X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/11890d971215ec44b7abb1e24ad748aefa1061a7..6cef86f2d748be96695293b48afac61e2ae640df:/services/keep-web/server_test.go diff --git a/services/keep-web/server_test.go b/services/keep-web/server_test.go index a2a5754380..0a38384f07 100644 --- a/services/keep-web/server_test.go +++ b/services/keep-web/server_test.go @@ -28,17 +28,17 @@ func (s *IntegrationSuite) TestNoToken(c *check.C) { "", "bogustoken", } { - hdr, body, _ := s.runCurl(c, token, "dl.example.com", "/collections/"+arvadostest.FooCollection+"/foo") - c.Check(hdr, check.Matches, `(?s)HTTP/1.1 401 Unauthorized\r\n.*`) + hdr, body, _ := s.runCurl(c, token, "collections.example.com", "/collections/"+arvadostest.FooCollection+"/foo") + c.Check(hdr, check.Matches, `(?s)HTTP/1.1 404 Not Found\r\n.*`) c.Check(body, check.Equals, "") if token != "" { - hdr, body, _ = s.runCurl(c, token, "dl.example.com", "/collections/download/"+arvadostest.FooCollection+"/"+token+"/foo") + hdr, body, _ = s.runCurl(c, token, "collections.example.com", "/collections/download/"+arvadostest.FooCollection+"/"+token+"/foo") c.Check(hdr, check.Matches, `(?s)HTTP/1.1 404 Not Found\r\n.*`) c.Check(body, check.Equals, "") } - hdr, body, _ = s.runCurl(c, token, "dl.example.com", "/bad-route") + hdr, body, _ = s.runCurl(c, token, "collections.example.com", "/bad-route") c.Check(hdr, check.Matches, `(?s)HTTP/1.1 404 Not Found\r\n.*`) c.Check(body, check.Equals, "") } @@ -67,7 +67,7 @@ func (s *IntegrationSuite) Test404(c *check.C) { "/collections/" + arvadostest.NonexistentCollection + "/theperthcountyconspiracy", "/collections/download/" + arvadostest.NonexistentCollection + "/" + arvadostest.ActiveToken + "/theperthcountyconspiracy", } { - hdr, body, _ := s.runCurl(c, arvadostest.ActiveToken, "dl.example.com", uri) + hdr, body, _ := s.runCurl(c, arvadostest.ActiveToken, "collections.example.com", uri) c.Check(hdr, check.Matches, "(?s)HTTP/1.1 404 Not Found\r\n.*") c.Check(body, check.Equals, "") } @@ -105,51 +105,125 @@ func (s *IntegrationSuite) test100BlockFile(c *check.C, blocksize int) { err = arv.Create("collections", map[string]interface{}{ "collection": map[string]interface{}{ - "name": fmt.Sprintf("testdata blocksize=%d", blocksize), + "name": fmt.Sprintf("testdata blocksize=%d", blocksize), "manifest_text": mtext, }, }, &coll) c.Assert(err, check.Equals, nil) uuid := coll["uuid"].(string) - hdr, body, size := s.runCurl(c, arv.ApiToken, uuid + ".dl.example.com", "/testdata.bin") + hdr, body, size := s.runCurl(c, arv.ApiToken, uuid+".collections.example.com", "/testdata.bin") c.Check(hdr, check.Matches, `(?s)HTTP/1.1 200 OK\r\n.*`) c.Check(hdr, check.Matches, `(?si).*Content-length: `+fmt.Sprintf("%d00", blocksize)+`\r\n.*`) c.Check([]byte(body)[:1234], check.DeepEquals, testdata[:1234]) c.Check(size, check.Equals, int64(blocksize)*100) } +type curlCase struct { + id string + auth string + host string + path string + dataMD5 string +} + func (s *IntegrationSuite) Test200(c *check.C) { anonymousTokens = []string{arvadostest.AnonymousToken} - arv, err := arvadosclient.MakeArvadosClient() - c.Assert(err, check.Equals, nil) - arv.ApiToken = arvadostest.ActiveToken - kc, err := keepclient.MakeKeepClient(&arv) - c.Assert(err, check.Equals, nil) - kc.PutB([]byte("Hello world\n")) - kc.PutB([]byte("foo")) - for _, spec := range [][]string{ + for _, spec := range []curlCase{ // My collection - {arvadostest.ActiveToken, "/collections/" + arvadostest.FooCollection + "/foo", "acbd18db4cc2f85cedef654fccc4a4d8"}, - {"", "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", "acbd18db4cc2f85cedef654fccc4a4d8"}, - {"tokensobogus", "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", "acbd18db4cc2f85cedef654fccc4a4d8"}, - {arvadostest.ActiveToken, "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", "acbd18db4cc2f85cedef654fccc4a4d8"}, - {arvadostest.AnonymousToken, "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", "acbd18db4cc2f85cedef654fccc4a4d8"}, - // Anonymously accessible user agreement. - {"", "/collections/" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", "f0ef7081e1539ac00ef5b761b4fb01b3"}, - {arvadostest.ActiveToken, "/collections/" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", "f0ef7081e1539ac00ef5b761b4fb01b3"}, - {arvadostest.SpectatorToken, "/collections/" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", "f0ef7081e1539ac00ef5b761b4fb01b3"}, - {arvadostest.SpectatorToken, "/collections/download/" + arvadostest.HelloWorldCollection + "/" + arvadostest.SpectatorToken + "/Hello%20world.txt", "f0ef7081e1539ac00ef5b761b4fb01b3"}, + { + auth: arvadostest.ActiveToken, + host: arvadostest.FooCollection + "--collections.example.com", + path: "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + host: strings.Replace(arvadostest.FooPdh, "+", "-", 1) + ".collections.example.com", + path: "/t=" + arvadostest.ActiveToken + "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + path: "/c=" + arvadostest.FooPdh + "/t=" + arvadostest.ActiveToken + "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + path: "/c=" + strings.Replace(arvadostest.FooPdh, "+", "-", 1) + "/t=" + arvadostest.ActiveToken + "/_/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + path: "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + auth: "tokensobogus", + path: "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + auth: arvadostest.ActiveToken, + path: "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + { + auth: arvadostest.AnonymousToken, + path: "/collections/download/" + arvadostest.FooCollection + "/" + arvadostest.ActiveToken + "/foo", + dataMD5: "acbd18db4cc2f85cedef654fccc4a4d8", + }, + + // Anonymously accessible user agreement + { + path: "/c=" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + host: arvadostest.HelloWorldCollection + ".collections.example.com", + path: "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + host: arvadostest.HelloWorldCollection + ".collections.example.com", + path: "/_/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + path: "/collections/" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + auth: arvadostest.ActiveToken, + path: "/collections/" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + auth: arvadostest.SpectatorToken, + path: "/collections/" + arvadostest.HelloWorldCollection + "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + auth: arvadostest.SpectatorToken, + host: arvadostest.HelloWorldCollection + "--collections.example.com", + path: "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, + { + auth: arvadostest.SpectatorToken, + path: "/collections/download/" + arvadostest.HelloWorldCollection + "/" + arvadostest.SpectatorToken + "/Hello%20world.txt", + dataMD5: "f0ef7081e1539ac00ef5b761b4fb01b3", + }, } { - hdr, body, _ := s.runCurl(c, spec[0], "dl.example.com", spec[1]) + host := spec.host + if host == "" { + host = "collections.example.com" + } + hdr, body, _ := s.runCurl(c, spec.auth, host, spec.path) c.Check(hdr, check.Matches, `(?s)HTTP/1.1 200 OK\r\n.*`) - if strings.HasSuffix(spec[1], ".txt") { + if strings.HasSuffix(spec.path, ".txt") { c.Check(hdr, check.Matches, `(?s).*\r\nContent-Type: text/plain.*`) // TODO: Check some types that aren't // automatically detected by Go's http server // by sniffing the content. } - c.Check(fmt.Sprintf("%x", md5.Sum([]byte(body))), check.Equals, spec[2]) + c.Check(fmt.Sprintf("%x", md5.Sum([]byte(body))), check.Equals, spec.dataMD5) } } @@ -157,7 +231,7 @@ func (s *IntegrationSuite) Test200(c *check.C) { func (s *IntegrationSuite) runCurl(c *check.C, token, host, uri string, args ...string) (hdr, bodyPart string, bodySize int64) { curlArgs := []string{"--silent", "--show-error", "--include"} testHost, testPort, _ := net.SplitHostPort(s.testServer.Addr) - curlArgs = append(curlArgs, "--resolve", host + ":" + testPort + ":" + testHost) + curlArgs = append(curlArgs, "--resolve", host+":"+testPort+":"+testHost) if token != "" { curlArgs = append(curlArgs, "-H", "Authorization: OAuth2 "+token) } @@ -200,6 +274,15 @@ func (s *IntegrationSuite) runCurl(c *check.C, token, host, uri string, args ... func (s *IntegrationSuite) SetUpSuite(c *check.C) { arvadostest.StartAPI() arvadostest.StartKeep() + + arv, err := arvadosclient.MakeArvadosClient() + c.Assert(err, check.Equals, nil) + arv.ApiToken = arvadostest.ActiveToken + kc, err := keepclient.MakeKeepClient(&arv) + c.Assert(err, check.Equals, nil) + kc.PutB([]byte("Hello world\n")) + kc.PutB([]byte("foo")) + kc.PutB([]byte("foobar")) } func (s *IntegrationSuite) TearDownSuite(c *check.C) {