following up from T130449: Do something better than an "Unauthorized" error page at https://upload.wikimedia.org/ at the moment files under upload.wikimedia.org/ are served from root container via rewrite.py middleware. ATM the only authoritative copy of those files is in swift, though we want the authoritative copy to be in version control/puppet
root@ms-fe1001:~# swift list root crossdomain.xml favicon.ico index.html robots.txt root@ms-fe1001:~# swift download root crossdomain.xml crossdomain.xml [auth 0.022s, headers 0.050s, total 0.051s, 0.007 MB/s] root@ms-fe1001:~# swift download root robots.txt robots.txt [auth 0.028s, headers 0.155s, total 0.155s, 0.000 MB/s] root@ms-fe1001:~# swift download root index.html index.html [auth 0.024s, headers 0.033s, total 0.034s, 0.481 MB/s] root@ms-fe1001:~# cat crossdomain.xml <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*" /> </cross-domain-policy> root@ms-fe1001:~# cat robots.txt User-agent: * Disallow: /wikipedia/commons/archive/ root@ms-fe1001:~# head index.html <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Wikimedia Upload</title> <link rel="shortcut icon" href="/favicon.ico"> <style type="text/css"> * { font-family: 'Gill Sans', 'Gill Sans MT', sans-serif; } a:link, a:visited {