2021-04-18 15:41:13 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2016-06-25 17:51:06 -04:00
|
|
|
|
2016-08-18 19:23:42 -04:00
|
|
|
package cmd
|
2016-06-25 17:51:06 -04:00
|
|
|
|
|
|
|
import (
|
2016-07-29 00:57:11 -04:00
|
|
|
"bytes"
|
2020-09-04 12:45:06 -04:00
|
|
|
"context"
|
2017-08-14 21:08:42 -04:00
|
|
|
"crypto/rand"
|
2017-08-18 14:44:54 -04:00
|
|
|
"fmt"
|
2016-07-29 00:57:11 -04:00
|
|
|
"io"
|
2016-06-25 17:51:06 -04:00
|
|
|
"os"
|
2016-07-03 14:17:08 -04:00
|
|
|
slashpath "path"
|
|
|
|
"runtime"
|
2016-08-11 22:57:14 -04:00
|
|
|
"strings"
|
2016-07-02 04:59:28 -04:00
|
|
|
"syscall"
|
2016-06-25 17:51:06 -04:00
|
|
|
"testing"
|
2022-01-13 17:28:07 -05:00
|
|
|
|
|
|
|
"github.com/google/uuid"
|
2016-06-25 17:51:06 -04:00
|
|
|
)
|
|
|
|
|
2020-04-28 20:32:46 -04:00
|
|
|
func TestCheckPathLength(t *testing.T) {
|
|
|
|
// Check path length restrictions are not same on windows/darwin
|
|
|
|
if runtime.GOOS == "windows" || runtime.GOOS == "darwin" {
|
|
|
|
t.Skip()
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
path string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
|
|
|
{".", errFileAccessDenied},
|
|
|
|
{"/", errFileAccessDenied},
|
|
|
|
{"..", errFileAccessDenied},
|
|
|
|
{"data/G_792/srv-tse/c/users/denis/documents/gestion!20locative/heritier/propri!E9taire/20190101_a2.03!20-!20m.!20heritier!20re!B4mi!20-!20proce!60s-verbal!20de!20livraison!20et!20de!20remise!20des!20cle!B4s!20acque!B4reurs!20-!204-!20livraison!20-!20lp!20promotion!20toulouse!20-!20encre!20et!20plume!20-!205!20de!B4c.!202019!20a!60!2012-49.pdf.ecc", errFileNameTooLong},
|
|
|
|
{"data/G_792/srv-tse/c/users/denis/documents/gestionlocative.txt", nil},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
gotErr := checkPathLength(testCase.path)
|
|
|
|
t.Run("", func(t *testing.T) {
|
|
|
|
if gotErr != testCase.expectedErr {
|
|
|
|
t.Errorf("Expected %s, got %s", testCase.expectedErr, gotErr)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-07 03:01:40 -04:00
|
|
|
// Tests validate volume name.
|
|
|
|
func TestIsValidVolname(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
volName string
|
|
|
|
shouldPass bool
|
|
|
|
}{
|
|
|
|
// Cases which should pass the test.
|
|
|
|
// passing in valid bucket names.
|
|
|
|
{"lol", true},
|
|
|
|
{"1-this-is-valid", true},
|
|
|
|
{"1-this-too-is-valid-1", true},
|
|
|
|
{"this.works.too.1", true},
|
|
|
|
{"1234567", true},
|
|
|
|
{"123", true},
|
|
|
|
{"s3-eu-west-1.amazonaws.com", true},
|
|
|
|
{"ideas-are-more-powerful-than-guns", true},
|
|
|
|
{"testbucket", true},
|
|
|
|
{"1bucket", true},
|
|
|
|
{"bucket1", true},
|
|
|
|
{"$this-is-not-valid-too", true},
|
|
|
|
{"contains-$-dollar", true},
|
|
|
|
{"contains-^-carrot", true},
|
|
|
|
{"contains-$-dollar", true},
|
|
|
|
{"contains-$-dollar", true},
|
|
|
|
{".starts-with-a-dot", true},
|
|
|
|
{"ends-with-a-dot.", true},
|
|
|
|
{"ends-with-a-dash-", true},
|
|
|
|
{"-starts-with-a-dash", true},
|
|
|
|
{"THIS-BEINGS-WITH-UPPERCASe", true},
|
|
|
|
{"tHIS-ENDS-WITH-UPPERCASE", true},
|
|
|
|
{"ThisBeginsAndEndsWithUpperCase", true},
|
|
|
|
{"una ñina", true},
|
|
|
|
{"lalalallalallalalalallalallalala-theString-size-is-greater-than-64", true},
|
|
|
|
// cases for which test should fail.
|
|
|
|
// passing invalid bucket names.
|
|
|
|
{"", false},
|
2019-08-06 15:08:58 -04:00
|
|
|
{SlashSeparator, false},
|
2018-06-07 03:01:40 -04:00
|
|
|
{"a", false},
|
|
|
|
{"ab", false},
|
|
|
|
{"ab/", true},
|
|
|
|
{"......", true},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
isValidVolname := isValidVolname(testCase.volName)
|
|
|
|
if testCase.shouldPass && !isValidVolname {
|
|
|
|
t.Errorf("Test case %d: Expected \"%s\" to be a valid bucket name", i+1, testCase.volName)
|
|
|
|
}
|
|
|
|
if !testCase.shouldPass && isValidVolname {
|
|
|
|
t.Errorf("Test case %d: Expected bucket name \"%s\" to be invalid", i+1, testCase.volName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// creates a temp dir and sets up xlStorage layer.
|
|
|
|
// returns xlStorage layer, temp dir path to be used for the purpose of tests.
|
2022-07-25 15:37:26 -04:00
|
|
|
func newXLStorageTestSetup(tb testing.TB) (*xlStorageDiskIDCheck, string, error) {
|
|
|
|
diskPath := tb.TempDir()
|
2020-06-12 23:04:01 -04:00
|
|
|
|
|
|
|
// Initialize a new xlStorage layer.
|
2020-08-25 13:55:15 -04:00
|
|
|
storage, err := newLocalXLStorage(diskPath)
|
2016-07-30 04:26:19 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, "", err
|
|
|
|
}
|
2022-01-24 14:28:45 -05:00
|
|
|
|
2019-10-25 13:37:53 -04:00
|
|
|
// Create a sample format.json file
|
2022-01-24 14:28:45 -05:00
|
|
|
if err = storage.WriteAll(context.Background(), minioMetaBucket, formatConfigFile, []byte(`{"version":"1","format":"xl","id":"592a41c2-b7cc-4130-b883-c4b5cb15965b","xl":{"version":"3","this":"da017d62-70e3-45f1-8a1a-587707e69ad1","sets":[["e07285a6-8c73-4962-89c6-047fb939f803","33b8d431-482d-4376-b63c-626d229f0a29","cff6513a-4439-4dc1-bcaa-56c9e880c352","da017d62-70e3-45f1-8a1a-587707e69ad1","9c9f21d5-1f15-4737-bce6-835faa0d9626","0a59b346-1424-4fc2-9fa2-a2e80541d0c1","7924a3dc-b69a-4971-9a2e-014966d6aebb","4d2b8dd9-4e48-444b-bdca-c89194b26042"]],"distributionAlgo":"CRCMOD"}}`)); err != nil {
|
2019-10-25 13:37:53 -04:00
|
|
|
return nil, "", err
|
|
|
|
}
|
2022-01-24 14:28:45 -05:00
|
|
|
|
2023-07-13 14:41:55 -04:00
|
|
|
disk := newXLStorageDiskIDCheck(storage, false)
|
2022-01-24 14:28:45 -05:00
|
|
|
disk.SetDiskID("da017d62-70e3-45f1-8a1a-587707e69ad1")
|
2021-03-16 23:06:57 -04:00
|
|
|
return disk, diskPath, nil
|
2016-07-30 04:26:19 -04:00
|
|
|
}
|
|
|
|
|
2017-08-18 14:44:54 -04:00
|
|
|
// createPermDeniedFile - creates temporary directory and file with path '/mybucket/myobject'
|
|
|
|
func createPermDeniedFile(t *testing.T) (permDeniedDir string) {
|
|
|
|
var err error
|
2022-07-25 15:37:26 -04:00
|
|
|
permDeniedDir = t.TempDir()
|
2017-08-18 14:44:54 -04:00
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Mkdir(slashpath.Join(permDeniedDir, "mybucket"), 0o775); err != nil {
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Fatalf(fmt.Sprintf("Unable to create temporary directory %v. %v", slashpath.Join(permDeniedDir, "mybucket"), err))
|
2017-08-18 14:44:54 -04:00
|
|
|
}
|
|
|
|
|
2022-09-19 14:05:16 -04:00
|
|
|
if err = os.WriteFile(slashpath.Join(permDeniedDir, "mybucket", "myobject"), []byte(""), 0o400); err != nil {
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Fatalf(fmt.Sprintf("Unable to create file %v. %v", slashpath.Join(permDeniedDir, "mybucket", "myobject"), err))
|
2017-08-18 14:44:54 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(slashpath.Join(permDeniedDir, "mybucket"), 0o400); err != nil {
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Fatalf(fmt.Sprintf("Unable to change permission to temporary directory %v. %v", slashpath.Join(permDeniedDir, "mybucket"), err))
|
2017-08-18 14:44:54 -04:00
|
|
|
}
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Cleanup(func() {
|
|
|
|
os.Chmod(slashpath.Join(permDeniedDir, "mybucket"), 0o775)
|
|
|
|
})
|
2017-08-18 14:44:54 -04:00
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o400); err != nil {
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Fatalf(fmt.Sprintf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err))
|
2017-08-18 14:44:54 -04:00
|
|
|
}
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Cleanup(func() {
|
|
|
|
os.Chmod(permDeniedDir, 0o775)
|
|
|
|
})
|
2017-08-18 14:44:54 -04:00
|
|
|
|
|
|
|
return permDeniedDir
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorages xlStorage.getDiskInfo()
|
|
|
|
func TestXLStorageGetDiskInfo(t *testing.T) {
|
2022-07-25 15:37:26 -04:00
|
|
|
path := t.TempDir()
|
2016-06-29 14:25:35 -04:00
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
diskPath string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
|
|
|
{path, nil},
|
|
|
|
{"/nonexistent-dir", errDiskNotFound},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check test cases.
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
if _, err := getDiskInfo(testCase.diskPath); err != testCase.expectedErr {
|
|
|
|
t.Fatalf("expected: %s, got: %s", testCase.expectedErr, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
func TestXLStorageIsDirEmpty(t *testing.T) {
|
2022-07-25 15:37:26 -04:00
|
|
|
tmp := t.TempDir()
|
2017-08-04 13:43:51 -04:00
|
|
|
|
|
|
|
// Should give false on non-existent directory.
|
|
|
|
dir1 := slashpath.Join(tmp, "non-existent-directory")
|
2019-02-13 07:59:36 -05:00
|
|
|
if isDirEmpty(dir1) {
|
2017-08-04 13:43:51 -04:00
|
|
|
t.Error("expected false for non-existent directory, got true")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should give false for not-a-directory.
|
|
|
|
dir2 := slashpath.Join(tmp, "file")
|
2022-09-19 14:05:16 -04:00
|
|
|
err := os.WriteFile(dir2, []byte("hello"), 0o777)
|
2017-08-04 13:43:51 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2019-02-13 07:59:36 -05:00
|
|
|
if isDirEmpty(dir2) {
|
2017-08-04 13:43:51 -04:00
|
|
|
t.Error("expected false for a file, got true")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Should give true for a real empty directory.
|
|
|
|
dir3 := slashpath.Join(tmp, "empty")
|
2022-01-02 12:15:06 -05:00
|
|
|
err = os.Mkdir(dir3, 0o777)
|
2017-08-04 13:43:51 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2019-02-13 07:59:36 -05:00
|
|
|
if !isDirEmpty(dir3) {
|
2017-08-04 13:43:51 -04:00
|
|
|
t.Error("expected true for empty dir, got false")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-10-11 22:48:42 -04:00
|
|
|
func TestXLStorageReadVersionLegacy(t *testing.T) {
|
|
|
|
const legacyJSON = `{"version":"1.0.1","format":"xl","stat":{"size":2016,"modTime":"2021-10-11T23:40:34.914361617Z"},"erasure":{"algorithm":"klauspost/reedsolomon/vandermonde","data":2,"parity":2,"blockSize":10485760,"index":2,"distribution":[2,3,4,1],"checksum":[{"name":"part.1","algorithm":"highwayhash256S"}]},"minio":{"release":"RELEASE.2019-12-30T05-45-39Z"},"meta":{"X-Minio-Internal-Server-Side-Encryption-Iv":"kInsJB/0yxyz/40ZI+lmQYJfZacDYqZsGh2wEiv+N50=","X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id":"my-minio-key","X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key":"eyJhZWFkIjoiQUVTLTI1Ni1HQ00tSE1BQy1TSEEtMjU2IiwiaWQiOiJjMzEwNDVjODFmMTA2MWU5NTI4ODcxZmNhMmRkYzA3YyIsIml2IjoiOWQ5cUxGMFhSaFBXbEVqT2JDMmo0QT09Iiwibm9uY2UiOiJYaERsemlCU1cwSENuK2RDIiwiYnl0ZXMiOiJUM0lmY1haQ1dtMWpLeWxBWmFUUnczbDVoYldLWW95dm5iNTZVaWJEbE5LOFZVU2tuQmx3NytIMG8yZnRzZ1UrIn0=","X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key":"IAAfANqt801MT+wwzQRkfFhTrndmhfNiN0alKwDS4AQ1dznNADRQgoq6I4pPVfRsbDp5rQawlripQZvPWUSNJA==","X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm":"DAREv2-HMAC-SHA256","content-type":"application/octet-stream","etag":"20000f00cf5e68d3d6b60e44fcd8b9e8-1"},"parts":[{"number":1,"name":"part.1","etag":"","size":2016,"actualSize":1984}]}`
|
|
|
|
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2021-10-11 22:48:42 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to cfgreate xlStorage test setup, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create files for the test cases.
|
|
|
|
if err = xlStorage.MakeVol(context.Background(), "exists-legacy"); err != nil {
|
|
|
|
t.Fatalf("Unable to create a volume \"exists-legacy\", %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists-legacy", "as-file/xl.json", []byte(legacyJSON)); err != nil {
|
|
|
|
t.Fatalf("Unable to create a file \"as-file\", %s", err)
|
|
|
|
}
|
|
|
|
|
2023-11-21 00:33:47 -05:00
|
|
|
fi, err := xlStorage.ReadVersion(context.Background(), "exists-legacy", "as-file", "", ReadOptions{})
|
2021-10-11 22:48:42 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to read older 'xl.json' content: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !fi.XLV1 {
|
|
|
|
t.Fatal("Unexpected 'xl.json' content should be correctly interpreted as legacy content")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-11 05:27:04 -05:00
|
|
|
// TestXLStorageReadVersion - TestXLStorages the functionality implemented by xlStorage ReadVersion storage API.
|
|
|
|
func TestXLStorageReadVersion(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2021-01-11 05:27:04 -05:00
|
|
|
if err != nil {
|
2021-01-22 18:38:21 -05:00
|
|
|
t.Fatalf("Unable to cfgreate xlStorage test setup, %s", err)
|
2021-01-11 05:27:04 -05:00
|
|
|
}
|
|
|
|
|
2022-09-19 14:05:16 -04:00
|
|
|
xlMeta, _ := os.ReadFile("testdata/xl.meta")
|
2023-11-21 00:33:47 -05:00
|
|
|
fi, _ := getFileInfo(xlMeta, "exists", "as-file", "", false, true)
|
2021-01-11 05:27:04 -05:00
|
|
|
|
|
|
|
// Create files for the test cases.
|
|
|
|
if err = xlStorage.MakeVol(context.Background(), "exists"); err != nil {
|
|
|
|
t.Fatalf("Unable to create a volume \"exists\", %s", err)
|
|
|
|
}
|
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists", "as-directory/as-file/xl.meta", xlMeta); err != nil {
|
|
|
|
t.Fatalf("Unable to create a file \"as-directory/as-file\", %s", err)
|
|
|
|
}
|
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists", "as-file/xl.meta", xlMeta); err != nil {
|
|
|
|
t.Fatalf("Unable to create a file \"as-file\", %s", err)
|
|
|
|
}
|
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists", "as-file-parent/xl.meta", xlMeta); err != nil {
|
|
|
|
t.Fatalf("Unable to create a file \"as-file-parent\", %s", err)
|
|
|
|
}
|
2023-11-21 00:33:47 -05:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "exists/as-file/"+fi.DataDir); err != nil {
|
|
|
|
t.Fatalf("Unable to create a dataDir %s, %s", fi.DataDir, err)
|
|
|
|
}
|
2021-01-11 05:27:04 -05:00
|
|
|
|
|
|
|
// TestXLStoragecases to validate different conditions for ReadVersion API.
|
|
|
|
testCases := []struct {
|
|
|
|
volume string
|
|
|
|
path string
|
|
|
|
err error
|
|
|
|
}{
|
|
|
|
// TestXLStorage case - 1.
|
|
|
|
// Validate volume does not exist.
|
|
|
|
{
|
|
|
|
volume: "i-dont-exist",
|
|
|
|
path: "",
|
|
|
|
err: errVolumeNotFound,
|
|
|
|
},
|
|
|
|
// TestXLStorage case - 2.
|
|
|
|
// Validate bad condition file does not exist.
|
|
|
|
{
|
|
|
|
volume: "exists",
|
|
|
|
path: "as-file-not-found",
|
|
|
|
err: errFileNotFound,
|
|
|
|
},
|
|
|
|
// TestXLStorage case - 3.
|
|
|
|
// Validate bad condition file exists as prefix/directory and
|
|
|
|
// we are attempting to read it.
|
|
|
|
{
|
|
|
|
volume: "exists",
|
|
|
|
path: "as-directory",
|
|
|
|
err: errFileNotFound,
|
|
|
|
},
|
|
|
|
// TestXLStorage case - 4.
|
|
|
|
{
|
|
|
|
volume: "exists",
|
|
|
|
path: "as-file-parent/as-file",
|
|
|
|
err: errFileNotFound,
|
|
|
|
},
|
|
|
|
// TestXLStorage case - 5.
|
|
|
|
// Validate the good condition file exists and we are able to read it.
|
|
|
|
{
|
|
|
|
volume: "exists",
|
|
|
|
path: "as-file",
|
|
|
|
err: nil,
|
|
|
|
},
|
|
|
|
// TestXLStorage case - 6.
|
|
|
|
// TestXLStorage case with invalid volume name.
|
|
|
|
{
|
|
|
|
volume: "ab",
|
|
|
|
path: "as-file",
|
|
|
|
err: errVolumeNotFound,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run through all the test cases and validate for ReadVersion.
|
|
|
|
for i, testCase := range testCases {
|
2023-11-21 00:33:47 -05:00
|
|
|
_, err = xlStorage.ReadVersion(context.Background(), testCase.volume, testCase.path, "", ReadOptions{})
|
2021-01-11 05:27:04 -05:00
|
|
|
if err != testCase.err {
|
|
|
|
t.Fatalf("TestXLStorage %d: Expected err \"%s\", got err \"%s\"", i+1, testCase.err, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageReadAll - TestXLStorages the functionality implemented by xlStorage ReadAll storage API.
|
|
|
|
func TestXLStorageReadAll(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2016-06-25 17:51:06 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-06-25 17:51:06 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create files for the test cases.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "exists"); err != nil {
|
2016-06-25 17:51:06 -04:00
|
|
|
t.Fatalf("Unable to create a volume \"exists\", %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists", "as-directory/as-file", []byte("Hello, World")); err != nil {
|
2016-06-25 17:51:06 -04:00
|
|
|
t.Fatalf("Unable to create a file \"as-directory/as-file\", %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists", "as-file", []byte("Hello, World")); err != nil {
|
2016-06-25 17:51:06 -04:00
|
|
|
t.Fatalf("Unable to create a file \"as-file\", %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "exists", "as-file-parent", []byte("Hello, World")); err != nil {
|
2016-07-11 03:15:37 -04:00
|
|
|
t.Fatalf("Unable to create a file \"as-file-parent\", %s", err)
|
|
|
|
}
|
2016-06-25 17:51:06 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStoragecases to validate different conditions for ReadAll API.
|
2016-06-25 17:51:06 -04:00
|
|
|
testCases := []struct {
|
|
|
|
volume string
|
|
|
|
path string
|
|
|
|
err error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-06-25 17:51:06 -04:00
|
|
|
// Validate volume does not exist.
|
|
|
|
{
|
2016-08-11 22:57:14 -04:00
|
|
|
volume: "i-dont-exist",
|
|
|
|
path: "",
|
|
|
|
err: errVolumeNotFound,
|
2016-06-25 17:51:06 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2016-06-25 17:51:06 -04:00
|
|
|
// Validate bad condition file does not exist.
|
|
|
|
{
|
2016-08-11 22:57:14 -04:00
|
|
|
volume: "exists",
|
|
|
|
path: "as-file-not-found",
|
|
|
|
err: errFileNotFound,
|
2016-06-25 17:51:06 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
2016-06-25 17:51:06 -04:00
|
|
|
// Validate bad condition file exists as prefix/directory and
|
|
|
|
// we are attempting to read it.
|
|
|
|
{
|
2016-08-11 22:57:14 -04:00
|
|
|
volume: "exists",
|
|
|
|
path: "as-directory",
|
|
|
|
err: errFileNotFound,
|
2016-06-25 17:51:06 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 4.
|
2016-07-11 03:15:37 -04:00
|
|
|
{
|
2016-08-11 22:57:14 -04:00
|
|
|
volume: "exists",
|
|
|
|
path: "as-file-parent/as-file",
|
|
|
|
err: errFileNotFound,
|
2016-07-11 03:15:37 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 5.
|
2016-07-11 03:15:37 -04:00
|
|
|
// Validate the good condition file exists and we are able to read it.
|
2016-06-25 17:51:06 -04:00
|
|
|
{
|
2016-08-11 22:57:14 -04:00
|
|
|
volume: "exists",
|
|
|
|
path: "as-file",
|
|
|
|
err: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 6.
|
|
|
|
// TestXLStorage case with invalid volume name.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
volume: "ab",
|
|
|
|
path: "as-file",
|
2018-04-23 23:27:33 -04:00
|
|
|
err: errVolumeNotFound,
|
2016-06-25 17:51:06 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
var dataRead []byte
|
2016-06-25 17:51:06 -04:00
|
|
|
// Run through all the test cases and validate for ReadAll.
|
|
|
|
for i, testCase := range testCases {
|
2020-09-04 12:45:06 -04:00
|
|
|
dataRead, err = xlStorage.ReadAll(context.Background(), testCase.volume, testCase.path)
|
2016-06-25 17:51:06 -04:00
|
|
|
if err != testCase.err {
|
2021-10-28 20:02:22 -04:00
|
|
|
t.Errorf("TestXLStorage %d: Expected err \"%v\", got err \"%v\"", i+1, testCase.err, err)
|
|
|
|
continue
|
2016-06-25 17:51:06 -04:00
|
|
|
}
|
2016-08-11 22:57:14 -04:00
|
|
|
if err == nil {
|
2021-11-16 12:28:29 -05:00
|
|
|
if !bytes.Equal(dataRead, []byte("Hello, World")) {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Errorf("TestXLStorage %d: Expected the data read to be \"%s\", but instead got \"%s\"", i+1, "Hello, World", string(dataRead))
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-06-25 17:51:06 -04:00
|
|
|
}
|
2016-07-02 04:59:28 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestNewXLStorage all the cases handled in xlStorage storage layer initialization.
|
|
|
|
func TestNewXLStorage(t *testing.T) {
|
2016-07-02 04:59:28 -04:00
|
|
|
// Temporary dir name.
|
2019-08-06 15:08:58 -04:00
|
|
|
tmpDirName := globalTestTmpDir + SlashSeparator + "minio-" + nextSuffix()
|
2016-07-02 04:59:28 -04:00
|
|
|
// Temporary file name.
|
2019-08-06 15:08:58 -04:00
|
|
|
tmpFileName := globalTestTmpDir + SlashSeparator + "minio-" + nextSuffix()
|
2016-07-02 04:59:28 -04:00
|
|
|
f, _ := os.Create(tmpFileName)
|
|
|
|
f.Close()
|
|
|
|
defer os.Remove(tmpFileName)
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// List of all tests for xlStorage initialization.
|
2016-07-02 04:59:28 -04:00
|
|
|
testCases := []struct {
|
2016-10-27 06:30:52 -04:00
|
|
|
name string
|
|
|
|
err error
|
2016-07-02 04:59:28 -04:00
|
|
|
}{
|
|
|
|
// Validates input argument cannot be empty.
|
|
|
|
{
|
|
|
|
"",
|
|
|
|
errInvalidArgument,
|
|
|
|
},
|
|
|
|
// Validates if the directory does not exist and
|
|
|
|
// gets automatically created.
|
|
|
|
{
|
|
|
|
tmpDirName,
|
|
|
|
nil,
|
|
|
|
},
|
|
|
|
// Validates if the disk exists as file and returns error
|
|
|
|
// not a directory.
|
|
|
|
{
|
|
|
|
tmpFileName,
|
2020-06-12 23:04:01 -04:00
|
|
|
errDiskNotDir,
|
2016-07-02 04:59:28 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate all test cases.
|
|
|
|
for i, testCase := range testCases {
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize a new xlStorage layer.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err := newLocalXLStorage(testCase.name)
|
2016-07-02 04:59:28 -04:00
|
|
|
if err != testCase.err {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("TestXLStorage %d failed wanted: %s, got: %s", i+1, err, testCase.err)
|
2016-07-02 04:59:28 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2016-07-03 14:17:08 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageMakeVol - TestXLStorage validate the logic for creation of new xlStorage volume.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Asserts the failures too against the expected failures.
|
2020-06-12 23:04:01 -04:00
|
|
|
func TestXLStorageMakeVol(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, path, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
|
|
|
// Create a file.
|
2022-09-19 14:05:16 -04:00
|
|
|
if err := os.WriteFile(slashpath.Join(path, "vol-as-file"), []byte{}, os.ModePerm); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
// Create a directory.
|
2022-01-02 12:15:06 -05:00
|
|
|
if err := os.Mkdir(slashpath.Join(path, "existing-vol"), 0o777); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create directory, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
volName string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// A valid case, volume creation is expected to succeed.
|
|
|
|
{
|
|
|
|
volName: "success-vol",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Case where a file exists by the name of the volume to be created.
|
|
|
|
{
|
|
|
|
volName: "vol-as-file",
|
|
|
|
expectedErr: errVolumeExists,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
volName: "existing-vol",
|
|
|
|
expectedErr: errVolumeExists,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 5.
|
|
|
|
// TestXLStorage case with invalid volume name.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
volName: "ab",
|
|
|
|
expectedErr: errInvalidArgument,
|
|
|
|
},
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
for i, testCase := range testCases {
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.MakeVol(context.Background(), testCase.volName); err != testCase.expectedErr {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("TestXLStorage %d: Expected: \"%s\", got: \"%s\"", i+1, testCase.expectedErr, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for permission denied.
|
2017-01-18 15:24:34 -05:00
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
2022-07-25 15:37:26 -04:00
|
|
|
permDeniedDir := createPermDeniedFile(t)
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o400); err != nil {
|
2017-08-18 14:44:54 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
2018-04-09 23:56:09 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize xlStorage storage layer for permission denied error.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err = newLocalXLStorage(permDeniedDir)
|
2021-01-22 18:38:21 -05:00
|
|
|
if err != nil && err != errDiskAccessDenied {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2018-04-09 23:56:09 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o755); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-08-25 13:55:15 -04:00
|
|
|
xlStorageNew, err := newLocalXLStorage(permDeniedDir)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2018-04-09 23:56:09 -04:00
|
|
|
// change backend permissions for MakeVol error.
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o400); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorageNew.MakeVol(context.Background(), "test-vol"); err != errDiskAccessDenied {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("expected: %s, got: %s", errDiskAccessDenied, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageDeleteVol - Validates the expected behavior of xlStorage.DeleteVol for various cases.
|
|
|
|
func TestXLStorageDeleteVol(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, path, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage failure cases.
|
2016-07-03 14:17:08 -04:00
|
|
|
vol := slashpath.Join(path, "nonempty-vol")
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Mkdir(vol, 0o777); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create directory, %s", err)
|
|
|
|
}
|
2022-09-19 14:05:16 -04:00
|
|
|
if err = os.WriteFile(slashpath.Join(vol, "test-file"), []byte{}, os.ModePerm); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
volName string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// A valida case. Empty vol, should be possible to delete.
|
|
|
|
{
|
|
|
|
volName: "success-vol",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2016-08-11 22:57:14 -04:00
|
|
|
// volume is non-existent.
|
|
|
|
{
|
|
|
|
volName: "nonexistent-vol",
|
|
|
|
expectedErr: errVolumeNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
2016-08-11 22:57:14 -04:00
|
|
|
// It shouldn't be possible to delete an non-empty volume, validating the same.
|
|
|
|
{
|
|
|
|
volName: "nonempty-vol",
|
|
|
|
expectedErr: errVolumeNotEmpty,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 5.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Invalid volume name.
|
|
|
|
{
|
|
|
|
volName: "ab",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
for i, testCase := range testCases {
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.DeleteVol(context.Background(), testCase.volName, false); err != testCase.expectedErr {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("TestXLStorage: %d, expected: %s, got: %s", i+1, testCase.expectedErr, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for permission denied.
|
2017-01-18 15:24:34 -05:00
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
2022-07-25 15:37:26 -04:00
|
|
|
permDeniedDir := t.TempDir()
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Mkdir(slashpath.Join(permDeniedDir, "mybucket"), 0o400); err != nil {
|
2017-08-18 14:44:54 -04:00
|
|
|
t.Fatalf("Unable to create temporary directory %v. %v", slashpath.Join(permDeniedDir, "mybucket"), err)
|
|
|
|
}
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Cleanup(func() {
|
|
|
|
os.Chmod(slashpath.Join(permDeniedDir, "mybucket"), 0o775)
|
|
|
|
})
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o400); err != nil {
|
2017-08-18 14:44:54 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Cleanup(func() {
|
|
|
|
os.Chmod(permDeniedDir, 0o775)
|
|
|
|
})
|
2018-04-09 23:56:09 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize xlStorage storage layer for permission denied error.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err = newLocalXLStorage(permDeniedDir)
|
2021-01-22 18:38:21 -05:00
|
|
|
if err != nil && err != errDiskAccessDenied {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2018-04-09 23:56:09 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o755); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-08-25 13:55:15 -04:00
|
|
|
xlStorageNew, err := newLocalXLStorage(permDeniedDir)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2018-04-09 23:56:09 -04:00
|
|
|
// change backend permissions for MakeVol error.
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o400); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorageNew.DeleteVol(context.Background(), "mybucket", false); err != errDiskAccessDenied {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("expected: Permission error, got: %s", err)
|
|
|
|
}
|
|
|
|
}
|
2016-08-11 22:57:14 -04:00
|
|
|
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorageDeletedStorage, diskPath, err := newXLStorageTestSetup(t)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
// removing the disk, used to recreate disk not found error.
|
2017-08-12 22:25:43 -04:00
|
|
|
os.RemoveAll(diskPath)
|
2016-08-11 22:57:14 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for delete on an removed disk.
|
2016-08-11 22:57:14 -04:00
|
|
|
// should fail with disk not found.
|
2020-09-04 12:45:06 -04:00
|
|
|
err = xlStorageDeletedStorage.DeleteVol(context.Background(), "Del-Vol", false)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != errDiskNotFound {
|
2022-08-04 19:10:08 -04:00
|
|
|
t.Errorf("Expected: \"Drive not found\", got \"%s\"", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageStatVol - TestXLStorages validate the volume info returned by xlStorage.StatVol() for various inputs.
|
|
|
|
func TestXLStorageStatVol(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
volName string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
volName: "success-vol",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
volName: "nonexistent-vol",
|
|
|
|
expectedErr: errVolumeNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
volName: "ab",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
for i, testCase := range testCases {
|
2020-06-12 23:04:01 -04:00
|
|
|
var volInfo VolInfo
|
2020-09-04 12:45:06 -04:00
|
|
|
volInfo, err = xlStorage.StatVol(context.Background(), testCase.volName)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != testCase.expectedErr {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("TestXLStorage case : %d, Expected: \"%s\", got: \"%s\"", i+1, testCase.expectedErr, err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if err == nil {
|
2020-05-18 12:59:45 -04:00
|
|
|
if volInfo.Name != testCase.volName {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Errorf("TestXLStorage case %d: Expected the volume name to be \"%s\", instead found \"%s\"",
|
|
|
|
i+1, volInfo.Name, testCase.volName)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
2016-08-11 22:57:14 -04:00
|
|
|
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorageDeletedStorage, diskPath, err := newXLStorageTestSetup(t)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
// removing the disk, used to recreate disk not found error.
|
2017-08-12 22:25:43 -04:00
|
|
|
os.RemoveAll(diskPath)
|
2016-08-11 22:57:14 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for delete on an removed disk.
|
2016-08-11 22:57:14 -04:00
|
|
|
// should fail with disk not found.
|
2020-09-04 12:45:06 -04:00
|
|
|
_, err = xlStorageDeletedStorage.StatVol(context.Background(), "Stat vol")
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != errDiskNotFound {
|
2022-08-04 19:10:08 -04:00
|
|
|
t.Errorf("Expected: \"Drive not found\", got \"%s\"", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageListVols - Validates the result and the error output for xlStorage volume listing functionality xlStorage.ListVols().
|
|
|
|
func TestXLStorageListVols(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, path, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2019-10-25 13:37:53 -04:00
|
|
|
var volInfos []VolInfo
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage empty list vols.
|
2020-09-04 12:45:06 -04:00
|
|
|
if volInfos, err = xlStorage.ListVols(context.Background()); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("expected: <nil>, got: %s", err)
|
2019-10-25 13:37:53 -04:00
|
|
|
} else if len(volInfos) != 1 {
|
|
|
|
t.Fatalf("expected: one entry, got: %s", volInfos)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage non-empty list vols.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
2019-10-25 13:37:53 -04:00
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
volInfos, err = xlStorage.ListVols(context.Background())
|
2019-10-25 13:37:53 -04:00
|
|
|
if err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("expected: <nil>, got: %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
2019-10-25 13:37:53 -04:00
|
|
|
if len(volInfos) != 2 {
|
|
|
|
t.Fatalf("expected: 2, got: %d", len(volInfos))
|
|
|
|
}
|
|
|
|
volFound := false
|
|
|
|
for _, info := range volInfos {
|
|
|
|
if info.Name == "success-vol" {
|
|
|
|
volFound = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !volFound {
|
|
|
|
t.Errorf("expected: success-vol to be created")
|
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
// removing the path and simulating disk failure
|
2017-08-12 22:25:43 -04:00
|
|
|
os.RemoveAll(path)
|
2016-08-11 22:57:14 -04:00
|
|
|
// should fail with errDiskNotFound.
|
2020-09-04 12:45:06 -04:00
|
|
|
if _, err = xlStorage.ListVols(context.Background()); err != errDiskNotFound {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Errorf("Expected to fail with \"%s\", but instead failed with \"%s\"", errDiskNotFound, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
fix: use buffers only when necessary for io.Copy() (#11229)
Use separate sync.Pool for writes/reads
Avoid passing buffers for io.CopyBuffer()
if the writer or reader implement io.WriteTo or io.ReadFrom
respectively then its useless for sync.Pool to allocate
buffers on its own since that will be completely ignored
by the io.CopyBuffer Go implementation.
Improve this wherever we see this to be optimal.
This allows us to be more efficient on memory usage.
```
385 // copyBuffer is the actual implementation of Copy and CopyBuffer.
386 // if buf is nil, one is allocated.
387 func copyBuffer(dst Writer, src Reader, buf []byte) (written int64, err error) {
388 // If the reader has a WriteTo method, use it to do the copy.
389 // Avoids an allocation and a copy.
390 if wt, ok := src.(WriterTo); ok {
391 return wt.WriteTo(dst)
392 }
393 // Similarly, if the writer has a ReadFrom method, use it to do the copy.
394 if rt, ok := dst.(ReaderFrom); ok {
395 return rt.ReadFrom(src)
396 }
```
From readahead package
```
// WriteTo writes data to w until there's no more data to write or when an error occurs.
// The return value n is the number of bytes written.
// Any error encountered during the write is also returned.
func (a *reader) WriteTo(w io.Writer) (n int64, err error) {
if a.err != nil {
return 0, a.err
}
n = 0
for {
err = a.fill()
if err != nil {
return n, err
}
n2, err := w.Write(a.cur.buffer())
a.cur.inc(n2)
n += int64(n2)
if err != nil {
return n, err
}
```
2021-01-06 12:36:55 -05:00
|
|
|
// TestXLStorageListDir - TestXLStorages validate the directory listing functionality provided by xlStorage.ListDir .
|
|
|
|
func TestXLStorageListDir(t *testing.T) {
|
2020-06-12 23:04:01 -04:00
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// create xlStorage test setup.
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorageDeletedStorage, diskPath, err := newXLStorageTestSetup(t)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
// removing the disk, used to recreate disk not found error.
|
2017-08-12 22:25:43 -04:00
|
|
|
os.RemoveAll(diskPath)
|
2016-08-11 22:57:14 -04:00
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "success-vol", "abc/def/ghi/success-file", []byte("Hello, world")); err != nil {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "success-vol", "abc/xyz/ghi/success-file", []byte("Hello, world")); err != nil {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
2020-01-17 16:34:43 -05:00
|
|
|
srcVol string
|
|
|
|
srcPath string
|
2016-08-11 22:57:14 -04:00
|
|
|
// expected result.
|
|
|
|
expectedListDir []string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// valid case with existing volume and file to delete.
|
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "abc",
|
|
|
|
expectedListDir: []string{"def/", "xyz/"},
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// valid case with existing volume and file to delete.
|
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "abc/def",
|
|
|
|
expectedListDir: []string{"ghi/"},
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// valid case with existing volume and file to delete.
|
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "abc/def/ghi",
|
|
|
|
expectedListDir: []string{"success-file"},
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "abcdef",
|
|
|
|
expectedErr: errFileNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
|
|
|
// TestXLStorage case with invalid volume name.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "ab",
|
|
|
|
srcPath: "success-file",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 4.
|
|
|
|
// TestXLStorage case with non existent volume.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "non-existent-vol",
|
|
|
|
srcPath: "success-file",
|
|
|
|
expectedErr: errVolumeNotFound,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
var dirList []string
|
2020-09-04 12:45:06 -04:00
|
|
|
dirList, err = xlStorage.ListDir(context.Background(), testCase.srcVol, testCase.srcPath, -1)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != testCase.expectedErr {
|
2021-03-29 11:07:23 -04:00
|
|
|
t.Errorf("TestXLStorage case %d: Expected: \"%s\", got: \"%s\"", i+1, testCase.expectedErr, err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
if err == nil {
|
|
|
|
for _, expected := range testCase.expectedListDir {
|
|
|
|
if !strings.Contains(strings.Join(dirList, ","), expected) {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Errorf("TestXLStorage case %d: Expected the directory listing to be \"%v\", but got \"%v\"", i+1, testCase.expectedListDir, dirList)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for permission denied.
|
2017-01-18 15:24:34 -05:00
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
2017-08-18 14:44:54 -04:00
|
|
|
permDeniedDir := createPermDeniedFile(t)
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize xlStorage storage layer for permission denied error.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err = newLocalXLStorage(permDeniedDir)
|
2021-01-22 18:38:21 -05:00
|
|
|
if err != nil && err != errDiskAccessDenied {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2018-04-09 23:56:09 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o755); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-08-25 13:55:15 -04:00
|
|
|
xlStorageNew, err := newLocalXLStorage(permDeniedDir)
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
|
2022-07-11 12:15:54 -04:00
|
|
|
if err = xlStorageNew.Delete(context.Background(), "mybucket", "myobject", DeleteOptions{
|
|
|
|
Recursive: false,
|
2023-11-29 01:35:16 -05:00
|
|
|
Immediate: false,
|
2023-11-21 18:08:41 -05:00
|
|
|
}); err != errFileAccessDenied {
|
|
|
|
t.Errorf("expected: %s, got: %s", errFileAccessDenied, err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for delete on an removed disk.
|
2016-08-11 22:57:14 -04:00
|
|
|
// should fail with disk not found.
|
2022-07-11 12:15:54 -04:00
|
|
|
err = xlStorageDeletedStorage.Delete(context.Background(), "del-vol", "my-file", DeleteOptions{
|
|
|
|
Recursive: false,
|
2023-11-29 01:35:16 -05:00
|
|
|
Immediate: false,
|
2022-07-11 12:15:54 -04:00
|
|
|
})
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != errDiskNotFound {
|
2022-08-04 19:10:08 -04:00
|
|
|
t.Errorf("Expected: \"Drive not found\", got \"%s\"", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageDeleteFile - Series of test cases construct valid and invalid input data and validates the result and the error response.
|
|
|
|
func TestXLStorageDeleteFile(t *testing.T) {
|
2021-03-29 11:07:23 -04:00
|
|
|
if runtime.GOOS == globalWindowsOSName {
|
|
|
|
t.Skip()
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, path, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "success-vol", "success-file", []byte("Hello, world")); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "no-permissions"); err != nil {
|
posix: do not upstream errors in deleteFile (#4771)
This commit changes posix's deleteFile() to not upstream errors from
removing parent directories. This fixes a race condition.
The race condition occurs when multiple deleteFile()s are called on the
same parent directory, but different child files. Because deleteFile()
recursively removes parent directories if they are empty, but
deleteFile() errors if the selected deletePath does not exist, there was
an opportunity for a race condition. The two processes would remove the
child directories successfully, then depend on the parent directory
still existing. In some cases this is an invalid assumption, because
other processes can remove the parent directory beforehand. This commit
changes deleteFile() to not upstream an error if one occurs, because the
only required error should be from the immediate deletePath, not from a
parent path.
In the specific bug report, multiple CompleteMultipartUpload requests
would launch multiple deleteFile() requests. Because they chain up on
parent directories, ultimately at the end, there would be multiple
remove files for the ultimate parent directory,
.minio.sys/multipart/{bucket}. Because only one will succeed and one
will fail, an error would be upstreamed saying that the file does not
exist, and the CompleteMultipartUpload code interpreted this as
NoSuchKey, or that the object/part id doesn't exist. This was faulty
behavior and is now fixed.
The added test fails before this change and passes after this change.
Fixes: https://github.com/minio/minio/issues/4727
2017-08-04 19:51:20 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err.Error())
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "no-permissions", "dir/file", []byte("Hello, world")); err != nil {
|
posix: do not upstream errors in deleteFile (#4771)
This commit changes posix's deleteFile() to not upstream errors from
removing parent directories. This fixes a race condition.
The race condition occurs when multiple deleteFile()s are called on the
same parent directory, but different child files. Because deleteFile()
recursively removes parent directories if they are empty, but
deleteFile() errors if the selected deletePath does not exist, there was
an opportunity for a race condition. The two processes would remove the
child directories successfully, then depend on the parent directory
still existing. In some cases this is an invalid assumption, because
other processes can remove the parent directory beforehand. This commit
changes deleteFile() to not upstream an error if one occurs, because the
only required error should be from the immediate deletePath, not from a
parent path.
In the specific bug report, multiple CompleteMultipartUpload requests
would launch multiple deleteFile() requests. Because they chain up on
parent directories, ultimately at the end, there would be multiple
remove files for the ultimate parent directory,
.minio.sys/multipart/{bucket}. Because only one will succeed and one
will fail, an error would be upstreamed saying that the file does not
exist, and the CompleteMultipartUpload code interpreted this as
NoSuchKey, or that the object/part id doesn't exist. This was faulty
behavior and is now fixed.
The added test fails before this change and passes after this change.
Fixes: https://github.com/minio/minio/issues/4727
2017-08-04 19:51:20 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err.Error())
|
|
|
|
}
|
|
|
|
// Parent directory must have write permissions, this is read + execute.
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(pathJoin(path, "no-permissions"), 0o555); err != nil {
|
posix: do not upstream errors in deleteFile (#4771)
This commit changes posix's deleteFile() to not upstream errors from
removing parent directories. This fixes a race condition.
The race condition occurs when multiple deleteFile()s are called on the
same parent directory, but different child files. Because deleteFile()
recursively removes parent directories if they are empty, but
deleteFile() errors if the selected deletePath does not exist, there was
an opportunity for a race condition. The two processes would remove the
child directories successfully, then depend on the parent directory
still existing. In some cases this is an invalid assumption, because
other processes can remove the parent directory beforehand. This commit
changes deleteFile() to not upstream an error if one occurs, because the
only required error should be from the immediate deletePath, not from a
parent path.
In the specific bug report, multiple CompleteMultipartUpload requests
would launch multiple deleteFile() requests. Because they chain up on
parent directories, ultimately at the end, there would be multiple
remove files for the ultimate parent directory,
.minio.sys/multipart/{bucket}. Because only one will succeed and one
will fail, an error would be upstreamed saying that the file does not
exist, and the CompleteMultipartUpload code interpreted this as
NoSuchKey, or that the object/part id doesn't exist. This was faulty
behavior and is now fixed.
The added test fails before this change and passes after this change.
Fixes: https://github.com/minio/minio/issues/4727
2017-08-04 19:51:20 -04:00
|
|
|
t.Fatalf("Unable to chmod directory, %s", err.Error())
|
|
|
|
}
|
2022-07-25 15:37:26 -04:00
|
|
|
t.Cleanup(func() {
|
|
|
|
os.Chmod(pathJoin(path, "no-permissions"), 0o775)
|
|
|
|
})
|
posix: do not upstream errors in deleteFile (#4771)
This commit changes posix's deleteFile() to not upstream errors from
removing parent directories. This fixes a race condition.
The race condition occurs when multiple deleteFile()s are called on the
same parent directory, but different child files. Because deleteFile()
recursively removes parent directories if they are empty, but
deleteFile() errors if the selected deletePath does not exist, there was
an opportunity for a race condition. The two processes would remove the
child directories successfully, then depend on the parent directory
still existing. In some cases this is an invalid assumption, because
other processes can remove the parent directory beforehand. This commit
changes deleteFile() to not upstream an error if one occurs, because the
only required error should be from the immediate deletePath, not from a
parent path.
In the specific bug report, multiple CompleteMultipartUpload requests
would launch multiple deleteFile() requests. Because they chain up on
parent directories, ultimately at the end, there would be multiple
remove files for the ultimate parent directory,
.minio.sys/multipart/{bucket}. Because only one will succeed and one
will fail, an error would be upstreamed saying that the file does not
exist, and the CompleteMultipartUpload code interpreted this as
NoSuchKey, or that the object/part id doesn't exist. This was faulty
behavior and is now fixed.
The added test fails before this change and passes after this change.
Fixes: https://github.com/minio/minio/issues/4727
2017-08-04 19:51:20 -04:00
|
|
|
|
2016-07-03 14:17:08 -04:00
|
|
|
testCases := []struct {
|
2016-08-11 22:57:14 -04:00
|
|
|
srcVol string
|
|
|
|
srcPath string
|
2016-07-03 14:17:08 -04:00
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// valid case with existing volume and file to delete.
|
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "success-file",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2021-06-07 12:35:08 -04:00
|
|
|
// The file was deleted in the last case, so Delete should not fail.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "success-file",
|
2021-06-07 12:35:08 -04:00
|
|
|
expectedErr: nil,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
|
|
|
// TestXLStorage case with segment of the volume name > 255.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
2018-01-29 21:43:13 -05:00
|
|
|
srcVol: "my",
|
2016-08-11 22:57:14 -04:00
|
|
|
srcPath: "success-file",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 4.
|
|
|
|
// TestXLStorage case with non-existent volume.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "non-existent-vol",
|
|
|
|
srcPath: "success-file",
|
|
|
|
expectedErr: errVolumeNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 5.
|
|
|
|
// TestXLStorage case with src path segment > 255.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "my-obj-del-0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001",
|
|
|
|
expectedErr: errFileNameTooLong,
|
|
|
|
},
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
for i, testCase := range testCases {
|
2022-07-11 12:15:54 -04:00
|
|
|
if err = xlStorage.Delete(context.Background(), testCase.srcVol, testCase.srcPath, DeleteOptions{
|
|
|
|
Recursive: false,
|
2023-11-29 01:35:16 -05:00
|
|
|
Immediate: false,
|
2022-07-11 12:15:54 -04:00
|
|
|
}); err != testCase.expectedErr {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Errorf("TestXLStorage case %d: Expected: \"%s\", got: \"%s\"", i+1, testCase.expectedErr, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for permission denied.
|
2017-01-18 15:24:34 -05:00
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
2017-08-18 14:44:54 -04:00
|
|
|
permDeniedDir := createPermDeniedFile(t)
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize xlStorage storage layer for permission denied error.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err = newLocalXLStorage(permDeniedDir)
|
2021-01-22 18:38:21 -05:00
|
|
|
if err != nil && err != errDiskAccessDenied {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2018-04-09 23:56:09 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o755); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-08-25 13:55:15 -04:00
|
|
|
xlStorageNew, err := newLocalXLStorage(permDeniedDir)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2022-07-11 12:15:54 -04:00
|
|
|
if err = xlStorageNew.Delete(context.Background(), "mybucket", "myobject", DeleteOptions{
|
|
|
|
Recursive: false,
|
2023-11-29 01:35:16 -05:00
|
|
|
Immediate: false,
|
2023-11-21 18:08:41 -05:00
|
|
|
}); err != errFileAccessDenied {
|
|
|
|
t.Errorf("expected: %s, got: %s", errFileAccessDenied, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
2016-08-11 22:57:14 -04:00
|
|
|
|
2022-05-12 18:24:58 -04:00
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorageDeletedStorage, diskPath, err := newXLStorageTestSetup(t)
|
2022-05-12 18:24:58 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
|
|
|
}
|
|
|
|
// removing the disk, used to recreate disk not found error.
|
|
|
|
err = os.RemoveAll(diskPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to remoe xlStorage diskpath, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for delete on an removed disk.
|
2016-08-11 22:57:14 -04:00
|
|
|
// should fail with disk not found.
|
2022-07-11 12:15:54 -04:00
|
|
|
err = xlStorageDeletedStorage.Delete(context.Background(), "del-vol", "my-file", DeleteOptions{
|
|
|
|
Recursive: false,
|
2023-11-29 01:35:16 -05:00
|
|
|
Immediate: false,
|
2022-07-11 12:15:54 -04:00
|
|
|
})
|
2016-08-11 22:57:14 -04:00
|
|
|
if err != errDiskNotFound {
|
2022-08-04 19:10:08 -04:00
|
|
|
t.Errorf("Expected: \"Drive not found\", got \"%s\"", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageReadFile - TestXLStorages xlStorage.ReadFile with wide range of cases and asserts the result and error response.
|
|
|
|
func TestXLStorageReadFile(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, path, err := newXLStorageTestSetup(t)
|
2016-07-29 00:57:11 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-29 00:57:11 -04:00
|
|
|
}
|
2016-08-11 22:57:14 -04:00
|
|
|
|
2016-07-30 04:26:19 -04:00
|
|
|
volume := "success-vol"
|
2016-07-29 00:57:11 -04:00
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), volume); err != nil {
|
2016-07-29 00:57:11 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create directory to make errIsNotRegular
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Mkdir(slashpath.Join(path, "success-vol", "object-as-dir"), 0o777); err != nil {
|
2016-07-29 00:57:11 -04:00
|
|
|
t.Fatalf("Unable to create directory, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
2016-07-30 04:26:19 -04:00
|
|
|
volume string
|
2016-07-29 00:57:11 -04:00
|
|
|
fileName string
|
|
|
|
offset int64
|
|
|
|
bufSize int
|
|
|
|
expectedBuf []byte
|
|
|
|
expectedErr error
|
|
|
|
}{
|
|
|
|
// Successful read at offset 0 and proper buffer size. - 1
|
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "myobject", 0, 5,
|
2016-07-29 00:57:11 -04:00
|
|
|
[]byte("hello"), nil,
|
|
|
|
},
|
|
|
|
// Success read at hierarchy. - 2
|
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "path/to/my/object", 0, 5,
|
2016-07-29 00:57:11 -04:00
|
|
|
[]byte("hello"), nil,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Object is a directory. - 3
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "object-as-dir",
|
2022-01-02 12:15:06 -05:00
|
|
|
0, 5, nil, errIsNotRegular,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// One path segment length is > 255 chars long. - 4
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "path/to/my/object0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001",
|
2022-01-02 12:15:06 -05:00
|
|
|
0, 5, nil, errFileNameTooLong,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Path length is > 1024 chars long. - 5
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "level0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001/level0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002/level0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003/object000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001",
|
2022-01-02 12:15:06 -05:00
|
|
|
0, 5, nil, errFileNameTooLong,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Buffer size greater than object size. - 6
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "myobject", 0, 16,
|
2016-07-29 00:57:11 -04:00
|
|
|
[]byte("hello, world"),
|
|
|
|
io.ErrUnexpectedEOF,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Reading from an offset success. - 7
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "myobject", 7, 5,
|
2016-07-29 00:57:11 -04:00
|
|
|
[]byte("world"), nil,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Reading from an object but buffer size greater. - 8
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "myobject",
|
2016-07-29 00:57:11 -04:00
|
|
|
7, 8,
|
|
|
|
[]byte("world"),
|
|
|
|
io.ErrUnexpectedEOF,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Seeking ahead returns io.EOF. - 9
|
2016-07-29 00:57:11 -04:00
|
|
|
{
|
2016-07-30 04:26:19 -04:00
|
|
|
volume, "myobject", 14, 1, nil, io.EOF,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Empty volume name. - 10
|
2016-07-30 04:26:19 -04:00
|
|
|
{
|
2018-04-23 23:27:33 -04:00
|
|
|
"", "myobject", 14, 1, nil, errVolumeNotFound,
|
2016-07-30 04:26:19 -04:00
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Empty filename name. - 11
|
2016-07-30 04:26:19 -04:00
|
|
|
{
|
|
|
|
volume, "", 14, 1, nil, errIsNotRegular,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Non existent volume name - 12
|
2016-07-30 04:26:19 -04:00
|
|
|
{
|
|
|
|
"abcd", "", 14, 1, nil, errVolumeNotFound,
|
|
|
|
},
|
2019-03-05 20:28:14 -05:00
|
|
|
// Non existent filename - 13
|
2016-07-30 04:26:19 -04:00
|
|
|
{
|
|
|
|
volume, "abcd", 14, 1, nil, errFileNotFound,
|
2016-07-29 00:57:11 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create all files needed during testing.
|
|
|
|
appendFiles := testCases[:4]
|
2018-08-06 18:14:08 -04:00
|
|
|
v := NewBitrotVerifier(SHA256, getSHA256Sum([]byte("hello, world")))
|
2016-07-29 00:57:11 -04:00
|
|
|
// Create test files for further reading.
|
|
|
|
for i, appendFile := range appendFiles {
|
2020-09-04 12:45:06 -04:00
|
|
|
err = xlStorage.AppendFile(context.Background(), volume, appendFile.fileName, []byte("hello, world"))
|
2016-07-29 00:57:11 -04:00
|
|
|
if err != appendFile.expectedErr {
|
|
|
|
t.Fatalf("Creating file failed: %d %#v, expected: %s, got: %s", i+1, appendFile, appendFile.expectedErr, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-06 20:00:15 -04:00
|
|
|
{
|
|
|
|
buf := make([]byte, 5)
|
2018-08-06 18:14:08 -04:00
|
|
|
// Test for negative offset.
|
2020-09-04 12:45:06 -04:00
|
|
|
if _, err = xlStorage.ReadFile(context.Background(), volume, "myobject", -1, buf, v); err == nil {
|
2018-08-06 18:14:08 -04:00
|
|
|
t.Fatalf("expected: error, got: <nil>")
|
2017-10-06 20:00:15 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-30 14:04:29 -04:00
|
|
|
for l := 0; l < 2; l++ {
|
|
|
|
// Following block validates all ReadFile test cases.
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
var n int64
|
|
|
|
// Common read buffer.
|
2022-01-02 12:15:06 -05:00
|
|
|
buf := make([]byte, testCase.bufSize)
|
2020-10-30 14:04:29 -04:00
|
|
|
n, err = xlStorage.ReadFile(context.Background(), testCase.volume, testCase.fileName, testCase.offset, buf, v)
|
|
|
|
if err != nil && testCase.expectedErr != nil {
|
|
|
|
// Validate if the type string of the errors are an exact match.
|
|
|
|
if err.Error() != testCase.expectedErr.Error() {
|
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
|
|
|
t.Errorf("Case: %d %#v, expected: %s, got: %s", i+1, testCase, testCase.expectedErr, err)
|
|
|
|
} else {
|
|
|
|
var resultErrno, expectErrno uintptr
|
|
|
|
if pathErr, ok := err.(*os.PathError); ok {
|
|
|
|
if errno, pok := pathErr.Err.(syscall.Errno); pok {
|
|
|
|
resultErrno = uintptr(errno)
|
|
|
|
}
|
2016-08-31 17:43:20 -04:00
|
|
|
}
|
2020-10-30 14:04:29 -04:00
|
|
|
if pathErr, ok := testCase.expectedErr.(*os.PathError); ok {
|
|
|
|
if errno, pok := pathErr.Err.(syscall.Errno); pok {
|
|
|
|
expectErrno = uintptr(errno)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !(expectErrno != 0 && resultErrno != 0 && expectErrno == resultErrno) {
|
|
|
|
t.Errorf("Case: %d %#v, expected: %s, got: %s", i+1, testCase, testCase.expectedErr, err)
|
2016-08-31 17:43:20 -04:00
|
|
|
}
|
|
|
|
}
|
2020-10-30 14:04:29 -04:00
|
|
|
}
|
|
|
|
// Err unexpected EOF special case, where we verify we have provided a larger
|
|
|
|
// buffer than the data itself, but the results are in-fact valid. So we validate
|
|
|
|
// this error condition specifically treating it as a good condition with valid
|
|
|
|
// results. In this scenario return 'n' is always lesser than the input buffer.
|
|
|
|
if err == io.ErrUnexpectedEOF {
|
|
|
|
if !bytes.Equal(testCase.expectedBuf, buf[:n]) {
|
|
|
|
t.Errorf("Case: %d %#v, expected: \"%s\", got: \"%s\"", i+1, testCase, string(testCase.expectedBuf), string(buf[:n]))
|
|
|
|
}
|
|
|
|
if n > int64(len(buf)) {
|
|
|
|
t.Errorf("Case: %d %#v, expected: %d, got: %d", i+1, testCase, testCase.bufSize, n)
|
2016-08-31 17:43:20 -04:00
|
|
|
}
|
|
|
|
}
|
2016-07-29 00:57:11 -04:00
|
|
|
}
|
2020-10-30 14:04:29 -04:00
|
|
|
// ReadFile has returned success, but our expected error is non 'nil'.
|
|
|
|
if err == nil && err != testCase.expectedErr {
|
|
|
|
t.Errorf("Case: %d %#v, expected: %s, got :%s", i+1, testCase, testCase.expectedErr, err)
|
|
|
|
}
|
|
|
|
// Expected error retured, proceed further to validate the returned results.
|
2021-11-16 12:28:29 -05:00
|
|
|
if err != nil && testCase.expectedErr == nil {
|
|
|
|
t.Errorf("Case: %d %#v, expected: %s, got :%s", i+1, testCase, testCase.expectedErr, err)
|
|
|
|
}
|
|
|
|
if err == nil {
|
2020-10-30 14:04:29 -04:00
|
|
|
if !bytes.Equal(testCase.expectedBuf, buf) {
|
|
|
|
t.Errorf("Case: %d %#v, expected: \"%s\", got: \"%s\"", i+1, testCase, string(testCase.expectedBuf), string(buf[:testCase.bufSize]))
|
2016-07-29 00:57:11 -04:00
|
|
|
}
|
2020-10-30 14:04:29 -04:00
|
|
|
if n != int64(testCase.bufSize) {
|
2016-07-29 00:57:11 -04:00
|
|
|
t.Errorf("Case: %d %#v, expected: %d, got: %d", i+1, testCase, testCase.bufSize, n)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for permission denied.
|
2018-04-09 23:56:09 -04:00
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
|
|
|
permDeniedDir := createPermDeniedFile(t)
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Initialize xlStorage storage layer for permission denied error.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err = newLocalXLStorage(permDeniedDir)
|
2021-01-22 18:38:21 -05:00
|
|
|
if err != nil && err != errDiskAccessDenied {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2018-04-09 23:56:09 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o755); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-08-25 13:55:15 -04:00
|
|
|
xlStoragePermStorage, err := newLocalXLStorage(permDeniedDir)
|
2016-07-29 00:57:11 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2016-07-29 00:57:11 -04:00
|
|
|
}
|
2018-04-09 23:56:09 -04:00
|
|
|
|
|
|
|
// Common read buffer.
|
2022-01-02 12:15:06 -05:00
|
|
|
buf := make([]byte, 10)
|
2020-09-04 12:45:06 -04:00
|
|
|
if _, err = xlStoragePermStorage.ReadFile(context.Background(), "mybucket", "myobject", 0, buf, v); err != errFileAccessDenied {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Errorf("expected: %s, got: %s", errFileAccessDenied, err)
|
2016-07-29 00:57:11 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
var xlStorageReadFileWithVerifyTests = []struct {
|
2017-08-14 21:08:42 -04:00
|
|
|
file string
|
|
|
|
offset int
|
|
|
|
length int
|
|
|
|
algorithm BitrotAlgorithm
|
|
|
|
expError error
|
|
|
|
}{
|
2019-10-01 16:12:15 -04:00
|
|
|
{file: "myobject", offset: 0, length: 100, algorithm: SHA256, expError: nil}, // 0
|
|
|
|
{file: "myobject", offset: 25, length: 74, algorithm: SHA256, expError: nil}, // 1
|
|
|
|
{file: "myobject", offset: 29, length: 70, algorithm: SHA256, expError: nil}, // 2
|
|
|
|
{file: "myobject", offset: 100, length: 0, algorithm: SHA256, expError: nil}, // 3
|
|
|
|
{file: "myobject", offset: 1, length: 120, algorithm: SHA256, expError: errFileCorrupt}, // 4
|
|
|
|
{file: "myobject", offset: 3, length: 1100, algorithm: SHA256, expError: nil}, // 5
|
|
|
|
{file: "myobject", offset: 2, length: 100, algorithm: SHA256, expError: errFileCorrupt}, // 6
|
|
|
|
{file: "myobject", offset: 1000, length: 1001, algorithm: SHA256, expError: nil}, // 7
|
|
|
|
{file: "myobject", offset: 0, length: 100, algorithm: BLAKE2b512, expError: errFileCorrupt}, // 8
|
|
|
|
{file: "myobject", offset: 25, length: 74, algorithm: BLAKE2b512, expError: nil}, // 9
|
|
|
|
{file: "myobject", offset: 29, length: 70, algorithm: BLAKE2b512, expError: errFileCorrupt}, // 10
|
|
|
|
{file: "myobject", offset: 100, length: 0, algorithm: BLAKE2b512, expError: nil}, // 11
|
|
|
|
{file: "myobject", offset: 1, length: 120, algorithm: BLAKE2b512, expError: nil}, // 12
|
|
|
|
{file: "myobject", offset: 3, length: 1100, algorithm: BLAKE2b512, expError: nil}, // 13
|
|
|
|
{file: "myobject", offset: 2, length: 100, algorithm: BLAKE2b512, expError: nil}, // 14
|
|
|
|
{file: "myobject", offset: 1000, length: 1001, algorithm: BLAKE2b512, expError: nil}, // 15
|
2017-08-14 21:08:42 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageReadFile with bitrot verification - tests the xlStorage level
|
2017-09-25 14:32:56 -04:00
|
|
|
// ReadFile API with a BitrotVerifier. Only tests hashing related
|
2017-05-16 17:21:52 -04:00
|
|
|
// functionality. Other functionality is tested with
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageReadFile.
|
|
|
|
func TestXLStorageReadFileWithVerify(t *testing.T) {
|
2017-08-14 21:08:42 -04:00
|
|
|
volume, object := "test-vol", "myobject"
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2017-05-16 17:21:52 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2017-05-16 17:21:52 -04:00
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), volume); err != nil {
|
2017-08-14 21:08:42 -04:00
|
|
|
t.Fatalf("Unable to create volume %s: %v", volume, err)
|
|
|
|
}
|
|
|
|
data := make([]byte, 8*1024)
|
|
|
|
if _, err = io.ReadFull(rand.Reader, data); err != nil {
|
|
|
|
t.Fatalf("Unable to create generate random data: %v", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), volume, object, data); err != nil {
|
2017-08-14 21:08:42 -04:00
|
|
|
t.Fatalf("Unable to create object: %v", err)
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
for i, test := range xlStorageReadFileWithVerifyTests {
|
2017-08-14 21:08:42 -04:00
|
|
|
h := test.algorithm.New()
|
|
|
|
h.Write(data)
|
|
|
|
if test.expError != nil {
|
|
|
|
h.Write([]byte{0})
|
|
|
|
}
|
2017-05-16 17:21:52 -04:00
|
|
|
|
2017-08-14 21:08:42 -04:00
|
|
|
buffer := make([]byte, test.length)
|
2020-09-04 12:45:06 -04:00
|
|
|
n, err := xlStorage.ReadFile(context.Background(), volume, test.file, int64(test.offset), buffer, NewBitrotVerifier(test.algorithm, h.Sum(nil)))
|
2017-05-16 17:21:52 -04:00
|
|
|
|
|
|
|
switch {
|
2017-08-14 21:08:42 -04:00
|
|
|
case err == nil && test.expError != nil:
|
|
|
|
t.Errorf("Test %d: Expected error %v but got none.", i, test.expError)
|
|
|
|
case err == nil && n != int64(test.length):
|
|
|
|
t.Errorf("Test %d: %d bytes were expected, but %d were written", i, test.length, n)
|
|
|
|
case err == nil && !bytes.Equal(data[test.offset:test.offset+test.length], buffer):
|
|
|
|
t.Errorf("Test %d: Expected bytes: %v, but got: %v", i, data[test.offset:test.offset+test.length], buffer)
|
|
|
|
case err != nil && err != test.expError:
|
|
|
|
t.Errorf("Test %d: Expected error: %v, but got: %v", i, test.expError, err)
|
2017-05-16 17:21:52 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorageFormatFileChange - to test if changing the diskID makes the calls fail.
|
|
|
|
func TestXLStorageFormatFileChange(t *testing.T) {
|
2022-10-24 20:44:15 -04:00
|
|
|
volume := "fail-vol"
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2019-10-25 13:37:53 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2019-10-25 13:37:53 -04:00
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), volume); err != nil {
|
2019-10-25 13:37:53 -04:00
|
|
|
t.Fatalf("MakeVol failed with %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Change the format.json such that "this" is changed to "randomid".
|
2022-09-19 14:05:16 -04:00
|
|
|
if err = os.WriteFile(pathJoin(xlStorage.String(), minioMetaBucket, formatConfigFile), []byte(`{"version":"1","format":"xl","id":"592a41c2-b7cc-4130-b883-c4b5cb15965b","xl":{"version":"3","this":"randomid","sets":[["e07285a6-8c73-4962-89c6-047fb939f803","33b8d431-482d-4376-b63c-626d229f0a29","cff6513a-4439-4dc1-bcaa-56c9e880c352","randomid","9c9f21d5-1f15-4737-bce6-835faa0d9626","0a59b346-1424-4fc2-9fa2-a2e80541d0c1","7924a3dc-b69a-4971-9a2e-014966d6aebb","4d2b8dd9-4e48-444b-bdca-c89194b26042"]],"distributionAlgo":"CRCMOD"}}`), 0o644); err != nil {
|
2019-10-25 13:37:53 -04:00
|
|
|
t.Fatalf("ioutil.WriteFile failed with %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
err = xlStorage.MakeVol(context.Background(), volume)
|
2019-12-02 12:28:01 -05:00
|
|
|
if err != errVolumeExists {
|
2019-10-25 13:37:53 -04:00
|
|
|
t.Fatalf("MakeVol expected to fail with errDiskNotFound but failed with %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage xlStorage.AppendFile()
|
|
|
|
func TestXLStorageAppendFile(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, path, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create directory to make errIsNotRegular
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Mkdir(slashpath.Join(path, "success-vol", "object-as-dir"), 0o777); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create directory, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
fileName string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
|
|
|
{"myobject", nil},
|
|
|
|
{"path/to/my/object", nil},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage to append to previously created file.
|
2016-07-03 14:17:08 -04:00
|
|
|
{"myobject", nil},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage to use same path of previously created file.
|
2016-07-03 14:17:08 -04:00
|
|
|
{"path/to/my/testobject", nil},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage to use object is a directory now.
|
2016-07-03 14:17:08 -04:00
|
|
|
{"object-as-dir", errIsNotRegular},
|
|
|
|
// path segment uses previously uploaded object.
|
|
|
|
{"myobject/testobject", errFileAccessDenied},
|
|
|
|
// One path segment length is > 255 chars long.
|
|
|
|
{"path/to/my/object0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001", errFileNameTooLong},
|
|
|
|
// path length is > 1024 chars long.
|
|
|
|
{"level0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001/level0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002/level0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003/object000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001", errFileNameTooLong},
|
|
|
|
}
|
|
|
|
|
2018-03-29 17:38:26 -04:00
|
|
|
for i, testCase := range testCases {
|
2020-09-04 12:45:06 -04:00
|
|
|
if err = xlStorage.AppendFile(context.Background(), "success-vol", testCase.fileName, []byte("hello, world")); err != testCase.expectedErr {
|
2018-03-29 17:38:26 -04:00
|
|
|
t.Errorf("Case: %d, expected: %s, got: %s", i+1, testCase.expectedErr, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage for permission denied.
|
2017-01-18 15:24:34 -05:00
|
|
|
if runtime.GOOS != globalWindowsOSName {
|
2017-08-18 14:44:54 -04:00
|
|
|
permDeniedDir := createPermDeniedFile(t)
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
var xlStoragePermStorage StorageAPI
|
|
|
|
// Initialize xlStorage storage layer for permission denied error.
|
2020-08-25 13:55:15 -04:00
|
|
|
_, err = newLocalXLStorage(permDeniedDir)
|
2021-01-22 18:38:21 -05:00
|
|
|
if err != nil && err != errDiskAccessDenied {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2018-04-09 23:56:09 -04:00
|
|
|
}
|
|
|
|
|
2022-01-02 12:15:06 -05:00
|
|
|
if err = os.Chmod(permDeniedDir, 0o755); err != nil {
|
2018-04-09 23:56:09 -04:00
|
|
|
t.Fatalf("Unable to change permission to temporary directory %v. %v", permDeniedDir, err)
|
|
|
|
}
|
|
|
|
|
2020-08-25 13:55:15 -04:00
|
|
|
xlStoragePermStorage, err = newLocalXLStorage(permDeniedDir)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to initialize xlStorage, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2023-11-21 18:08:41 -05:00
|
|
|
if err = xlStoragePermStorage.AppendFile(context.Background(), "mybucket", "myobject", []byte("hello, world")); err != errFileAccessDenied {
|
|
|
|
t.Fatalf("expected: errFileAccessDenied error, got: %s", err)
|
2016-08-11 22:57:14 -04:00
|
|
|
}
|
|
|
|
}
|
2018-04-09 23:56:09 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case with invalid volume name.
|
2016-08-11 22:57:14 -04:00
|
|
|
// A valid volume name should be atleast of size 3.
|
2020-09-04 12:45:06 -04:00
|
|
|
err = xlStorage.AppendFile(context.Background(), "bn", "yes", []byte("hello, world"))
|
2018-04-23 23:27:33 -04:00
|
|
|
if err != errVolumeNotFound {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("expected: \"Invalid argument error\", got: \"%s\"", err)
|
|
|
|
}
|
2016-10-29 15:44:44 -04:00
|
|
|
}
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage xlStorage.RenameFile()
|
|
|
|
func TestXLStorageRenameFile(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.MakeVol(context.Background(), "src-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.MakeVol(context.Background(), "dest-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "src-vol", "file1", []byte("Hello, world")); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "src-vol", "file2", []byte("Hello, world")); err != nil {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "src-vol", "file3", []byte("Hello, world")); err != nil {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "src-vol", "file4", []byte("Hello, world")); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "src-vol", "file5", []byte("Hello, world")); err != nil {
|
2016-08-11 22:57:14 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "src-vol", "path/to/file1", []byte("Hello, world")); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
2016-08-11 22:57:14 -04:00
|
|
|
srcVol string
|
|
|
|
destVol string
|
2016-07-03 14:17:08 -04:00
|
|
|
srcPath string
|
|
|
|
destPath string
|
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file1",
|
|
|
|
destPath: "file-one",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "path/",
|
|
|
|
destPath: "new-path/",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
|
|
|
// TestXLStorage to overwrite destination file.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file2",
|
|
|
|
destPath: "file-one",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 4.
|
|
|
|
// TestXLStorage case with io error count set to 1.
|
2016-08-11 22:57:14 -04:00
|
|
|
// expected not to fail.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file3",
|
|
|
|
destPath: "file-two",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 5.
|
|
|
|
// TestXLStorage case with io error count set to maximum allowed count.
|
2016-08-11 22:57:14 -04:00
|
|
|
// expected not to fail.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "file-three",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 6.
|
|
|
|
// TestXLStorage case with non-existent source file.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "non-existent-file",
|
|
|
|
destPath: "file-three",
|
|
|
|
expectedErr: errFileNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 7.
|
|
|
|
// TestXLStorage to check failure of source and destination are not same type.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "path/",
|
|
|
|
destPath: "file-one",
|
|
|
|
expectedErr: errFileAccessDenied,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 8.
|
|
|
|
// TestXLStorage to check failure of destination directory exists.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "path/",
|
|
|
|
destPath: "new-path/",
|
|
|
|
expectedErr: errFileAccessDenied,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 9.
|
|
|
|
// TestXLStorage case with source being a file and destination being a directory.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Either both have to be files or directories.
|
|
|
|
// Expecting to fail with `errFileAccessDenied`.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "new-path/",
|
|
|
|
expectedErr: errFileAccessDenied,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 10.
|
|
|
|
// TestXLStorage case with non-existent source volume.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Expecting to fail with `errVolumeNotFound`.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol-non-existent",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "new-path/",
|
|
|
|
expectedErr: errVolumeNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 11.
|
|
|
|
// TestXLStorage case with non-existent destination volume.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Expecting to fail with `errVolumeNotFound`.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol-non-existent",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "new-path/",
|
|
|
|
expectedErr: errVolumeNotFound,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 12.
|
|
|
|
// TestXLStorage case with invalid src volume name. Length should be atleast 3.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Expecting to fail with `errInvalidArgument`.
|
|
|
|
{
|
|
|
|
srcVol: "ab",
|
|
|
|
destVol: "dest-vol-non-existent",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "new-path/",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 13.
|
|
|
|
// TestXLStorage case with invalid destination volume name. Length should be atleast 3.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Expecting to fail with `errInvalidArgument`.
|
|
|
|
{
|
|
|
|
srcVol: "abcd",
|
|
|
|
destVol: "ef",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "new-path/",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 14.
|
|
|
|
// TestXLStorage case with invalid destination volume name. Length should be atleast 3.
|
2016-08-11 22:57:14 -04:00
|
|
|
// Expecting to fail with `errInvalidArgument`.
|
|
|
|
{
|
|
|
|
srcVol: "abcd",
|
|
|
|
destVol: "ef",
|
|
|
|
srcPath: "file4",
|
|
|
|
destPath: "new-path/",
|
2018-04-23 23:27:33 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 15.
|
|
|
|
// TestXLStorage case with the parent of the destination being a file.
|
2016-08-11 22:57:14 -04:00
|
|
|
// expected to fail with `errFileAccessDenied`.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file5",
|
|
|
|
destPath: "file-one/parent-is-file",
|
|
|
|
expectedErr: errFileAccessDenied,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 16.
|
|
|
|
// TestXLStorage case with segment of source file name more than 255.
|
2016-08-11 22:57:14 -04:00
|
|
|
// expected not to fail.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "path/to/my/object0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001",
|
|
|
|
destPath: "file-six",
|
|
|
|
expectedErr: errFileNameTooLong,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 17.
|
|
|
|
// TestXLStorage case with segment of destination file name more than 255.
|
2016-08-11 22:57:14 -04:00
|
|
|
// expected not to fail.
|
|
|
|
{
|
|
|
|
srcVol: "src-vol",
|
|
|
|
destVol: "dest-vol",
|
|
|
|
srcPath: "file6",
|
|
|
|
destPath: "path/to/my/object0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001",
|
|
|
|
expectedErr: errFileNameTooLong,
|
|
|
|
},
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
for i, testCase := range testCases {
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.RenameFile(context.Background(), testCase.srcVol, testCase.srcPath, testCase.destVol, testCase.destPath); err != testCase.expectedErr {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("TestXLStorage %d: Expected the error to be : \"%v\", got: \"%v\".", i+1, testCase.expectedErr, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-13 17:28:07 -05:00
|
|
|
// TestXLStorageDeleteVersion will test if version deletes and bulk deletes work as expected.
|
|
|
|
func TestXLStorageDeleteVersion(t *testing.T) {
|
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xl, _, err := newXLStorageTestSetup(t)
|
2022-01-13 17:28:07 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
volume := "myvol-vol"
|
|
|
|
object := "my-object"
|
|
|
|
if err := xl.MakeVol(ctx, volume); err != nil {
|
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
var versions [50]string
|
|
|
|
for i := range versions {
|
|
|
|
versions[i] = uuid.New().String()
|
|
|
|
fi := FileInfo{
|
2023-11-21 00:33:47 -05:00
|
|
|
Name: object, Volume: volume, VersionID: versions[i], ModTime: UTCNow(), DataDir: "", Size: 10000,
|
2022-01-13 17:28:07 -05:00
|
|
|
Erasure: ErasureInfo{
|
|
|
|
Algorithm: erasureAlgorithm,
|
|
|
|
DataBlocks: 4,
|
|
|
|
ParityBlocks: 4,
|
|
|
|
BlockSize: blockSizeV2,
|
|
|
|
Index: 1,
|
|
|
|
Distribution: []int{0, 1, 2, 3, 4, 5, 6, 7},
|
|
|
|
Checksums: nil,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if err := xl.WriteMetadata(ctx, volume, object, fi); err != nil {
|
|
|
|
t.Fatalf("Unable to create object, %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var deleted [len(versions)]bool
|
|
|
|
checkVerExist := func(t testing.TB) {
|
|
|
|
t.Helper()
|
|
|
|
for i := range versions {
|
|
|
|
shouldExist := !deleted[i]
|
2023-11-21 00:33:47 -05:00
|
|
|
fi, err := xl.ReadVersion(ctx, volume, object, versions[i], ReadOptions{})
|
2022-01-13 17:28:07 -05:00
|
|
|
if shouldExist {
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Version %s should exist, but got err %v", versions[i], err)
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if err != errFileVersionNotFound {
|
|
|
|
t.Fatalf("Version %s should not exist, but returned: %#v", versions[i], fi)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete version 0...
|
|
|
|
checkVerExist(t)
|
|
|
|
err = xl.DeleteVersion(ctx, volume, object, FileInfo{Name: object, Volume: volume, VersionID: versions[0]}, false)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
deleted[0] = true
|
|
|
|
checkVerExist(t)
|
|
|
|
|
|
|
|
// Delete 10 in bulk, including a non-existing.
|
|
|
|
fis := []FileInfoVersions{{Name: object, Volume: volume}}
|
|
|
|
for i := range versions[:10] {
|
|
|
|
fis[0].Versions = append(fis[0].Versions, FileInfo{Name: object, Volume: volume, VersionID: versions[i]})
|
|
|
|
deleted[i] = true
|
|
|
|
}
|
|
|
|
errs := xl.DeleteVersions(ctx, volume, fis)
|
|
|
|
if errs[0] != nil {
|
|
|
|
t.Fatalf("expected nil error, got %v", errs[0])
|
|
|
|
}
|
|
|
|
checkVerExist(t)
|
|
|
|
|
|
|
|
// Delete them all... (some again)
|
|
|
|
fis[0].Versions = nil
|
|
|
|
for i := range versions[:] {
|
|
|
|
fis[0].Versions = append(fis[0].Versions, FileInfo{Name: object, Volume: volume, VersionID: versions[i]})
|
|
|
|
deleted[i] = true
|
|
|
|
}
|
|
|
|
errs = xl.DeleteVersions(ctx, volume, fis)
|
|
|
|
if errs[0] != nil {
|
|
|
|
t.Fatalf("expected nil error, got %v", errs[0])
|
|
|
|
}
|
|
|
|
checkVerExist(t)
|
|
|
|
|
|
|
|
// Meta should be deleted now...
|
2023-11-21 00:33:47 -05:00
|
|
|
fi, err := xl.ReadVersion(ctx, volume, object, "", ReadOptions{})
|
2022-01-13 17:28:07 -05:00
|
|
|
if err != errFileNotFound {
|
|
|
|
t.Fatalf("Object %s should not exist, but returned: %#v", object, fi)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-03 16:26:57 -04:00
|
|
|
// TestXLStorage xlStorage.StatInfoFile()
|
|
|
|
func TestXLStorageStatInfoFile(t *testing.T) {
|
2020-06-12 23:04:01 -04:00
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
xlStorage, _, err := newXLStorageTestSetup(t)
|
2016-07-03 14:17:08 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Setup test environment.
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.MakeVol(context.Background(), "success-vol"); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create volume, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "success-vol", pathJoin("success-file", xlStorageFormatFile), []byte("Hello, world")); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
2020-09-04 12:45:06 -04:00
|
|
|
if err := xlStorage.AppendFile(context.Background(), "success-vol", pathJoin("path/to/success-file", xlStorageFormatFile), []byte("Hello, world")); err != nil {
|
2016-07-03 14:17:08 -04:00
|
|
|
t.Fatalf("Unable to create file, %s", err)
|
|
|
|
}
|
|
|
|
|
2021-01-18 15:25:22 -05:00
|
|
|
if err := xlStorage.MakeVol(context.Background(), "success-vol/path/to/"+xlStorageFormatFile); err != nil {
|
|
|
|
t.Fatalf("Unable to create path, %s", err)
|
|
|
|
}
|
|
|
|
|
2016-07-03 14:17:08 -04:00
|
|
|
testCases := []struct {
|
2016-08-11 22:57:14 -04:00
|
|
|
srcVol string
|
|
|
|
srcPath string
|
2016-07-03 14:17:08 -04:00
|
|
|
expectedErr error
|
|
|
|
}{
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 1.
|
|
|
|
// TestXLStorage case with valid inputs, expected to pass.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "success-file",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 2.
|
|
|
|
// TestXLStorage case with valid inputs, expected to pass.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "path/to/success-file",
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 3.
|
|
|
|
// TestXLStorage case with non-existent file.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "nonexistent-file",
|
2021-01-02 15:01:29 -05:00
|
|
|
expectedErr: errPathNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 4.
|
|
|
|
// TestXLStorage case with non-existent file path.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "path/2/success-file",
|
2021-01-02 15:01:29 -05:00
|
|
|
expectedErr: errPathNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 5.
|
|
|
|
// TestXLStorage case with path being a directory.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "path",
|
2021-01-18 15:25:22 -05:00
|
|
|
expectedErr: errPathNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2020-06-12 23:04:01 -04:00
|
|
|
// TestXLStorage case - 6.
|
|
|
|
// TestXLStorage case with non existent volume.
|
2016-08-11 22:57:14 -04:00
|
|
|
{
|
|
|
|
srcVol: "non-existent-vol",
|
|
|
|
srcPath: "success-file",
|
2021-08-03 16:26:57 -04:00
|
|
|
expectedErr: errVolumeNotFound,
|
2016-08-11 22:57:14 -04:00
|
|
|
},
|
2021-01-18 15:25:22 -05:00
|
|
|
// TestXLStorage case - 7.
|
|
|
|
// TestXLStorage case with file with directory.
|
|
|
|
{
|
|
|
|
srcVol: "success-vol",
|
|
|
|
srcPath: "path/to",
|
2021-08-03 16:26:57 -04:00
|
|
|
expectedErr: nil,
|
2021-01-18 15:25:22 -05:00
|
|
|
},
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
|
2016-08-11 22:57:14 -04:00
|
|
|
for i, testCase := range testCases {
|
2021-10-01 14:50:00 -04:00
|
|
|
_, err := xlStorage.StatInfoFile(context.Background(), testCase.srcVol, testCase.srcPath+"/"+xlStorageFormatFile, false)
|
2021-08-03 16:26:57 -04:00
|
|
|
if err != testCase.expectedErr {
|
2021-01-19 13:01:06 -05:00
|
|
|
t.Errorf("TestXLStorage case %d: Expected: \"%s\", got: \"%s\"", i+1, testCase.expectedErr, err)
|
2016-07-03 14:17:08 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-07-10 21:14:48 -04:00
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// Test xlStorage.VerifyFile()
|
|
|
|
func TestXLStorageVerifyFile(t *testing.T) {
|
2019-07-08 16:51:18 -04:00
|
|
|
// We test 4 cases:
|
|
|
|
// 1) Whole-file bitrot check on proper file
|
|
|
|
// 2) Whole-file bitrot check on corrupted file
|
|
|
|
// 3) Streaming bitrot check on proper file
|
|
|
|
// 4) Streaming bitrot check on corrupted file
|
|
|
|
|
2020-06-12 23:04:01 -04:00
|
|
|
// create xlStorage test setup
|
2022-07-25 15:37:26 -04:00
|
|
|
storage, path, err := newXLStorageTestSetup(t)
|
2019-07-08 16:51:18 -04:00
|
|
|
if err != nil {
|
2020-06-12 23:04:01 -04:00
|
|
|
t.Fatalf("Unable to create xlStorage test setup, %s", err)
|
2019-07-08 16:51:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
volName := "testvol"
|
|
|
|
fileName := "testfile"
|
2021-03-18 17:09:55 -04:00
|
|
|
if err := storage.MakeVol(context.Background(), volName); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 1) Whole-file bitrot check on proper file
|
|
|
|
size := int64(4*1024*1024 + 100*1024) // 4.1 MB
|
|
|
|
data := make([]byte, size)
|
|
|
|
if _, err := rand.Read(data); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
algo := HighwayHash256
|
|
|
|
h := algo.New()
|
|
|
|
h.Write(data)
|
|
|
|
hashBytes := h.Sum(nil)
|
2021-03-18 17:09:55 -04:00
|
|
|
if err := storage.WriteAll(context.Background(), volName, fileName, data); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2022-03-09 14:38:54 -05:00
|
|
|
if err := storage.storage.bitrotVerify(context.Background(), pathJoin(path, volName, fileName), size, algo, hashBytes, 0); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 2) Whole-file bitrot check on corrupted file
|
2021-03-18 17:09:55 -04:00
|
|
|
if err := storage.AppendFile(context.Background(), volName, fileName, []byte("a")); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2019-09-11 16:49:53 -04:00
|
|
|
|
|
|
|
// Check if VerifyFile reports the incorrect file length (the correct length is `size+1`)
|
2022-03-09 14:38:54 -05:00
|
|
|
if err := storage.storage.bitrotVerify(context.Background(), pathJoin(path, volName, fileName), size, algo, hashBytes, 0); err == nil {
|
2019-09-11 16:49:53 -04:00
|
|
|
t.Fatal("expected to fail bitrot check")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if bitrot fails
|
2022-03-09 14:38:54 -05:00
|
|
|
if err := storage.storage.bitrotVerify(context.Background(), pathJoin(path, volName, fileName), size+1, algo, hashBytes, 0); err == nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal("expected to fail bitrot check")
|
|
|
|
}
|
|
|
|
|
2022-07-11 12:15:54 -04:00
|
|
|
if err := storage.Delete(context.Background(), volName, fileName, DeleteOptions{
|
|
|
|
Recursive: false,
|
2023-11-29 01:35:16 -05:00
|
|
|
Immediate: false,
|
2022-07-11 12:15:54 -04:00
|
|
|
}); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 3) Streaming bitrot check on proper file
|
|
|
|
algo = HighwayHash256S
|
|
|
|
shardSize := int64(1024 * 1024)
|
|
|
|
shard := make([]byte, shardSize)
|
2021-05-17 11:32:28 -04:00
|
|
|
w := newStreamingBitrotWriter(storage, volName, fileName, size, algo, shardSize)
|
2019-07-08 16:51:18 -04:00
|
|
|
reader := bytes.NewReader(data)
|
|
|
|
for {
|
fix: use buffers only when necessary for io.Copy() (#11229)
Use separate sync.Pool for writes/reads
Avoid passing buffers for io.CopyBuffer()
if the writer or reader implement io.WriteTo or io.ReadFrom
respectively then its useless for sync.Pool to allocate
buffers on its own since that will be completely ignored
by the io.CopyBuffer Go implementation.
Improve this wherever we see this to be optimal.
This allows us to be more efficient on memory usage.
```
385 // copyBuffer is the actual implementation of Copy and CopyBuffer.
386 // if buf is nil, one is allocated.
387 func copyBuffer(dst Writer, src Reader, buf []byte) (written int64, err error) {
388 // If the reader has a WriteTo method, use it to do the copy.
389 // Avoids an allocation and a copy.
390 if wt, ok := src.(WriterTo); ok {
391 return wt.WriteTo(dst)
392 }
393 // Similarly, if the writer has a ReadFrom method, use it to do the copy.
394 if rt, ok := dst.(ReaderFrom); ok {
395 return rt.ReadFrom(src)
396 }
```
From readahead package
```
// WriteTo writes data to w until there's no more data to write or when an error occurs.
// The return value n is the number of bytes written.
// Any error encountered during the write is also returned.
func (a *reader) WriteTo(w io.Writer) (n int64, err error) {
if a.err != nil {
return 0, a.err
}
n = 0
for {
err = a.fill()
if err != nil {
return n, err
}
n2, err := w.Write(a.cur.buffer())
a.cur.inc(n2)
n += int64(n2)
if err != nil {
return n, err
}
```
2021-01-06 12:36:55 -05:00
|
|
|
// Using io.Copy instead of this loop will not work for us as io.Copy
|
|
|
|
// will use bytes.Reader.WriteTo() which will not do shardSize'ed writes
|
|
|
|
// causing error.
|
2019-07-08 16:51:18 -04:00
|
|
|
n, err := reader.Read(shard)
|
|
|
|
w.Write(shard[:n])
|
|
|
|
if err == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if err == io.EOF {
|
|
|
|
break
|
|
|
|
}
|
2019-07-22 20:06:08 -04:00
|
|
|
t.Fatal(err)
|
2019-07-08 16:51:18 -04:00
|
|
|
}
|
2021-03-18 17:09:55 -04:00
|
|
|
w.(io.Closer).Close()
|
2022-03-09 14:38:54 -05:00
|
|
|
if err := storage.storage.bitrotVerify(context.Background(), pathJoin(path, volName, fileName), size, algo, nil, shardSize); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 4) Streaming bitrot check on corrupted file
|
2021-03-18 17:09:55 -04:00
|
|
|
filePath := pathJoin(storage.String(), volName, fileName)
|
2022-01-02 12:15:06 -05:00
|
|
|
f, err := os.OpenFile(filePath, os.O_WRONLY|os.O_SYNC, 0o644)
|
2019-07-08 16:51:18 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-09-02 12:42:24 -04:00
|
|
|
// Replace first 256 with 'a'.
|
|
|
|
if _, err := f.WriteString(strings.Repeat("a", 256)); err != nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
f.Close()
|
2022-03-09 14:38:54 -05:00
|
|
|
if err := storage.storage.bitrotVerify(context.Background(), pathJoin(path, volName, fileName), size, algo, nil, shardSize); err == nil {
|
2019-09-11 16:49:53 -04:00
|
|
|
t.Fatal("expected to fail bitrot check")
|
|
|
|
}
|
2022-03-09 14:38:54 -05:00
|
|
|
if err := storage.storage.bitrotVerify(context.Background(), pathJoin(path, volName, fileName), size+1, algo, nil, shardSize); err == nil {
|
2019-07-08 16:51:18 -04:00
|
|
|
t.Fatal("expected to fail bitrot check")
|
|
|
|
}
|
|
|
|
}
|
2021-08-26 19:23:12 -04:00
|
|
|
|
|
|
|
// TestXLStorageReadMetadata tests readMetadata
|
|
|
|
func TestXLStorageReadMetadata(t *testing.T) {
|
|
|
|
volume, object := "test-vol", "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
2022-07-25 15:37:26 -04:00
|
|
|
tmpDir := t.TempDir()
|
2021-08-26 19:23:12 -04:00
|
|
|
|
|
|
|
disk, err := newLocalXLStorage(tmpDir)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
disk.MakeVol(context.Background(), volume)
|
2021-09-17 17:11:01 -04:00
|
|
|
if _, err := disk.readMetadata(context.Background(), pathJoin(tmpDir, volume, object)); err != errFileNameTooLong {
|
2021-08-26 19:23:12 -04:00
|
|
|
t.Fatalf("Unexpected error from readMetadata - expect %v: got %v", errFileNameTooLong, err)
|
|
|
|
}
|
|
|
|
}
|