2020-04-09 15:43:34 +00:00
|
|
|
package crypt
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"crypto/md5"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/rclone/rclone/fs"
|
|
|
|
"github.com/rclone/rclone/fs/hash"
|
|
|
|
"github.com/rclone/rclone/fs/object"
|
|
|
|
"github.com/rclone/rclone/lib/random"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
type testWrapper struct {
|
|
|
|
fs.ObjectInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
// UnWrap returns the Object that this Object is wrapping or nil if it
|
|
|
|
// isn't wrapping anything
|
|
|
|
func (o testWrapper) UnWrap() fs.Object {
|
|
|
|
if o, ok := o.ObjectInfo.(fs.Object); ok {
|
|
|
|
return o
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a temporary local fs to upload things from
|
|
|
|
|
|
|
|
func makeTempLocalFs(t *testing.T) (localFs fs.Fs, cleanup func()) {
|
|
|
|
localFs, err := fs.TemporaryLocalFs()
|
|
|
|
require.NoError(t, err)
|
|
|
|
cleanup = func() {
|
|
|
|
require.NoError(t, localFs.Rmdir(context.Background(), ""))
|
|
|
|
}
|
|
|
|
return localFs, cleanup
|
|
|
|
}
|
|
|
|
|
|
|
|
// Upload a file to a remote
|
|
|
|
func uploadFile(t *testing.T, f fs.Fs, remote, contents string) (obj fs.Object, cleanup func()) {
|
|
|
|
inBuf := bytes.NewBufferString(contents)
|
|
|
|
t1 := time.Date(2012, time.December, 17, 18, 32, 31, 0, time.UTC)
|
|
|
|
upSrc := object.NewStaticObjectInfo(remote, t1, int64(len(contents)), true, nil, nil)
|
|
|
|
obj, err := f.Put(context.Background(), inBuf, upSrc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
cleanup = func() {
|
|
|
|
require.NoError(t, obj.Remove(context.Background()))
|
|
|
|
}
|
|
|
|
return obj, cleanup
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test the ObjectInfo
|
|
|
|
func testObjectInfo(t *testing.T, f *Fs, wrap bool) {
|
|
|
|
var (
|
|
|
|
contents = random.String(100)
|
|
|
|
path = "hash_test_object"
|
|
|
|
ctx = context.Background()
|
|
|
|
)
|
|
|
|
if wrap {
|
|
|
|
path = "_wrap"
|
|
|
|
}
|
|
|
|
|
|
|
|
localFs, cleanupLocalFs := makeTempLocalFs(t)
|
|
|
|
defer cleanupLocalFs()
|
|
|
|
|
|
|
|
obj, cleanupObj := uploadFile(t, localFs, path, contents)
|
|
|
|
defer cleanupObj()
|
|
|
|
|
|
|
|
// encrypt the data
|
|
|
|
inBuf := bytes.NewBufferString(contents)
|
|
|
|
var outBuf bytes.Buffer
|
|
|
|
enc, err := f.cipher.newEncrypter(inBuf, nil)
|
|
|
|
require.NoError(t, err)
|
|
|
|
nonce := enc.nonce // read the nonce at the start
|
|
|
|
_, err = io.Copy(&outBuf, enc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
var oi fs.ObjectInfo = obj
|
|
|
|
if wrap {
|
2020-05-20 10:39:20 +00:00
|
|
|
// wrap the object in an fs.ObjectUnwrapper if required
|
2020-04-09 15:43:34 +00:00
|
|
|
oi = testWrapper{oi}
|
|
|
|
}
|
|
|
|
|
|
|
|
// wrap the object in a crypt for upload using the nonce we
|
Spelling fixes
Fix spelling of: above, already, anonymous, associated,
authentication, bandwidth, because, between, blocks, calculate,
candidates, cautious, changelog, cleaner, clipboard, command,
completely, concurrently, considered, constructs, corrupt, current,
daemon, dependencies, deprecated, directory, dispatcher, download,
eligible, ellipsis, encrypter, endpoint, entrieslist, essentially,
existing writers, existing, expires, filesystem, flushing, frequently,
hierarchy, however, implementation, implements, inaccurate,
individually, insensitive, longer, maximum, metadata, modified,
multipart, namedirfirst, nextcloud, obscured, opened, optional,
owncloud, pacific, passphrase, password, permanently, persimmon,
positive, potato, protocol, quota, receiving, recommends, referring,
requires, revisited, satisfied, satisfies, satisfy, semver,
serialized, session, storage, strategies, stringlist, successful,
supported, surprise, temporarily, temporary, transactions, unneeded,
update, uploads, wrapped
Signed-off-by: Josh Soref <jsoref@users.noreply.github.com>
2020-10-09 00:17:24 +00:00
|
|
|
// saved from the encrypter
|
2020-04-09 15:43:34 +00:00
|
|
|
src := f.newObjectInfo(oi, nonce)
|
|
|
|
|
|
|
|
// Test ObjectInfo methods
|
|
|
|
assert.Equal(t, int64(outBuf.Len()), src.Size())
|
|
|
|
assert.Equal(t, f, src.Fs())
|
|
|
|
assert.NotEqual(t, path, src.Remote())
|
|
|
|
|
|
|
|
// Test ObjectInfo.Hash
|
|
|
|
wantHash := md5.Sum(outBuf.Bytes())
|
|
|
|
gotHash, err := src.Hash(ctx, hash.MD5)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, fmt.Sprintf("%x", wantHash), gotHash)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testComputeHash(t *testing.T, f *Fs) {
|
|
|
|
var (
|
|
|
|
contents = random.String(100)
|
|
|
|
path = "compute_hash_test"
|
|
|
|
ctx = context.Background()
|
|
|
|
hashType = f.Fs.Hashes().GetOne()
|
|
|
|
)
|
|
|
|
|
|
|
|
if hashType == hash.None {
|
|
|
|
t.Skipf("%v: does not support hashes", f.Fs)
|
|
|
|
}
|
|
|
|
|
|
|
|
localFs, cleanupLocalFs := makeTempLocalFs(t)
|
|
|
|
defer cleanupLocalFs()
|
|
|
|
|
|
|
|
// Upload a file to localFs as a test object
|
|
|
|
localObj, cleanupLocalObj := uploadFile(t, localFs, path, contents)
|
|
|
|
defer cleanupLocalObj()
|
|
|
|
|
|
|
|
// Upload the same data to the remote Fs also
|
|
|
|
remoteObj, cleanupRemoteObj := uploadFile(t, f, path, contents)
|
|
|
|
defer cleanupRemoteObj()
|
|
|
|
|
|
|
|
// Calculate the expected Hash of the remote object
|
|
|
|
computedHash, err := f.ComputeHash(ctx, remoteObj.(*Object), localObj, hashType)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Test computed hash matches remote object hash
|
|
|
|
remoteObjHash, err := remoteObj.(*Object).Object.Hash(ctx, hashType)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, remoteObjHash, computedHash)
|
|
|
|
}
|
|
|
|
|
|
|
|
// InternalTest is called by fstests.Run to extra tests
|
|
|
|
func (f *Fs) InternalTest(t *testing.T) {
|
|
|
|
t.Run("ObjectInfo", func(t *testing.T) { testObjectInfo(t, f, false) })
|
|
|
|
t.Run("ObjectInfoWrap", func(t *testing.T) { testObjectInfo(t, f, true) })
|
|
|
|
t.Run("ComputeHash", func(t *testing.T) { testComputeHash(t, f) })
|
|
|
|
}
|