2021-04-19 13:30:42 -04:00
|
|
|
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
|
|
//
|
|
|
|
// This file is part of MinIO Object Storage stack
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2021-05-19 21:51:23 -04:00
|
|
|
"bytes"
|
2021-04-19 13:30:42 -04:00
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2021-06-01 17:59:40 -04:00
|
|
|
"github.com/minio/minio/internal/bucket/lifecycle"
|
|
|
|
xhttp "github.com/minio/minio/internal/http"
|
2021-04-19 13:30:42 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// TestParseRestoreObjStatus tests parseRestoreObjStatus
|
|
|
|
func TestParseRestoreObjStatus(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
restoreHdr string
|
|
|
|
expectedStatus restoreObjStatus
|
|
|
|
expectedErr error
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
// valid: represents a restored object, 'pending' expiry.
|
2022-02-09 16:17:41 -05:00
|
|
|
restoreHdr: `ongoing-request="false", expiry-date="Fri, 21 Dec 2012 00:00:00 GMT"`,
|
2021-04-19 13:30:42 -04:00
|
|
|
expectedStatus: restoreObjStatus{
|
|
|
|
ongoing: false,
|
|
|
|
expiry: time.Date(2012, 12, 21, 0, 0, 0, 0, time.UTC),
|
|
|
|
},
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// valid: represents an ongoing restore object request.
|
2022-02-09 16:17:41 -05:00
|
|
|
restoreHdr: `ongoing-request="true"`,
|
2021-04-19 13:30:42 -04:00
|
|
|
expectedStatus: restoreObjStatus{
|
|
|
|
ongoing: true,
|
|
|
|
},
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// invalid; ongoing restore object request can't have expiry set on it.
|
2022-02-09 16:17:41 -05:00
|
|
|
restoreHdr: `ongoing-request="true", expiry-date="Fri, 21 Dec 2012 00:00:00 GMT"`,
|
2021-04-19 13:30:42 -04:00
|
|
|
expectedStatus: restoreObjStatus{},
|
|
|
|
expectedErr: errRestoreHDRMalformed,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// invalid; completed restore object request must have expiry set on it.
|
2022-02-09 16:17:41 -05:00
|
|
|
restoreHdr: `ongoing-request="false"`,
|
2021-04-19 13:30:42 -04:00
|
|
|
expectedStatus: restoreObjStatus{},
|
|
|
|
expectedErr: errRestoreHDRMalformed,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
|
|
actual, err := parseRestoreObjStatus(tc.restoreHdr)
|
|
|
|
if err != tc.expectedErr {
|
|
|
|
t.Fatalf("Test %d: got %v expected %v", i+1, err, tc.expectedErr)
|
|
|
|
}
|
|
|
|
if actual != tc.expectedStatus {
|
|
|
|
t.Fatalf("Test %d: got %v expected %v", i+1, actual, tc.expectedStatus)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestRestoreObjStatusRoundTrip restoreObjStatus roundtrip
|
|
|
|
func TestRestoreObjStatusRoundTrip(t *testing.T) {
|
|
|
|
testCases := []restoreObjStatus{
|
|
|
|
ongoingRestoreObj(),
|
|
|
|
completedRestoreObj(time.Now().UTC()),
|
|
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
|
|
actual, err := parseRestoreObjStatus(tc.String())
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test %d: parse restore object failed: %v", i+1, err)
|
|
|
|
}
|
|
|
|
if actual.ongoing != tc.ongoing || actual.expiry.Format(http.TimeFormat) != tc.expiry.Format(http.TimeFormat) {
|
|
|
|
t.Fatalf("Test %d: got %v expected %v", i+1, actual, tc)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestRestoreObjOnDisk tests restoreObjStatus' OnDisk method
|
|
|
|
func TestRestoreObjOnDisk(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
restoreStatus restoreObjStatus
|
|
|
|
ondisk bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
// restore in progress
|
|
|
|
restoreStatus: ongoingRestoreObj(),
|
|
|
|
ondisk: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore completed but expired
|
|
|
|
restoreStatus: completedRestoreObj(time.Now().Add(-time.Hour)),
|
|
|
|
ondisk: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore completed
|
|
|
|
restoreStatus: completedRestoreObj(time.Now().Add(time.Hour)),
|
|
|
|
ondisk: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
if actual := tc.restoreStatus.OnDisk(); actual != tc.ondisk {
|
|
|
|
t.Fatalf("Test %d: expected %v but got %v", i+1, tc.ondisk, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestIsRestoredObjectOnDisk tests isRestoredObjectOnDisk helper function
|
|
|
|
func TestIsRestoredObjectOnDisk(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
meta map[string]string
|
|
|
|
ondisk bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
// restore in progress
|
|
|
|
meta: map[string]string{
|
|
|
|
xhttp.AmzRestore: ongoingRestoreObj().String(),
|
|
|
|
},
|
|
|
|
ondisk: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore completed
|
|
|
|
meta: map[string]string{
|
|
|
|
xhttp.AmzRestore: completedRestoreObj(time.Now().Add(time.Hour)).String(),
|
|
|
|
},
|
|
|
|
ondisk: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore completed but expired
|
|
|
|
meta: map[string]string{
|
|
|
|
xhttp.AmzRestore: completedRestoreObj(time.Now().Add(-time.Hour)).String(),
|
|
|
|
},
|
|
|
|
ondisk: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
if actual := isRestoredObjectOnDisk(tc.meta); actual != tc.ondisk {
|
|
|
|
t.Fatalf("Test %d: expected %v but got %v for %v", i+1, tc.ondisk, actual, tc.meta)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-05-04 11:40:42 -04:00
|
|
|
|
|
|
|
func TestObjectIsRemote(t *testing.T) {
|
|
|
|
fi := newFileInfo("object", 8, 8)
|
|
|
|
fi.Erasure.Index = 1
|
|
|
|
if !fi.IsValid() {
|
|
|
|
t.Fatalf("unable to get xl meta")
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
meta map[string]string
|
|
|
|
remote bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
// restore in progress
|
|
|
|
meta: map[string]string{
|
|
|
|
xhttp.AmzRestore: ongoingRestoreObj().String(),
|
|
|
|
},
|
|
|
|
remote: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore completed
|
|
|
|
meta: map[string]string{
|
|
|
|
xhttp.AmzRestore: completedRestoreObj(time.Now().Add(time.Hour)).String(),
|
|
|
|
},
|
|
|
|
remote: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore completed but expired
|
|
|
|
meta: map[string]string{
|
|
|
|
xhttp.AmzRestore: completedRestoreObj(time.Now().Add(-time.Hour)).String(),
|
|
|
|
},
|
|
|
|
remote: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// restore never initiated
|
|
|
|
meta: map[string]string{},
|
|
|
|
remote: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
|
|
// Set transition status to complete
|
|
|
|
fi.TransitionStatus = lifecycle.TransitionComplete
|
|
|
|
fi.Metadata = tc.meta
|
|
|
|
if got := fi.IsRemote(); got != tc.remote {
|
|
|
|
t.Fatalf("Test %d.a: expected %v got %v", i+1, tc.remote, got)
|
|
|
|
}
|
2022-05-31 05:57:57 -04:00
|
|
|
oi := fi.ToObjectInfo("bucket", "object", false)
|
2021-05-04 11:40:42 -04:00
|
|
|
if got := oi.IsRemote(); got != tc.remote {
|
|
|
|
t.Fatalf("Test %d.b: expected %v got %v", i+1, tc.remote, got)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Reset transition status; An object that's not transitioned is not remote.
|
|
|
|
fi.TransitionStatus = ""
|
|
|
|
fi.Metadata = nil
|
|
|
|
if got := fi.IsRemote(); got != false {
|
|
|
|
t.Fatalf("Expected object not to be remote but got %v", got)
|
|
|
|
}
|
|
|
|
}
|
2021-05-19 21:51:23 -04:00
|
|
|
|
|
|
|
func TestValidateTransitionTier(t *testing.T) {
|
|
|
|
globalTierConfigMgr = NewTierConfigMgr()
|
|
|
|
testCases := []struct {
|
|
|
|
xml []byte
|
|
|
|
expectedErr error
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
// non-existent storage-class
|
|
|
|
xml: []byte(`<LifecycleConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ID>rule</ID><Prefix /><Status>Enabled</Status><Transition><Days>1</Days><StorageClass>"NONEXISTENT"</StorageClass></Transition></Rule></LifecycleConfiguration>`),
|
|
|
|
expectedErr: errInvalidStorageClass,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// no transition rule
|
|
|
|
xml: []byte(`<LifecycleConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ID>rule</ID><Prefix /><Status>Enabled</Status><Expiration><Days>1</Days></Expiration></Rule></LifecycleConfiguration>`),
|
|
|
|
expectedErr: nil,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
|
|
lc, err := lifecycle.ParseLifecycleConfig(bytes.NewReader(tc.xml))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Test %d: Failed to parse lifecycle config %v", i+1, err)
|
|
|
|
}
|
|
|
|
|
2021-07-21 22:12:44 -04:00
|
|
|
err = validateTransitionTier(lc)
|
2021-05-19 21:51:23 -04:00
|
|
|
if err != tc.expectedErr {
|
|
|
|
t.Fatalf("Test %d: Expected %v but got %v", i+1, tc.expectedErr, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|