blob: dbb65ba2fd61519aaa0da856709f7221800cefb5 [file]
'''
'''
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import os
import sys
Test.Summary = '''
Test new "all headers" log fields
'''
# Define ATS.
#
ts = Test.MakeATSProcess("ts")
# Define MicroServer.
#
server = Test.MakeOriginServer("server")
request_header = {"headers": "GET / HTTP/1.1\r\nHost: does.not.matter\r\n\r\n", "timestamp": "1469733493.993", "body": ""}
response_header = {
"headers": "HTTP/1.1 200 OK\r\nConnection: close\r\nCache-control: max-age=85000\r\n\r\n",
"timestamp": "1469733493.993",
"body": "xxx"
}
server.addResponse("sessionlog.json", request_header, response_header)
ts.Disk.records_config.update({
'proxy.config.diags.debug.enabled': 0,
'proxy.config.diags.debug.tags': 'http|dns',
})
ts.Disk.remap_config.AddLine('map http://127.0.0.1:{0} http://127.0.0.1:{1}'.format(ts.Variables.port, server.Variables.Port))
# Mix in a numeric log field. Hopefull this will detect any binary alignment problems.
#
ts.Disk.logging_yaml.AddLines(
'''
logging:
formats:
- name: custom
format: "%<cqah> ___FS___ %<pssc> ___FS___ %<psah> ___FS___ %<ssah> ___FS___ %<pqah> ___FS___ %<cssah> ___FS___ END_TXN"
logs:
- filename: test_all_headers
format: custom
'''.split("\n"))
# Configure comparison of "sanitized" log file with gold file at end of test.
#
sanitized_log_path = os.path.join(ts.Variables.LOGDIR, 'test_all_headers.log.san')
if Condition.CurlUsingUnixDomainSocket():
Test.Disk.File(sanitized_log_path, exists=True, content='gold/test_all_headers_uds.gold')
else:
Test.Disk.File(sanitized_log_path, exists=True, content='gold/test_all_headers.gold')
def reallyLong():
value = 'abcdefghijklmnop'
value = value + value
value = value + value
value = value + value
retval = ""
for i in range(3):
retval += ' -H "x-header{}: {}"'.format(i, value)
return retval
tr = Test.AddTestRun()
tr.Processes.Default.StartBefore(server)
tr.Processes.Default.StartBefore(Test.Processes.ts)
if Condition.CurlUsingUnixDomainSocket():
tr.MakeCurlCommand(
'"http://127.0.0.1:{0}" --user-agent "007" -H "Host: 127.0.0.1:{0}" --verbose '.format(ts.Variables.port) + reallyLong(),
ts=ts)
else:
tr.MakeCurlCommand('"http://127.0.0.1:{0}" --user-agent "007" --verbose '.format(ts.Variables.port) + reallyLong(), ts=ts)
tr.Processes.Default.ReturnCode = 0
# Repeat same curl, will be answered from the ATS cache.
#
tr = Test.AddTestRun()
if Condition.CurlUsingUnixDomainSocket():
tr.MakeCurlCommand(
'"http://127.0.0.1:{0}" --user-agent "007" -H "Host: 127.0.0.1:{0}" --verbose '.format(ts.Variables.port) + reallyLong(),
ts=ts)
else:
tr.MakeCurlCommand('"http://127.0.0.1:{0}" --user-agent "007" --verbose '.format(ts.Variables.port) + reallyLong(), ts=ts)
tr.Processes.Default.ReturnCode = 0
# Delay to allow TS to flush report to disk, then "sanitize" generated log.
#
tr = Test.AddTestRun()
log_path = os.path.join(ts.Variables.LOGDIR, 'test_all_headers.log')
sanitizer_python_script = os.path.join(Test.TestDirectory, 'all_headers_sanitizer.py')
sanitizer_shell_script = os.path.join(Test.TestDirectory, 'all_headers_sanitizer.sh')
tr.Processes.Default.Command = \
(f'{sys.executable} {sanitizer_python_script} {log_path} {server.Variables.Port} | '
f'sh {sanitizer_shell_script} > {sanitized_log_path}')
tr.Processes.Default.ReturnCode = 0