Blackify openstack.object_store

Black used with the '-l 79 -S' flags.

A future change will ignore this commit in git-blame history by adding a
'git-blame-ignore-revs' file.

Change-Id: I9c6e6b898fc7e3a196725bd37a3b5bdc77060cd3
Signed-off-by: Stephen Finucane <stephenfin@redhat.com>
This commit is contained in:
Stephen Finucane 2023-05-03 12:14:19 +01:00
parent 34da09f312
commit 4589e293e8
13 changed files with 904 additions and 571 deletions

View File

@ -28,13 +28,13 @@ class BaseResource(resource.Resource):
_last_headers = dict()
def __init__(self, metadata=None, **attrs):
"""Process and save metadata known at creation stage
"""
"""Process and save metadata known at creation stage"""
super().__init__(**attrs)
if metadata is not None:
for k, v in metadata.items():
if not k.lower().startswith(
self._custom_metadata_prefix.lower()):
self._custom_metadata_prefix.lower()
):
self.metadata[self._custom_metadata_prefix + k] = v
else:
self.metadata[k] = v
@ -62,8 +62,8 @@ class BaseResource(resource.Resource):
def set_metadata(self, session, metadata, refresh=True):
request = self._prepare_request()
response = session.post(
request.url,
headers=self._calculate_headers(metadata))
request.url, headers=self._calculate_headers(metadata)
)
self._translate_response(response, has_body=False)
if refresh:
response = session.head(request.url)
@ -74,10 +74,11 @@ class BaseResource(resource.Resource):
request = self._prepare_request()
headers = {key: '' for key in keys}
response = session.post(
request.url,
headers=self._calculate_headers(headers))
request.url, headers=self._calculate_headers(headers)
)
exceptions.raise_from_response(
response, error_message="Error deleting metadata keys")
response, error_message="Error deleting metadata keys"
)
return self
def _set_metadata(self, headers):
@ -85,10 +86,8 @@ class BaseResource(resource.Resource):
for header in headers:
# RADOS and other stuff in front may actually lowcase headers
if header.lower().startswith(
self._custom_metadata_prefix.lower()
):
key = header[len(self._custom_metadata_prefix):].lower()
if header.lower().startswith(self._custom_metadata_prefix.lower()):
key = header[len(self._custom_metadata_prefix) :].lower()
self.metadata[key] = headers[header]
def _translate_response(self, response, has_body=None, error_message=None):
@ -98,5 +97,6 @@ class BaseResource(resource.Resource):
# pops known headers.
self._last_headers = response.headers.copy()
super(BaseResource, self)._translate_response(
response, has_body=has_body, error_message=error_message)
response, has_body=has_body, error_message=error_message
)
self._set_metadata(response.headers)

View File

@ -40,7 +40,7 @@ class Proxy(proxy.Proxy):
"account": _account.Account,
"container": _container.Container,
"info": _info.Info,
"object": _obj.Object
"object": _obj.Object,
}
skip_discovery = True
@ -60,19 +60,25 @@ class Proxy(proxy.Proxy):
# Split url into parts and exclude potential project_id in some urls
url_parts = [
x for x in url_path.split('/') if (
x
for x in url_path.split('/')
if (
x != project_id
and (
not project_id
or (project_id and x != 'AUTH_' + project_id)
))
)
)
]
# Strip leading version piece so that
# GET /v1/AUTH_xxx
# returns ['AUTH_xxx']
if (url_parts[0]
and url_parts[0][0] == 'v'
and url_parts[0][1] and url_parts[0][1].isdigit()):
if (
url_parts[0]
and url_parts[0][0] == 'v'
and url_parts[0][1]
and url_parts[0][1].isdigit()
):
url_parts = url_parts[1:]
# Strip out anything that's empty or None
@ -152,8 +158,9 @@ class Proxy(proxy.Proxy):
:returns: ``None``
"""
self._delete(_container.Container, container,
ignore_missing=ignore_missing)
self._delete(
_container.Container, container, ignore_missing=ignore_missing
)
def get_container_metadata(self, container):
"""Get metadata for a container
@ -219,8 +226,12 @@ class Proxy(proxy.Proxy):
container = self._get_container_name(container=container)
for obj in self._list(
_obj.Object, container=container,
paginated=True, format='json', **query):
_obj.Object,
container=container,
paginated=True,
format='json',
**query,
):
obj.container = container
yield obj
@ -236,8 +247,12 @@ class Proxy(proxy.Proxy):
raise ValueError("container must be specified")
def get_object(
self, obj, container=None, resp_chunk_size=1024,
outfile=None, remember_content=False
self,
obj,
container=None,
resp_chunk_size=1024,
outfile=None,
remember_content=False,
):
"""Get the data associated with an object
@ -262,20 +277,17 @@ class Proxy(proxy.Proxy):
:raises: :class:`~openstack.exceptions.ResourceNotFound`
when no resource can be found.
"""
container_name = self._get_container_name(
obj=obj, container=container)
container_name = self._get_container_name(obj=obj, container=container)
_object = self._get_resource(
_obj.Object, obj,
container=container_name)
_obj.Object, obj, container=container_name
)
request = _object._prepare_request()
get_stream = (outfile is not None)
get_stream = outfile is not None
response = self.get(
request.url,
headers=request.headers,
stream=get_stream
request.url, headers=request.headers, stream=get_stream
)
exceptions.raise_from_response(response)
_object._translate_response(response, has_body=False)
@ -286,7 +298,8 @@ class Proxy(proxy.Proxy):
else:
outfile_handle = outfile
for chunk in response.iter_content(
resp_chunk_size, decode_unicode=False):
resp_chunk_size, decode_unicode=False
):
outfile_handle.write(chunk)
if isinstance(outfile, str):
outfile_handle.close()
@ -308,10 +321,10 @@ class Proxy(proxy.Proxy):
:raises: :class:`~openstack.exceptions.ResourceNotFound`
when no resource can be found.
"""
container_name = self._get_container_name(
obj=obj, container=container)
container_name = self._get_container_name(obj=obj, container=container)
obj = self._get_resource(
_obj.Object, obj, container=container_name, **attrs)
_obj.Object, obj, container=container_name, **attrs
)
return obj.download(self)
def stream_object(self, obj, container=None, chunk_size=1024, **attrs):
@ -326,18 +339,26 @@ class Proxy(proxy.Proxy):
when no resource can be found.
:returns: An iterator that iterates over chunk_size bytes
"""
container_name = self._get_container_name(
obj=obj, container=container)
container_name = self._get_container_name(obj=obj, container=container)
obj = self._get_resource(
_obj.Object, obj, container=container_name, **attrs)
_obj.Object, obj, container=container_name, **attrs
)
return obj.stream(self, chunk_size=chunk_size)
def create_object(
self, container, name, filename=None,
md5=None, sha256=None, segment_size=None,
use_slo=True, metadata=None,
generate_checksums=None, data=None,
**headers):
self,
container,
name,
filename=None,
md5=None,
sha256=None,
segment_size=None,
use_slo=True,
metadata=None,
generate_checksums=None,
data=None,
**headers,
):
"""Create a file object.
Automatically uses large-object segments if needed.
@ -373,13 +394,14 @@ class Proxy(proxy.Proxy):
"""
if data is not None and filename:
raise ValueError(
"Both filename and data given. Please choose one.")
"Both filename and data given. Please choose one."
)
if data is not None and not name:
raise ValueError(
"name is a required parameter when data is given")
raise ValueError("name is a required parameter when data is given")
if data is not None and generate_checksums:
raise ValueError(
"checksums cannot be generated with data parameter")
"checksums cannot be generated with data parameter"
)
if generate_checksums is None:
if data is not None:
generate_checksums = False
@ -400,17 +422,22 @@ class Proxy(proxy.Proxy):
metadata[self._connection._OBJECT_SHA256_KEY] = sha256
container_name = self._get_container_name(container=container)
endpoint = '{container}/{name}'.format(container=container_name,
name=name)
endpoint = '{container}/{name}'.format(
container=container_name, name=name
)
if data is not None:
self.log.debug(
"swift uploading data to %(endpoint)s",
{'endpoint': endpoint})
"swift uploading data to %(endpoint)s", {'endpoint': endpoint}
)
return self._create(
_obj.Object, container=container_name,
name=name, data=data, metadata=metadata,
**headers)
_obj.Object,
container=container_name,
name=name,
data=data,
metadata=metadata,
**headers,
)
# segment_size gets used as a step value in a range call, so needs
# to be an int
@ -423,7 +450,8 @@ class Proxy(proxy.Proxy):
self._connection.log.debug(
"swift uploading %(filename)s to %(endpoint)s",
{'filename': filename, 'endpoint': endpoint})
{'filename': filename, 'endpoint': endpoint},
)
if metadata is not None:
# Rely on the class headers calculation for requested metadata
@ -435,8 +463,13 @@ class Proxy(proxy.Proxy):
else:
self._upload_large_object(
endpoint, filename, headers,
file_size, segment_size, use_slo)
endpoint,
filename,
headers,
file_size,
segment_size,
use_slo,
)
# Backwards compat
upload_object = create_object
@ -461,8 +494,12 @@ class Proxy(proxy.Proxy):
"""
container_name = self._get_container_name(obj, container)
self._delete(_obj.Object, obj, ignore_missing=ignore_missing,
container=container_name)
self._delete(
_obj.Object,
obj,
ignore_missing=ignore_missing,
container=container_name,
)
def get_object_metadata(self, obj, container=None):
"""Get metadata for an object.
@ -522,7 +559,8 @@ class Proxy(proxy.Proxy):
return res
def is_object_stale(
self, container, name, filename, file_md5=None, file_sha256=None):
self, container, name, filename, file_md5=None, file_sha256=None
):
"""Check to see if an object matches the hashes of a file.
:param container: Name of the container.
@ -538,37 +576,45 @@ class Proxy(proxy.Proxy):
except exceptions.NotFoundException:
self._connection.log.debug(
"swift stale check, no object: {container}/{name}".format(
container=container, name=name))
container=container, name=name
)
)
return True
if not (file_md5 or file_sha256):
(file_md5, file_sha256) = \
utils._get_file_hashes(filename)
(file_md5, file_sha256) = utils._get_file_hashes(filename)
md5_key = metadata.get(
self._connection._OBJECT_MD5_KEY,
metadata.get(self._connection._SHADE_OBJECT_MD5_KEY, ''))
metadata.get(self._connection._SHADE_OBJECT_MD5_KEY, ''),
)
sha256_key = metadata.get(
self._connection._OBJECT_SHA256_KEY, metadata.get(
self._connection._SHADE_OBJECT_SHA256_KEY, ''))
self._connection._OBJECT_SHA256_KEY,
metadata.get(self._connection._SHADE_OBJECT_SHA256_KEY, ''),
)
up_to_date = utils._hashes_up_to_date(
md5=file_md5, sha256=file_sha256,
md5_key=md5_key, sha256_key=sha256_key)
md5=file_md5,
sha256=file_sha256,
md5_key=md5_key,
sha256_key=sha256_key,
)
if not up_to_date:
self._connection.log.debug(
"swift checksum mismatch: "
" %(filename)s!=%(container)s/%(name)s",
{'filename': filename, 'container': container, 'name': name})
{'filename': filename, 'container': container, 'name': name},
)
return True
self._connection.log.debug(
"swift object up to date: %(container)s/%(name)s",
{'container': container, 'name': name})
{'container': container, 'name': name},
)
return False
def _upload_large_object(
self, endpoint, filename,
headers, file_size, segment_size, use_slo):
self, endpoint, filename, headers, file_size, segment_size, use_slo
):
# If the object is big, we need to break it up into segments that
# are no larger than segment_size, upload each of them individually
# and then upload a manifest object. The segments can be uploaded in
@ -584,28 +630,32 @@ class Proxy(proxy.Proxy):
# segment, the value a FileSegment file-like object that is a
# slice of the data for the segment.
segments = self._get_file_segments(
endpoint, filename, file_size, segment_size)
endpoint, filename, file_size, segment_size
)
# Schedule the segments for upload
for name, segment in segments.items():
# Async call to put - schedules execution and returns a future
segment_future = self._connection._pool_executor.submit(
self.put,
name, headers=headers, data=segment,
raise_exc=False)
self.put, name, headers=headers, data=segment, raise_exc=False
)
segment_futures.append(segment_future)
# TODO(mordred) Collect etags from results to add to this manifest
# dict. Then sort the list of dicts by path.
manifest.append(dict(
# While Object Storage usually expects the name to be
# urlencoded in most requests, the SLO manifest requires
# plain object names instead.
path='/{name}'.format(name=parse.unquote(name)),
size_bytes=segment.length))
manifest.append(
dict(
# While Object Storage usually expects the name to be
# urlencoded in most requests, the SLO manifest requires
# plain object names instead.
path='/{name}'.format(name=parse.unquote(name)),
size_bytes=segment.length,
)
)
# Try once and collect failed results to retry
segment_results, retry_results = self._connection._wait_for_futures(
segment_futures, raise_on_error=False)
segment_futures, raise_on_error=False
)
self._add_etag_to_manifest(segment_results, manifest)
@ -616,37 +666,41 @@ class Proxy(proxy.Proxy):
segment.seek(0)
# Async call to put - schedules execution and returns a future
segment_future = self._connection._pool_executor.submit(
self.put,
name, headers=headers, data=segment)
self.put, name, headers=headers, data=segment
)
# TODO(mordred) Collect etags from results to add to this manifest
# dict. Then sort the list of dicts by path.
retry_futures.append(segment_future)
# If any segments fail the second time, just throw the error
segment_results, retry_results = self._connection._wait_for_futures(
retry_futures, raise_on_error=True)
retry_futures, raise_on_error=True
)
self._add_etag_to_manifest(segment_results, manifest)
try:
if use_slo:
return self._finish_large_object_slo(
endpoint, headers, manifest)
endpoint, headers, manifest
)
else:
return self._finish_large_object_dlo(
endpoint, headers)
return self._finish_large_object_dlo(endpoint, headers)
except Exception:
try:
segment_prefix = endpoint.split('/')[-1]
self.log.debug(
"Failed to upload large object manifest for %s. "
"Removing segment uploads.", segment_prefix)
"Removing segment uploads.",
segment_prefix,
)
self._delete_autocreated_image_objects(
segment_prefix=segment_prefix)
segment_prefix=segment_prefix
)
except Exception:
self.log.exception(
"Failed to cleanup image objects for %s:",
segment_prefix)
"Failed to cleanup image objects for %s:", segment_prefix
)
raise
def _finish_large_object_slo(self, endpoint, headers, manifest):
@ -656,10 +710,13 @@ class Proxy(proxy.Proxy):
retries = 3
while True:
try:
return exceptions.raise_from_response(self.put(
endpoint,
params={'multipart-manifest': 'put'},
headers=headers, data=json.dumps(manifest))
return exceptions.raise_from_response(
self.put(
endpoint,
params={'multipart-manifest': 'put'},
headers=headers,
data=json.dumps(manifest),
)
)
except Exception:
retries -= 1
@ -673,7 +730,8 @@ class Proxy(proxy.Proxy):
while True:
try:
return exceptions.raise_from_response(
self.put(endpoint, headers=headers))
self.put(endpoint, headers=headers)
)
except Exception:
retries -= 1
if retries == 0:
@ -681,8 +739,7 @@ class Proxy(proxy.Proxy):
def _upload_object(self, endpoint, filename, headers):
with open(filename, 'rb') as dt:
return self.put(
endpoint, headers=headers, data=dt)
return self.put(endpoint, headers=headers, data=dt)
def _get_file_segments(self, endpoint, filename, file_size, segment_size):
# Use an ordered dict here so that testing can replicate things
@ -690,10 +747,13 @@ class Proxy(proxy.Proxy):
for (index, offset) in enumerate(range(0, file_size, segment_size)):
remaining = file_size - (index * segment_size)
segment = _utils.FileSegment(
filename, offset,
segment_size if segment_size < remaining else remaining)
filename,
offset,
segment_size if segment_size < remaining else remaining,
)
name = '{endpoint}/{index:0>6}'.format(
endpoint=endpoint, index=index)
endpoint=endpoint, index=index
)
segments[name] = segment
return segments
@ -710,7 +770,8 @@ class Proxy(proxy.Proxy):
server_max_file_size = DEFAULT_MAX_FILE_SIZE
self._connection.log.info(
"Swift capabilities not supported. "
"Using default max file size.")
"Using default max file size."
)
else:
raise
else:
@ -740,9 +801,7 @@ class Proxy(proxy.Proxy):
continue
name = self._object_name_from_url(result.url)
for entry in manifest:
if entry['path'] == '/{name}'.format(
name=parse.unquote(name)
):
if entry['path'] == '/{name}'.format(name=parse.unquote(name)):
entry['etag'] = result.headers['Etag']
def get_info(self):
@ -788,12 +847,16 @@ class Proxy(proxy.Proxy):
temp_url_key = None
if container:
container_meta = self.get_container_metadata(container)
temp_url_key = (container_meta.meta_temp_url_key_2
or container_meta.meta_temp_url_key)
temp_url_key = (
container_meta.meta_temp_url_key_2
or container_meta.meta_temp_url_key
)
if not temp_url_key:
account_meta = self.get_account_metadata()
temp_url_key = (account_meta.meta_temp_url_key_2
or account_meta.meta_temp_url_key)
temp_url_key = (
account_meta.meta_temp_url_key_2
or account_meta.meta_temp_url_key
)
if temp_url_key and not isinstance(temp_url_key, bytes):
temp_url_key = temp_url_key.encode('utf8')
return temp_url_key
@ -807,12 +870,20 @@ class Proxy(proxy.Proxy):
if not temp_url_key:
raise exceptions.SDKException(
'temp_url_key was not given, nor was a temporary url key'
' found for the account or the container.')
' found for the account or the container.'
)
return temp_url_key
def generate_form_signature(
self, container, object_prefix, redirect_url, max_file_size,
max_upload_count, timeout, temp_url_key=None):
self,
container,
object_prefix,
redirect_url,
max_file_size,
max_upload_count,
timeout,
temp_url_key=None,
):
"""Generate a signature for a FormPost upload.
:param container: The value can be the name of a container or a
@ -832,33 +903,50 @@ class Proxy(proxy.Proxy):
max_file_size = int(max_file_size)
if max_file_size < 1:
raise exceptions.SDKException(
'Please use a positive max_file_size value.')
'Please use a positive max_file_size value.'
)
max_upload_count = int(max_upload_count)
if max_upload_count < 1:
raise exceptions.SDKException(
'Please use a positive max_upload_count value.')
'Please use a positive max_upload_count value.'
)
if timeout < 1:
raise exceptions.SDKException(
'Please use a positive <timeout> value.')
'Please use a positive <timeout> value.'
)
expires = int(time.time() + int(timeout))
temp_url_key = self._check_temp_url_key(container=container,
temp_url_key=temp_url_key)
temp_url_key = self._check_temp_url_key(
container=container, temp_url_key=temp_url_key
)
res = self._get_resource(_container.Container, container)
endpoint = parse.urlparse(self.get_endpoint())
path = '/'.join([endpoint.path, res.name, object_prefix])
data = '%s\n%s\n%s\n%s\n%s' % (path, redirect_url, max_file_size,
max_upload_count, expires)
data = '%s\n%s\n%s\n%s\n%s' % (
path,
redirect_url,
max_file_size,
max_upload_count,
expires,
)
data = data.encode('utf8')
sig = hmac.new(temp_url_key, data, sha1).hexdigest()
return (expires, sig)
def generate_temp_url(
self, path, seconds, method, absolute=False, prefix=False,
iso8601=False, ip_range=None, temp_url_key=None):
self,
path,
seconds,
method,
absolute=False,
prefix=False,
iso8601=False,
ip_range=None,
temp_url_key=None,
):
"""Generates a temporary URL that gives unauthenticated access to the
Swift object.
@ -894,7 +982,8 @@ class Proxy(proxy.Proxy):
formats = (
EXPIRES_ISO8601_FORMAT,
EXPIRES_ISO8601_FORMAT[:-1],
SHORT_EXPIRES_ISO8601_FORMAT)
SHORT_EXPIRES_ISO8601_FORMAT,
)
for f in formats:
try:
t = time.strptime(seconds, f)
@ -919,8 +1008,10 @@ class Proxy(proxy.Proxy):
if timestamp < 0:
raise ValueError()
except ValueError:
raise ValueError('time must either be a whole number '
'or in specific ISO 8601 format.')
raise ValueError(
'time must either be a whole number '
'or in specific ISO 8601 format.'
)
if isinstance(path, bytes):
try:
@ -931,50 +1022,61 @@ class Proxy(proxy.Proxy):
path_for_body = path
parts = path_for_body.split('/', 4)
if len(parts) != 5 or parts[0] or not all(
parts[1:(4 if prefix else 5)]):
if (
len(parts) != 5
or parts[0]
or not all(parts[1 : (4 if prefix else 5)])
):
if prefix:
raise ValueError('path must at least contain /v1/a/c/')
else:
raise ValueError('path must be full path to an object'
' e.g. /v1/a/c/o')
raise ValueError(
'path must be full path to an object' ' e.g. /v1/a/c/o'
)
standard_methods = ['GET', 'PUT', 'HEAD', 'POST', 'DELETE']
if method.upper() not in standard_methods:
self.log.warning('Non default HTTP method %s for tempurl '
'specified, possibly an error', method.upper())
self.log.warning(
'Non default HTTP method %s for tempurl '
'specified, possibly an error',
method.upper(),
)
if not absolute:
expiration = int(time.time() + timestamp)
else:
expiration = timestamp
hmac_parts = [method.upper(), str(expiration),
('prefix:' if prefix else '') + path_for_body]
hmac_parts = [
method.upper(),
str(expiration),
('prefix:' if prefix else '') + path_for_body,
]
if ip_range:
if isinstance(ip_range, bytes):
try:
ip_range = ip_range.decode('utf-8')
except UnicodeDecodeError:
raise ValueError(
'ip_range must be representable as UTF-8'
)
raise ValueError('ip_range must be representable as UTF-8')
hmac_parts.insert(0, "ip=%s" % ip_range)
hmac_body = u'\n'.join(hmac_parts)
temp_url_key = self._check_temp_url_key(temp_url_key=temp_url_key)
sig = hmac.new(temp_url_key, hmac_body.encode('utf-8'),
sha1).hexdigest()
sig = hmac.new(
temp_url_key, hmac_body.encode('utf-8'), sha1
).hexdigest()
if iso8601:
expiration = time.strftime(
EXPIRES_ISO8601_FORMAT, time.gmtime(expiration))
EXPIRES_ISO8601_FORMAT, time.gmtime(expiration)
)
temp_url = u'{path}?temp_url_sig={sig}&temp_url_expires={exp}'.format(
path=path_for_body, sig=sig, exp=expiration)
path=path_for_body, sig=sig, exp=expiration
)
if ip_range:
temp_url += u'&temp_url_ip_range={}'.format(ip_range)
@ -1020,11 +1122,7 @@ class Proxy(proxy.Proxy):
# ========== Project Cleanup ==========
def _get_cleanup_dependencies(self):
return {
'object_store': {
'before': []
}
}
return {'object_store': {'before': []}}
def _service_cleanup(
self,
@ -1032,7 +1130,7 @@ class Proxy(proxy.Proxy):
client_status_queue=None,
identified_resources=None,
filters=None,
resource_evaluation_fn=None
resource_evaluation_fn=None,
):
is_bulk_delete_supported = False
bulk_delete_max_per_request = None
@ -1044,7 +1142,8 @@ class Proxy(proxy.Proxy):
bulk_delete = caps.swift.get("bulk_delete", {})
is_bulk_delete_supported = bulk_delete is not None
bulk_delete_max_per_request = bulk_delete.get(
"max_deletes_per_request", 100)
"max_deletes_per_request", 100
)
elements = []
for cont in self.containers():
@ -1058,7 +1157,8 @@ class Proxy(proxy.Proxy):
client_status_queue=client_status_queue,
identified_resources=identified_resources,
filters=filters,
resource_evaluation_fn=resource_evaluation_fn)
resource_evaluation_fn=resource_evaluation_fn,
)
if need_delete:
if not is_bulk_delete_supported and not dry_run:
self.delete_object(obj, cont)
@ -1083,7 +1183,8 @@ class Proxy(proxy.Proxy):
client_status_queue=client_status_queue,
identified_resources=identified_resources,
filters=filters,
resource_evaluation_fn=resource_evaluation_fn)
resource_evaluation_fn=resource_evaluation_fn,
)
def _bulk_delete(self, elements, dry_run=False):
data = "\n".join([parse.quote(x) for x in elements])
@ -1093,6 +1194,6 @@ class Proxy(proxy.Proxy):
data=data,
headers={
'Content-Type': 'text/plain',
'Accept': 'application/json'
}
'Accept': 'application/json',
},
)

View File

@ -28,8 +28,9 @@ class Account(_base.BaseResource):
#: the account.
account_bytes_used = resource.Header("x-account-bytes-used", type=int)
#: The number of containers.
account_container_count = resource.Header("x-account-container-count",
type=int)
account_container_count = resource.Header(
"x-account-container-count", type=int
)
#: The number of objects in the account.
account_object_count = resource.Header("x-account-object-count", type=int)
#: The secret key value for temporary URLs. If not set,

View File

@ -25,7 +25,7 @@ class Container(_base.BaseResource):
"read_ACL": "x-container-read",
"write_ACL": "x-container-write",
"sync_to": "x-container-sync-to",
"sync_key": "x-container-sync-key"
"sync_key": "x-container-sync-key",
}
base_path = "/"
@ -38,9 +38,7 @@ class Container(_base.BaseResource):
allow_list = True
allow_head = True
_query_mapping = resource.QueryParameters(
'prefix', 'format'
)
_query_mapping = resource.QueryParameters('prefix', 'format')
# Container body data (when id=None)
#: The name of the container.
@ -54,10 +52,12 @@ class Container(_base.BaseResource):
# Container metadata (when id=name)
#: The number of objects.
object_count = resource.Header(
"x-container-object-count", type=int, alias='count')
"x-container-object-count", type=int, alias='count'
)
#: The count of bytes used in total.
bytes_used = resource.Header(
"x-container-bytes-used", type=int, alias='bytes')
"x-container-bytes-used", type=int, alias='bytes'
)
#: The timestamp of the transaction.
timestamp = resource.Header("x-timestamp")
@ -94,8 +94,9 @@ class Container(_base.BaseResource):
#: If set to true, Object Storage guesses the content type based
#: on the file extension and ignores the value sent in the
#: Content-Type header, if present. *Type: bool*
is_content_type_detected = resource.Header("x-detect-content-type",
type=bool)
is_content_type_detected = resource.Header(
"x-detect-content-type", type=bool
)
#: Storage policy used by the container.
#: It is not possible to change policy of an existing container
@ -136,9 +137,9 @@ class Container(_base.BaseResource):
:data:`Resource.allow_create` is not set to ``True``.
"""
request = self._prepare_request(
requires_id=True, prepend_key=prepend_key, base_path=base_path)
response = session.put(
request.url, headers=request.headers)
requires_id=True, prepend_key=prepend_key, base_path=base_path
)
response = session.put(request.url, headers=request.headers)
self._translate_response(response, has_body=False)
return self

View File

@ -34,8 +34,12 @@ class Info(resource.Resource):
tempurl = resource.Body("tempurl", type=dict)
def fetch(
self, session, requires_id=False,
base_path=None, skip_cache=False, error_message=None
self,
session,
requires_id=False,
base_path=None,
skip_cache=False,
error_message=None,
):
"""Get a remote resource based on this instance.
@ -64,7 +68,8 @@ class Info(resource.Resource):
session = self._get_session(session)
endpoint = urllib.parse.urlparse(session.get_endpoint())
url = "{scheme}://{netloc}/info".format(
scheme=endpoint.scheme, netloc=endpoint.netloc)
scheme=endpoint.scheme, netloc=endpoint.netloc
)
microversion = self._get_microversion(session, action='fetch')
response = session.get(url, microversion=microversion)

View File

@ -30,7 +30,7 @@ class Object(_base.BaseResource):
"is_content_type_detected": "x-detect-content-type",
"manifest": "x-object-manifest",
# Rax hack - the need CORS as different header
"access_control_allow_origin": "access-control-allow-origin"
"access_control_allow_origin": "access-control-allow-origin",
}
base_path = "/%(container)s"
@ -44,10 +44,14 @@ class Object(_base.BaseResource):
allow_head = True
_query_mapping = resource.QueryParameters(
'prefix', 'format',
'temp_url_sig', 'temp_url_expires',
'filename', 'multipart_manifest', 'symlink',
multipart_manifest='multipart-manifest'
'prefix',
'format',
'temp_url_sig',
'temp_url_expires',
'filename',
'multipart_manifest',
'symlink',
multipart_manifest='multipart-manifest',
)
# Data to be passed during a POST call to create an object on the server.
@ -117,7 +121,8 @@ class Object(_base.BaseResource):
#: size of the response body. Instead it contains the size of
#: the object, in bytes.
content_length = resource.Header(
"content-length", type=int, alias='_bytes')
"content-length", type=int, alias='_bytes'
)
#: The MIME type of the object.
content_type = resource.Header("content-type", alias="_content_type")
#: The type of ranges that the object accepts.
@ -136,8 +141,9 @@ class Object(_base.BaseResource):
etag = resource.Header("etag", alias='_hash')
#: Set to True if this object is a static large object manifest object.
#: *Type: bool*
is_static_large_object = resource.Header("x-static-large-object",
type=bool)
is_static_large_object = resource.Header(
"x-static-large-object", type=bool
)
#: If set, the value of the Content-Encoding metadata.
#: If not set, this header is not returned by this operation.
content_encoding = resource.Header("content-encoding")
@ -164,9 +170,8 @@ class Object(_base.BaseResource):
#: The date and time that the object was created or the last
#: time that the metadata was changed.
last_modified_at = resource.Header(
"last-modified",
alias='_last_modified',
aka='updated_at')
"last-modified", alias='_last_modified', aka='updated_at'
)
# Headers for PUT and POST requests
#: Set to chunked to enable chunked transfer encoding. If used,
@ -175,8 +180,9 @@ class Object(_base.BaseResource):
#: If set to true, Object Storage guesses the content type based
#: on the file extension and ignores the value sent in the
#: Content-Type header, if present. *Type: bool*
is_content_type_detected = resource.Header("x-detect-content-type",
type=bool)
is_content_type_detected = resource.Header(
"x-detect-content-type", type=bool
)
#: If set, this is the name of an object used to create the new
#: object by copying the X-Copy-From object. The value is in form
#: {container}/{object}. You must UTF-8-encode and then URL-encode
@ -195,7 +201,8 @@ class Object(_base.BaseResource):
#: CORS for RAX (deviating from standard)
access_control_allow_origin = resource.Header(
"access-control-allow-origin")
"access-control-allow-origin"
)
has_body = False
@ -209,8 +216,9 @@ class Object(_base.BaseResource):
def set_metadata(self, session, metadata):
# Filter out items with empty values so the create metadata behaviour
# is the same as account and container
filtered_metadata = \
{key: value for key, value in metadata.items() if value}
filtered_metadata = {
key: value for key, value in metadata.items() if value
}
# Update from remote if we only have locally created information
if not self.last_modified_at:
@ -281,9 +289,11 @@ class Object(_base.BaseResource):
request = self._prepare_request()
response = session.post(
request.url, headers=self._calculate_headers(metadata))
request.url, headers=self._calculate_headers(metadata)
)
exceptions.raise_from_response(
response, error_message="Error deleting metadata keys")
response, error_message="Error deleting metadata keys"
)
# Only delete from local object if the remote delete was successful
for key in attr_keys_to_delete:
@ -296,7 +306,8 @@ class Object(_base.BaseResource):
request = self._prepare_request()
response = session.get(
request.url, headers=request.headers, stream=stream)
request.url, headers=request.headers, stream=stream
)
exceptions.raise_from_response(response, error_message=error_message)
return response
@ -306,16 +317,15 @@ class Object(_base.BaseResource):
def stream(self, session, error_message=None, chunk_size=1024):
response = self._download(
session, error_message=error_message, stream=True)
session, error_message=error_message, stream=True
)
return response.iter_content(chunk_size, decode_unicode=False)
def create(self, session, base_path=None, **params):
request = self._prepare_request(base_path=base_path)
response = session.put(
request.url,
data=self.data,
headers=request.headers
request.url, data=self.data, headers=request.headers
)
self._translate_response(response, has_body=False)
return self
@ -339,6 +349,5 @@ class Object(_base.BaseResource):
headers['multipart-manifest'] = 'delete'
return session.delete(
request.url,
headers=headers,
microversion=microversion)
request.url, headers=headers, microversion=microversion
)

View File

@ -14,7 +14,6 @@ from openstack.tests.functional import base
class TestAccount(base.BaseFunctionalTest):
def setUp(self):
super(TestAccount, self).setUp()
self.require_service('object-store')

View File

@ -15,7 +15,6 @@ from openstack.tests.functional import base
class TestContainer(base.BaseFunctionalTest):
def setUp(self):
super(TestContainer, self).setUp()
self.require_service('object-store')
@ -24,7 +23,9 @@ class TestContainer(base.BaseFunctionalTest):
container = self.conn.object_store.create_container(name=self.NAME)
self.addEmptyCleanup(
self.conn.object_store.delete_container,
self.NAME, ignore_missing=False)
self.NAME,
ignore_missing=False,
)
assert isinstance(container, _container.Container)
self.assertEqual(self.NAME, container.name)
@ -43,21 +44,24 @@ class TestContainer(base.BaseFunctionalTest):
self.assertIsNone(container.read_ACL)
self.assertIsNone(container.write_ACL)
self.conn.object_store.set_container_metadata(
container, read_ACL='.r:*', write_ACL='demo:demo')
container, read_ACL='.r:*', write_ACL='demo:demo'
)
container = self.conn.object_store.get_container_metadata(self.NAME)
self.assertEqual('.r:*', container.read_ACL)
self.assertEqual('demo:demo', container.write_ACL)
# update system metadata
self.conn.object_store.set_container_metadata(
container, read_ACL='.r:demo')
container, read_ACL='.r:demo'
)
container = self.conn.object_store.get_container_metadata(self.NAME)
self.assertEqual('.r:demo', container.read_ACL)
self.assertEqual('demo:demo', container.write_ACL)
# set system metadata and custom metadata
self.conn.object_store.set_container_metadata(
container, k0='v0', sync_key='1234')
container, k0='v0', sync_key='1234'
)
container = self.conn.object_store.get_container_metadata(self.NAME)
self.assertTrue(container.metadata)
self.assertIn('k0', container.metadata)
@ -67,8 +71,9 @@ class TestContainer(base.BaseFunctionalTest):
self.assertEqual('1234', container.sync_key)
# unset system metadata
self.conn.object_store.delete_container_metadata(container,
['sync_key'])
self.conn.object_store.delete_container_metadata(
container, ['sync_key']
)
container = self.conn.object_store.get_container_metadata(self.NAME)
self.assertTrue(container.metadata)
self.assertIn('k0', container.metadata)

View File

@ -26,19 +26,25 @@ class TestObject(base.BaseFunctionalTest):
self.conn.object_store.create_container(name=self.FOLDER)
self.addCleanup(self.conn.object_store.delete_container, self.FOLDER)
self.sot = self.conn.object_store.upload_object(
container=self.FOLDER, name=self.FILE, data=self.DATA)
container=self.FOLDER, name=self.FILE, data=self.DATA
)
self.addEmptyCleanup(
self.conn.object_store.delete_object, self.sot,
ignore_missing=False)
self.conn.object_store.delete_object,
self.sot,
ignore_missing=False,
)
def test_list(self):
names = [o.name for o
in self.conn.object_store.objects(container=self.FOLDER)]
names = [
o.name
for o in self.conn.object_store.objects(container=self.FOLDER)
]
self.assertIn(self.FILE, names)
def test_download_object(self):
result = self.conn.object_store.download_object(
self.FILE, container=self.FOLDER)
self.FILE, container=self.FOLDER
)
self.assertEqual(self.DATA, result)
result = self.conn.object_store.download_object(self.sot)
self.assertEqual(self.DATA, result)
@ -46,25 +52,29 @@ class TestObject(base.BaseFunctionalTest):
def test_system_metadata(self):
# get system metadata
obj = self.conn.object_store.get_object_metadata(
self.FILE, container=self.FOLDER)
self.FILE, container=self.FOLDER
)
# TODO(shade) obj.bytes is coming up None on python3 but not python2
# self.assertGreaterEqual(0, obj.bytes)
self.assertIsNotNone(obj.etag)
# set system metadata
obj = self.conn.object_store.get_object_metadata(
self.FILE, container=self.FOLDER)
self.FILE, container=self.FOLDER
)
self.assertIsNone(obj.content_disposition)
self.assertIsNone(obj.content_encoding)
self.conn.object_store.set_object_metadata(
obj, content_disposition='attachment', content_encoding='gzip')
obj, content_disposition='attachment', content_encoding='gzip'
)
obj = self.conn.object_store.get_object_metadata(obj)
self.assertEqual('attachment', obj.content_disposition)
self.assertEqual('gzip', obj.content_encoding)
# update system metadata
self.conn.object_store.set_object_metadata(
obj, content_encoding='deflate')
obj, content_encoding='deflate'
)
obj = self.conn.object_store.get_object_metadata(obj)
self.assertEqual('attachment', obj.content_disposition)
self.assertEqual('deflate', obj.content_encoding)
@ -79,7 +89,8 @@ class TestObject(base.BaseFunctionalTest):
# unset more system metadata
self.conn.object_store.delete_object_metadata(
obj, keys=['content_disposition'])
obj, keys=['content_disposition']
)
obj = self.conn.object_store.get_object_metadata(obj)
self.assertIn('k0', obj.metadata)
self.assertEqual('v0', obj.metadata['k0'])
@ -90,7 +101,8 @@ class TestObject(base.BaseFunctionalTest):
def test_custom_metadata(self):
# get custom metadata
obj = self.conn.object_store.get_object_metadata(
self.FILE, container=self.FOLDER)
self.FILE, container=self.FOLDER
)
self.assertFalse(obj.metadata)
# set no custom metadata
@ -112,8 +124,9 @@ class TestObject(base.BaseFunctionalTest):
self.assertEqual('v1', obj.metadata['k1'])
# set more custom metadata by named object and container
self.conn.object_store.set_object_metadata(self.FILE, self.FOLDER,
k2='v2')
self.conn.object_store.set_object_metadata(
self.FILE, self.FOLDER, k2='v2'
)
obj = self.conn.object_store.get_object_metadata(obj)
self.assertTrue(obj.metadata)
self.assertEqual(2, len(obj.metadata))

View File

@ -24,12 +24,11 @@ ACCOUNT_EXAMPLE = {
'x-account-container-count': '678',
'content-type': 'text/plain; charset=utf-8',
'x-account-object-count': '98765',
'x-timestamp': '1453413555.88937'
'x-timestamp': '1453413555.88937',
}
class TestAccount(base.TestCase):
def setUp(self):
super(TestAccount, self).setUp()
self.endpoint = self.cloud.object_store.get_endpoint() + '/'
@ -49,28 +48,41 @@ class TestAccount(base.TestCase):
def test_make_it(self):
sot = account.Account(**ACCOUNT_EXAMPLE)
self.assertIsNone(sot.id)
self.assertEqual(int(ACCOUNT_EXAMPLE['x-account-bytes-used']),
sot.account_bytes_used)
self.assertEqual(int(ACCOUNT_EXAMPLE['x-account-container-count']),
sot.account_container_count)
self.assertEqual(int(ACCOUNT_EXAMPLE['x-account-object-count']),
sot.account_object_count)
self.assertEqual(
int(ACCOUNT_EXAMPLE['x-account-bytes-used']),
sot.account_bytes_used,
)
self.assertEqual(
int(ACCOUNT_EXAMPLE['x-account-container-count']),
sot.account_container_count,
)
self.assertEqual(
int(ACCOUNT_EXAMPLE['x-account-object-count']),
sot.account_object_count,
)
self.assertEqual(ACCOUNT_EXAMPLE['x-timestamp'], sot.timestamp)
def test_set_temp_url_key(self):
sot = account.Account()
key = 'super-secure-key'
self.register_uris([
dict(method='POST', uri=self.endpoint,
status_code=204,
validate=dict(
headers={
'x-account-meta-temp-url-key': key})),
dict(method='HEAD', uri=self.endpoint,
headers={
'x-account-meta-temp-url-key': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.endpoint,
status_code=204,
validate=dict(
headers={'x-account-meta-temp-url-key': key}
),
),
dict(
method='HEAD',
uri=self.endpoint,
headers={'x-account-meta-temp-url-key': key},
),
]
)
sot.set_temp_url_key(self.cloud.object_store, key)
self.assert_calls()
@ -78,15 +90,22 @@ class TestAccount(base.TestCase):
sot = account.Account()
key = 'super-secure-key'
self.register_uris([
dict(method='POST', uri=self.endpoint,
status_code=204,
validate=dict(
headers={
'x-account-meta-temp-url-key-2': key})),
dict(method='HEAD', uri=self.endpoint,
headers={
'x-account-meta-temp-url-key-2': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.endpoint,
status_code=204,
validate=dict(
headers={'x-account-meta-temp-url-key-2': key}
),
),
dict(
method='HEAD',
uri=self.endpoint,
headers={'x-account-meta-temp-url-key-2': key},
),
]
)
sot.set_temp_url_key(self.cloud.object_store, key, secondary=True)
self.assert_calls()

View File

@ -17,13 +17,13 @@ from openstack.tests.unit import base
class TestContainer(base.TestCase):
def setUp(self):
super(TestContainer, self).setUp()
self.container = self.getUniqueString()
self.endpoint = self.cloud.object_store.get_endpoint() + '/'
self.container_endpoint = '{endpoint}{container}'.format(
endpoint=self.endpoint, container=self.container)
endpoint=self.endpoint, container=self.container
)
self.body = {
"count": 2,
@ -42,7 +42,7 @@ class TestContainer(base.TestCase):
'x-history-location': 'history-location',
'content-type': 'application/json; charset=utf-8',
'x-timestamp': '1453414055.48672',
'x-storage-policy': 'Gold'
'x-storage-policy': 'Gold',
}
self.body_plus_headers = dict(self.body, **self.headers)
@ -81,49 +81,44 @@ class TestContainer(base.TestCase):
# Attributes from header
self.assertEqual(
int(self.body_plus_headers['x-container-object-count']),
sot.object_count)
sot.object_count,
)
self.assertEqual(
int(self.body_plus_headers['x-container-bytes-used']),
sot.bytes_used)
sot.bytes_used,
)
self.assertEqual(
self.body_plus_headers['x-container-read'],
sot.read_ACL)
self.body_plus_headers['x-container-read'], sot.read_ACL
)
self.assertEqual(
self.body_plus_headers['x-container-write'],
sot.write_ACL)
self.body_plus_headers['x-container-write'], sot.write_ACL
)
self.assertEqual(
self.body_plus_headers['x-container-sync-to'],
sot.sync_to)
self.body_plus_headers['x-container-sync-to'], sot.sync_to
)
self.assertEqual(
self.body_plus_headers['x-container-sync-key'],
sot.sync_key)
self.body_plus_headers['x-container-sync-key'], sot.sync_key
)
self.assertEqual(
self.body_plus_headers['x-versions-location'],
sot.versions_location)
sot.versions_location,
)
self.assertEqual(
self.body_plus_headers['x-history-location'],
sot.history_location)
self.body_plus_headers['x-history-location'], sot.history_location
)
self.assertEqual(self.body_plus_headers['x-timestamp'], sot.timestamp)
self.assertEqual(self.body_plus_headers['x-storage-policy'],
sot.storage_policy)
self.assertEqual(
self.body_plus_headers['x-storage-policy'], sot.storage_policy
)
def test_list(self):
containers = [
{
"count": 999,
"bytes": 12345,
"name": "container1"
},
{
"count": 888,
"bytes": 54321,
"name": "container2"
}
{"count": 999, "bytes": 12345, "name": "container1"},
{"count": 888, "bytes": 54321, "name": "container2"},
]
self.register_uris([
dict(method='GET', uri=self.endpoint,
json=containers)
])
self.register_uris(
[dict(method='GET', uri=self.endpoint, json=containers)]
)
response = container.Container.list(self.cloud.object_store)
@ -144,25 +139,32 @@ class TestContainer(base.TestCase):
"x-container-read": "some ACL",
"x-container-write": "another ACL",
"x-detect-content-type": 'True',
"X-Container-Meta-foo": "bar"
"X-Container-Meta-foo": "bar",
}
self.register_uris([
dict(method=sess_method, uri=self.container_endpoint,
json=self.body,
validate=dict(headers=headers)),
])
self.register_uris(
[
dict(
method=sess_method,
uri=self.container_endpoint,
json=self.body,
validate=dict(headers=headers),
),
]
)
sot_call(self.cloud.object_store)
self.assert_calls()
def test_create(self):
sot = container.Container.new(
name=self.container, metadata={'foo': 'bar'})
name=self.container, metadata={'foo': 'bar'}
)
self._test_create_update(sot, sot.create, 'PUT')
def test_commit(self):
sot = container.Container.new(
name=self.container, metadata={'foo': 'bar'})
name=self.container, metadata={'foo': 'bar'}
)
self._test_create_update(sot, sot.commit, 'POST')
def test_to_dict_recursion(self):
@ -200,15 +202,22 @@ class TestContainer(base.TestCase):
'versions_location': None,
'history_location': None,
'write_ACL': None,
'storage_policy': None
}, json.loads(json.dumps(sot)))
'storage_policy': None,
},
json.loads(json.dumps(sot)),
)
def _test_no_headers(self, sot, sot_call, sess_method):
headers = {}
self.register_uris([
dict(method=sess_method, uri=self.container_endpoint,
validate=dict(headers=headers))
])
self.register_uris(
[
dict(
method=sess_method,
uri=self.container_endpoint,
validate=dict(headers=headers),
)
]
)
sot_call(self.cloud.object_store)
def test_create_no_headers(self):
@ -225,16 +234,23 @@ class TestContainer(base.TestCase):
sot = container.Container.new(name=self.container)
key = self.getUniqueString()
self.register_uris([
dict(method='POST', uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={
'x-container-meta-temp-url-key': key})),
dict(method='HEAD', uri=self.container_endpoint,
headers={
'x-container-meta-temp-url-key': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={'x-container-meta-temp-url-key': key}
),
),
dict(
method='HEAD',
uri=self.container_endpoint,
headers={'x-container-meta-temp-url-key': key},
),
]
)
sot.set_temp_url_key(self.cloud.object_store, key)
self.assert_calls()
@ -242,15 +258,22 @@ class TestContainer(base.TestCase):
sot = container.Container.new(name=self.container)
key = self.getUniqueString()
self.register_uris([
dict(method='POST', uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={
'x-container-meta-temp-url-key-2': key})),
dict(method='HEAD', uri=self.container_endpoint,
headers={
'x-container-meta-temp-url-key-2': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={'x-container-meta-temp-url-key-2': key}
),
),
dict(
method='HEAD',
uri=self.container_endpoint,
headers={'x-container-meta-temp-url-key-2': key},
),
]
)
sot.set_temp_url_key(self.cloud.object_store, key, secondary=True)
self.assert_calls()

View File

@ -27,7 +27,6 @@ from openstack.tests.unit.cloud import test_object as base_test_object
class TestObject(base_test_object.BaseTestObject):
def setUp(self):
super(TestObject, self).setUp()
self.the_data = b'test body'
@ -39,7 +38,7 @@ class TestObject(base_test_object.BaseTestObject):
"last_modified": "2014-07-13T18:41:03.319240",
"bytes": self.the_data_length,
"name": self.object,
"content_type": "application/octet-stream"
"content_type": "application/octet-stream",
}
self.headers = {
'Content-Length': str(len(self.the_data)),
@ -78,9 +77,9 @@ class TestObject(base_test_object.BaseTestObject):
'prefix': 'prefix',
'symlink': 'symlink',
'temp_url_expires': 'temp_url_expires',
'temp_url_sig': 'temp_url_sig'
'temp_url_sig': 'temp_url_sig',
},
sot._query_mapping._mapping
sot._query_mapping._mapping,
)
def test_new(self):
@ -95,8 +94,7 @@ class TestObject(base_test_object.BaseTestObject):
# Attributes from header
self.assertEqual(self.container, sot.container)
self.assertEqual(
int(self.body['bytes']), sot.content_length)
self.assertEqual(int(self.body['bytes']), sot.content_length)
self.assertEqual(self.body['last_modified'], sot.last_modified_at)
self.assertEqual(self.body['hash'], sot.etag)
self.assertEqual(self.body['content_type'], sot.content_type)
@ -108,7 +106,8 @@ class TestObject(base_test_object.BaseTestObject):
# Attributes from header
self.assertEqual(self.container, sot.container)
self.assertEqual(
int(self.headers['Content-Length']), sot.content_length)
int(self.headers['Content-Length']), sot.content_length
)
self.assertEqual(self.headers['Accept-Ranges'], sot.accept_ranges)
self.assertEqual(self.headers['Last-Modified'], sot.last_modified_at)
self.assertEqual(self.headers['Etag'], sot.etag)
@ -129,16 +128,19 @@ class TestObject(base_test_object.BaseTestObject):
headers = {
'X-Newest': 'True',
'If-Match': self.headers['Etag'],
'Accept': '*/*'
'Accept': '*/*',
}
self.register_uris([
dict(method='GET', uri=self.object_endpoint,
headers=self.headers,
content=self.the_data,
validate=dict(
headers=headers
))
])
self.register_uris(
[
dict(
method='GET',
uri=self.object_endpoint,
headers=self.headers,
content=self.the_data,
validate=dict(headers=headers),
)
]
)
sot = obj.Object.new(container=self.container, name=self.object)
sot.is_newest = True
# if_match is a list type, but we're passing a string. This tests
@ -153,19 +155,23 @@ class TestObject(base_test_object.BaseTestObject):
def _test_create(self, method, data):
sot = obj.Object.new(
container=self.container, name=self.object,
data=data, metadata={'foo': 'bar'})
container=self.container,
name=self.object,
data=data,
metadata={'foo': 'bar'},
)
sot.is_newest = True
sent_headers = {
"x-newest": 'True',
"X-Object-Meta-foo": "bar"
}
self.register_uris([
dict(method=method, uri=self.object_endpoint,
headers=self.headers,
validate=dict(
headers=sent_headers))
])
sent_headers = {"x-newest": 'True', "X-Object-Meta-foo": "bar"}
self.register_uris(
[
dict(
method=method,
uri=self.object_endpoint,
headers=self.headers,
validate=dict(headers=sent_headers),
)
]
)
rv = sot.create(self.cloud.object_store)
self.assertEqual(rv.etag, self.headers['Etag'])

View File

@ -47,24 +47,30 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
self.container = self.getUniqueString()
self.endpoint = self.cloud.object_store.get_endpoint() + '/'
self.container_endpoint = '{endpoint}{container}'.format(
endpoint=self.endpoint, container=self.container)
endpoint=self.endpoint, container=self.container
)
def test_account_metadata_get(self):
self.verify_head(
self.proxy.get_account_metadata, account.Account,
method_args=[])
self.proxy.get_account_metadata, account.Account, method_args=[]
)
def test_container_metadata_get(self):
self.verify_head(self.proxy.get_container_metadata,
container.Container, method_args=["container"])
self.verify_head(
self.proxy.get_container_metadata,
container.Container,
method_args=["container"],
)
def test_container_delete(self):
self.verify_delete(self.proxy.delete_container,
container.Container, False)
self.verify_delete(
self.proxy.delete_container, container.Container, False
)
def test_container_delete_ignore(self):
self.verify_delete(self.proxy.delete_container,
container.Container, True)
self.verify_delete(
self.proxy.delete_container, container.Container, True
)
def test_container_create_attrs(self):
self.verify_create(
@ -72,7 +78,8 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
container.Container,
method_args=['container_name'],
expected_args=[],
expected_kwargs={'name': 'container_name', "x": 1, "y": 2, "z": 3})
expected_kwargs={'name': 'container_name', "x": 1, "y": 2, "z": 3},
)
def test_object_metadata_get(self):
self._verify(
@ -81,7 +88,8 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
method_args=['object'],
method_kwargs={'container': 'container'},
expected_args=[obj.Object, 'object'],
expected_kwargs={'container': 'container'})
expected_kwargs={'container': 'container'},
)
def _test_object_delete(self, ignore):
expected_kwargs = {
@ -95,7 +103,8 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
method_args=["resource"],
method_kwargs=expected_kwargs,
expected_args=[obj.Object, "resource"],
expected_kwargs=expected_kwargs)
expected_kwargs=expected_kwargs,
)
def test_object_delete(self):
self._test_object_delete(False)
@ -108,7 +117,7 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
"name": "test",
"data": "data",
"container": "name",
"metadata": {}
"metadata": {},
}
self._verify(
@ -116,52 +125,57 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
self.proxy.upload_object,
method_kwargs=kwargs,
expected_args=[obj.Object],
expected_kwargs=kwargs)
expected_kwargs=kwargs,
)
def test_object_create_no_container(self):
self.assertRaises(TypeError, self.proxy.upload_object)
def test_object_get(self):
with requests_mock.Mocker() as m:
m.get("%scontainer/object" % self.endpoint,
text="data")
m.get("%scontainer/object" % self.endpoint, text="data")
res = self.proxy.get_object("object", container="container")
self.assertIsNone(res.data)
def test_object_get_write_file(self):
with requests_mock.Mocker() as m:
m.get("%scontainer/object" % self.endpoint,
text="data")
m.get("%scontainer/object" % self.endpoint, text="data")
with tempfile.NamedTemporaryFile() as f:
self.proxy.get_object(
"object", container="container",
outfile=f.name)
"object", container="container", outfile=f.name
)
dt = open(f.name).read()
self.assertEqual(dt, "data")
def test_object_get_remember_content(self):
with requests_mock.Mocker() as m:
m.get("%scontainer/object" % self.endpoint,
text="data")
m.get("%scontainer/object" % self.endpoint, text="data")
res = self.proxy.get_object(
"object", container="container",
remember_content=True)
"object", container="container", remember_content=True
)
self.assertEqual(res.data, "data")
def test_set_temp_url_key(self):
key = 'super-secure-key'
self.register_uris([
dict(method='POST', uri=self.endpoint,
status_code=204,
validate=dict(
headers={
'x-account-meta-temp-url-key': key})),
dict(method='HEAD', uri=self.endpoint,
headers={
'x-account-meta-temp-url-key': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.endpoint,
status_code=204,
validate=dict(
headers={'x-account-meta-temp-url-key': key}
),
),
dict(
method='HEAD',
uri=self.endpoint,
headers={'x-account-meta-temp-url-key': key},
),
]
)
self.proxy.set_account_temp_url_key(key)
self.assert_calls()
@ -169,16 +183,23 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
key = 'super-secure-key'
self.register_uris([
dict(method='POST', uri=self.endpoint,
status_code=204,
validate=dict(
headers={
'x-account-meta-temp-url-key-2': key})),
dict(method='HEAD', uri=self.endpoint,
headers={
'x-account-meta-temp-url-key-2': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.endpoint,
status_code=204,
validate=dict(
headers={'x-account-meta-temp-url-key-2': key}
),
),
dict(
method='HEAD',
uri=self.endpoint,
headers={'x-account-meta-temp-url-key-2': key},
),
]
)
self.proxy.set_account_temp_url_key(key, secondary=True)
self.assert_calls()
@ -186,16 +207,23 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
key = 'super-secure-key'
self.register_uris([
dict(method='POST', uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={
'x-container-meta-temp-url-key': key})),
dict(method='HEAD', uri=self.container_endpoint,
headers={
'x-container-meta-temp-url-key': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={'x-container-meta-temp-url-key': key}
),
),
dict(
method='HEAD',
uri=self.container_endpoint,
headers={'x-container-meta-temp-url-key': key},
),
]
)
self.proxy.set_container_temp_url_key(self.container, key)
self.assert_calls()
@ -203,18 +231,26 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
key = 'super-secure-key'
self.register_uris([
dict(method='POST', uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={
'x-container-meta-temp-url-key-2': key})),
dict(method='HEAD', uri=self.container_endpoint,
headers={
'x-container-meta-temp-url-key-2': key}),
])
self.register_uris(
[
dict(
method='POST',
uri=self.container_endpoint,
status_code=204,
validate=dict(
headers={'x-container-meta-temp-url-key-2': key}
),
),
dict(
method='HEAD',
uri=self.container_endpoint,
headers={'x-container-meta-temp-url-key-2': key},
),
]
)
self.proxy.set_container_temp_url_key(
self.container, key, secondary=True)
self.container, key, secondary=True
)
self.assert_calls()
def test_copy_object(self):
@ -222,9 +258,10 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
def test_file_segment(self):
file_size = 4200
content = ''.join(random.choice(
string.ascii_uppercase + string.digits)
for _ in range(file_size)).encode('latin-1')
content = ''.join(
random.choice(string.ascii_uppercase + string.digits)
for _ in range(file_size)
).encode('latin-1')
self.imagefile = tempfile.NamedTemporaryFile(delete=False)
self.imagefile.write(content)
self.imagefile.close()
@ -233,50 +270,60 @@ class TestObjectStoreProxy(test_proxy_base.TestProxyBase):
endpoint='test_container/test_image',
filename=self.imagefile.name,
file_size=file_size,
segment_size=1000)
segment_size=1000,
)
self.assertEqual(len(segments), 5)
segment_content = b''
for (index, (name, segment)) in enumerate(segments.items()):
self.assertEqual(
'test_container/test_image/{index:0>6}'.format(index=index),
name)
name,
)
segment_content += segment.read()
self.assertEqual(content, segment_content)
class TestDownloadObject(base_test_object.BaseTestObject):
def setUp(self):
super(TestDownloadObject, self).setUp()
self.the_data = b'test body'
self.register_uris([
dict(method='GET', uri=self.object_endpoint,
headers={
'Content-Length': str(len(self.the_data)),
'Content-Type': 'application/octet-stream',
'Accept-Ranges': 'bytes',
'Last-Modified': 'Thu, 15 Dec 2016 13:34:14 GMT',
'Etag': '"b5c454b44fbd5344793e3fb7e3850768"',
'X-Timestamp': '1481808853.65009',
'X-Trans-Id': 'tx68c2a2278f0c469bb6de1-005857ed80dfw1',
'Date': 'Mon, 19 Dec 2016 14:24:00 GMT',
'X-Static-Large-Object': 'True',
'X-Object-Meta-Mtime': '1481513709.168512',
},
content=self.the_data)])
self.register_uris(
[
dict(
method='GET',
uri=self.object_endpoint,
headers={
'Content-Length': str(len(self.the_data)),
'Content-Type': 'application/octet-stream',
'Accept-Ranges': 'bytes',
'Last-Modified': 'Thu, 15 Dec 2016 13:34:14 GMT',
'Etag': '"b5c454b44fbd5344793e3fb7e3850768"',
'X-Timestamp': '1481808853.65009',
'X-Trans-Id': 'tx68c2a2278f0c469bb6de1-005857ed80dfw1',
'Date': 'Mon, 19 Dec 2016 14:24:00 GMT',
'X-Static-Large-Object': 'True',
'X-Object-Meta-Mtime': '1481513709.168512',
},
content=self.the_data,
)
]
)
def test_download(self):
data = self.cloud.object_store.download_object(
self.object, container=self.container)
self.object, container=self.container
)
self.assertEqual(data, self.the_data)
self.assert_calls()
def test_stream(self):
chunk_size = 2
for index, chunk in enumerate(self.cloud.object_store.stream_object(
self.object, container=self.container,
chunk_size=chunk_size)):
for index, chunk in enumerate(
self.cloud.object_store.stream_object(
self.object, container=self.container, chunk_size=chunk_size
)
):
chunk_len = len(chunk)
start = index * chunk_size
end = start + chunk_len
@ -290,12 +337,17 @@ class TestExtractName(TestObjectStoreProxy):
scenarios = [
('discovery', dict(url='/', parts=['account'])),
('endpoints', dict(url='/endpoints', parts=['endpoints'])),
('container', dict(url='/AUTH_123/container_name',
parts=['container'])),
('object', dict(url='/container_name/object_name',
parts=['object'])),
('object_long', dict(url='/v1/AUTH_123/cnt/path/deep/object_name',
parts=['object']))
(
'container',
dict(url='/AUTH_123/container_name', parts=['container']),
),
('object', dict(url='/container_name/object_name', parts=['object'])),
(
'object_long',
dict(
url='/v1/AUTH_123/cnt/path/deep/object_name', parts=['object']
),
),
]
def test_extract_name(self):
@ -307,36 +359,44 @@ class TestExtractName(TestObjectStoreProxy):
class TestTempURL(TestObjectStoreProxy):
expires_iso8601_format = '%Y-%m-%dT%H:%M:%SZ'
short_expires_iso8601_format = '%Y-%m-%d'
time_errmsg = ('time must either be a whole number or in specific '
'ISO 8601 format.')
time_errmsg = (
'time must either be a whole number or in specific ' 'ISO 8601 format.'
)
path_errmsg = 'path must be full path to an object e.g. /v1/a/c/o'
url = '/v1/AUTH_account/c/o'
seconds = 3600
key = 'correcthorsebatterystaple'
method = 'GET'
expected_url = url + ('?temp_url_sig=temp_url_signature'
'&temp_url_expires=1400003600')
expected_body = '\n'.join([
method,
'1400003600',
url,
]).encode('utf-8')
expected_url = url + (
'?temp_url_sig=temp_url_signature' '&temp_url_expires=1400003600'
)
expected_body = '\n'.join(
[
method,
'1400003600',
url,
]
).encode('utf-8')
@mock.patch('hmac.HMAC')
@mock.patch('time.time', return_value=1400000000)
def test_generate_temp_url(self, time_mock, hmac_mock):
hmac_mock().hexdigest.return_value = 'temp_url_signature'
url = self.proxy.generate_temp_url(
self.url, self.seconds, self.method, temp_url_key=self.key)
self.url, self.seconds, self.method, temp_url_key=self.key
)
key = self.key
if not isinstance(key, bytes):
key = key.encode('utf-8')
self.assertEqual(url, self.expected_url)
self.assertEqual(hmac_mock.mock_calls, [
mock.call(),
mock.call(key, self.expected_body, sha1),
mock.call().hexdigest(),
])
self.assertEqual(
hmac_mock.mock_calls,
[
mock.call(),
mock.call(key, self.expected_body, sha1),
mock.call().hexdigest(),
],
)
self.assertIsInstance(url, type(self.url))
@mock.patch('hmac.HMAC')
@ -344,62 +404,83 @@ class TestTempURL(TestObjectStoreProxy):
def test_generate_temp_url_ip_range(self, time_mock, hmac_mock):
hmac_mock().hexdigest.return_value = 'temp_url_signature'
ip_ranges = [
'1.2.3.4', '1.2.3.4/24', '2001:db8::',
b'1.2.3.4', b'1.2.3.4/24', b'2001:db8::',
'1.2.3.4',
'1.2.3.4/24',
'2001:db8::',
b'1.2.3.4',
b'1.2.3.4/24',
b'2001:db8::',
]
path = '/v1/AUTH_account/c/o/'
expected_url = path + ('?temp_url_sig=temp_url_signature'
'&temp_url_expires=1400003600'
'&temp_url_ip_range=')
expected_url = path + (
'?temp_url_sig=temp_url_signature'
'&temp_url_expires=1400003600'
'&temp_url_ip_range='
)
for ip_range in ip_ranges:
hmac_mock.reset_mock()
url = self.proxy.generate_temp_url(
path, self.seconds, self.method,
temp_url_key=self.key, ip_range=ip_range)
path,
self.seconds,
self.method,
temp_url_key=self.key,
ip_range=ip_range,
)
key = self.key
if not isinstance(key, bytes):
key = key.encode('utf-8')
if isinstance(ip_range, bytes):
ip_range_expected_url = (
expected_url + ip_range.decode('utf-8')
)
expected_body = '\n'.join([
'ip=' + ip_range.decode('utf-8'),
self.method,
'1400003600',
path,
]).encode('utf-8')
ip_range_expected_url = expected_url + ip_range.decode('utf-8')
expected_body = '\n'.join(
[
'ip=' + ip_range.decode('utf-8'),
self.method,
'1400003600',
path,
]
).encode('utf-8')
else:
ip_range_expected_url = expected_url + ip_range
expected_body = '\n'.join([
'ip=' + ip_range,
self.method,
'1400003600',
path,
]).encode('utf-8')
expected_body = '\n'.join(
[
'ip=' + ip_range,
self.method,
'1400003600',
path,
]
).encode('utf-8')
self.assertEqual(url, ip_range_expected_url)
self.assertEqual(hmac_mock.mock_calls, [
mock.call(key, expected_body, sha1),
mock.call().hexdigest(),
])
self.assertEqual(
hmac_mock.mock_calls,
[
mock.call(key, expected_body, sha1),
mock.call().hexdigest(),
],
)
self.assertIsInstance(url, type(path))
@mock.patch('hmac.HMAC')
def test_generate_temp_url_iso8601_argument(self, hmac_mock):
hmac_mock().hexdigest.return_value = 'temp_url_signature'
url = self.proxy.generate_temp_url(
self.url, '2014-05-13T17:53:20Z', self.method,
temp_url_key=self.key)
self.url,
'2014-05-13T17:53:20Z',
self.method,
temp_url_key=self.key,
)
self.assertEqual(url, self.expected_url)
# Don't care about absolute arg.
url = self.proxy.generate_temp_url(self.url, '2014-05-13T17:53:20Z',
self.method,
temp_url_key=self.key,
absolute=True)
url = self.proxy.generate_temp_url(
self.url,
'2014-05-13T17:53:20Z',
self.method,
temp_url_key=self.key,
absolute=True,
)
self.assertEqual(url, self.expected_url)
lt = time.localtime()
@ -407,14 +488,16 @@ class TestTempURL(TestObjectStoreProxy):
if not isinstance(self.expected_url, str):
expected_url = self.expected_url.replace(
b'1400003600', bytes(str(int(time.mktime(lt))),
encoding='ascii'))
b'1400003600',
bytes(str(int(time.mktime(lt))), encoding='ascii'),
)
else:
expected_url = self.expected_url.replace(
'1400003600', str(int(time.mktime(lt))))
url = self.proxy.generate_temp_url(self.url, expires,
self.method,
temp_url_key=self.key)
'1400003600', str(int(time.mktime(lt)))
)
url = self.proxy.generate_temp_url(
self.url, expires, self.method, temp_url_key=self.key
)
self.assertEqual(url, expected_url)
expires = time.strftime(self.short_expires_iso8601_format, lt)
@ -422,39 +505,48 @@ class TestTempURL(TestObjectStoreProxy):
if not isinstance(self.expected_url, str):
expected_url = self.expected_url.replace(
b'1400003600', bytes(str(int(time.mktime(lt))),
encoding='ascii'))
b'1400003600',
bytes(str(int(time.mktime(lt))), encoding='ascii'),
)
else:
expected_url = self.expected_url.replace(
'1400003600', str(int(time.mktime(lt))))
url = self.proxy.generate_temp_url(self.url, expires,
self.method,
temp_url_key=self.key)
'1400003600', str(int(time.mktime(lt)))
)
url = self.proxy.generate_temp_url(
self.url, expires, self.method, temp_url_key=self.key
)
self.assertEqual(url, expected_url)
@mock.patch('hmac.HMAC')
@mock.patch('time.time', return_value=1400000000)
def test_generate_temp_url_iso8601_output(self, time_mock, hmac_mock):
hmac_mock().hexdigest.return_value = 'temp_url_signature'
url = self.proxy.generate_temp_url(self.url, self.seconds,
self.method,
temp_url_key=self.key,
iso8601=True)
url = self.proxy.generate_temp_url(
self.url,
self.seconds,
self.method,
temp_url_key=self.key,
iso8601=True,
)
key = self.key
if not isinstance(key, bytes):
key = key.encode('utf-8')
expires = time.strftime(self.expires_iso8601_format,
time.gmtime(1400003600))
expires = time.strftime(
self.expires_iso8601_format, time.gmtime(1400003600)
)
if not isinstance(self.url, str):
self.assertTrue(url.endswith(bytes(expires, 'utf-8')))
else:
self.assertTrue(url.endswith(expires))
self.assertEqual(hmac_mock.mock_calls, [
mock.call(),
mock.call(key, self.expected_body, sha1),
mock.call().hexdigest(),
])
self.assertEqual(
hmac_mock.mock_calls,
[
mock.call(),
mock.call(key, self.expected_body, sha1),
mock.call().hexdigest(),
],
)
self.assertIsInstance(url, type(self.url))
@mock.patch('hmac.HMAC')
@ -465,25 +557,36 @@ class TestTempURL(TestObjectStoreProxy):
for p in prefixes:
hmac_mock.reset_mock()
path = '/v1/AUTH_account/c/' + p
expected_url = path + ('?temp_url_sig=temp_url_signature'
'&temp_url_expires=1400003600'
'&temp_url_prefix=' + p)
expected_body = '\n'.join([
self.method,
'1400003600',
'prefix:' + path,
]).encode('utf-8')
expected_url = path + (
'?temp_url_sig=temp_url_signature'
'&temp_url_expires=1400003600'
'&temp_url_prefix=' + p
)
expected_body = '\n'.join(
[
self.method,
'1400003600',
'prefix:' + path,
]
).encode('utf-8')
url = self.proxy.generate_temp_url(
path, self.seconds, self.method, prefix=True,
temp_url_key=self.key)
path,
self.seconds,
self.method,
prefix=True,
temp_url_key=self.key,
)
key = self.key
if not isinstance(key, bytes):
key = key.encode('utf-8')
self.assertEqual(url, expected_url)
self.assertEqual(hmac_mock.mock_calls, [
mock.call(key, expected_body, sha1),
mock.call().hexdigest(),
])
self.assertEqual(
hmac_mock.mock_calls,
[
mock.call(key, expected_body, sha1),
mock.call().hexdigest(),
],
)
self.assertIsInstance(url, type(path))
@ -491,94 +594,142 @@ class TestTempURL(TestObjectStoreProxy):
self.assertRaisesRegex(
ValueError,
'path must be representable as UTF-8',
self.proxy.generate_temp_url, b'/v1/a/c/\xff', self.seconds,
self.method, temp_url_key=self.key)
self.proxy.generate_temp_url,
b'/v1/a/c/\xff',
self.seconds,
self.method,
temp_url_key=self.key,
)
@mock.patch('hmac.HMAC.hexdigest', return_value="temp_url_signature")
def test_generate_absolute_expiry_temp_url(self, hmac_mock):
if isinstance(self.expected_url, bytes):
expected_url = self.expected_url.replace(
b'1400003600', b'2146636800')
b'1400003600', b'2146636800'
)
else:
expected_url = self.expected_url.replace(
u'1400003600', u'2146636800')
u'1400003600', u'2146636800'
)
url = self.proxy.generate_temp_url(
self.url, 2146636800, self.method, absolute=True,
temp_url_key=self.key)
self.url,
2146636800,
self.method,
absolute=True,
temp_url_key=self.key,
)
self.assertEqual(url, expected_url)
def test_generate_temp_url_bad_time(self):
for bad_time in ['not_an_int', -1, 1.1, '-1', '1.1', '2015-05',
'2015-05-01T01:00']:
for bad_time in [
'not_an_int',
-1,
1.1,
'-1',
'1.1',
'2015-05',
'2015-05-01T01:00',
]:
self.assertRaisesRegex(
ValueError, self.time_errmsg,
self.proxy.generate_temp_url, self.url, bad_time,
self.method, temp_url_key=self.key)
ValueError,
self.time_errmsg,
self.proxy.generate_temp_url,
self.url,
bad_time,
self.method,
temp_url_key=self.key,
)
def test_generate_temp_url_bad_path(self):
for bad_path in ['/v1/a/c', 'v1/a/c/o', 'blah/v1/a/c/o', '/v1//c/o',
'/v1/a/c/', '/v1/a/c']:
for bad_path in [
'/v1/a/c',
'v1/a/c/o',
'blah/v1/a/c/o',
'/v1//c/o',
'/v1/a/c/',
'/v1/a/c',
]:
self.assertRaisesRegex(
ValueError, self.path_errmsg,
self.proxy.generate_temp_url, bad_path, 60, self.method,
temp_url_key=self.key)
ValueError,
self.path_errmsg,
self.proxy.generate_temp_url,
bad_path,
60,
self.method,
temp_url_key=self.key,
)
class TestTempURLUnicodePathAndKey(TestTempURL):
url = u'/v1/\u00e4/c/\u00f3'
key = u'k\u00e9y'
expected_url = (u'%s?temp_url_sig=temp_url_signature'
u'&temp_url_expires=1400003600') % url
expected_body = u'\n'.join([
u'GET',
u'1400003600',
url,
]).encode('utf-8')
expected_url = (
u'%s?temp_url_sig=temp_url_signature' u'&temp_url_expires=1400003600'
) % url
expected_body = u'\n'.join(
[
u'GET',
u'1400003600',
url,
]
).encode('utf-8')
class TestTempURLUnicodePathBytesKey(TestTempURL):
url = u'/v1/\u00e4/c/\u00f3'
key = u'k\u00e9y'.encode('utf-8')
expected_url = (u'%s?temp_url_sig=temp_url_signature'
u'&temp_url_expires=1400003600') % url
expected_body = '\n'.join([
u'GET',
u'1400003600',
url,
]).encode('utf-8')
expected_url = (
u'%s?temp_url_sig=temp_url_signature' u'&temp_url_expires=1400003600'
) % url
expected_body = '\n'.join(
[
u'GET',
u'1400003600',
url,
]
).encode('utf-8')
class TestTempURLBytesPathUnicodeKey(TestTempURL):
url = u'/v1/\u00e4/c/\u00f3'.encode('utf-8')
key = u'k\u00e9y'
expected_url = url + (b'?temp_url_sig=temp_url_signature'
b'&temp_url_expires=1400003600')
expected_body = b'\n'.join([
b'GET',
b'1400003600',
url,
])
expected_url = url + (
b'?temp_url_sig=temp_url_signature' b'&temp_url_expires=1400003600'
)
expected_body = b'\n'.join(
[
b'GET',
b'1400003600',
url,
]
)
class TestTempURLBytesPathAndKey(TestTempURL):
url = u'/v1/\u00e4/c/\u00f3'.encode('utf-8')
key = u'k\u00e9y'.encode('utf-8')
expected_url = url + (b'?temp_url_sig=temp_url_signature'
b'&temp_url_expires=1400003600')
expected_body = b'\n'.join([
b'GET',
b'1400003600',
url,
])
expected_url = url + (
b'?temp_url_sig=temp_url_signature' b'&temp_url_expires=1400003600'
)
expected_body = b'\n'.join(
[
b'GET',
b'1400003600',
url,
]
)
class TestTempURLBytesPathAndNonUtf8Key(TestTempURL):
url = u'/v1/\u00e4/c/\u00f3'.encode('utf-8')
key = b'k\xffy'
expected_url = url + (b'?temp_url_sig=temp_url_signature'
b'&temp_url_expires=1400003600')
expected_body = b'\n'.join([
b'GET',
b'1400003600',
url,
])
expected_url = url + (
b'?temp_url_sig=temp_url_signature' b'&temp_url_expires=1400003600'
)
expected_body = b'\n'.join(
[
b'GET',
b'1400003600',
url,
]
)