forked from TrueCloudLab/distribution
77e69b9cf3
Signed-off-by: Olivier Gambier <olivier@docker.com>
327 lines
9.1 KiB
Go
327 lines
9.1 KiB
Go
// Copyright 2014 Google Inc. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
// +build integration
|
|
|
|
package storage
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/md5"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"math/rand"
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
"google.golang.org/cloud/internal"
|
|
"google.golang.org/cloud/internal/testutil"
|
|
)
|
|
|
|
var (
|
|
bucket string
|
|
contents = make(map[string][]byte)
|
|
objects = []string{"obj1", "obj2", "obj/with/slashes"}
|
|
aclObjects = []string{"acl1", "acl2"}
|
|
copyObj = "copy-object"
|
|
)
|
|
|
|
const envBucket = "GCLOUD_TESTS_GOLANG_PROJECT_ID"
|
|
|
|
func TestObjects(t *testing.T) {
|
|
ctx := testutil.Context(ScopeFullControl)
|
|
bucket = os.Getenv(envBucket)
|
|
|
|
// Cleanup.
|
|
cleanup(t, "obj")
|
|
|
|
const defaultType = "text/plain"
|
|
|
|
// Test Writer.
|
|
for _, obj := range objects {
|
|
t.Logf("Writing %v", obj)
|
|
wc := NewWriter(ctx, bucket, obj)
|
|
wc.ContentType = defaultType
|
|
c := randomContents()
|
|
if _, err := wc.Write(c); err != nil {
|
|
t.Errorf("Write for %v failed with %v", obj, err)
|
|
}
|
|
if err := wc.Close(); err != nil {
|
|
t.Errorf("Close for %v failed with %v", obj, err)
|
|
}
|
|
contents[obj] = c
|
|
}
|
|
|
|
// Test Reader.
|
|
for _, obj := range objects {
|
|
t.Logf("Creating a reader to read %v", obj)
|
|
rc, err := NewReader(ctx, bucket, obj)
|
|
if err != nil {
|
|
t.Errorf("Can't create a reader for %v, errored with %v", obj, err)
|
|
}
|
|
slurp, err := ioutil.ReadAll(rc)
|
|
if err != nil {
|
|
t.Errorf("Can't ReadAll object %v, errored with %v", obj, err)
|
|
}
|
|
if got, want := slurp, contents[obj]; !bytes.Equal(got, want) {
|
|
t.Errorf("Contents (%v) = %q; want %q", obj, got, want)
|
|
}
|
|
rc.Close()
|
|
|
|
// Test SignedURL
|
|
opts := &SignedURLOptions{
|
|
GoogleAccessID: "xxx@clientid",
|
|
PrivateKey: dummyKey("rsa"),
|
|
Method: "GET",
|
|
MD5: []byte("202cb962ac59075b964b07152d234b70"),
|
|
Expires: time.Date(2020, time.October, 2, 10, 0, 0, 0, time.UTC),
|
|
ContentType: "application/json",
|
|
Headers: []string{"x-header1", "x-header2"},
|
|
}
|
|
u, err := SignedURL(bucket, obj, opts)
|
|
if err != nil {
|
|
t.Fatalf("SignedURL(%q, %q) errored with %v", bucket, obj, err)
|
|
}
|
|
hc := internal.HTTPClient(ctx)
|
|
res, err := hc.Get(u)
|
|
if err != nil {
|
|
t.Fatalf("Can't get URL %q: %v", u, err)
|
|
}
|
|
slurp, err = ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
t.Fatalf("Can't ReadAll signed object %v, errored with %v", obj, err)
|
|
}
|
|
if got, want := slurp, contents[obj]; !bytes.Equal(got, want) {
|
|
t.Errorf("Contents (%v) = %q; want %q", obj, got, want)
|
|
}
|
|
res.Body.Close()
|
|
}
|
|
|
|
// Test NotFound.
|
|
_, err := NewReader(ctx, bucket, "obj-not-exists")
|
|
if err != ErrObjectNotExist {
|
|
t.Errorf("Object should not exist, err found to be %v", err)
|
|
}
|
|
|
|
name := objects[0]
|
|
|
|
// Test StatObject.
|
|
o, err := StatObject(ctx, bucket, name)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
if got, want := o.Name, name; got != want {
|
|
t.Errorf("Name (%v) = %q; want %q", name, got, want)
|
|
}
|
|
if got, want := o.ContentType, defaultType; got != want {
|
|
t.Errorf("ContentType (%v) = %q; want %q", name, got, want)
|
|
}
|
|
|
|
// Test object copy.
|
|
copy, err := CopyObject(ctx, bucket, name, bucket, copyObj, nil)
|
|
if err != nil {
|
|
t.Errorf("CopyObject failed with %v", err)
|
|
}
|
|
if copy.Name != copyObj {
|
|
t.Errorf("Copy object's name = %q; want %q", copy.Name, copyObj)
|
|
}
|
|
if copy.Bucket != bucket {
|
|
t.Errorf("Copy object's bucket = %q; want %q", copy.Bucket, bucket)
|
|
}
|
|
|
|
// Test UpdateAttrs.
|
|
updated, err := UpdateAttrs(ctx, bucket, name, ObjectAttrs{
|
|
ContentType: "text/html",
|
|
ACL: []ACLRule{{Entity: "domain-google.com", Role: RoleReader}},
|
|
})
|
|
if err != nil {
|
|
t.Errorf("UpdateAttrs failed with %v", err)
|
|
}
|
|
if want := "text/html"; updated.ContentType != want {
|
|
t.Errorf("updated.ContentType == %q; want %q", updated.ContentType, want)
|
|
}
|
|
|
|
// Test checksums.
|
|
checksumCases := []struct {
|
|
name string
|
|
contents [][]byte
|
|
size int64
|
|
md5 string
|
|
crc32c uint32
|
|
}{
|
|
{
|
|
name: "checksum-object",
|
|
contents: [][]byte{[]byte("hello"), []byte("world")},
|
|
size: 10,
|
|
md5: "fc5e038d38a57032085441e7fe7010b0",
|
|
crc32c: 1456190592,
|
|
},
|
|
{
|
|
name: "zero-object",
|
|
contents: [][]byte{},
|
|
size: 0,
|
|
md5: "d41d8cd98f00b204e9800998ecf8427e",
|
|
crc32c: 0,
|
|
},
|
|
}
|
|
for _, c := range checksumCases {
|
|
wc := NewWriter(ctx, bucket, c.name)
|
|
for _, data := range c.contents {
|
|
if _, err := wc.Write(data); err != nil {
|
|
t.Errorf("Write(%q) failed with %q", data, err)
|
|
}
|
|
}
|
|
if err = wc.Close(); err != nil {
|
|
t.Errorf("%q: close failed with %q", c.name, err)
|
|
}
|
|
obj := wc.Object()
|
|
if got, want := obj.Size, c.size; got != want {
|
|
t.Errorf("Object (%q) Size = %v; want %v", c.name, got, want)
|
|
}
|
|
if got, want := fmt.Sprintf("%x", obj.MD5), c.md5; got != want {
|
|
t.Errorf("Object (%q) MD5 = %q; want %q", c.name, got, want)
|
|
}
|
|
if got, want := obj.CRC32C, c.crc32c; got != want {
|
|
t.Errorf("Object (%q) CRC32C = %v; want %v", c.name, got, want)
|
|
}
|
|
}
|
|
|
|
// Test public ACL.
|
|
publicObj := objects[0]
|
|
if err = PutACLRule(ctx, bucket, publicObj, AllUsers, RoleReader); err != nil {
|
|
t.Errorf("PutACLRule failed with %v", err)
|
|
}
|
|
publicCtx := testutil.NoAuthContext()
|
|
rc, err := NewReader(publicCtx, bucket, publicObj)
|
|
if err != nil {
|
|
t.Error(err)
|
|
}
|
|
slurp, err := ioutil.ReadAll(rc)
|
|
if err != nil {
|
|
t.Errorf("ReadAll failed with %v", err)
|
|
}
|
|
if string(slurp) != string(contents[publicObj]) {
|
|
t.Errorf("Public object's content is expected to be %s, found %s", contents[publicObj], slurp)
|
|
}
|
|
rc.Close()
|
|
|
|
// Test writer error handling.
|
|
wc := NewWriter(publicCtx, bucket, publicObj)
|
|
if _, err := wc.Write([]byte("hello")); err != nil {
|
|
t.Errorf("Write unexpectedly failed with %v", err)
|
|
}
|
|
if err = wc.Close(); err == nil {
|
|
t.Error("Close expected an error, found none")
|
|
}
|
|
|
|
// DeleteObject object.
|
|
// The rest of the other object will be deleted during
|
|
// the initial cleanup. This tests exists, so we still can cover
|
|
// deletion if there are no objects on the bucket to clean.
|
|
if err := DeleteObject(ctx, bucket, copyObj); err != nil {
|
|
t.Errorf("Deletion of %v failed with %v", copyObj, err)
|
|
}
|
|
_, err = StatObject(ctx, bucket, copyObj)
|
|
if err != ErrObjectNotExist {
|
|
t.Errorf("Copy is expected to be deleted, stat errored with %v", err)
|
|
}
|
|
}
|
|
|
|
func TestACL(t *testing.T) {
|
|
ctx := testutil.Context(ScopeFullControl)
|
|
cleanup(t, "acl")
|
|
entity := ACLEntity("domain-google.com")
|
|
if err := PutDefaultACLRule(ctx, bucket, entity, RoleReader); err != nil {
|
|
t.Errorf("Can't put default ACL rule for the bucket, errored with %v", err)
|
|
}
|
|
for _, obj := range aclObjects {
|
|
t.Logf("Writing %v", obj)
|
|
wc := NewWriter(ctx, bucket, obj)
|
|
c := randomContents()
|
|
if _, err := wc.Write(c); err != nil {
|
|
t.Errorf("Write for %v failed with %v", obj, err)
|
|
}
|
|
if err := wc.Close(); err != nil {
|
|
t.Errorf("Close for %v failed with %v", obj, err)
|
|
}
|
|
}
|
|
name := aclObjects[0]
|
|
acl, err := ACL(ctx, bucket, name)
|
|
if err != nil {
|
|
t.Errorf("Can't retrieve ACL of %v", name)
|
|
}
|
|
aclFound := false
|
|
for _, rule := range acl {
|
|
if rule.Entity == entity && rule.Role == RoleReader {
|
|
aclFound = true
|
|
}
|
|
}
|
|
if !aclFound {
|
|
t.Error("Expected to find an ACL rule for google.com domain users, but not found")
|
|
}
|
|
if err := DeleteACLRule(ctx, bucket, name, entity); err != nil {
|
|
t.Errorf("Can't delete the ACL rule for the entity: %v", entity)
|
|
}
|
|
|
|
if err := PutBucketACLRule(ctx, bucket, "user-jbd@google.com", RoleReader); err != nil {
|
|
t.Errorf("Error while putting bucket ACL rule: %v", err)
|
|
}
|
|
bACL, err := BucketACL(ctx, bucket)
|
|
if err != nil {
|
|
t.Errorf("Error while getting the ACL of the bucket: %v", err)
|
|
}
|
|
bACLFound := false
|
|
for _, rule := range bACL {
|
|
if rule.Entity == "user-jbd@google.com" && rule.Role == RoleReader {
|
|
bACLFound = true
|
|
}
|
|
}
|
|
if !bACLFound {
|
|
t.Error("Expected to find an ACL rule for jbd@google.com user, but not found")
|
|
}
|
|
if err := DeleteBucketACLRule(ctx, bucket, "user-jbd@google.com"); err != nil {
|
|
t.Errorf("Error while deleting bucket ACL rule: %v", err)
|
|
}
|
|
}
|
|
|
|
func cleanup(t *testing.T, prefix string) {
|
|
ctx := testutil.Context(ScopeFullControl)
|
|
var q *Query = &Query{
|
|
Prefix: prefix,
|
|
}
|
|
for {
|
|
o, err := ListObjects(ctx, bucket, q)
|
|
if err != nil {
|
|
t.Fatalf("Cleanup List for bucket %v failed with error: %v", bucket, err)
|
|
}
|
|
for _, obj := range o.Results {
|
|
t.Logf("Cleanup deletion of %v", obj.Name)
|
|
if err = DeleteObject(ctx, bucket, obj.Name); err != nil {
|
|
t.Fatalf("Cleanup Delete for object %v failed with %v", obj.Name, err)
|
|
}
|
|
}
|
|
if o.Next == nil {
|
|
break
|
|
}
|
|
q = o.Next
|
|
}
|
|
}
|
|
|
|
func randomContents() []byte {
|
|
h := md5.New()
|
|
io.WriteString(h, fmt.Sprintf("hello world%d", rand.Intn(100000)))
|
|
return h.Sum(nil)
|
|
}
|