From f5ad2bfaee76b1344fec5630554cd959af9e9454 Mon Sep 17 00:00:00 2001 From: Matt Benjamin Date: Wed, 20 Dec 2017 14:50:49 -0500 Subject: [PATCH] Add test case for POST with no Content-Type header Signed-off-by: Matt Benjamin --- s3tests/functional/test_s3.py | 36 +++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/s3tests/functional/test_s3.py b/s3tests/functional/test_s3.py index 7b128c6..45a70c3 100644 --- a/s3tests/functional/test_s3.py +++ b/s3tests/functional/test_s3.py @@ -1500,6 +1500,42 @@ def test_post_object_authenticated_request(): got = key.get_contents_as_string() eq(got, 'bar') +@attr(resource='object') +@attr(method='post') +@attr(operation='authenticated browser based upload via POST request, no content-type header') +@attr(assertion='succeeds and returns written data') +def test_post_object_authenticated_no_content_type(): + bucket = get_new_bucket() + + url = _get_post_url(s3.main, bucket) + + utc = pytz.utc + expires = datetime.datetime.now(utc) + datetime.timedelta(seconds=+6000) + + policy_document = {"expiration": expires.strftime("%Y-%m-%dT%H:%M:%SZ"),\ + "conditions": [\ + {"bucket": bucket.name},\ + ["starts-with", "$key", "foo"],\ + {"acl": "private"},\ + ["content-length-range", 0, 1024]\ + ]\ + } + + json_policy_document = json.JSONEncoder().encode(policy_document) + policy = base64.b64encode(json_policy_document) + conn = s3.main + signature = base64.b64encode(hmac.new(conn.aws_secret_access_key, policy, sha).digest()) + + payload = OrderedDict([ ("key" , "foo.txt"),("AWSAccessKeyId" , conn.aws_access_key_id),\ + ("acl" , "private"),("signature" , signature),("policy" , policy),\ + ('file', ('bar'))]) + + r = requests.post(url, files = payload) + eq(r.status_code, 204) + key = bucket.get_key("foo.txt") + got = key.get_contents_as_string() + eq(got, 'bar') + @attr(resource='object') @attr(method='post') @attr(operation='authenticated browser based upload via POST request, bad access key')