
self.assert_(resp.status // 100 == 2, resp.status)
|
||||
self.assertTrue(resp.status // 100 == 2, resp.status)
|
||||
objs = json.loads(body)
|
||||
if not objs:
|
||||
break
|
||||
|
@ -15,11 +15,12 @@
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
|
||||
import json
|
||||
import unittest
|
||||
from nose import SkipTest
|
||||
from uuid import uuid4
|
||||
|
||||
from swift.common.utils import json
|
||||
from six.moves import range
|
||||
|
||||
from test.functional import check_response, retry, requires_acls, \
|
||||
requires_policies
|
||||
@ -88,7 +89,7 @@ class TestObject(unittest.TestCase):
|
||||
body = resp.read()
|
||||
if resp.status == 404:
|
||||
break
|
||||
self.assert_(resp.status // 100 == 2, resp.status)
|
||||
self.assertTrue(resp.status // 100 == 2, resp.status)
|
||||
objs = json.loads(body)
|
||||
if not objs:
|
||||
break
|
||||
@ -106,7 +107,7 @@ class TestObject(unittest.TestCase):
|
||||
for container in self.containers:
|
||||
resp = retry(delete, container)
|
||||
resp.read()
|
||||
self.assert_(resp.status in (204, 404))
|
||||
self.assertIn(resp.status, (204, 404))
|
||||
|
||||
def test_if_none_match(self):
|
||||
def put(url, token, parsed, conn):
|
||||
@ -118,10 +119,10 @@ class TestObject(unittest.TestCase):
|
||||
return check_response(conn)
|
||||
resp = retry(put)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
resp = retry(put)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 412)
|
||||
self.assertEqual(resp.status, 412)
|
||||
|
||||
def put(url, token, parsed, conn):
|
||||
conn.request('PUT', '%s/%s/%s' % (
|
||||
@ -132,7 +133,7 @@ class TestObject(unittest.TestCase):
|
||||
return check_response(conn)
|
||||
resp = retry(put)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 400)
|
||||
self.assertEqual(resp.status, 400)
|
||||
|
||||
def test_non_integer_x_delete_after(self):
|
||||
def put(url, token, parsed, conn):
|
||||
@ -144,7 +145,7 @@ class TestObject(unittest.TestCase):
|
||||
return check_response(conn)
|
||||
resp = retry(put)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 400)
|
||||
self.assertEqual(resp.status, 400)
|
||||
self.assertEqual(body, 'Non-integer X-Delete-After')
|
||||
|
||||
def test_non_integer_x_delete_at(self):
|
||||
@ -157,7 +158,7 @@ class TestObject(unittest.TestCase):
|
||||
return check_response(conn)
|
||||
resp = retry(put)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 400)
|
||||
self.assertEqual(resp.status, 400)
|
||||
self.assertEqual(body, 'Non-integer X-Delete-At')
|
||||
|
||||
def test_x_delete_at_in_the_past(self):
|
||||
@ -170,7 +171,7 @@ class TestObject(unittest.TestCase):
|
||||
return check_response(conn)
|
||||
resp = retry(put)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 400)
|
||||
self.assertEqual(resp.status, 400)
|
||||
self.assertEqual(body, 'X-Delete-At in past')
|
||||
|
||||
def test_copy_object(self):
|
||||
@ -242,6 +243,23 @@ class TestObject(unittest.TestCase):
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertEqual(dest_contents, source_contents)
|
||||
|
||||
# copy source to dest with COPY and range
|
||||
def copy(url, token, parsed, conn):
|
||||
conn.request('COPY', '%s/%s' % (parsed.path, source), '',
|
||||
{'X-Auth-Token': token,
|
||||
'Destination': dest,
|
||||
'Range': 'bytes=1-2'})
|
||||
return check_response(conn)
|
||||
resp = retry(copy)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 201)
|
||||
|
||||
# contents of dest should be the same as source
|
||||
resp = retry(get_dest)
|
||||
dest_contents = resp.read()
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertEqual(dest_contents, source_contents[1:3])
|
||||
|
||||
# delete the copy
|
||||
resp = retry(delete)
|
||||
resp.read()
|
||||
@ -369,7 +387,7 @@ class TestObject(unittest.TestCase):
|
||||
resp = retry(get)
|
||||
raise Exception('Should not have been able to GET')
|
||||
except Exception as err:
|
||||
self.assert_(str(err).startswith('No result after '))
|
||||
self.assertTrue(str(err).startswith('No result after '))
|
||||
|
||||
def post(url, token, parsed, conn):
|
||||
conn.request('POST', parsed.path + '/' + self.container, '',
|
||||
@ -394,7 +412,7 @@ class TestObject(unittest.TestCase):
|
||||
resp = retry(get)
|
||||
raise Exception('Should not have been able to GET')
|
||||
except Exception as err:
|
||||
self.assert_(str(err).startswith('No result after '))
|
||||
self.assertTrue(str(err).startswith('No result after '))
|
||||
|
||||
def test_private_object(self):
|
||||
if tf.skip or tf.skip3:
|
||||
@ -525,12 +543,12 @@ class TestObject(unittest.TestCase):
|
||||
# cannot list objects
|
||||
resp = retry(get_listing, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# cannot get object
|
||||
resp = retry(get, self.obj, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-only access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -543,32 +561,32 @@ class TestObject(unittest.TestCase):
|
||||
# can list objects
|
||||
resp = retry(get_listing, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(self.obj in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(self.obj, listing)
|
||||
|
||||
# can get object
|
||||
resp = retry(get, self.obj, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEquals(body, 'test')
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertEqual(body, 'test')
|
||||
|
||||
# can not put an object
|
||||
obj_name = str(uuid4())
|
||||
resp = retry(put, obj_name, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# can not delete an object
|
||||
resp = retry(delete, self.obj, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# sanity with account1
|
||||
resp = retry(get_listing, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(obj_name not in listing)
|
||||
self.assert_(self.obj in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertNotIn(obj_name, listing)
|
||||
self.assertIn(self.obj, listing)
|
||||
|
||||
@requires_acls
|
||||
def test_read_write(self):
|
||||
@ -606,12 +624,12 @@ class TestObject(unittest.TestCase):
|
||||
# cannot list objects
|
||||
resp = retry(get_listing, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# cannot get object
|
||||
resp = retry(get, self.obj, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant read-write access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -624,32 +642,32 @@ class TestObject(unittest.TestCase):
|
||||
# can list objects
|
||||
resp = retry(get_listing, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(self.obj in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(self.obj, listing)
|
||||
|
||||
# can get object
|
||||
resp = retry(get, self.obj, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEquals(body, 'test')
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertEqual(body, 'test')
|
||||
|
||||
# can put an object
|
||||
obj_name = str(uuid4())
|
||||
resp = retry(put, obj_name, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
|
||||
# can delete an object
|
||||
resp = retry(delete, self.obj, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
|
||||
# sanity with account1
|
||||
resp = retry(get_listing, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(obj_name in listing)
|
||||
self.assert_(self.obj not in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(obj_name, listing)
|
||||
self.assertNotIn(self.obj, listing)
|
||||
|
||||
@requires_acls
|
||||
def test_admin(self):
|
||||
@ -687,12 +705,12 @@ class TestObject(unittest.TestCase):
|
||||
# cannot list objects
|
||||
resp = retry(get_listing, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# cannot get object
|
||||
resp = retry(get, self.obj, use_account=3)
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 403)
|
||||
self.assertEqual(resp.status, 403)
|
||||
|
||||
# grant admin access
|
||||
acl_user = tf.swift_test_user[2]
|
||||
@ -705,32 +723,32 @@ class TestObject(unittest.TestCase):
|
||||
# can list objects
|
||||
resp = retry(get_listing, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(self.obj in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(self.obj, listing)
|
||||
|
||||
# can get object
|
||||
resp = retry(get, self.obj, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEquals(body, 'test')
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertEqual(body, 'test')
|
||||
|
||||
# can put an object
|
||||
obj_name = str(uuid4())
|
||||
resp = retry(put, obj_name, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 201)
|
||||
self.assertEqual(resp.status, 201)
|
||||
|
||||
# can delete an object
|
||||
resp = retry(delete, self.obj, use_account=3)
|
||||
body = resp.read()
|
||||
self.assertEquals(resp.status, 204)
|
||||
self.assertEqual(resp.status, 204)
|
||||
|
||||
# sanity with account1
|
||||
resp = retry(get_listing, use_account=3)
|
||||
listing = resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assert_(obj_name in listing)
|
||||
self.assert_(self.obj not in listing)
|
||||
self.assertEqual(resp.status, 200)
|
||||
self.assertIn(obj_name, listing)
|
||||
self.assertNotIn(self.obj, listing)
|
||||
|
||||
def test_manifest(self):
|
||||
if tf.skip:
|
||||
@ -746,7 +764,7 @@ class TestObject(unittest.TestCase):
|
||||
parsed.path, self.container, str(objnum)), segments1[objnum],
|
||||
{'X-Auth-Token': token})
|
||||
return check_response(conn)
|
||||
for objnum in xrange(len(segments1)):
|
||||
for objnum in range(len(segments1)):
|
||||
resp = retry(put, objnum)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 201)
|
||||
@ -809,7 +827,7 @@ class TestObject(unittest.TestCase):
|
||||
parsed.path, self.container, str(objnum)), segments2[objnum],
|
||||
{'X-Auth-Token': token})
|
||||
return check_response(conn)
|
||||
for objnum in xrange(len(segments2)):
|
||||
for objnum in range(len(segments2)):
|
||||
resp = retry(put, objnum)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 201)
|
||||
@ -891,7 +909,7 @@ class TestObject(unittest.TestCase):
|
||||
parsed.path, acontainer, str(objnum)), segments3[objnum],
|
||||
{'X-Auth-Token': token})
|
||||
return check_response(conn)
|
||||
for objnum in xrange(len(segments3)):
|
||||
for objnum in range(len(segments3)):
|
||||
resp = retry(put, objnum)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 201)
|
||||
@ -966,7 +984,7 @@ class TestObject(unittest.TestCase):
|
||||
parsed.path, acontainer, str(objnum)), '',
|
||||
{'X-Auth-Token': token})
|
||||
return check_response(conn)
|
||||
for objnum in xrange(len(segments3)):
|
||||
for objnum in range(len(segments3)):
|
||||
resp = retry(delete, objnum)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
@ -977,7 +995,7 @@ class TestObject(unittest.TestCase):
|
||||
parsed.path, self.container, str(objnum)), '',
|
||||
{'X-Auth-Token': token})
|
||||
return check_response(conn)
|
||||
for objnum in xrange(len(segments2)):
|
||||
for objnum in range(len(segments2)):
|
||||
resp = retry(delete, objnum)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
@ -988,7 +1006,7 @@ class TestObject(unittest.TestCase):
|
||||
parsed.path, self.container, str(objnum)), '',
|
||||
{'X-Auth-Token': token})
|
||||
return check_response(conn)
|
||||
for objnum in xrange(len(segments1)):
|
||||
for objnum in range(len(segments1)):
|
||||
resp = retry(delete, objnum)
|
||||
resp.read()
|
||||
self.assertEqual(resp.status, 204)
|
||||
@ -1095,77 +1113,77 @@ class TestObject(unittest.TestCase):
|
||||
|
||||
resp = retry(put_cors_cont, '*')
|
||||
resp.read()
|
||||
self.assertEquals(resp.status // 100, 2)
|
||||
self.assertEqual(resp.status // 100, 2)
|
||||
|
||||
resp = retry(put_obj, 'cat')
|
||||
resp.read()
|
||||
self.assertEquals(resp.status // 100, 2)
|
||||
self.assertEqual(resp.status // 100, 2)
|
||||
|
||||
resp = retry(check_cors,
|
||||
'OPTIONS', 'cat', {'Origin': 'http://m.com'})
|
||||
self.assertEquals(resp.status, 401)
|
||||
self.assertEqual(resp.status, 401)
|
||||
|
||||
resp = retry(check_cors,
|
||||
'OPTIONS', 'cat',
|
||||
{'Origin': 'http://m.com',
|
||||
'Access-Control-Request-Method': 'GET'})
|
||||
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEqual(resp.status, 200)
|
||||
resp.read()
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('access-control-allow-origin'),
|
||||
self.assertEqual(headers.get('access-control-allow-origin'),
|
||||
'*')
|
||||
|
||||
resp = retry(check_cors,
|
||||
'GET', 'cat', {'Origin': 'http://m.com'})
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEqual(resp.status, 200)
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('access-control-allow-origin'),
|
||||
self.assertEqual(headers.get('access-control-allow-origin'),
|
||||
'*')
|
||||
|
||||
resp = retry(check_cors,
|
||||
'GET', 'cat', {'Origin': 'http://m.com',
|
||||
'X-Web-Mode': 'True'})
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEqual(resp.status, 200)
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('access-control-allow-origin'),
|
||||
self.assertEqual(headers.get('access-control-allow-origin'),
|
||||
'*')
|
||||
|
||||
####################
|
||||
|
||||
resp = retry(put_cors_cont, 'http://secret.com')
|
||||
resp.read()
|
||||
self.assertEquals(resp.status // 100, 2)
|
||||
self.assertEqual(resp.status // 100, 2)
|
||||
|
||||
resp = retry(check_cors,
|
||||
'OPTIONS', 'cat',
|
||||
{'Origin': 'http://m.com',
|
||||
'Access-Control-Request-Method': 'GET'})
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 401)
|
||||
self.assertEqual(resp.status, 401)
|
||||
|
||||
if strict_cors:
|
||||
resp = retry(check_cors,
|
||||
'GET', 'cat', {'Origin': 'http://m.com'})
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEqual(resp.status, 200)
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertTrue('access-control-allow-origin' not in headers)
|
||||
self.assertNotIn('access-control-allow-origin', headers)
|
||||
|
||||
resp = retry(check_cors,
|
||||
'GET', 'cat', {'Origin': 'http://secret.com'})
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEqual(resp.status, 200)
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('access-control-allow-origin'),
|
||||
self.assertEqual(headers.get('access-control-allow-origin'),
|
||||
'http://secret.com')
|
||||
else:
|
||||
resp = retry(check_cors,
|
||||
'GET', 'cat', {'Origin': 'http://m.com'})
|
||||
resp.read()
|
||||
self.assertEquals(resp.status, 200)
|
||||
self.assertEqual(resp.status, 200)
|
||||
headers = dict((k.lower(), v) for k, v in resp.getheaders())
|
||||
self.assertEquals(headers.get('access-control-allow-origin'),
|
||||
self.assertEqual(headers.get('access-control-allow-origin'),
|
||||
'http://m.com')
|
||||
|
||||
@requires_policies
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -15,10 +15,12 @@
|
||||
|
||||
""" Swift tests """
|
||||
|
||||
from __future__ import print_function
|
||||
import os
|
||||
import copy
|
||||
import logging
|
||||
import errno
|
||||
from six.moves import range
|
||||
import sys
|
||||
from contextlib import contextmanager, closing
|
||||
from collections import defaultdict, Iterable
|
||||
@ -30,17 +32,18 @@ import eventlet
|
||||
from eventlet.green import socket
|
||||
from tempfile import mkdtemp
|
||||
from shutil import rmtree
|
||||
from swift.common.utils import Timestamp
|
||||
from swift.common.utils import Timestamp, NOTICE
|
||||
from test import get_config
|
||||
from swift.common import swob, utils
|
||||
from swift.common.ring import Ring, RingData
|
||||
from hashlib import md5
|
||||
import logging.handlers
|
||||
from httplib import HTTPException
|
||||
|
||||
from six.moves.http_client import HTTPException
|
||||
from swift.common import storage_policy
|
||||
from swift.common.storage_policy import StoragePolicy, ECStoragePolicy
|
||||
import functools
|
||||
import cPickle as pickle
|
||||
import six.moves.cPickle as pickle
|
||||
from gzip import GzipFile
|
||||
import mock as mocklib
|
||||
import inspect
|
||||
@ -226,9 +229,7 @@ class FakeRing(Ring):
|
||||
return [dict(node, index=i) for i, node in enumerate(list(self._devs))]
|
||||
|
||||
def get_more_nodes(self, part):
|
||||
# replicas^2 is the true cap
|
||||
for x in xrange(self.replicas, min(self.replicas + self.max_more_nodes,
|
||||
self.replicas * self.replicas)):
|
||||
for x in range(self.replicas, (self.replicas + self.max_more_nodes)):
|
||||
yield {'ip': '10.0.0.%s' % x,
|
||||
'replication_ip': '10.0.0.%s' % x,
|
||||
'port': self._base_port + x,
|
||||
@ -478,8 +479,18 @@ class FakeLogger(logging.Logger, object):
|
||||
logging.INFO: 'info',
|
||||
logging.DEBUG: 'debug',
|
||||
logging.CRITICAL: 'critical',
|
||||
NOTICE: 'notice',
|
||||
}
|
||||
|
||||
def notice(self, msg, *args, **kwargs):
|
||||
"""
|
||||
Convenience function for syslog priority LOG_NOTICE. The python
|
||||
logging lvl is set to 25, just above info. SysLogHandler is
|
||||
monkey patched to map this log lvl to the LOG_NOTICE syslog
|
||||
priority.
|
||||
"""
|
||||
self.log(NOTICE, msg, *args, **kwargs)
|
||||
|
||||
def _log(self, level, msg, *args, **kwargs):
|
||||
store_name = self.store_in[level]
|
||||
cargs = [msg]
|
||||
@ -495,7 +506,9 @@ class FakeLogger(logging.Logger, object):
|
||||
def _clear(self):
|
||||
self.log_dict = defaultdict(list)
|
||||
self.lines_dict = {'critical': [], 'error': [], 'info': [],
|
||||
'warning': [], 'debug': []}
|
||||
'warning': [], 'debug': [], 'notice': []}
|
||||
|
||||
clear = _clear # this is a public interface
|
||||
|
||||
def get_lines_for_level(self, level):
|
||||
if level not in self.lines_dict:
|
||||
@ -560,8 +573,8 @@ class FakeLogger(logging.Logger, object):
|
||||
try:
|
||||
line = record.getMessage()
|
||||
except TypeError:
|
||||
print 'WARNING: unable to format log message %r %% %r' % (
|
||||
record.msg, record.args)
|
||||
print('WARNING: unable to format log message %r %% %r' % (
|
||||
record.msg, record.args))
|
||||
raise
|
||||
self.lines_dict[record.levelname.lower()].append(line)
|
||||
|
||||
@ -585,7 +598,7 @@ class DebugLogger(FakeLogger):
|
||||
|
||||
def handle(self, record):
|
||||
self._handle(record)
|
||||
print self.formatter.format(record)
|
||||
print(self.formatter.format(record))
|
||||
|
||||
|
||||
class DebugLogAdapter(utils.LogAdapter):
|
||||
@ -704,6 +717,74 @@ def mock(update):
|
||||
delattr(module, attr)
|
||||
|
||||
|
||||
class FakeStatus(object):
|
||||
"""
|
||||
This will work with our fake_http_connect, if you hand in one of these
|
||||
instead of a status int or status int tuple to the "codes" iter you can
|
||||
add some eventlet sleep to the expect and response stages of the
|
||||
connection.
|
||||
"""
|
||||
|
||||
def __init__(self, status, expect_sleep=None, response_sleep=None):
|
||||
"""
|
||||
:param status: the response status int, or a tuple of
|
||||
([expect_status, ...], response_status)
|
||||
:param expect_sleep: float, time to eventlet sleep during expect, can
|
||||
be a iter of floats
|
||||
:param response_sleep: float, time to eventlet sleep during response
|
||||
"""
|
||||
# connect exception
|
||||
if isinstance(status, (Exception, eventlet.Timeout)):
|
||||
raise status
|
||||
if isinstance(status, tuple):
|
||||
self.expect_status = list(status[:-1])
|
||||
self.status = status[-1]
|
||||
self.explicit_expect_list = True
|
||||
else:
|
||||
self.expect_status, self.status = ([], status)
|
||||
self.explicit_expect_list = False
|
||||
if not self.expect_status:
|
||||
# when a swift backend service returns a status before reading
|
||||
# from the body (mostly an error response) eventlet.wsgi will
|
||||
# respond with that status line immediately instead of 100
|
||||
# Continue, even if the client sent the Expect 100 header.
|
||||
# BufferedHttp and the proxy both see these error statuses
|
||||
# when they call getexpect, so our FakeConn tries to act like
|
||||
# our backend services and return certain types of responses
|
||||
# as expect statuses just like a real backend server would do.
|
||||
if self.status in (507, 412, 409):
|
||||
self.expect_status = [status]
|
||||
else:
|
||||
self.expect_status = [100, 100]
|
||||
|
||||
# setup sleep attributes
|
||||
if not isinstance(expect_sleep, (list, tuple)):
|
||||
expect_sleep = [expect_sleep] * len(self.expect_status)
|
||||
self.expect_sleep_list = list(expect_sleep)
|
||||
while len(self.expect_sleep_list) < len(self.expect_status):
|
||||
self.expect_sleep_list.append(None)
|
||||
self.response_sleep = response_sleep
|
||||
|
||||
def get_response_status(self):
|
||||
if self.response_sleep is not None:
|
||||
eventlet.sleep(self.response_sleep)
|
||||
if self.expect_status and self.explicit_expect_list:
|
||||
raise Exception('Test did not consume all fake '
|
||||
'expect status: %r' % (self.expect_status,))
|
||||
if isinstance(self.status, (Exception, eventlet.Timeout)):
|
||||
raise self.status
|
||||
return self.status
|
||||
|
||||
def get_expect_status(self):
|
||||
expect_sleep = self.expect_sleep_list.pop(0)
|
||||
if expect_sleep is not None:
|
||||
eventlet.sleep(expect_sleep)
|
||||
expect_status = self.expect_status.pop(0)
|
||||
if isinstance(expect_status, (Exception, eventlet.Timeout)):
|
||||
raise expect_status
|
||||
return expect_status
|
||||
|
||||
|
||||
class SlowBody(object):
|
||||
"""
|
||||
This will work with our fake_http_connect, if you hand in these
|
||||
@ -741,29 +822,9 @@ def fake_http_connect(*code_iter, **kwargs):
|
||||
def __init__(self, status, etag=None, body='', timestamp='1',
|
||||
headers=None, expect_headers=None, connection_id=None,
|
||||
give_send=None):
|
||||
# connect exception
|
||||
if isinstance(status, (Exception, eventlet.Timeout)):
|
||||
raise status
|
||||
if isinstance(status, tuple):
|
||||
self.expect_status = list(status[:-1])
|
||||
self.status = status[-1]
|
||||
self.explicit_expect_list = True
|
||||
else:
|
||||
self.expect_status, self.status = ([], status)
|
||||
self.explicit_expect_list = False
|
||||
if not self.expect_status:
|
||||
# when a swift backend service returns a status before reading
|
||||
# from the body (mostly an error response) eventlet.wsgi will
|
||||
# respond with that status line immediately instead of 100
|
||||
# Continue, even if the client sent the Expect 100 header.
|
||||
# BufferedHttp and the proxy both see these error statuses
|
||||
# when they call getexpect, so our FakeConn tries to act like
|
||||
# our backend services and return certain types of responses
|
||||
# as expect statuses just like a real backend server would do.
|
||||
if self.status in (507, 412, 409):
|
||||
self.expect_status = [status]
|
||||
else:
|
||||
self.expect_status = [100, 100]
|
||||
if not isinstance(status, FakeStatus):
|
||||
status = FakeStatus(status)
|
||||
self._status = status
|
||||
self.reason = 'Fake'
|
||||
self.host = '1.2.3.4'
|
||||
self.port = '1234'
|
||||
@ -785,11 +846,6 @@ def fake_http_connect(*code_iter, **kwargs):
|
||||
eventlet.sleep()
|
||||
|
||||
def getresponse(self):
|
||||
if self.expect_status and self.explicit_expect_list:
|
||||
raise Exception('Test did not consume all fake '
|
||||
'expect status: %r' % (self.expect_status,))
|
||||
if isinstance(self.status, (Exception, eventlet.Timeout)):
|
||||
raise self.status
|
||||
exc = kwargs.get('raise_exc')
|
||||
if exc:
|
||||
if isinstance(exc, (Exception, eventlet.Timeout)):
|
||||
@ -797,16 +853,19 @@ def fake_http_connect(*code_iter, **kwargs):
|
||||
raise Exception('test')
|
||||
if kwargs.get('raise_timeout_exc'):
|
||||
raise eventlet.Timeout()
|
||||
self.status = self._status.get_response_status()
|
||||
return self
|
||||
|
||||
def getexpect(self):
|
||||
expect_status = self.expect_status.pop(0)
|
||||
if isinstance(self.expect_status, (Exception, eventlet.Timeout)):
|
||||
raise self.expect_status
|
||||
expect_status = self._status.get_expect_status()
|
||||
headers = dict(self.expect_headers)
|
||||
if expect_status == 409:
|
||||
headers['X-Backend-Timestamp'] = self.timestamp
|
||||
return FakeConn(expect_status, headers=headers)
|
||||
response = FakeConn(expect_status,
|
||||
timestamp=self.timestamp,
|
||||
headers=headers)
|
||||
response.status = expect_status
|
||||
return response
|
||||
|
||||
def getheaders(self):
|
||||
etag = self.etag
|
||||
@ -834,7 +893,7 @@ def fake_http_connect(*code_iter, **kwargs):
|
||||
# when timestamp is None, HeaderKeyDict raises KeyError
|
||||
headers.pop('x-timestamp', None)
|
||||
try:
|
||||
if container_ts_iter.next() is False:
|
||||
if next(container_ts_iter) is False:
|
||||
headers['x-container-timestamp'] = '1'
|
||||
except StopIteration:
|
||||
pass
|
||||
@ -911,24 +970,24 @@ def fake_http_connect(*code_iter, **kwargs):
|
||||
kwargs['give_content_type'](args[6]['Content-Type'])
|
||||
else:
|
||||
kwargs['give_content_type']('')
|
||||
i, status = conn_id_and_code_iter.next()
|
||||
i, status = next(conn_id_and_code_iter)
|
||||
if 'give_connect' in kwargs:
|
||||
give_conn_fn = kwargs['give_connect']
|
||||
argspec = inspect.getargspec(give_conn_fn)
|
||||
if argspec.keywords or 'connection_id' in argspec.args:
|
||||
ckwargs['connection_id'] = i
|
||||
give_conn_fn(*args, **ckwargs)
|
||||
etag = etag_iter.next()
|
||||
headers = headers_iter.next()
|
||||
expect_headers = expect_headers_iter.next()
|
||||
timestamp = timestamps_iter.next()
|
||||
etag = next(etag_iter)
|
||||
headers = next(headers_iter)
|
||||
expect_headers = next(expect_headers_iter)
|
||||
timestamp = next(timestamps_iter)
|
||||
|
||||
if status <= 0:
|
||||
raise HTTPException()
|
||||
if body_iter is None:
|
||||
body = static_body or ''
|
||||
else:
|
||||
body = body_iter.next()
|
||||
body = next(body_iter)
|
||||
return FakeConn(status, etag, body=body, timestamp=timestamp,
|
||||
headers=headers, expect_headers=expect_headers,
|
||||
connection_id=i, give_send=kwargs.get('give_send'))
|
||||
|
@ -207,9 +207,6 @@ class TestDiskFile(unittest.TestCase):
|
||||
assert not gdf._is_dir
|
||||
assert gdf._fd is not None
|
||||
assert gdf._metadata == exp_md
|
||||
self.assertRaises(DiskFileNotOpen, gdf.get_metadata)
|
||||
self.assertRaises(DiskFileNotOpen, gdf.reader)
|
||||
self.assertRaises(DiskFileNotOpen, gdf.__enter__)
|
||||
|
||||
def test_open_and_close(self):
|
||||
mock_close = Mock()
|
||||
@ -480,7 +477,6 @@ class TestDiskFile(unittest.TestCase):
|
||||
gdf = self._get_diskfile("vol0", "p57", "ufo47", "bar", "z")
|
||||
md = {'Content-Type': 'application/octet-stream', 'a': 'b'}
|
||||
gdf.write_metadata(md.copy())
|
||||
self.assertEqual(None, gdf._metadata)
|
||||
fmd = _metadata[_mapit(the_dir)]
|
||||
md.update({'X-Object-Type': 'file', 'X-Type': 'Object'})
|
||||
self.assertTrue(fmd['a'], md['a'])
|
||||
|
29
tox.ini
29
tox.ini
@ -1,5 +1,5 @@
|
||||
[tox]
|
||||
envlist = py26,py27,pep8,functest,functest-ci
|
||||
envlist = py27,pep8,functest
|
||||
minversion = 1.6
|
||||
skipsdist = True
|
||||
|
||||
@ -15,11 +15,12 @@ deps =
|
||||
# Note: pip supports installing from git repos.
|
||||
# https://pip.pypa.io/en/latest/reference/pip_install.html#git
|
||||
# Example: git+https://github.com/openstack/swift.git@2.0.0
|
||||
https://launchpad.net/swift/kilo/2.3.0/+download/swift-2.3.0.tar.gz
|
||||
https://launchpad.net/swift/liberty/2.5.0/+download/swift-2.5.0.tar.gz
|
||||
PyECLib==1.0.7
|
||||
-r{toxinidir}/test-requirements.txt
|
||||
changedir = {toxinidir}/test/unit
|
||||
commands = nosetests -v {posargs}
|
||||
passenv = SWIFT_* *_proxy
|
||||
|
||||
[testenv:cover]
|
||||
setenv = VIRTUAL_ENV={envdir}
|
||||
@ -46,14 +47,20 @@ changedir = {toxinidir}
|
||||
commands = {posargs}
|
||||
|
||||
[flake8]
|
||||
# it's not a bug that we aren't using all of hacking
|
||||
# H102 -> apache2 license exists
|
||||
# H103 -> license is apache
|
||||
# H201 -> no bare excepts (unless marked with " # noqa")
|
||||
# H231 -> Check for except statements to be Python 3.x compatible
|
||||
# H501 -> don't use locals() for str formatting
|
||||
# H903 -> \n not \r\n
|
||||
ignore = H
|
||||
select = F,E,W,H102,H103,H201,H231,H501,H903
|
||||
# it's not a bug that we aren't using all of hacking, ignore:
|
||||
# F812: list comprehension redefines ...
|
||||
# H101: Use TODO(NAME)
|
||||
# H202: assertRaises Exception too broad
|
||||
# H233: Python 3.x incompatible use of print operator
|
||||
# H234: assertEquals is deprecated, use assertEqual
|
||||
# H301: one import per line
|
||||
# H306: imports not in alphabetical order (time, os)
|
||||
# H401: docstring should not start with a space
|
||||
# H403: multi line docstrings should end on a new line
|
||||
# H404: multi line docstring should start without a leading new line
|
||||
# H405: multi line docstring summary not separated with an empty line
|
||||
# H501: Do not use self.__dict__ for string formatting
|
||||
# H703: Multiple positional placeholders
|
||||
ignore = F812,H101,H202,H233,H234,H301,H306,H401,H403,H404,H405,H501,H703
|
||||
exclude = .venv,.tox,dist,doc,*egg,test
|
||||
show-source = True
|
||||
|
Loading…
Reference in New Issue
Block a user