| ''' |
| ''' |
| # Licensed to the Apache Software Foundation (ASF) under one |
| # or more contributor license agreements. See the NOTICE file |
| # distributed with this work for additional information |
| # regarding copyright ownership. The ASF licenses this file |
| # to you under the Apache License, Version 2.0 (the |
| # "License"); you may not use this file except in compliance |
| # with the License. You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| import os |
| import sys |
| |
| Test.Summary = ''' |
| Test new "all headers" log fields |
| ''' |
| |
| # Define ATS. |
| # |
| ts = Test.MakeATSProcess("ts") |
| |
| # Define MicroServer. |
| # |
| server = Test.MakeOriginServer("server") |
| |
| request_header = {"headers": "GET / HTTP/1.1\r\nHost: does.not.matter\r\n\r\n", "timestamp": "1469733493.993", "body": ""} |
| response_header = { |
| "headers": "HTTP/1.1 200 OK\r\nConnection: close\r\nCache-control: max-age=85000\r\n\r\n", |
| "timestamp": "1469733493.993", |
| "body": "xxx" |
| } |
| server.addResponse("sessionlog.json", request_header, response_header) |
| |
| ts.Disk.records_config.update({ |
| 'proxy.config.diags.debug.enabled': 0, |
| 'proxy.config.diags.debug.tags': 'http|dns', |
| }) |
| |
| ts.Disk.remap_config.AddLine('map http://127.0.0.1:{0} http://127.0.0.1:{1}'.format(ts.Variables.port, server.Variables.Port)) |
| |
| # Mix in a numeric log field. Hopefull this will detect any binary alignment problems. |
| # |
| ts.Disk.logging_yaml.AddLines( |
| ''' |
| logging: |
| formats: |
| - name: custom |
| format: "%<cqah> ___FS___ %<pssc> ___FS___ %<psah> ___FS___ %<ssah> ___FS___ %<pqah> ___FS___ %<cssah> ___FS___ END_TXN" |
| logs: |
| - filename: test_all_headers |
| format: custom |
| '''.split("\n")) |
| |
| # Configure comparison of "sanitized" log file with gold file at end of test. |
| # |
| sanitized_log_path = os.path.join(ts.Variables.LOGDIR, 'test_all_headers.log.san') |
| if Condition.CurlUsingUnixDomainSocket(): |
| Test.Disk.File(sanitized_log_path, exists=True, content='gold/test_all_headers_uds.gold') |
| else: |
| Test.Disk.File(sanitized_log_path, exists=True, content='gold/test_all_headers.gold') |
| |
| |
| def reallyLong(): |
| value = 'abcdefghijklmnop' |
| value = value + value |
| value = value + value |
| value = value + value |
| retval = "" |
| for i in range(3): |
| retval += ' -H "x-header{}: {}"'.format(i, value) |
| return retval |
| |
| |
| tr = Test.AddTestRun() |
| tr.Processes.Default.StartBefore(server) |
| tr.Processes.Default.StartBefore(Test.Processes.ts) |
| if Condition.CurlUsingUnixDomainSocket(): |
| tr.MakeCurlCommand( |
| '"http://127.0.0.1:{0}" --user-agent "007" -H "Host: 127.0.0.1:{0}" --verbose '.format(ts.Variables.port) + reallyLong(), |
| ts=ts) |
| else: |
| tr.MakeCurlCommand('"http://127.0.0.1:{0}" --user-agent "007" --verbose '.format(ts.Variables.port) + reallyLong(), ts=ts) |
| tr.Processes.Default.ReturnCode = 0 |
| |
| # Repeat same curl, will be answered from the ATS cache. |
| # |
| tr = Test.AddTestRun() |
| if Condition.CurlUsingUnixDomainSocket(): |
| tr.MakeCurlCommand( |
| '"http://127.0.0.1:{0}" --user-agent "007" -H "Host: 127.0.0.1:{0}" --verbose '.format(ts.Variables.port) + reallyLong(), |
| ts=ts) |
| else: |
| tr.MakeCurlCommand('"http://127.0.0.1:{0}" --user-agent "007" --verbose '.format(ts.Variables.port) + reallyLong(), ts=ts) |
| tr.Processes.Default.ReturnCode = 0 |
| |
| # Delay to allow TS to flush report to disk, then "sanitize" generated log. |
| # |
| tr = Test.AddTestRun() |
| |
| log_path = os.path.join(ts.Variables.LOGDIR, 'test_all_headers.log') |
| sanitizer_python_script = os.path.join(Test.TestDirectory, 'all_headers_sanitizer.py') |
| sanitizer_shell_script = os.path.join(Test.TestDirectory, 'all_headers_sanitizer.sh') |
| |
| tr.Processes.Default.Command = \ |
| (f'{sys.executable} {sanitizer_python_script} {log_path} {server.Variables.Port} | ' |
| f'sh {sanitizer_shell_script} > {sanitized_log_path}') |
| tr.Processes.Default.ReturnCode = 0 |