Index: swarm_client/tests/isolateserver_smoke_test.py |
=================================================================== |
--- swarm_client/tests/isolateserver_smoke_test.py (revision 235167) |
+++ swarm_client/tests/isolateserver_smoke_test.py (working copy) |
@@ -1,129 +0,0 @@ |
-#!/usr/bin/env python |
-# Copyright 2013 The Chromium Authors. All rights reserved. |
-# Use of this source code is governed by a BSD-style license that can be |
-# found in the LICENSE file. |
- |
-import binascii |
-import hashlib |
-import logging |
-import os |
-import subprocess |
-import sys |
-import tempfile |
-import time |
-import unittest |
-import urllib |
- |
-ROOT_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__))) |
-sys.path.insert(0, ROOT_DIR) |
- |
-import isolateserver |
- |
-ROOT_DIR = os.path.dirname(os.path.dirname(os.path.abspath(__file__))) |
- |
-# Ensure that the testing machine has access to this server. |
-ISOLATE_SERVER = 'https://isolateserver.appspot.com/' |
- |
-# The directory containing the test data files. |
-TEST_DATA_DIR = os.path.join(ROOT_DIR, 'tests', 'isolateserver') |
- |
- |
-# TODO(vadimsh): This test is a bit frankensteinish now. It uses new /content-gs |
-# protocol for uploads via 'isolateserver.py archive', but uses old /content |
-# protocol for validity check and fetches. |
- |
-class IsolateServerArchiveSmokeTest(unittest.TestCase): |
- def setUp(self): |
- # The namespace must end in '-gzip' since all files are now compressed |
- # before being uploaded. |
- self.namespace = ('temporary' + str(long(time.time())).split('.', 1)[0] |
- + '-gzip') |
- url = ISOLATE_SERVER + '/content/get_token?from_smoke_test=1' |
- self.token = urllib.quote(isolateserver.net.url_read(url)) |
- |
- def _archive_given_files(self, files): |
- """Given a list of files, call isolateserver.py with them. Then |
- verify they are all on the server.""" |
- args = [ |
- sys.executable, |
- os.path.join(ROOT_DIR, 'isolateserver.py'), |
- 'archive', |
- '--isolate-server', ISOLATE_SERVER, |
- '--namespace', self.namespace |
- ] |
- if '-v' in sys.argv: |
- args.append('--verbose') |
- args.extend(os.path.join(TEST_DATA_DIR, filename) for filename in files) |
- |
- self.assertEqual(0, subprocess.call(args)) |
- |
- # Try to download the files from the server. |
- file_hashes = [ |
- isolateserver.hash_file(os.path.join(TEST_DATA_DIR, f), hashlib.sha1) |
- for f in files |
- ] |
- for i in range(len(files)): |
- download_url = '%scontent/retrieve/%s/%s' % ( |
- ISOLATE_SERVER, self.namespace, file_hashes[i]) |
- |
- downloaded_file = isolateserver.net.url_read(download_url, retry_404=True) |
- self.assertTrue(downloaded_file is not None, |
- 'File %s was missing from the server' % files[i]) |
- |
- # Ensure the files are listed as present on the server. |
- contains_hash_url = '%scontent/contains/%s?token=%s&from_smoke_test=1' % ( |
- ISOLATE_SERVER, self.namespace, self.token) |
- |
- body = ''.join(binascii.unhexlify(h) for h in file_hashes) |
- expected = chr(1) * len(files) |
- MAX_ATTEMPTS = 10 |
- for i in xrange(MAX_ATTEMPTS): |
- # AppEngine's database is eventually consistent and isolateserver do not |
- # use transaction for performance reasons, so even if one request was able |
- # to retrieve the file, an subsequent may not see it! So retry a few time |
- # until the database becomes consistent with regard to these entities. |
- response = isolateserver.net.url_read( |
- contains_hash_url, |
- data=body, |
- content_type='application/octet-stream') |
- if response == expected: |
- break |
- # GAE is exposing its internal data inconsistency. |
- if i != (MAX_ATTEMPTS - 1): |
- print('Visible datastore inconsistency, retrying.') |
- time.sleep(0.1) |
- self.assertEqual(expected, response) |
- |
- def test_archive_empty_file(self): |
- self._archive_given_files(['empty_file.txt']) |
- |
- def test_archive_small_file(self): |
- self._archive_given_files(['small_file.txt']) |
- |
- def disabled_test_archive_huge_file(self): |
- # Create a file over 2gbs. |
- # TODO(maruel): Temporarily disabled until the server is fixed. |
- filepath = None |
- try: |
- try: |
- handle, filepath = tempfile.mkstemp(prefix='isolateserver') |
- # Write 2.1gb. |
- chunk = chr(0) + chr(57) + chr(128) + chr(255) |
- chunk1mb = chunk * (1024 * 1024 / len(chunk)) |
- for _ in xrange(1280): |
- os.write(handle, chunk1mb) |
- finally: |
- os.close(handle) |
- |
- self._archive_given_files([filepath]) |
- finally: |
- if filepath: |
- os.remove(filepath) |
- |
- |
-if __name__ == '__main__': |
- if len(sys.argv) > 1 and sys.argv[1].startswith('http'): |
- ISOLATE_SERVER = sys.argv.pop(1).rstrip('/') + '/' |
- logging.basicConfig( |
- level=logging.DEBUG if '-v' in sys.argv else logging.ERROR) |
- unittest.main() |