1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064
|
# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
# SPDX-License-Identifier: Apache-2.0.
from io import BytesIO
import unittest
import os
import tempfile
import math
import shutil
import time
from test import NativeResourceTest
from concurrent.futures import Future
from multiprocessing import Process
import multiprocessing as mp
import sys
import gc
from awscrt.http import HttpHeaders, HttpRequest
from awscrt.auth import AwsCredentials
from awscrt.s3 import (
S3ChecksumAlgorithm,
S3ChecksumConfig,
S3ChecksumLocation,
S3Client,
S3RequestType,
S3ResponseError,
CrossProcessLock,
S3FileIoOptions,
create_default_s3_signing_config,
get_optimized_platforms,
)
from awscrt.io import (
ClientBootstrap,
ClientTlsContext,
DefaultHostResolver,
EventLoopGroup,
TlsConnectionOptions,
TlsContextOptions,
)
from awscrt.auth import (
AwsCredentialsProvider,
AwsSignatureType,
AwsSignedBodyHeaderType,
AwsSignedBodyValue,
AwsSigningAlgorithm,
AwsSigningConfig,
)
from awscrt.common import join_all_native_threads
MB = 1024 ** 2
GB = 1024 ** 3
S3EXPRESS_ENDPOINT = "crts-east1--use1-az4--x-s3.s3express-use1-az4.us-east-1.amazonaws.com"
cross_process_lock_name = "instance_lock_test"
def cross_proc_task():
try:
lock = CrossProcessLock(cross_process_lock_name)
lock.acquire()
lock.release()
exit(0)
except RuntimeError as e:
exit(-1)
def release_lock_task():
# remove the global lock
global CRT_S3_PROCESS_LOCK
CRT_S3_PROCESS_LOCK = None
exit(0)
class CrossProcessLockTest(NativeResourceTest):
def setUp(self):
self.nonce = time.time()
super().setUp()
def test_with_statement(self):
nonce_str = f'lock_a_{self.nonce}'
with CrossProcessLock(nonce_str) as lock:
try:
new_lock = CrossProcessLock(nonce_str)
new_lock.acquire()
self.fail("Acquiring a lock by the same nonce should fail when it's already held")
except RuntimeError as e:
unique_nonce_str = f'lock_b{self.nonce}'
new_lock = CrossProcessLock(unique_nonce_str)
new_lock.acquire()
new_lock.release()
lock_after_with_same_nonce = CrossProcessLock(nonce_str)
lock_after_with_same_nonce.acquire()
lock_after_with_same_nonce.release()
def test_cross_proc(self):
with CrossProcessLock(cross_process_lock_name) as lock:
process = Process(target=cross_proc_task)
process.start()
process.join()
# acquiring this lock in a sub-process should fail since we
# already hold the lock in this process.
self.assertNotEqual(0, process.exitcode)
# now that we've released the lock above, the same sub-process path
# should now succeed.
unlocked_process = Process(target=cross_proc_task)
unlocked_process.start()
unlocked_process.join()
self.assertEqual(0, unlocked_process.exitcode)
@unittest.skipIf(sys.platform.startswith('win'), "Windows doesn't support fork")
def test_fork_shares_lock(self):
# mock the use case from boto3 where a global lock used and the workaround with fork.
global CRT_S3_PROCESS_LOCK
CRT_S3_PROCESS_LOCK = CrossProcessLock(cross_process_lock_name)
CRT_S3_PROCESS_LOCK.acquire()
mp.set_start_method('fork', force=True)
# the first forked process release the forked lock.
# when the process forked, the child process also has the lock and it could release the lock before
# the parent process. Make sure when this happens, the lock is still held by the parent process.
release_process = Process(target=release_lock_task)
release_process.start()
release_process.join()
# create another process try to acquire the lock, it should fail as the
# lock should still be held with the main process.
process = Process(target=cross_proc_task)
process.start()
process.join()
# acquiring this lock in a sub-process should fail since we
# already hold the lock in this process.
self.assertNotEqual(0, process.exitcode)
del CRT_S3_PROCESS_LOCK
class FileCreator(object):
def __init__(self):
self.rootdir = tempfile.mkdtemp()
def remove_all(self):
shutil.rmtree(self.rootdir)
def create_file(self, filename, contents, mode='w'):
"""Creates a file in a tmpdir
``filename`` should be a relative path, e.g. "foo/bar/baz.txt"
It will be translated into a full path in a tmp dir.
``mode`` is the mode the file should be opened either as ``w`` or
`wb``.
Returns the full path to the file.
"""
full_path = os.path.join(self.rootdir, filename)
if not os.path.isdir(os.path.dirname(full_path)):
os.makedirs(os.path.dirname(full_path))
with open(full_path, mode) as f:
f.write(contents)
return full_path
def create_file_with_size(self, filename, filesize):
filename = self.create_file(filename, contents='')
chunksize = 8192
with open(filename, 'wb') as f:
for i in range(int(math.ceil(filesize / float(chunksize)))):
f.write(b'a' * chunksize)
return filename
def append_file(self, filename, contents):
"""Append contents to a file
``filename`` should be a relative path, e.g. "foo/bar/baz.txt"
It will be translated into a full path in a tmp dir.
Returns the full path to the file.
"""
full_path = os.path.join(self.rootdir, filename)
if not os.path.isdir(os.path.dirname(full_path)):
os.makedirs(os.path.dirname(full_path))
with open(full_path, 'a') as f:
f.write(contents)
return full_path
def full_path(self, filename):
"""Translate relative path to full path in temp dir.
f.full_path('foo/bar.txt') -> /tmp/asdfasd/foo/bar.txt
"""
return os.path.join(self.rootdir, filename)
def s3_client_new(
secure,
region,
part_size=0,
is_cancel_test=False,
enable_s3express=False,
mem_limit=None,
network_interface_names=None):
if is_cancel_test:
# for cancellation tests, make things slow, so it's less likely that
# stuff succeeds on other threads before the cancellation is processed.
num_threads = 1
throughput_target_gbps = 0.000028 # 28 Kbps beeepdiiingeep beeeeeekskhskshhKKKKchCH
else:
# else use defaults
num_threads = None
throughput_target_gbps = None
event_loop_group = EventLoopGroup(num_threads)
host_resolver = DefaultHostResolver(event_loop_group)
bootstrap = ClientBootstrap(event_loop_group, host_resolver)
credential_provider = AwsCredentialsProvider.new_default_chain(bootstrap)
signing_config = create_default_s3_signing_config(region=region, credential_provider=credential_provider)
tls_option = None
if secure:
opt = TlsContextOptions()
ctx = ClientTlsContext(opt)
tls_option = TlsConnectionOptions(ctx)
s3_client = S3Client(
bootstrap=bootstrap,
region=region,
signing_config=signing_config,
tls_connection_options=tls_option,
part_size=part_size,
throughput_target_gbps=throughput_target_gbps,
enable_s3express=enable_s3express,
memory_limit=mem_limit,
network_interface_names=network_interface_names)
return s3_client
class FakeReadStream(object):
def __init__(self, read_future):
self._future = read_future
def read(self, length):
fake_string = "x" * length
fake_data = bytes(fake_string, 'utf-8')
if not self._future.done():
self._future.set_result(None)
return fake_data
class S3ClientTest(NativeResourceTest):
def setUp(self):
self.region = "us-west-2"
self.timeout = 10 # seconds
super().setUp()
def test_sanity(self):
s3_client = s3_client_new(False, self.region)
self.assertIsNotNone(s3_client)
def test_sanity_secure(self):
s3_client = s3_client_new(True, self.region)
self.assertIsNotNone(s3_client)
def test_sanity_network_interface_names(self):
# This is just a sanity test to ensure that we are passing the parameter correctly.
with self.assertRaises(Exception):
s3_client_new(True, self.region, network_interface_names=("eth0", "invalid-network-interface"))
def test_wait_shutdown(self):
s3_client = s3_client_new(False, self.region)
self.assertIsNotNone(s3_client)
shutdown_event = s3_client.shutdown_event
del s3_client
self.assertTrue(shutdown_event.wait(self.timeout))
def test_get_optimized_platforms(self):
platform_list = get_optimized_platforms()
self.assertTrue(len(platform_list) > 0)
self.assertTrue("p4d.24xlarge" in platform_list)
@unittest.skipUnless(os.environ.get('AWS_TEST_S3'), 'set env var to run test: AWS_TEST_S3')
class S3RequestTest(NativeResourceTest):
def setUp(self):
super().setUp()
# TODO: use env-vars to customize how these tests are run, instead of relying on hard-coded values
self.get_test_object_path = "/get_object_test_10MB.txt"
self.put_test_object_path = "/put_object_test_py_10MB.txt"
self.region = "us-west-2"
self.bucket_name = "aws-crt-canary-bucket"
self.timeout = 100 # seconds
self.num_threads = 0
self.special_path = "put_object_test_10MB@$%.txt"
self.non_ascii_file_name = "ÉxÅmple.txt"
self.part_size = 5 * MB
self.response_headers = None
self.response_status_code = None
self.received_body_len = 0
self.transferred_len = 0
self.data_len = 0
self.progress_invoked = 0
self.done_error = None
self.done_status_code = None
self.done_error_headers = None
self.done_error_body = None
self.done_error_operation_name = None
self.done_did_validate_checksum = None
self.done_checksum_validation_algorithm = None
self.files = FileCreator()
self.temp_put_obj_file_path = self.files.create_file_with_size("temp_put_obj_10mb", 10 * MB)
self.s3express_preload_cache = [('key_1', AwsCredentials("accesskey_1", "secretAccessKey", "sessionToken")),
('key_2', AwsCredentials("accesskey_2", "secretAccessKey", "sessionToken"))]
def tearDown(self):
self.files.remove_all()
self.s3express_preload_cache = None
super().tearDown()
def _build_endpoint_string(self, region, bucket_name, enable_s3express=False):
if enable_s3express:
return S3EXPRESS_ENDPOINT
return bucket_name + ".s3." + region + ".amazonaws.com"
def _get_object_request(self, object_path, enable_s3express=False):
headers = HttpHeaders([("host", self._build_endpoint_string(self.region, self.bucket_name, enable_s3express))])
request = HttpRequest("GET", object_path, headers)
return request
def _put_object_request(
self,
input_stream,
content_len,
path=None,
unknown_content_length=False,
enable_s3express=False):
# if send file path is set, the body_stream of http request will be ignored (using file handler from C instead)
headers = HttpHeaders([("host", self._build_endpoint_string(self.region, self.bucket_name, enable_s3express)),
("Content-Type", "text/plain")])
if unknown_content_length is False:
headers.add("Content-Length", str(content_len))
if path is None:
path = self.put_test_object_path
request = HttpRequest("PUT", path, headers, input_stream)
return request
def _on_request_headers(self, status_code, headers, **kargs):
self.response_status_code = status_code
self.response_headers = headers
def _on_request_body(self, chunk, offset, **kargs):
self.received_body_len = self.received_body_len + len(chunk)
def _on_request_done(
self,
error,
error_headers,
error_body,
error_operation_name,
status_code,
did_validate_checksum,
checksum_validation_algorithm,
**kwargs):
self.done_error = error
self.done_error_headers = error_headers
self.done_error_body = error_body
self.done_error_operation_name = error_operation_name
self.done_status_code = status_code
self.done_did_validate_checksum = did_validate_checksum
self.done_checksum_validation_algorithm = checksum_validation_algorithm
def _on_progress(self, progress):
self.transferred_len += progress
def _validate_successful_response(self, is_put_object):
self.assertEqual(self.response_status_code, 200, "status code is not 200")
self.assertEqual(self.done_status_code, self.response_status_code,
"status-code from on_done doesn't match code from on_headers")
self.assertIsNone(self.done_error)
self.assertIsNone(self.done_error_headers)
self.assertIsNone(self.done_error_body)
self.assertIsNone(self.done_error_operation_name)
self.assertIsInstance(self.done_did_validate_checksum, bool)
if self.done_did_validate_checksum:
self.assertIsInstance(self.done_checksum_validation_algorithm, S3ChecksumAlgorithm)
else:
self.assertIsNone(self.done_checksum_validation_algorithm)
headers = HttpHeaders(self.response_headers)
self.assertIsNone(headers.get("Content-Range"))
body_length = headers.get("Content-Length")
if not is_put_object:
self.assertIsNotNone(body_length, "Content-Length is missing from headers")
if body_length:
self.assertEqual(
int(body_length),
self.received_body_len,
"Received body length does not match the Content-Length header")
def _test_s3_put_get_object(
self,
request,
request_type,
exception_name=None,
enable_s3express=False,
mem_limit=None,
**kwargs):
s3_client = s3_client_new(
False,
self.region,
self.part_size,
enable_s3express=enable_s3express,
mem_limit=mem_limit)
signing_config = None
if enable_s3express:
signing_config = AwsSigningConfig(
algorithm=AwsSigningAlgorithm.V4_S3EXPRESS)
s3_request = s3_client.make_request(
request=request,
type=request_type,
signing_config=signing_config,
on_headers=self._on_request_headers,
on_body=self._on_request_body,
on_done=self._on_request_done,
**kwargs)
finished_future = s3_request.finished_future
shutdown_event = s3_request.shutdown_event
s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
if exception_name is None:
try:
finished_future.result()
self._validate_successful_response(request_type is S3RequestType.PUT_OBJECT)
except S3ResponseError as e:
print(e.status_code)
print(e.headers)
print(e.body)
raise e
else:
e = finished_future.exception()
self.assertEqual(e.name, exception_name)
self.assertEqual(e, self.done_error)
def test_get_object(self):
request = self._get_object_request(self.get_test_object_path)
self._test_s3_put_get_object(request, S3RequestType.GET_OBJECT)
def test_get_object_mem_limit(self):
request = self._get_object_request(self.get_test_object_path)
self._test_s3_put_get_object(request, S3RequestType.GET_OBJECT, mem_limit=2 * GB)
def test_put_object(self):
put_body_stream = open(self.temp_put_obj_file_path, "rb")
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(put_body_stream, content_length)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT)
put_body_stream.close()
def test_put_object_mem_limit(self):
put_body_stream = open(self.temp_put_obj_file_path, "rb")
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(put_body_stream, content_length)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT, mem_limit=2 * GB)
put_body_stream.close()
def test_put_object_unknown_content_length(self):
put_body_stream = open(self.temp_put_obj_file_path, "rb")
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(put_body_stream, content_length, unknown_content_length=True)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT)
put_body_stream.close()
def test_put_object_unknown_content_length_single_part(self):
data_bytes = "test crt python single part upload".encode(encoding='utf-8')
put_body_stream = BytesIO(data_bytes)
request = self._put_object_request(put_body_stream, len(data_bytes), unknown_content_length=True)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT)
put_body_stream.close()
def test_get_object_s3express(self):
self.region = "us-east-1"
request = self._get_object_request("/crt-download-10MB", enable_s3express=True)
self._test_s3_put_get_object(request, S3RequestType.GET_OBJECT, enable_s3express=True)
def test_put_object_s3express(self):
self.region = "us-east-1"
put_body_stream = open(self.temp_put_obj_file_path, "rb")
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(put_body_stream, content_length, enable_s3express=True)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT, enable_s3express=True)
put_body_stream.close()
def test_put_object_multiple_times(self):
s3_client = s3_client_new(False, self.region, 5 * MB)
finished_futures = []
for i in range(3):
tempfile = self.files.create_file_with_size("temp_file_{}".format(str(i)), 10 * MB)
path = "/put_object_test_py_10MB_{}.txt".format(str(i))
content_length = os.stat(tempfile).st_size
request = self._put_object_request(None, content_length, path=path)
s3_request = s3_client.make_request(
request=request,
type=S3RequestType.PUT_OBJECT,
send_filepath=tempfile,
on_headers=self._on_request_headers,
on_body=self._on_request_body,
on_done=self._on_request_done)
finished_futures.append(s3_request.finished_future)
# request keeps connection alive. delete pointer so connection can shut down
del s3_request
try:
for future in finished_futures:
future.result(self.timeout)
except Exception as e:
# failed
self.assertTrue(False)
client_shutdown_event = s3_client.shutdown_event
del s3_client
self.assertTrue(client_shutdown_event.wait(self.timeout))
def test_put_object_request_override_part_size(self):
s3_client = s3_client_new(False, self.region, 5 * MB)
tempfile = self.files.create_file_with_size("temp_file_override", 10 * MB)
path = "/put_object_test_py_10MB_override.txt"
content_length = os.stat(tempfile).st_size
request = self._put_object_request(None, content_length, path=path)
# Override the threshold to 10 MB, which will result in a single part upload
s3_request = s3_client.make_request(
request=request,
type=S3RequestType.PUT_OBJECT,
send_filepath=tempfile,
on_headers=self._on_request_headers,
on_body=self._on_request_body,
on_done=self._on_request_done,
multipart_upload_threshold=10 * MB)
try:
s3_request.finished_future.result(self.timeout)
except Exception as e:
# failed
self.assertTrue(False)
# Etag headers for a MPU will be formatted with `-[part number]`
etag = HttpHeaders(self.response_headers).get("Etag")
# make sure we uploaded as single part as we override the threshold
self.assertFalse("-" in etag)
del s3_request
client_shutdown_event = s3_client.shutdown_event
del s3_client
self.assertTrue(client_shutdown_event.wait(self.timeout))
def test_get_object_filepath(self):
request = self._get_object_request(self.get_test_object_path)
request_type = S3RequestType.GET_OBJECT
s3_client = s3_client_new(False, self.region, 5 * MB)
with tempfile.NamedTemporaryFile(mode="w", delete=False) as file:
file.close()
s3_request = s3_client.make_request(
request=request,
type=request_type,
recv_filepath=file.name,
on_headers=self._on_request_headers,
on_progress=self._on_progress,
on_done=self._on_request_done)
finished_future = s3_request.finished_future
# Regression test: Let S3Request get GC'd early.
# The download should continue without problems.
# We once had a bug where the file would get closed too early:
# https://github.com/awslabs/aws-crt-python/pull/506
del s3_request
finished_future.result(self.timeout)
# Result check
self.data_len = int(HttpHeaders(self.response_headers).get("Content-Length"))
file_stats = os.stat(file.name)
file_len = file_stats.st_size
self.assertEqual(
file_len,
self.transferred_len,
"the length of written file does not match the transferred length reported")
self.assertEqual(
self.data_len,
self.transferred_len,
"the transferred length reported does not match the content-length header")
self.assertEqual(self.response_status_code, 200, "status code is not 200")
# TODO verify the content of written file
os.remove(file.name)
def test_put_object_filepath(self):
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(None, content_length)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT, send_filepath=self.temp_put_obj_file_path)
def test_put_object_filepath_with_fio_options(self):
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(None, content_length)
fio_options = S3FileIoOptions(should_stream=True, disk_throughput_gbps=10.0, direct_io=True)
self._test_s3_put_get_object(
request,
S3RequestType.PUT_OBJECT,
send_filepath=self.temp_put_obj_file_path,
fio_options=fio_options)
def test_put_object_filepath_unknown_content_length(self):
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(None, content_length, unknown_content_length=True)
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT, send_filepath=self.temp_put_obj_file_path)
def test_put_object_filepath_move(self):
# remove the input file when request done
tempfile = self.files.create_file_with_size("temp_file", 10 * MB)
content_length = os.stat(tempfile).st_size
request = self._put_object_request(None, content_length)
s3_client = s3_client_new(False, self.region, 5 * MB)
request_type = S3RequestType.PUT_OBJECT
done_future = Future()
def on_done_remove_file(**kwargs):
self._on_request_done(**kwargs)
os.remove(tempfile)
done_future.set_result(None)
s3_client.make_request(
request=request,
type=request_type,
send_filepath=tempfile,
on_headers=self._on_request_headers,
on_progress=self._on_progress,
on_done=on_done_remove_file)
done_future.result(self.timeout)
# check result
self.assertEqual(
content_length,
self.transferred_len,
"the transferred length reported does not match body we sent")
self._validate_successful_response(request_type is S3RequestType.PUT_OBJECT)
def upload_with_global_client(self):
global CRT_S3_CLIENT
if CRT_S3_CLIENT is None:
CRT_S3_CLIENT = s3_client_new(False, self.region, 5 * MB)
put_body_stream = open(self.temp_put_obj_file_path, "rb")
content_length = os.stat(self.temp_put_obj_file_path).st_size
request = self._put_object_request(put_body_stream, content_length)
s3_request = CRT_S3_CLIENT.make_request(
request=request,
type=S3RequestType.PUT_OBJECT,
on_headers=self._on_request_headers,
on_body=self._on_request_body,
on_done=self._on_request_done)
shutdown_event = s3_request.shutdown_event
s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
put_body_stream.close()
def fork_s3_client(self):
try:
# init_logging(LogLevel.Trace, f"aws-crt-python{os.getpid()}.log")
self.upload_with_global_client()
global CRT_S3_CLIENT
del CRT_S3_CLIENT
exit(0)
except Exception as e:
print(f"fork_s3_client error: {e}")
exit(-1)
def before_fork(self):
global CRT_S3_CLIENT
try:
if CRT_S3_CLIENT is not None:
# The client is not safe to use after fork, so we need to release it.
# make sure the client is shutdown properly before fork
# also wait for every thread to be joined, incase of some thread is in the middle of cleanup.
shutdown_event = CRT_S3_CLIENT.shutdown_event
CRT_S3_CLIENT = None
gc.collect()
self.assertTrue(shutdown_event.wait(self.timeout))
self.assertTrue(join_all_native_threads(timeout_sec=10))
except Exception as e:
print(f"before_fork error: {e}")
# fail hard as exceptions raised from the fork handler will be ignored.
sys.stdout.flush()
sys.stderr.flush()
os._exit(-1)
@unittest.skipIf(sys.platform.startswith('win') or sys.platform == 'darwin',
"Test skipped on Windows and macOS. Windows doesn't support fork. macOS has background threads crashes the forked process.")
def test_fork_workaround(self):
# mock the boto3 use case where a global client is used and the
# workaround for fork is to release the client from the fork handler.
global CRT_S3_CLIENT
CRT_S3_CLIENT = s3_client_new(False, self.region, 5 * MB)
self.upload_with_global_client()
# fork the process and use the global S3 client for the transfer.
# to workaround the background thread issue that cleaned after fork,
# we need to make sure the client is shutdown properly
# and all background threads has joined before fork, see `self.before_fork`
# And in the sub-process, we can recreate the global S3 client and use it.
os.register_at_fork(before=self.before_fork)
mp.set_start_method('fork', force=True)
process = Process(target=self.fork_s3_client)
process.start()
process.join()
self.assertEqual(0, process.exitcode)
self.upload_with_global_client()
del CRT_S3_CLIENT
def _round_trip_with_checksums_helper(
self,
algo=S3ChecksumAlgorithm.CRC32,
mpu=True,
provide_full_object_checksum=False):
if not mpu:
# increase the part size for the client to use single part upload
self.part_size = 20 * MB
put_body_stream = open(self.temp_put_obj_file_path, "rb")
content_length = os.stat(self.temp_put_obj_file_path).st_size
# construct different path to prevent race condition between tests
path = '/hello-world-' + algo.name
if mpu:
path += "-mpu"
if provide_full_object_checksum:
path += "-full-object"
if algo == S3ChecksumAlgorithm.CRC32:
checksum_header_name = 'x-amz-checksum-crc32'
checksum_str = 'a9ccsg=='
elif algo == S3ChecksumAlgorithm.CRC64NVME:
checksum_header_name = 'x-amz-checksum-crc64nvme'
checksum_str = 'tPMvgM0jSDQ='
else:
raise Exception("Checksum algo not supported by test helper")
# upload, with client adding checksum
upload_request = self._put_object_request(put_body_stream, content_length, path=path)
upload_checksum_config = S3ChecksumConfig(
algorithm=algo,
location=S3ChecksumLocation.TRAILER)
if provide_full_object_checksum:
upload_request.headers.add(checksum_header_name, checksum_str)
# checksum will be provided from the header, don't set the checksum configs
upload_checksum_config = None
self._test_s3_put_get_object(upload_request, S3RequestType.PUT_OBJECT,
checksum_config=upload_checksum_config)
# download, with client validating checksum
download_request = self._get_object_request(path)
download_checksum_config = S3ChecksumConfig(validate_response=True)
self._test_s3_put_get_object(download_request, S3RequestType.GET_OBJECT,
checksum_config=download_checksum_config)
self.assertTrue(self.done_did_validate_checksum)
self.assertEqual(self.done_checksum_validation_algorithm, algo)
self.assertEqual(HttpHeaders(self.response_headers).get(checksum_header_name),
checksum_str)
put_body_stream.close()
def test_round_trip_with_trailing_checksum(self):
self._round_trip_with_checksums_helper(S3ChecksumAlgorithm.CRC32, mpu=False)
def test_round_trip_with_full_object_checksum_mpu(self):
self._round_trip_with_checksums_helper(
S3ChecksumAlgorithm.CRC64NVME,
mpu=True,
provide_full_object_checksum=True)
def test_round_trip_with_full_object_checksum_single_part(self):
self._round_trip_with_checksums_helper(
S3ChecksumAlgorithm.CRC64NVME,
mpu=False,
provide_full_object_checksum=True)
def test_round_trip_with_full_object_checksum_mpu_crc32(self):
self._round_trip_with_checksums_helper(S3ChecksumAlgorithm.CRC32, mpu=True, provide_full_object_checksum=True)
def test_round_trip_with_full_object_checksum_single_part_crc32(self):
self._round_trip_with_checksums_helper(S3ChecksumAlgorithm.CRC32, mpu=False, provide_full_object_checksum=True)
def _on_progress_cancel_after_first_chunk(self, progress):
self.transferred_len += progress
self.progress_invoked += 1
self.s3_request.cancel()
def test_multipart_get_object_cancel(self):
# a 5 GB file
request = self._get_object_request("/get_object_test_5120MB.txt")
s3_client = s3_client_new(False, self.region, 5 * MB, is_cancel_test=True)
with tempfile.NamedTemporaryFile(mode="w", delete=False) as file:
file.close()
self.s3_request = s3_client.make_request(
request=request,
recv_filepath=file.name,
type=S3RequestType.GET_OBJECT,
on_headers=self._on_request_headers,
on_progress=self._on_progress_cancel_after_first_chunk,
on_done=self._on_request_done)
finished_future = self.s3_request.finished_future
e = finished_future.exception(self.timeout)
self.assertEqual(e.name, "AWS_ERROR_S3_CANCELED")
# Result check
self.data_len = int(HttpHeaders(self.response_headers).get("Content-Length"))
self.assertLess(
self.transferred_len,
self.data_len,
"the cancel failed to block all the following body")
# The on_finish callback may invoke the progress
self.assertLessEqual(self.progress_invoked, 2)
shutdown_event = self.s3_request.shutdown_event
self.s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
os.remove(file.name)
def test_get_object_quick_cancel(self):
# a 5 GB file
request = self._get_object_request("/get_object_test_5120MB.txt")
s3_client = s3_client_new(False, self.region, 5 * MB, is_cancel_test=True)
with tempfile.NamedTemporaryFile(mode="w", delete=False) as file:
file.close()
s3_request = s3_client.make_request(
request=request,
recv_filepath=file.name,
type=S3RequestType.GET_OBJECT,
on_headers=self._on_request_headers,
on_progress=self._on_progress,
on_done=self._on_request_done)
s3_request.cancel()
finished_future = s3_request.finished_future
e = finished_future.exception(self.timeout)
self.assertEqual(e.name, "AWS_ERROR_S3_CANCELED")
shutdown_event = s3_request.shutdown_event
s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
os.remove(file.name)
def _put_object_cancel_helper(self, cancel_after_read):
read_future = Future()
put_body_stream = FakeReadStream(read_future)
data_len = 10 * GB # some fake length
headers = HttpHeaders([("host", self._build_endpoint_string(self.region, self.bucket_name)),
("Content-Type", "text/plain"), ("Content-Length", str(data_len))])
http_request = HttpRequest("PUT", "/cancelled_request", headers, put_body_stream)
s3_client = s3_client_new(False, self.region, 8 * MB, is_cancel_test=True)
s3_request = s3_client.make_request(
request=http_request,
type=S3RequestType.PUT_OBJECT,
on_headers=self._on_request_headers,
on_done=self._on_request_done)
if cancel_after_read:
read_future.result(self.timeout)
s3_request.cancel()
finished_future = s3_request.finished_future
e = finished_future.exception(self.timeout)
self.assertEqual(e.name, "AWS_ERROR_S3_CANCELED")
shutdown_event = s3_request.shutdown_event
s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
# TODO If CLI installed, run the following command to ensure the cancel succeed.
# aws s3api list-multipart-uploads --bucket aws-crt-canary-bucket --prefix 'cancelled_request'
# Nothing should printout
def test_multipart_put_object_cancel(self):
return self._put_object_cancel_helper(True)
def test_put_object_quick_cancel(self):
return self._put_object_cancel_helper(False)
def test_singlepart_upload_with_invalid_request(self):
# send upload with incorrect Content-MD5
# need to do single-part upload so the Content-MD5 header is sent along as-is.
content_length = 100
file_path = self.files.create_file_with_size("temp_file", content_length)
put_body_stream = open(file_path, "r+b")
request = self._put_object_request(put_body_stream, content_length)
request.headers.set("Content-MD5", "something")
self._test_s3_put_get_object(request, S3RequestType.PUT_OBJECT, "AWS_ERROR_S3_INVALID_RESPONSE_STATUS")
# check that data from on_done callback came through correctly
self.assertIsInstance(self.done_error, S3ResponseError)
self.assertEqual(self.done_status_code, 400)
self.assertEqual(self.done_error.status_code, 400)
self.assertIsNotNone(self.done_error_headers)
self.assertTrue(any(h[0].lower() == 'x-amz-request-id' for h in self.done_error_headers))
self.assertListEqual(self.done_error_headers, self.done_error.headers)
self.assertIsNotNone(self.done_error_body)
self.assertEqual(self.done_error_operation_name, "PutObject")
self.assertEqual(self.done_error_operation_name, self.done_error.operation_name)
self.assertTrue(b"InvalidDigest" in self.done_error_body)
self.assertEqual(self.done_error_body, self.done_error.body)
put_body_stream.close()
def test_default_request_failure(self):
# send invalid DEFAULT S3Request
# ensure error info (including custom operation_name) comes through correctly
s3_client = S3Client(region=self.region)
# send invalid request to S3.
http_request = HttpRequest(method="GET", path="/obviously-invalid-path-object-does-not-exist")
http_request.headers.add("host", self._build_endpoint_string(self.region, self.bucket_name))
http_request.headers.add("content-length", "0")
s3_request = s3_client.make_request(
type=S3RequestType.DEFAULT,
request=http_request,
operation_name="MyNewOperationName")
exception = s3_request.finished_future.exception(self.timeout)
self.assertIsInstance(exception, S3ResponseError)
self.assertEqual(exception.operation_name, "MyNewOperationName")
def test_on_headers_callback_failure(self):
def _explode(**kwargs):
raise RuntimeError("Error in on_headers callback")
request = self._get_object_request(self.get_test_object_path)
s3_client = s3_client_new(False, self.region, 5 * MB)
s3_request = s3_client.make_request(
request=request,
type=S3RequestType.GET_OBJECT,
on_headers=_explode,
on_body=self._on_request_body,
)
finished_future = s3_request.finished_future
shutdown_event = s3_request.shutdown_event
s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
e = finished_future.exception()
# check that data from on_done callback came through correctly
self.assertIsInstance(e, RuntimeError)
self.assertEqual(str(e), "Error in on_headers callback")
def test_on_body_callback_failure(self):
def _explode(**kwargs):
raise RuntimeError("Error in on_body callback")
request = self._get_object_request(self.get_test_object_path)
s3_client = s3_client_new(False, self.region, 5 * MB)
s3_request = s3_client.make_request(
request=request,
type=S3RequestType.GET_OBJECT,
on_headers=self._on_request_headers,
on_body=_explode,
)
finished_future = s3_request.finished_future
shutdown_event = s3_request.shutdown_event
s3_request = None
self.assertTrue(shutdown_event.wait(self.timeout))
e = finished_future.exception()
# check that data from on_done callback came through correctly
self.assertIsInstance(e, RuntimeError)
self.assertEqual(str(e), "Error in on_body callback")
def test_special_filepath_upload(self):
# remove the input file when request done
content_length = 10 * MB
special_path = self.files.create_file_with_size(self.special_path, content_length)
request = self._put_object_request(None, content_length)
s3_client = s3_client_new(False, self.region, 5 * MB)
request_type = S3RequestType.PUT_OBJECT
event_loop_group = EventLoopGroup()
host_resolver = DefaultHostResolver(event_loop_group)
bootstrap = ClientBootstrap(event_loop_group, host_resolver)
credential_provider = AwsCredentialsProvider.new_default_chain(bootstrap)
# Let signer to normalize uri path for us.
signing_config = AwsSigningConfig(
algorithm=AwsSigningAlgorithm.V4,
signature_type=AwsSignatureType.HTTP_REQUEST_HEADERS,
service="s3",
signed_body_header_type=AwsSignedBodyHeaderType.X_AMZ_CONTENT_SHA_256,
signed_body_value=AwsSignedBodyValue.UNSIGNED_PAYLOAD,
region=self.region,
credentials_provider=credential_provider,
use_double_uri_encode=False,
should_normalize_uri_path=True,
)
s3_request = s3_client.make_request(
request=request,
type=request_type,
send_filepath=special_path,
signing_config=signing_config,
on_headers=self._on_request_headers,
on_progress=self._on_progress,
on_done=self._on_request_done)
finished_future = s3_request.finished_future
finished_future.result(self.timeout)
# check result
self.assertEqual(
content_length,
self.transferred_len,
"the transferred length reported does not match body we sent")
self._validate_successful_response(request_type is S3RequestType.PUT_OBJECT)
os.remove(special_path)
def test_non_ascii_filepath_upload(self):
# remove the input file when request done
content_length = 10 * MB
non_ascii_file_path = self.files.create_file_with_size(self.non_ascii_file_name, content_length)
request = self._put_object_request(None, content_length)
s3_client = s3_client_new(False, self.region, 5 * MB)
request_type = S3RequestType.PUT_OBJECT
s3_request = s3_client.make_request(
request=request,
type=request_type,
send_filepath=non_ascii_file_path,
on_headers=self._on_request_headers,
on_progress=self._on_progress,
on_done=self._on_request_done)
finished_future = s3_request.finished_future
finished_future.result(self.timeout)
# check result
self.assertEqual(
content_length,
self.transferred_len,
"the transferred length reported does not match body we sent")
self._validate_successful_response(request_type is S3RequestType.PUT_OBJECT)
def test_non_ascii_filepath_download(self):
non_ascii_file_path = self.files.create_file_with_size(self.non_ascii_file_name, 0)
request = self._get_object_request(self.get_test_object_path)
request_type = S3RequestType.GET_OBJECT
s3_client = s3_client_new(False, self.region, 5 * MB)
s3_request = s3_client.make_request(
request=request,
type=request_type,
recv_filepath=non_ascii_file_path,
on_headers=self._on_request_headers,
on_progress=self._on_progress,
on_done=self._on_request_done)
finished_future = s3_request.finished_future
finished_future.result(self.timeout)
# Result check
self.data_len = int(HttpHeaders(self.response_headers).get("Content-Length"))
file_stats = os.stat(non_ascii_file_path)
file_len = file_stats.st_size
self.assertEqual(
file_len,
self.transferred_len,
"the length of written file does not match the transferred length reported")
self.assertEqual(
self.data_len,
self.transferred_len,
"the transferred length reported does not match the content-length header")
self.assertEqual(self.response_status_code, 200, "status code is not 200")
if __name__ == '__main__':
unittest.main()
|