[#197] Add a leading slash to the FilePath attribute #209
2 changed files with 51 additions and 9 deletions
|
@ -253,9 +253,7 @@ func (h *Handler) byAttribute(c *fasthttp.RequestCtx, handler func(context.Conte
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if key == attrFileName {
|
val = prepareAtribute(key, val)
|
||||||
val = prepareFileName(val)
|
|
||||||
}
|
|
||||||
|
|
||||||
log = log.With(zap.String("cid", cidParam), zap.String("attr_key", key), zap.String("attr_val", val))
|
log = log.With(zap.String("cid", cidParam), zap.String("attr_key", key), zap.String("attr_val", val))
|
||||||
|
|
||||||
|
@ -298,7 +296,8 @@ func (h *Handler) findObjectByAttribute(ctx context.Context, log *zap.Logger, cn
|
||||||
switch {
|
switch {
|
||||||
case errors.Is(err, io.EOF) && h.needSearchByFileName(attrKey, attrVal):
|
case errors.Is(err, io.EOF) && h.needSearchByFileName(attrKey, attrVal):
|
||||||
log.Debug(logs.ObjectNotFoundByFilePathTrySearchByFileName, logs.TagField(logs.TagExternalStorage))
|
log.Debug(logs.ObjectNotFoundByFilePathTrySearchByFileName, logs.TagField(logs.TagExternalStorage))
|
||||||
return h.findObjectByAttribute(ctx, log, cnrID, attrFileName, prepareFileName(attrVal))
|
attrVal = prepareAtribute(attrFileName, attrVal)
|
||||||
|
return h.findObjectByAttribute(ctx, log, cnrID, attrFileName, attrVal)
|
||||||
case errors.Is(err, io.EOF):
|
case errors.Is(err, io.EOF):
|
||||||
log.Error(logs.ObjectNotFound, zap.Error(err), logs.TagField(logs.TagExternalStorage))
|
log.Error(logs.ObjectNotFound, zap.Error(err), logs.TagField(logs.TagExternalStorage))
|
||||||
return oid.ID{}, fmt.Errorf("object not found: %w", err)
|
return oid.ID{}, fmt.Errorf("object not found: %w", err)
|
||||||
|
@ -319,6 +318,18 @@ func (h *Handler) needSearchByFileName(key, val string) bool {
|
||||||
return strings.HasPrefix(val, "/") && strings.Count(val, "/") == 1 || !strings.Contains(val, "/")
|
return strings.HasPrefix(val, "/") && strings.Count(val, "/") == 1 || !strings.Contains(val, "/")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func prepareAtribute(attrKey, attrVal string) string {
|
||||||
r.loginov marked this conversation as resolved
|
|||||||
|
if attrKey == attrFileName {
|
||||||
|
return prepareFileName(attrVal)
|
||||||
|
}
|
||||||
|
|
||||||
|
if attrKey == attrFilePath {
|
||||||
|
return prepareFilePath(attrVal)
|
||||||
|
}
|
||||||
|
|
||||||
|
return attrVal
|
||||||
|
}
|
||||||
|
|
||||||
func prepareFileName(fileName string) string {
|
func prepareFileName(fileName string) string {
|
||||||
r.loginov marked this conversation as resolved
r.loginov
commented
I have a question here. Don't we want to check the I have a question here. Don't we want to check the `FileName` for the absence of slashes in general, and not just at the beginning? After all, according to the specification, `FileName` should not contain slashes at all.
r.loginov
commented
We decided that it still needed to be done. Created a task: #215 We decided that it still needed to be done. Created a task: #215
|
|||||||
if strings.HasPrefix(fileName, "/") {
|
if strings.HasPrefix(fileName, "/") {
|
||||||
return fileName[1:]
|
return fileName[1:]
|
||||||
|
@ -327,6 +338,14 @@ func prepareFileName(fileName string) string {
|
||||||
return fileName
|
return fileName
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func prepareFilePath(filePath string) string {
|
||||||
|
if !strings.HasPrefix(filePath, "/") {
|
||||||
|
return "/" + filePath
|
||||||
|
}
|
||||||
|
|
||||||
|
return filePath
|
||||||
|
}
|
||||||
|
|
||||||
// resolveContainer decode container id, if it's not a valid container id
|
// resolveContainer decode container id, if it's not a valid container id
|
||||||
// then trey to resolve name using provided resolver.
|
// then trey to resolve name using provided resolver.
|
||||||
func (h *Handler) resolveContainer(ctx context.Context, containerID string) (*cid.ID, error) {
|
func (h *Handler) resolveContainer(ctx context.Context, containerID string) (*cid.ID, error) {
|
||||||
|
|
|
@ -219,8 +219,10 @@ func TestBasic(t *testing.T) {
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
obj := hc.frostfs.objects[putRes.ContainerID+"/"+putRes.ObjectID]
|
obj := hc.frostfs.objects[putRes.ContainerID+"/"+putRes.ObjectID]
|
||||||
attr := prepareObjectAttributes(object.AttributeFilePath, objFileName)
|
fileName := prepareObjectAttributes(object.AttributeFileName, objFileName)
|
||||||
obj.SetAttributes(append(obj.Attributes(), attr)...)
|
filePath := prepareObjectAttributes(object.AttributeFilePath, objFilePath)
|
||||||
|
obj.SetAttributes(append(obj.Attributes(), fileName)...)
|
||||||
|
obj.SetAttributes(append(obj.Attributes(), filePath)...)
|
||||||
|
|
||||||
t.Run("get", func(t *testing.T) {
|
t.Run("get", func(t *testing.T) {
|
||||||
r = prepareGetRequest(ctx, cnrID.EncodeToString(), putRes.ObjectID)
|
r = prepareGetRequest(ctx, cnrID.EncodeToString(), putRes.ObjectID)
|
||||||
|
@ -240,7 +242,11 @@ func TestBasic(t *testing.T) {
|
||||||
hc.Handler().DownloadByAttribute(r)
|
hc.Handler().DownloadByAttribute(r)
|
||||||
require.Equal(t, content, string(r.Response.Body()))
|
require.Equal(t, content, string(r.Response.Body()))
|
||||||
|
|
||||||
r = prepareGetByAttributeRequest(ctx, bktName, attrFileName, "/"+objFileName)
|
r = prepareGetByAttributeRequest(ctx, bktName, attrFileName, objFilePath)
|
||||||
|
hc.Handler().DownloadByAttribute(r)
|
||||||
|
require.Equal(t, content, string(r.Response.Body()))
|
||||||
|
|
||||||
|
r = prepareGetByAttributeRequest(ctx, bktName, attrFilePath, objFileName)
|
||||||
hc.Handler().DownloadByAttribute(r)
|
hc.Handler().DownloadByAttribute(r)
|
||||||
require.Equal(t, content, string(r.Response.Body()))
|
require.Equal(t, content, string(r.Response.Body()))
|
||||||
})
|
})
|
||||||
|
@ -251,7 +257,12 @@ func TestBasic(t *testing.T) {
|
||||||
require.Equal(t, putRes.ObjectID, string(r.Response.Header.Peek(hdrObjectID)))
|
require.Equal(t, putRes.ObjectID, string(r.Response.Header.Peek(hdrObjectID)))
|
||||||
require.Equal(t, putRes.ContainerID, string(r.Response.Header.Peek(hdrContainerID)))
|
require.Equal(t, putRes.ContainerID, string(r.Response.Header.Peek(hdrContainerID)))
|
||||||
|
|
||||||
r = prepareGetByAttributeRequest(ctx, bktName, attrFileName, "/"+objFileName)
|
r = prepareGetByAttributeRequest(ctx, bktName, attrFileName, objFilePath)
|
||||||
|
hc.Handler().HeadByAttribute(r)
|
||||||
|
require.Equal(t, putRes.ObjectID, string(r.Response.Header.Peek(hdrObjectID)))
|
||||||
|
require.Equal(t, putRes.ContainerID, string(r.Response.Header.Peek(hdrContainerID)))
|
||||||
|
|
||||||
|
r = prepareGetByAttributeRequest(ctx, bktName, attrFilePath, objFileName)
|
||||||
hc.Handler().HeadByAttribute(r)
|
hc.Handler().HeadByAttribute(r)
|
||||||
require.Equal(t, putRes.ObjectID, string(r.Response.Header.Peek(hdrObjectID)))
|
require.Equal(t, putRes.ObjectID, string(r.Response.Header.Peek(hdrObjectID)))
|
||||||
require.Equal(t, putRes.ContainerID, string(r.Response.Header.Peek(hdrContainerID)))
|
require.Equal(t, putRes.ContainerID, string(r.Response.Header.Peek(hdrContainerID)))
|
||||||
|
@ -265,7 +276,7 @@ func TestBasic(t *testing.T) {
|
||||||
zipReader, err := zip.NewReader(readerAt, int64(len(r.Response.Body())))
|
zipReader, err := zip.NewReader(readerAt, int64(len(r.Response.Body())))
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Len(t, zipReader.File, 1)
|
require.Len(t, zipReader.File, 1)
|
||||||
require.Equal(t, objFileName, zipReader.File[0].Name)
|
require.Equal(t, objFilePath, zipReader.File[0].Name)
|
||||||
f, err := zipReader.File[0].Open()
|
f, err := zipReader.File[0].Open()
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer func() {
|
defer func() {
|
||||||
|
@ -450,6 +461,17 @@ func TestPrepareFileName(t *testing.T) {
|
||||||
require.Equal(t, expected, actual)
|
require.Equal(t, expected, actual)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestPrepareFilePath(t *testing.T) {
|
||||||
|
filePath := "cat.jpg"
|
||||||
|
expected := "/cat.jpg"
|
||||||
|
actual := prepareFilePath(filePath)
|
||||||
|
require.Equal(t, expected, actual)
|
||||||
|
|
||||||
|
filePath = "/cat.jpg"
|
||||||
|
actual = prepareFilePath(filePath)
|
||||||
|
require.Equal(t, expected, actual)
|
||||||
|
}
|
||||||
|
|
||||||
func prepareUploadRequest(ctx context.Context, bucket, content string) (*fasthttp.RequestCtx, error) {
|
func prepareUploadRequest(ctx context.Context, bucket, content string) (*fasthttp.RequestCtx, error) {
|
||||||
r := new(fasthttp.RequestCtx)
|
r := new(fasthttp.RequestCtx)
|
||||||
utils.SetContextToRequest(ctx, r)
|
utils.SetContextToRequest(ctx, r)
|
||||||
|
@ -493,6 +515,7 @@ const (
|
||||||
keyAttr = "User-Attribute"
|
keyAttr = "User-Attribute"
|
||||||
valAttr = "user value"
|
valAttr = "user value"
|
||||||
objFileName = "newFile.txt"
|
objFileName = "newFile.txt"
|
||||||
|
objFilePath = "/newFile.txt"
|
||||||
)
|
)
|
||||||
|
|
||||||
func fillMultipartBody(r *fasthttp.RequestCtx, content string) error {
|
func fillMultipartBody(r *fasthttp.RequestCtx, content string) error {
|
||||||
|
|
Loading…
Add table
Reference in a new issue
It seems in this case it will be very convenient to disable strict compliance with the specification (#207) through a parameter from the configuration. It will only be enough to add a check for the value of the new flag.