1
# Copyright (C) 2005, 2006 Canonical Ltd
3
# This program is free software; you can redistribute it and/or modify
4
# it under the terms of the GNU General Public License as published by
5
# the Free Software Foundation; either version 2 of the License, or
6
# (at your option) any later version.
8
# This program is distributed in the hope that it will be useful,
9
# but WITHOUT ANY WARRANTY; without even the implied warranty of
10
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11
# GNU General Public License for more details.
13
# You should have received a copy of the GNU General Public License
14
# along with this program; if not, write to the Free Software
15
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
17
"""Tests from HTTP response parsing."""
19
from cStringIO import StringIO
22
from bzrlib import errors
23
from bzrlib.transport import http
24
from bzrlib.transport.http import response
25
from bzrlib.tests import TestCase
28
class TestResponseRange(TestCase):
29
"""Test the ResponseRange class."""
32
RR = response.ResponseRange
35
self.assertTrue(r1 < r2)
36
self.assertFalse(r1 > r2)
37
self.assertTrue(r1 < 5)
38
self.assertFalse(r2 < 5)
40
self.assertEqual(RR(0, 10, 5), RR(0, 10, 5))
41
self.assertNotEqual(RR(0, 10, 5), RR(0, 8, 5))
42
self.assertNotEqual(RR(0, 10, 5), RR(0, 10, 6))
44
def test_sort_list(self):
45
"""Ensure longer ranges are sorted after shorter ones"""
46
RR = response.ResponseRange
47
lst = [RR(3, 8, 0), 5, RR(3, 7, 0), 6]
49
self.assertEqual([RR(3,7,0), RR(3,8,0), 5, 6], lst)
52
class TestRangeFile(TestCase):
56
content = "abcdefghijklmnopqrstuvwxyz"
57
self.fp = response.RangeFile('foo', StringIO(content))
58
self.fp._add_range(0, 9, 0)
59
self.fp._add_range(20, 29, 10)
60
self.fp._add_range(30, 39, 15)
62
def test_valid_accesses(self):
63
"""Test so that valid accesses work to the file."""
65
self.assertEquals(self.fp.read(3), 'abc')
66
self.assertEquals(self.fp.read(3), 'def')
67
self.assertEquals(self.fp.tell(), 6)
69
self.assertEquals(self.fp.read(3), 'klm')
70
self.assertEquals(self.fp.read(2), 'no')
71
self.assertEquals(self.fp.tell(), 25)
72
# should wrap over to 30-39 entity
73
self.assertEquals(self.fp.read(3), 'pqr')
75
self.assertEquals(self.fp.read(3), 'def')
76
self.assertEquals(self.fp.tell(), 6)
78
def test_invalid_accesses(self):
79
"""Test so that invalid accesses trigger errors."""
81
self.assertRaises(errors.InvalidRange, self.fp.read, 2)
83
self.assertRaises(errors.InvalidRange, self.fp.read, 2)
85
self.assertRaises(errors.InvalidRange, self.fp.read, 2)
87
def test__finish_ranges(self):
88
"""Test that after RangeFile._finish_ranges the list is sorted."""
89
self.fp._add_range(1, 2, 3)
90
self.fp._add_range(8, 9, 10)
91
self.fp._add_range(3, 4, 5)
93
# TODO: jam 20060706 If we switch to inserting
94
# in sorted order, remove this test
95
self.assertNotEqual(self.fp._ranges, sorted(self.fp._ranges))
97
self.fp._finish_ranges()
98
self.assertEqual(self.fp._ranges, sorted(self.fp._ranges))
100
def test_seek_and_tell(self):
101
# Check for seeking before start
103
self.assertEqual(0, self.fp.tell())
106
self.assertEqual(5, self.fp.tell())
109
self.assertEqual(3, self.fp.tell())
111
# TODO: jam 20060706 following tests will fail if this
112
# is not true, and would be difficult to debug
113
# but it is a layering violation
114
self.assertEqual(39, self.fp._len)
117
self.assertEqual(39, self.fp.tell())
120
self.assertEqual(29, self.fp.tell())
122
self.assertRaises(ValueError, self.fp.seek, 0, 4)
123
self.assertRaises(ValueError, self.fp.seek, 0, -1)
126
class TestRegexes(TestCase):
128
def assertRegexMatches(self, groups, text):
129
"""Check that the regex matches and returns the right values"""
130
m = self.regex.match(text)
131
self.assertNotEqual(None, m, "text %s did not match regex" % (text,))
133
self.assertEqual(groups, m.groups())
135
def test_range_re(self):
136
"""Test that we match valid ranges."""
137
self.regex = response.HttpRangeResponse._CONTENT_RANGE_RE
138
self.assertRegexMatches(('bytes', '1', '10', '11'),
140
self.assertRegexMatches(('bytes', '1', '10', '11'),
142
self.assertRegexMatches(('bytes', '2123', '4242', '1231'),
143
'\tbytes 2123-4242/1231 ')
144
self.assertRegexMatches(('chars', '1', '2', '3'),
147
def test_content_type_re(self):
148
self.regex = response.HttpMultipartRangeResponse._CONTENT_TYPE_RE
149
self.assertRegexMatches(('', 'xxyyzz'),
150
'multipart/byteranges; boundary = xxyyzz')
151
self.assertRegexMatches(('', 'xxyyzz'),
152
'multipart/byteranges;boundary=xxyyzz')
153
self.assertRegexMatches(('', 'xx yy zz'),
154
' multipart/byteranges ; boundary= xx yy zz ')
155
self.assertRegexMatches(('"', 'xx yy zz'),
156
' multipart/byteranges ; boundary= "xx yy zz" ')
157
self.assertEqual(None,
159
' multipart/byteranges ; boundary= "xx yy zz '))
160
self.assertEqual(None,
162
' multipart/byteranges ; boundary= xx yy zz" '))
163
self.assertEqual(None,
164
self.regex.match('multipart byteranges;boundary=xx'))
170
Content-range: bytes 1-10/20\r
174
Content-Range: bytes 21-30/20\r
179
content-range: bytes 41-50/20\r
183
content-range: bytes 51-60/20\r
189
class TestHelpers(TestCase):
190
"""Test the helper functions"""
192
def test__parse_range(self):
193
"""Test that _parse_range acts reasonably."""
194
content = StringIO('')
195
parse_range = response.HttpRangeResponse._parse_range
196
self.assertEqual((1,2), parse_range('bytes 1-2/3'))
197
self.assertEqual((10,20), parse_range('bytes 10-20/2'))
199
self.assertRaises(errors.InvalidHttpRange, parse_range, 'char 1-3/2')
200
self.assertRaises(errors.InvalidHttpRange, parse_range, 'bytes a-3/2')
203
parse_range('bytes x-10/3', path='http://foo/bar')
204
except errors.InvalidHttpRange, e:
205
self.assertContainsRe(str(e), 'http://foo/bar')
206
self.assertContainsRe(str(e), 'bytes x-10/3')
208
self.fail('Did not raise InvalidHttpRange')
210
def test__parse_boundary_simple(self):
211
"""Test that _parse_boundary handles Content-type properly"""
212
parse_boundary = response.HttpMultipartRangeResponse._parse_boundary
213
m = parse_boundary(' multipart/byteranges; boundary=xxyyzz')
214
self.assertNotEqual(None, m)
215
# Check that the returned regex is capable of splitting simple_data
216
matches = list(m.finditer(simple_data))
217
self.assertEqual(4, len(matches))
219
# match.group() should be the content-range entry
220
# and match.end() should be the start of the content
221
self.assertEqual(' bytes 1-10/20', matches[0].group(1))
222
self.assertEqual(simple_data.find('1234567890'), matches[0].end())
223
self.assertEqual(' bytes 21-30/20', matches[1].group(1))
224
self.assertEqual(simple_data.find('abcdefghij'), matches[1].end())
225
self.assertEqual(' bytes 41-50/20', matches[2].group(1))
226
self.assertEqual(simple_data.find('zyxwvutsrq'), matches[2].end())
227
self.assertEqual(' bytes 51-60/20', matches[3].group(1))
228
self.assertEqual(simple_data.find('xxyyzz fbd'), matches[3].end())
230
def test__parse_boundary_invalid(self):
231
parse_boundary = response.HttpMultipartRangeResponse._parse_boundary
233
parse_boundary(' multipart/bytes;boundary=xxyyzz',
234
path='http://foo/bar')
235
except errors.InvalidHttpContentType, e:
236
self.assertContainsRe(str(e), 'http://foo/bar')
237
self.assertContainsRe(str(e), 'multipart/bytes;boundary=xxyyzz')
239
self.fail('Did not raise InvalidHttpContentType')
242
class TestHttpRangeResponse(TestCase):
244
def test_smoketest(self):
245
"""A basic test that HttpRangeResponse is reasonable."""
246
content = StringIO('0123456789')
247
f = response.HttpRangeResponse('http://foo', 'bytes 1-10/9', content)
248
self.assertEqual([response.ResponseRange(1,10,0)], f._ranges)
251
self.assertRaises(errors.InvalidRange, f.read, 2)
253
self.assertEqual('012345', f.read(6))
255
def test_invalid(self):
257
f = response.HttpRangeResponse('http://foo', 'bytes x-10/9',
258
StringIO('0123456789'))
259
except errors.InvalidHttpRange, e:
260
self.assertContainsRe(str(e), 'http://foo')
261
self.assertContainsRe(str(e), 'bytes x-10/9')
263
self.fail('Failed to raise InvalidHttpRange')
266
class TestHttpMultipartRangeResponse(TestCase):
267
"""Test the handling of multipart range responses"""
269
def test_simple(self):
270
content = StringIO(simple_data)
271
multi = response.HttpMultipartRangeResponse('http://foo',
272
'multipart/byteranges; boundary = xxyyzz', content)
274
self.assertEqual(4, len(multi._ranges))
277
self.assertEqual('1234567890', multi.read(10))
279
self.assertEqual('abcdefghij', multi.read(10))
281
self.assertEqual('zyxwvutsrq', multi.read(10))
283
self.assertEqual('xxyyzz fbd', multi.read(10))
284
# TODO: jam 20060706 Currently RangeFile does not support
285
# reading across ranges. Consider adding it.
287
# self.assertEqual('zyxwvutsrqxxyyzz fbd', multi.read(20))
288
self.assertRaises(errors.InvalidRange, multi.read, 20)
291
self.assertRaises(errors.InvalidRange, multi.read, 11)
293
self.assertRaises(errors.InvalidRange, multi.read, 10)
295
def test_invalid(self):
296
content = StringIO('')
298
response.HttpMultipartRangeResponse('http://foo',
299
'multipart/byte;boundary=invalid', content)
300
except errors.InvalidHttpContentType, e:
301
self.assertContainsRe(str(e), 'http://foo')
302
self.assertContainsRe(str(e), 'multipart/byte;')
305
# Taken from real request responses
306
_full_text_response = (200, """HTTP/1.1 200 OK\r
307
Date: Tue, 11 Jul 2006 04:32:56 GMT\r
308
Server: Apache/2.0.54 (Fedora)\r
309
Last-Modified: Sun, 23 Apr 2006 19:35:20 GMT\r
310
ETag: "56691-23-38e9ae00"\r
311
Accept-Ranges: bytes\r
314
Content-Type: text/plain; charset=UTF-8\r
316
""", """Bazaar-NG meta directory, format 1
320
_missing_response = (404, """HTTP/1.1 404 Not Found\r
321
Date: Tue, 11 Jul 2006 04:32:56 GMT\r
322
Server: Apache/2.0.54 (Fedora)\r
323
Content-Length: 336\r
325
Content-Type: text/html; charset=iso-8859-1\r
327
""", """<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
329
<title>404 Not Found</title>
332
<p>The requested URL /branches/bzr/jam-integration/.bzr/repository/format was not found on this server.</p>
334
<address>Apache/2.0.54 (Fedora) Server at bzr.arbash-meinel.com Port 80</address>
339
_single_range_response = (206, """HTTP/1.1 206 Partial Content\r
340
Date: Tue, 11 Jul 2006 04:45:22 GMT\r
341
Server: Apache/2.0.54 (Fedora)\r
342
Last-Modified: Thu, 06 Jul 2006 20:22:05 GMT\r
343
ETag: "238a3c-16ec2-805c5540"\r
344
Accept-Ranges: bytes\r
345
Content-Length: 100\r
346
Content-Range: bytes 100-199/93890\r
348
Content-Type: text/plain; charset=UTF-8\r
350
""", """mbp@sourcefrog.net-20050309040815-13242001617e4a06
351
mbp@sourcefrog.net-20050309040929-eee0eb3e6d1e762""")
354
_single_range_no_content_type = (206, """HTTP/1.1 206 Partial Content\r
355
Date: Tue, 11 Jul 2006 04:45:22 GMT\r
356
Server: Apache/2.0.54 (Fedora)\r
357
Last-Modified: Thu, 06 Jul 2006 20:22:05 GMT\r
358
ETag: "238a3c-16ec2-805c5540"\r
359
Accept-Ranges: bytes\r
360
Content-Length: 100\r
361
Content-Range: bytes 100-199/93890\r
364
""", """mbp@sourcefrog.net-20050309040815-13242001617e4a06
365
mbp@sourcefrog.net-20050309040929-eee0eb3e6d1e762""")
368
_multipart_range_response = (206, """HTTP/1.1 206 Partial Content\r
369
Date: Tue, 11 Jul 2006 04:49:48 GMT\r
370
Server: Apache/2.0.54 (Fedora)\r
371
Last-Modified: Thu, 06 Jul 2006 20:22:05 GMT\r
372
ETag: "238a3c-16ec2-805c5540"\r
373
Accept-Ranges: bytes\r
374
Content-Length: 1534\r
376
Content-Type: multipart/byteranges; boundary=418470f848b63279b\r
378
\r""", """--418470f848b63279b\r
379
Content-type: text/plain; charset=UTF-8\r
380
Content-range: bytes 0-254/93890\r
382
mbp@sourcefrog.net-20050309040815-13242001617e4a06
383
mbp@sourcefrog.net-20050309040929-eee0eb3e6d1e7627
384
mbp@sourcefrog.net-20050309040957-6cad07f466bb0bb8
385
mbp@sourcefrog.net-20050309041501-c840e09071de3b67
386
mbp@sourcefrog.net-20050309044615-c24a3250be83220a
388
--418470f848b63279b\r
389
Content-type: text/plain; charset=UTF-8\r
390
Content-range: bytes 1000-2049/93890\r
393
mbp@sourcefrog.net-20050311063625-07858525021f270b
394
mbp@sourcefrog.net-20050311231934-aa3776aff5200bb9
395
mbp@sourcefrog.net-20050311231953-73aeb3a131c3699a
396
mbp@sourcefrog.net-20050311232353-f5e33da490872c6a
397
mbp@sourcefrog.net-20050312071639-0a8f59a34a024ff0
398
mbp@sourcefrog.net-20050312073432-b2c16a55e0d6e9fb
399
mbp@sourcefrog.net-20050312073831-a47c3335ece1920f
400
mbp@sourcefrog.net-20050312085412-13373aa129ccbad3
401
mbp@sourcefrog.net-20050313052251-2bf004cb96b39933
402
mbp@sourcefrog.net-20050313052856-3edd84094687cb11
403
mbp@sourcefrog.net-20050313053233-e30a4f28aef48f9d
404
mbp@sourcefrog.net-20050313053853-7c64085594ff3072
405
mbp@sourcefrog.net-20050313054757-a86c3f5871069e22
406
mbp@sourcefrog.net-20050313061422-418f1f73b94879b9
407
mbp@sourcefrog.net-20050313120651-497bd231b19df600
408
mbp@sourcefrog.net-20050314024931-eae0170ef25a5d1a
409
mbp@sourcefrog.net-20050314025438-d52099f915fe65fc
410
mbp@sourcefrog.net-20050314025539-637a636692c055cf
411
mbp@sourcefrog.net-20050314025737-55eb441f430ab4ba
412
mbp@sourcefrog.net-20050314025901-d74aa93bb7ee8f62
414
--418470f848b63279b--\r
417
_multipart_squid_range_response = (206, """HTTP/1.0 206 Partial Content\r
418
Date: Thu, 31 Aug 2006 21:16:22 GMT\r
419
Server: Apache/2.2.2 (Unix) DAV/2\r
420
Last-Modified: Thu, 31 Aug 2006 17:57:06 GMT\r
421
Accept-Ranges: bytes\r
422
Content-Type: multipart/byteranges; boundary="squid/2.5.STABLE12:C99323425AD4FE26F726261FA6C24196"\r
423
Content-Length: 598\r
424
X-Cache: MISS from localhost.localdomain\r
425
X-Cache-Lookup: HIT from localhost.localdomain:3128\r
426
Proxy-Connection: keep-alive\r
430
--squid/2.5.STABLE12:C99323425AD4FE26F726261FA6C24196\r
431
Content-Type: text/plain\r
432
Content-Range: bytes 0-99/18672\r
436
scott@netsplit.com-20050708230047-47c7868f276b939f fulltext 0 863 :
438
--squid/2.5.STABLE12:C99323425AD4FE26F726261FA6C24196\r
439
Content-Type: text/plain\r
440
Content-Range: bytes 300-499/18672\r
442
com-20050708231537-2b124b835395399a :
443
scott@netsplit.com-20050820234126-551311dbb7435b51 line-delta 1803 479 .scott@netsplit.com-20050820232911-dc4322a084eadf7e :
444
scott@netsplit.com-20050821213706-c86\r
445
--squid/2.5.STABLE12:C99323425AD4FE26F726261FA6C24196--\r
449
_redirect_response = (206, """HTTP/1.1 301 Moved Permanently\r
450
Date: Tue, 18 Jul 2006 20:29:22 GMT\r
451
Server: Apache/2.0.54 (Ubuntu) PHP/4.4.0-3ubuntu1 mod_ssl/2.0.54 OpenSSL/0.9.7g\r
452
Location: http://bazaar-vcs.org/bzr/bzr.dev/.bzr/repository/inventory.knit\r
453
Content-Length: 272\r
454
Keep-Alive: timeout=15, max=100\r
455
Connection: Keep-Alive\r
456
Content-Type: text/html; charset=iso-8859-1\r
458
HTTP/1.1 206 Partial Content\r
459
Date: Tue, 18 Jul 2006 20:29:23 GMT\r
460
Server: Apache/2.0.54 (Ubuntu) PHP/4.4.0-3ubuntu1 mod_ssl/2.0.54 OpenSSL/0.9.7g\r
461
Last-Modified: Tue, 18 Jul 2006 20:24:59 GMT\r
462
ETag: "be8213-83958c-f0d3dcc0"\r
463
Accept-Ranges: bytes\r
464
Content-Length: 425\r
465
Content-Range: bytes 8623075-8623499/8623500\r
466
Keep-Alive: timeout=15, max=100\r
467
Connection: Keep-Alive\r
468
Content-Type: text/plain; charset=UTF-8\r
470
""", """this data intentionally removed,
471
this is not meant to be tested by
472
handle_response, just _extract_headers
477
_invalid_response = (444, """HTTP/1.1 444 Bad Response\r
478
Date: Tue, 11 Jul 2006 04:32:56 GMT\r
480
Content-Type: text/html; charset=iso-8859-1\r
482
""", """<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
484
<title>404 Not Found</title>
487
<p>I don't know what I'm doing</p>
493
# This should be in test_http.py, but the headers we
494
# want to parse are here
495
class TestExtractHeader(TestCase):
497
def use_response(self, response):
498
self.headers = http._extract_headers(response[1], 'http://foo')
500
def check_header(self, header, value):
501
self.assertEqual(value, self.headers[header])
503
def test_full_text(self):
504
self.use_response(_full_text_response)
506
self.check_header('Date', 'Tue, 11 Jul 2006 04:32:56 GMT')
507
self.check_header('date', 'Tue, 11 Jul 2006 04:32:56 GMT')
508
self.check_header('Content-Length', '35')
509
self.check_header('Content-Type', 'text/plain; charset=UTF-8')
510
self.check_header('content-type', 'text/plain; charset=UTF-8')
512
def test_missing_response(self):
513
self.use_response(_missing_response)
515
self.check_header('Content-Length', '336')
516
self.check_header('Content-Type', 'text/html; charset=iso-8859-1')
518
def test_single_range(self):
519
self.use_response(_single_range_response)
521
self.check_header('Content-Length', '100')
522
self.check_header('Content-Range', 'bytes 100-199/93890')
523
self.check_header('Content-Type', 'text/plain; charset=UTF-8')
525
def test_single_range_no_content(self):
526
self.use_response(_single_range_no_content_type)
528
self.check_header('Content-Length', '100')
529
self.check_header('Content-Range', 'bytes 100-199/93890')
531
def test_multi_range(self):
532
self.use_response(_multipart_range_response)
534
self.check_header('Content-Length', '1534')
535
self.check_header('Content-Type',
536
'multipart/byteranges; boundary=418470f848b63279b')
538
def test_multi_squid_range(self):
539
self.use_response(_multipart_squid_range_response)
541
self.check_header('Content-Length', '598')
542
self.check_header('Content-Type',
543
'multipart/byteranges; '\
544
'boundary="squid/2.5.STABLE12:C99323425AD4FE26F726261FA6C24196"')
546
def test_redirect(self):
547
"""We default to returning the last group of headers in the file."""
548
self.use_response(_redirect_response)
549
self.check_header('Content-Range', 'bytes 8623075-8623499/8623500')
550
self.check_header('Content-Type', 'text/plain; charset=UTF-8')
552
def test_empty(self):
553
self.assertRaises(errors.InvalidHttpResponse,
554
http._extract_headers, '', 'bad url')
556
def test_no_opening_http(self):
557
# Remove the HTTP line from the header
558
first, txt = _full_text_response[1].split('\r\n', 1)
559
self.assertRaises(errors.InvalidHttpResponse,
560
http._extract_headers, txt, 'missing HTTTP')
562
def test_trailing_whitespace(self):
563
# Test that we ignore bogus whitespace on the end
564
code, txt, body = _full_text_response
565
txt += '\r\n\n\n\n\n'
566
self.use_response((code, txt, body))
568
self.check_header('Date', 'Tue, 11 Jul 2006 04:32:56 GMT')
569
self.check_header('Content-Length', '35')
570
self.check_header('Content-Type', 'text/plain; charset=UTF-8')
572
def test_trailing_non_http(self):
573
# Test that we ignore bogus stuff on the end
574
code, txt, body = _full_text_response
575
txt = txt + 'Foo: Bar\r\nBaz: Bling\r\n\r\n'
576
self.use_response((code, txt, body))
578
self.check_header('Date', 'Tue, 11 Jul 2006 04:32:56 GMT')
579
self.check_header('Content-Length', '35')
580
self.check_header('Content-Type', 'text/plain; charset=UTF-8')
581
self.assertRaises(KeyError, self.headers.__getitem__, 'Foo')
583
def test_extra_whitespace(self):
584
# Test that we read an HTTP response, even with extra whitespace
585
code, txt, body = _redirect_response
586
# Find the second HTTP location
587
loc = txt.find('HTTP', 5)
588
txt = txt[:loc] + '\r\n\n' + txt[loc:]
589
self.use_response((code, txt, body))
590
self.check_header('Content-Range', 'bytes 8623075-8623499/8623500')
591
self.check_header('Content-Type', 'text/plain; charset=UTF-8')
594
class TestHandleResponse(TestCase):
596
def get_response(self, a_response):
597
"""Process a supplied response, and return the result."""
598
headers = http._extract_headers(a_response[1], 'http://foo')
599
return response.handle_response('http://foo', a_response[0], headers,
600
StringIO(a_response[2]))
602
def test_full_text(self):
603
out = self.get_response(_full_text_response)
604
# It is a StringIO from the original data
605
self.assertEqual(_full_text_response[2], out.read())
607
def test_missing_response(self):
608
self.assertRaises(errors.NoSuchFile,
609
self.get_response, _missing_response)
611
def test_single_range(self):
612
out = self.get_response(_single_range_response)
613
self.assertIsInstance(out, response.HttpRangeResponse)
615
self.assertRaises(errors.InvalidRange, out.read, 20)
618
self.assertEqual(_single_range_response[2], out.read(100))
620
def test_single_range_no_content(self):
621
out = self.get_response(_single_range_no_content_type)
622
self.assertIsInstance(out, response.HttpRangeResponse)
624
self.assertRaises(errors.InvalidRange, out.read, 20)
627
self.assertEqual(_single_range_no_content_type[2], out.read(100))
629
def test_multi_range(self):
630
out = self.get_response(_multipart_range_response)
631
self.assertIsInstance(out, response.HttpMultipartRangeResponse)
633
# Just make sure we can read the right contents
640
def test_multi_squid_range(self):
641
out = self.get_response(_multipart_squid_range_response)
642
self.assertIsInstance(out, response.HttpMultipartRangeResponse)
644
# Just make sure we can read the right contents
651
def test_invalid_response(self):
652
self.assertRaises(errors.InvalidHttpResponse,
653
self.get_response, _invalid_response)
655
def test_full_text_no_content_type(self):
656
# We should not require Content-Type for a full response
657
a_response = _full_text_response
658
headers = http._extract_headers(a_response[1], 'http://foo')
659
del headers['Content-Type']
660
out = response.handle_response('http://foo', a_response[0], headers,
661
StringIO(a_response[2]))
662
self.assertEqual(_full_text_response[2], out.read())
664
def test_missing_no_content_type(self):
665
# Without Content-Type we should still raise NoSuchFile on a 404
666
a_response = _missing_response
667
headers = http._extract_headers(a_response[1], 'http://missing')
668
del headers['Content-Type']
669
self.assertRaises(errors.NoSuchFile,
670
response.handle_response, 'http://missing', a_response[0], headers,
671
StringIO(a_response[2]))
673
def test_missing_content_range(self):
674
a_response = _single_range_response
675
headers = http._extract_headers(a_response[1], 'http://nocontent')
676
del headers['Content-Range']
677
self.assertRaises(errors.InvalidHttpResponse,
678
response.handle_response, 'http://nocontent', a_response[0],
679
headers, StringIO(a_response[2]))