2016-08-05 16:48:31 -04:00
|
|
|
/*
|
2017-01-18 15:24:34 -05:00
|
|
|
* Minio Cloud Storage, (C) 2016, 2017 Minio, Inc.
|
2016-08-05 16:48:31 -04:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-08-05 16:48:31 -04:00
|
|
|
|
2016-09-09 12:38:07 -04:00
|
|
|
import (
|
2018-01-08 17:30:55 -05:00
|
|
|
"bytes"
|
2017-04-07 17:37:32 -04:00
|
|
|
"encoding/json"
|
2017-12-28 12:32:48 -05:00
|
|
|
"errors"
|
2018-01-05 14:24:31 -05:00
|
|
|
"io/ioutil"
|
2016-09-09 12:38:07 -04:00
|
|
|
"net/http"
|
2016-10-27 06:30:52 -04:00
|
|
|
"net/url"
|
2018-01-05 14:24:31 -05:00
|
|
|
"os"
|
2016-09-09 12:38:07 -04:00
|
|
|
"reflect"
|
2017-04-07 17:37:32 -04:00
|
|
|
"strings"
|
2016-09-09 12:38:07 -04:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Tests http.Header clone.
|
|
|
|
func TestCloneHeader(t *testing.T) {
|
|
|
|
headers := []http.Header{
|
2016-09-10 03:51:25 -04:00
|
|
|
{
|
2016-09-09 12:38:07 -04:00
|
|
|
"Content-Type": {"text/html; charset=UTF-8"},
|
|
|
|
"Content-Length": {"0"},
|
|
|
|
},
|
2016-09-10 03:51:25 -04:00
|
|
|
{
|
2016-09-09 12:38:07 -04:00
|
|
|
"Content-Length": {"0", "1", "2"},
|
|
|
|
},
|
2016-09-10 03:51:25 -04:00
|
|
|
{
|
2016-09-09 12:38:07 -04:00
|
|
|
"Expires": {"-1"},
|
|
|
|
"Content-Length": {"0"},
|
|
|
|
"Content-Encoding": {"gzip"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, header := range headers {
|
|
|
|
clonedHeader := cloneHeader(header)
|
|
|
|
if !reflect.DeepEqual(header, clonedHeader) {
|
|
|
|
t.Errorf("Test %d failed", i+1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-08-05 16:48:31 -04:00
|
|
|
|
2018-01-05 14:24:31 -05:00
|
|
|
// Tests closing http tracing file.
|
|
|
|
func TestStopHTTPTrace(t *testing.T) {
|
|
|
|
var err error
|
|
|
|
globalHTTPTraceFile, err = ioutil.TempFile("", "")
|
|
|
|
if err != nil {
|
|
|
|
defer os.Remove(globalHTTPTraceFile.Name())
|
|
|
|
stopHTTPTrace()
|
|
|
|
if globalHTTPTraceFile != nil {
|
|
|
|
t.Errorf("globalHTTPTraceFile is not nil, it is expected to be nil")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-15 04:59:28 -04:00
|
|
|
// Tests maximum object size.
|
|
|
|
func TestMaxObjectSize(t *testing.T) {
|
|
|
|
sizes := []struct {
|
|
|
|
isMax bool
|
|
|
|
size int64
|
|
|
|
}{
|
|
|
|
// Test - 1 - maximum object size.
|
|
|
|
{
|
|
|
|
true,
|
2017-03-03 13:14:17 -05:00
|
|
|
globalMaxObjectSize + 1,
|
2016-08-15 04:59:28 -04:00
|
|
|
},
|
|
|
|
// Test - 2 - not maximum object size.
|
|
|
|
{
|
|
|
|
false,
|
2017-03-03 13:14:17 -05:00
|
|
|
globalMaxObjectSize - 1,
|
2016-08-15 04:59:28 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, s := range sizes {
|
|
|
|
isMax := isMaxObjectSize(s.size)
|
|
|
|
if isMax != s.isMax {
|
|
|
|
t.Errorf("Test %d: Expected %t, got %t", i+1, s.isMax, isMax)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Tests minimum allowed part size.
|
|
|
|
func TestMinAllowedPartSize(t *testing.T) {
|
|
|
|
sizes := []struct {
|
|
|
|
isMin bool
|
|
|
|
size int64
|
|
|
|
}{
|
|
|
|
// Test - 1 - within minimum part size.
|
|
|
|
{
|
|
|
|
true,
|
2017-03-03 13:14:17 -05:00
|
|
|
globalMinPartSize + 1,
|
2016-08-15 04:59:28 -04:00
|
|
|
},
|
|
|
|
// Test - 2 - smaller than minimum part size.
|
|
|
|
{
|
|
|
|
false,
|
2017-03-03 13:14:17 -05:00
|
|
|
globalMinPartSize - 1,
|
2016-08-15 04:59:28 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, s := range sizes {
|
|
|
|
isMin := isMinAllowedPartSize(s.size)
|
|
|
|
if isMin != s.isMin {
|
|
|
|
t.Errorf("Test %d: Expected %t, got %t", i+1, s.isMin, isMin)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Tests maximum allowed part number.
|
|
|
|
func TestMaxPartID(t *testing.T) {
|
|
|
|
sizes := []struct {
|
|
|
|
isMax bool
|
|
|
|
partN int
|
|
|
|
}{
|
|
|
|
// Test - 1 part number within max part number.
|
|
|
|
{
|
|
|
|
false,
|
2017-03-03 13:14:17 -05:00
|
|
|
globalMaxPartID - 1,
|
2016-08-15 04:59:28 -04:00
|
|
|
},
|
|
|
|
// Test - 2 part number bigger than max part number.
|
|
|
|
{
|
|
|
|
true,
|
2017-03-03 13:14:17 -05:00
|
|
|
globalMaxPartID + 1,
|
2016-08-15 04:59:28 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, s := range sizes {
|
|
|
|
isMax := isMaxPartID(s.partN)
|
|
|
|
if isMax != s.isMax {
|
|
|
|
t.Errorf("Test %d: Expected %t, got %t", i+1, s.isMax, isMax)
|
2016-08-07 02:53:10 -04:00
|
|
|
}
|
2016-08-05 16:48:31 -04:00
|
|
|
}
|
|
|
|
}
|
2016-10-12 04:03:50 -04:00
|
|
|
|
2017-01-10 14:01:23 -05:00
|
|
|
// Tests extracting bucket and objectname from various types of URL paths.
|
|
|
|
func TestURL2BucketObjectName(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
u *url.URL
|
|
|
|
bucket, object string
|
|
|
|
}{
|
|
|
|
// Test case 1 normal case.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/bucket/object",
|
|
|
|
},
|
|
|
|
bucket: "bucket",
|
|
|
|
object: "object",
|
|
|
|
},
|
|
|
|
// Test case 2 where url only has separator.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/",
|
|
|
|
},
|
|
|
|
bucket: "",
|
|
|
|
object: "",
|
|
|
|
},
|
|
|
|
// Test case 3 only bucket is present.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/bucket",
|
|
|
|
},
|
|
|
|
bucket: "bucket",
|
|
|
|
object: "",
|
|
|
|
},
|
|
|
|
// Test case 4 many separators and object is a directory.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/bucket/object/1/",
|
|
|
|
},
|
|
|
|
bucket: "bucket",
|
|
|
|
object: "object/1/",
|
|
|
|
},
|
|
|
|
// Test case 5 object has many trailing separators.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/bucket/object/1///",
|
|
|
|
},
|
|
|
|
bucket: "bucket",
|
|
|
|
object: "object/1///",
|
|
|
|
},
|
|
|
|
// Test case 6 object has only trailing separators.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/bucket/object///////",
|
|
|
|
},
|
|
|
|
bucket: "bucket",
|
|
|
|
object: "object///////",
|
|
|
|
},
|
|
|
|
// Test case 7 object has preceding separators.
|
|
|
|
{
|
|
|
|
u: &url.URL{
|
|
|
|
Path: "/bucket////object////",
|
|
|
|
},
|
|
|
|
bucket: "bucket",
|
|
|
|
object: "///object////",
|
|
|
|
},
|
|
|
|
// Test case 8 url is not allocated.
|
|
|
|
{
|
|
|
|
u: nil,
|
|
|
|
bucket: "",
|
|
|
|
object: "",
|
|
|
|
},
|
|
|
|
// Test case 9 url path is empty.
|
|
|
|
{
|
|
|
|
u: &url.URL{},
|
|
|
|
bucket: "",
|
|
|
|
object: "",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate all test cases.
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
bucketName, objectName := urlPath2BucketObjectName(testCase.u)
|
|
|
|
if bucketName != testCase.bucket {
|
|
|
|
t.Errorf("Test %d: failed expected bucket name \"%s\", got \"%s\"", i+1, testCase.bucket, bucketName)
|
|
|
|
}
|
|
|
|
if objectName != testCase.object {
|
|
|
|
t.Errorf("Test %d: failed expected bucket name \"%s\", got \"%s\"", i+1, testCase.object, objectName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-11-11 19:36:07 -05:00
|
|
|
// Add tests for starting and stopping different profilers.
|
|
|
|
func TestStartProfiler(t *testing.T) {
|
|
|
|
if startProfiler("") != nil {
|
|
|
|
t.Fatal("Expected nil, but non-nil value returned for invalid profiler.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-31 07:47:40 -04:00
|
|
|
// TestCheckURL tests valid url.
|
2017-03-16 14:44:01 -04:00
|
|
|
func TestCheckURL(t *testing.T) {
|
|
|
|
testCases := []struct {
|
2017-03-31 07:47:40 -04:00
|
|
|
urlStr string
|
2017-03-16 14:44:01 -04:00
|
|
|
shouldPass bool
|
|
|
|
}{
|
|
|
|
{"", false},
|
|
|
|
{":", false},
|
|
|
|
{"http://localhost/", true},
|
|
|
|
{"http://127.0.0.1/", true},
|
|
|
|
{"proto://myhostname/path", true},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validates fetching local address.
|
|
|
|
for i, testCase := range testCases {
|
2017-03-31 07:47:40 -04:00
|
|
|
_, err := checkURL(testCase.urlStr)
|
2017-03-16 14:44:01 -04:00
|
|
|
if testCase.shouldPass && err != nil {
|
|
|
|
t.Errorf("Test %d: expected to pass but got an error: %v\n", i+1, err)
|
|
|
|
}
|
|
|
|
if !testCase.shouldPass && err == nil {
|
|
|
|
t.Errorf("Test %d: expected to fail but passed.", i+1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-04-07 17:37:32 -04:00
|
|
|
|
|
|
|
// Testing dumping request function.
|
|
|
|
func TestDumpRequest(t *testing.T) {
|
2017-05-31 03:11:06 -04:00
|
|
|
req, err := http.NewRequest("GET", "http://localhost:9000?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=USWUXHGYZQYFYFFIT3RE%2F20170529%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20170529T190139Z&X-Amz-Expires=600&X-Amz-Signature=19b58080999df54b446fc97304eb8dda60d3df1812ae97f3e8783351bfd9781d&X-Amz-SignedHeaders=host&prefix=Hello%2AWorld%2A", nil)
|
2017-04-07 17:37:32 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-05-31 03:11:06 -04:00
|
|
|
req.RequestURI = "/?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=USWUXHGYZQYFYFFIT3RE%2F20170529%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20170529T190139Z&X-Amz-Expires=600&X-Amz-Signature=19b58080999df54b446fc97304eb8dda60d3df1812ae97f3e8783351bfd9781d&X-Amz-SignedHeaders=host&prefix=Hello%2AWorld%2A"
|
2017-04-07 17:37:32 -04:00
|
|
|
req.Header.Set("content-md5", "====test")
|
|
|
|
jsonReq := dumpRequest(req)
|
|
|
|
type jsonResult struct {
|
2017-05-31 03:11:06 -04:00
|
|
|
Method string `json:"method"`
|
|
|
|
RequestURI string `json:"reqURI"`
|
|
|
|
Header http.Header `json:"header"`
|
2017-04-07 17:37:32 -04:00
|
|
|
}
|
|
|
|
jsonReq = strings.Replace(jsonReq, "%%", "%", -1)
|
|
|
|
res := jsonResult{}
|
|
|
|
if err = json.Unmarshal([]byte(jsonReq), &res); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for expected method.
|
|
|
|
if res.Method != "GET" {
|
|
|
|
t.Fatalf("Unexpected method %s, expected 'GET'", res.Method)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Look for expected query values
|
|
|
|
expectedQuery := url.Values{}
|
|
|
|
expectedQuery.Set("prefix", "Hello*World*")
|
2017-05-31 03:11:06 -04:00
|
|
|
expectedQuery.Set("X-Amz-Algorithm", "AWS4-HMAC-SHA256")
|
|
|
|
expectedQuery.Set("X-Amz-Credential", "USWUXHGYZQYFYFFIT3RE/20170529/us-east-1/s3/aws4_request")
|
|
|
|
expectedQuery.Set("X-Amz-Date", "20170529T190139Z")
|
|
|
|
expectedQuery.Set("X-Amz-Expires", "600")
|
|
|
|
expectedQuery.Set("X-Amz-SignedHeaders", "host")
|
|
|
|
expectedQuery.Set("X-Amz-Signature", "19b58080999df54b446fc97304eb8dda60d3df1812ae97f3e8783351bfd9781d")
|
|
|
|
expectedRequestURI := "/?" + expectedQuery.Encode()
|
|
|
|
if !reflect.DeepEqual(res.RequestURI, expectedRequestURI) {
|
|
|
|
t.Fatalf("Expected %#v, got %#v", expectedRequestURI, res.RequestURI)
|
2017-04-07 17:37:32 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Look for expected header.
|
|
|
|
expectedHeader := http.Header{}
|
|
|
|
expectedHeader.Set("content-md5", "====test")
|
|
|
|
expectedHeader.Set("host", "localhost:9000")
|
|
|
|
if !reflect.DeepEqual(res.Header, expectedHeader) {
|
|
|
|
t.Fatalf("Expected %#v, got %#v", expectedHeader, res.Header)
|
|
|
|
}
|
|
|
|
}
|
2017-10-26 13:17:07 -04:00
|
|
|
|
2017-12-05 20:58:09 -05:00
|
|
|
// Test ToS3ETag()
|
2017-10-26 13:17:07 -04:00
|
|
|
func TestToS3ETag(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
etag string
|
|
|
|
expectedETag string
|
|
|
|
}{
|
|
|
|
{`"8019e762"`, `8019e762-1`},
|
|
|
|
{"5d57546eeb86b3eba68967292fba0644", "5d57546eeb86b3eba68967292fba0644-1"},
|
|
|
|
{`"8019e762-1"`, `8019e762-1`},
|
|
|
|
{"5d57546eeb86b3eba68967292fba0644-1", "5d57546eeb86b3eba68967292fba0644-1"},
|
|
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
2017-12-05 20:58:09 -05:00
|
|
|
etag := ToS3ETag(testCase.etag)
|
2017-10-26 13:17:07 -04:00
|
|
|
if etag != testCase.expectedETag {
|
|
|
|
t.Fatalf("test %v: expected: %v, got: %v", i+1, testCase.expectedETag, etag)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-12-28 12:32:48 -05:00
|
|
|
|
|
|
|
// Test contains
|
|
|
|
func TestContains(t *testing.T) {
|
|
|
|
|
|
|
|
testErr := errors.New("test err")
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
slice interface{}
|
|
|
|
elem interface{}
|
|
|
|
found bool
|
|
|
|
}{
|
|
|
|
{nil, nil, false},
|
|
|
|
{"1", "1", false},
|
|
|
|
{nil, "1", false},
|
|
|
|
{[]string{"1"}, nil, false},
|
|
|
|
{[]string{}, "1", false},
|
|
|
|
{[]string{"1"}, "1", true},
|
|
|
|
{[]string{"2"}, "1", false},
|
|
|
|
{[]string{"1", "2"}, "1", true},
|
|
|
|
{[]string{"2", "1"}, "1", true},
|
|
|
|
{[]string{"2", "1", "3"}, "1", true},
|
|
|
|
{[]int{1, 2, 3}, "1", false},
|
|
|
|
{[]int{1, 2, 3}, 2, true},
|
|
|
|
{[]int{1, 2, 3, 4, 5, 6}, 7, false},
|
|
|
|
{[]error{errors.New("new err")}, testErr, false},
|
|
|
|
{[]error{errors.New("new err"), testErr}, testErr, true},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
found := contains(testCase.slice, testCase.elem)
|
|
|
|
if found != testCase.found {
|
|
|
|
t.Fatalf("Test %v: expected: %v, got: %v", i+1, testCase.found, found)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-01-08 17:30:55 -05:00
|
|
|
|
|
|
|
// Test jsonLoadFromSeeker.
|
|
|
|
func TestJSONLoadFromSeeker(t *testing.T) {
|
|
|
|
format := newFormatFSV1()
|
|
|
|
b, err := json.Marshal(format)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
var gotFormat formatFSV1
|
|
|
|
if err = jsonLoadFromSeeker(bytes.NewReader(b), &gotFormat); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if *format != gotFormat {
|
|
|
|
t.Fatal("jsonLoadFromSeeker() failed to decode json")
|
|
|
|
}
|
|
|
|
}
|