mirror of
https://github.com/minio/minio.git
synced 2025-03-30 17:23:42 -04:00
tests: Fix retention versioning tests and add others (#12171)
Test GET/PUT/DELETE retention for governance compliance mode Signed-off-by: Anis Elleuch <anis@min.io>
This commit is contained in:
parent
736d8cbac4
commit
1ecc1eb4dd
@ -32,47 +32,54 @@ import (
|
|||||||
var s3Client *s3.S3
|
var s3Client *s3.S3
|
||||||
|
|
||||||
func cleanupBucket(bucket string, function string, args map[string]interface{}, startTime time.Time) {
|
func cleanupBucket(bucket string, function string, args map[string]interface{}, startTime time.Time) {
|
||||||
|
start := time.Now()
|
||||||
|
|
||||||
input := &s3.ListObjectVersionsInput{
|
input := &s3.ListObjectVersionsInput{
|
||||||
Bucket: aws.String(bucket),
|
Bucket: aws.String(bucket),
|
||||||
}
|
}
|
||||||
|
|
||||||
err := s3Client.ListObjectVersionsPages(input,
|
for time.Since(start) < 30*time.Minute {
|
||||||
func(page *s3.ListObjectVersionsOutput, lastPage bool) bool {
|
err := s3Client.ListObjectVersionsPages(input,
|
||||||
for _, v := range page.Versions {
|
func(page *s3.ListObjectVersionsOutput, lastPage bool) bool {
|
||||||
input := &s3.DeleteObjectInput{
|
for _, v := range page.Versions {
|
||||||
Bucket: &bucket,
|
input := &s3.DeleteObjectInput{
|
||||||
Key: v.Key,
|
Bucket: &bucket,
|
||||||
VersionId: v.VersionId,
|
Key: v.Key,
|
||||||
BypassGovernanceRetention: aws.Bool(true),
|
VersionId: v.VersionId,
|
||||||
|
BypassGovernanceRetention: aws.Bool(true),
|
||||||
|
}
|
||||||
|
_, err := s3Client.DeleteObject(input)
|
||||||
|
if err != nil {
|
||||||
|
return true
|
||||||
|
}
|
||||||
}
|
}
|
||||||
_, err := s3Client.DeleteObject(input)
|
for _, v := range page.DeleteMarkers {
|
||||||
if err != nil {
|
input := &s3.DeleteObjectInput{
|
||||||
log.Fatalln("cleanupBucket:", err)
|
Bucket: &bucket,
|
||||||
return true
|
Key: v.Key,
|
||||||
|
VersionId: v.VersionId,
|
||||||
|
BypassGovernanceRetention: aws.Bool(true),
|
||||||
|
}
|
||||||
|
_, err := s3Client.DeleteObject(input)
|
||||||
|
if err != nil {
|
||||||
|
return true
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
return true
|
||||||
for _, v := range page.DeleteMarkers {
|
})
|
||||||
input := &s3.DeleteObjectInput{
|
|
||||||
Bucket: &bucket,
|
|
||||||
Key: v.Key,
|
|
||||||
VersionId: v.VersionId,
|
|
||||||
}
|
|
||||||
_, err := s3Client.DeleteObject(input)
|
|
||||||
if err != nil {
|
|
||||||
log.Fatalln("cleanupBucket:", err)
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
})
|
|
||||||
|
|
||||||
_, err = s3Client.DeleteBucket(&s3.DeleteBucketInput{
|
_, err = s3Client.DeleteBucket(&s3.DeleteBucketInput{
|
||||||
Bucket: aws.String(bucket),
|
Bucket: aws.String(bucket),
|
||||||
})
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
failureLog(function, args, startTime, "", "Cleanup bucket Failed", err).Fatal()
|
time.Sleep(30 * time.Second)
|
||||||
|
continue
|
||||||
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
failureLog(function, args, startTime, "", "Unable to cleanup bucket after compliance tests", nil).Fatal()
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
@ -119,6 +126,8 @@ func main() {
|
|||||||
testListObjectsVersionsWithEmptyDirObject()
|
testListObjectsVersionsWithEmptyDirObject()
|
||||||
testTagging()
|
testTagging()
|
||||||
testLockingLegalhold()
|
testLockingLegalhold()
|
||||||
|
testPutGetRetentionCompliance()
|
||||||
|
testPutGetDeleteRetentionGovernance()
|
||||||
testLockingRetentionGovernance()
|
testLockingRetentionGovernance()
|
||||||
testLockingRetentionCompliance()
|
testLockingRetentionCompliance()
|
||||||
}
|
}
|
||||||
|
@ -88,34 +88,6 @@ func testLockingRetentionGovernance() {
|
|||||||
uploads[i].versionId = *output.VersionId
|
uploads[i].versionId = *output.VersionId
|
||||||
}
|
}
|
||||||
|
|
||||||
// Change RetainUntilDate
|
|
||||||
retentionUntil := time.Now().UTC().Add(time.Hour).Truncate(time.Second)
|
|
||||||
putRetentionInput := &s3.PutObjectRetentionInput{
|
|
||||||
Bucket: aws.String(bucket),
|
|
||||||
Key: aws.String(object),
|
|
||||||
VersionId: &uploads[1].versionId,
|
|
||||||
Retention: &s3.ObjectLockRetention{
|
|
||||||
Mode: aws.String(uploads[1].retention),
|
|
||||||
RetainUntilDate: aws.Time(retentionUntil),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
_, err = s3Client.PutObjectRetention(putRetentionInput)
|
|
||||||
if err != nil {
|
|
||||||
failureLog(function, args, startTime, "", fmt.Sprintf("PutObjectRetention expected to succeed but got %v", err), err).Fatal()
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
getRetentionInput := &s3.GetObjectRetentionInput{
|
|
||||||
Bucket: aws.String(bucket),
|
|
||||||
Key: aws.String(object),
|
|
||||||
VersionId: aws.String(uploads[1].versionId),
|
|
||||||
}
|
|
||||||
retentionOutput, err := s3Client.GetObjectRetention(getRetentionInput)
|
|
||||||
if err != nil || retentionOutput.Retention.RetainUntilDate.String() != retentionUntil.String() {
|
|
||||||
failureLog(function, args, startTime, "", fmt.Sprintf("GetObjectRetention expected to succeed but got %v", err), err).Fatal()
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// In all cases, we can remove an object by creating a delete marker
|
// In all cases, we can remove an object by creating a delete marker
|
||||||
// First delete without version ID
|
// First delete without version ID
|
||||||
deleteInput := &s3.DeleteObjectInput{
|
deleteInput := &s3.DeleteObjectInput{
|
||||||
@ -180,55 +152,7 @@ func testLockingRetentionCompliance() {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
defer func() {
|
defer cleanupBucket(bucket, function, args, startTime)
|
||||||
start := time.Now()
|
|
||||||
|
|
||||||
input := &s3.ListObjectVersionsInput{
|
|
||||||
Bucket: aws.String(bucket),
|
|
||||||
}
|
|
||||||
|
|
||||||
for time.Since(start) < 30*time.Minute {
|
|
||||||
err := s3Client.ListObjectVersionsPages(input,
|
|
||||||
func(page *s3.ListObjectVersionsOutput, lastPage bool) bool {
|
|
||||||
for _, v := range page.Versions {
|
|
||||||
input := &s3.DeleteObjectInput{
|
|
||||||
Bucket: &bucket,
|
|
||||||
Key: v.Key,
|
|
||||||
VersionId: v.VersionId,
|
|
||||||
}
|
|
||||||
_, err := s3Client.DeleteObject(input)
|
|
||||||
if err != nil {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
for _, v := range page.DeleteMarkers {
|
|
||||||
input := &s3.DeleteObjectInput{
|
|
||||||
Bucket: &bucket,
|
|
||||||
Key: v.Key,
|
|
||||||
VersionId: v.VersionId,
|
|
||||||
}
|
|
||||||
_, err := s3Client.DeleteObject(input)
|
|
||||||
if err != nil {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
})
|
|
||||||
|
|
||||||
_, err = s3Client.DeleteBucket(&s3.DeleteBucketInput{
|
|
||||||
Bucket: aws.String(bucket),
|
|
||||||
})
|
|
||||||
if err != nil {
|
|
||||||
time.Sleep(30 * time.Second)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
failureLog(function, args, startTime, "", "Unable to cleanup bucket after compliance tests", nil).Fatal()
|
|
||||||
return
|
|
||||||
|
|
||||||
}()
|
|
||||||
|
|
||||||
type uploadedObject struct {
|
type uploadedObject struct {
|
||||||
retention string
|
retention string
|
||||||
@ -301,3 +225,146 @@ func testLockingRetentionCompliance() {
|
|||||||
|
|
||||||
successLogger(function, args, startTime).Info()
|
successLogger(function, args, startTime).Info()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func testPutGetDeleteRetentionGovernance() {
|
||||||
|
functionName := "testPutGetDeleteRetentionGovernance"
|
||||||
|
testPutGetDeleteLockingRetention(functionName, "GOVERNANCE")
|
||||||
|
}
|
||||||
|
|
||||||
|
func testPutGetRetentionCompliance() {
|
||||||
|
functionName := "testPutGetRetentionCompliance"
|
||||||
|
testPutGetDeleteLockingRetention(functionName, "COMPLIANCE")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Test locking retention governance
|
||||||
|
func testPutGetDeleteLockingRetention(function, retentionMode string) {
|
||||||
|
startTime := time.Now()
|
||||||
|
bucket := randString(60, rand.NewSource(time.Now().UnixNano()), "versioning-test-")
|
||||||
|
object := "testObject"
|
||||||
|
args := map[string]interface{}{
|
||||||
|
"bucketName": bucket,
|
||||||
|
"objectName": object,
|
||||||
|
"retentionMode": retentionMode,
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := s3Client.CreateBucket(&s3.CreateBucketInput{
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
ObjectLockEnabledForBucket: aws.Bool(true),
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
if strings.Contains(err.Error(), "NotImplemented: A header you provided implies functionality that is not implemented") {
|
||||||
|
ignoreLog(function, args, startTime, "Versioning is not implemented").Info()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
failureLog(function, args, startTime, "", "CreateBucket failed", err).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
defer cleanupBucket(bucket, function, args, startTime)
|
||||||
|
|
||||||
|
oneMinuteRetention := time.Now().UTC().Add(time.Minute)
|
||||||
|
twoMinutesRetention := oneMinuteRetention.Add(time.Minute)
|
||||||
|
|
||||||
|
// Upload version and save the version ID
|
||||||
|
putInput := &s3.PutObjectInput{
|
||||||
|
Body: aws.ReadSeekCloser(strings.NewReader("content")),
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
Key: aws.String(object),
|
||||||
|
ObjectLockMode: aws.String(retentionMode),
|
||||||
|
ObjectLockRetainUntilDate: aws.Time(oneMinuteRetention),
|
||||||
|
}
|
||||||
|
|
||||||
|
output, err := s3Client.PutObject(putInput)
|
||||||
|
if err != nil {
|
||||||
|
failureLog(function, args, startTime, "", fmt.Sprintf("PUT expected to succeed but got %v", err), err).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
versionId := *output.VersionId
|
||||||
|
|
||||||
|
// Increase retention until date
|
||||||
|
putRetentionInput := &s3.PutObjectRetentionInput{
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
Key: aws.String(object),
|
||||||
|
VersionId: aws.String(versionId),
|
||||||
|
Retention: &s3.ObjectLockRetention{
|
||||||
|
Mode: aws.String(retentionMode),
|
||||||
|
RetainUntilDate: aws.Time(twoMinutesRetention),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
_, err = s3Client.PutObjectRetention(putRetentionInput)
|
||||||
|
if err != nil {
|
||||||
|
failureLog(function, args, startTime, "", fmt.Sprintf("PutObjectRetention expected to succeed but got %v", err), err).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
getRetentionInput := &s3.GetObjectRetentionInput{
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
Key: aws.String(object),
|
||||||
|
VersionId: aws.String(versionId),
|
||||||
|
}
|
||||||
|
|
||||||
|
retentionOutput, err := s3Client.GetObjectRetention(getRetentionInput)
|
||||||
|
if err != nil {
|
||||||
|
failureLog(function, args, startTime, "", fmt.Sprintf("GetObjectRetention expected to succeed but got %v", err), err).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Compare until retention date with truncating precision less than second
|
||||||
|
if retentionOutput.Retention.RetainUntilDate.Truncate(time.Second).String() != twoMinutesRetention.Truncate(time.Second).String() {
|
||||||
|
failureLog(function, args, startTime, "", "Unexpected until retention date", nil).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Lower retention until date, should fail
|
||||||
|
putRetentionInput = &s3.PutObjectRetentionInput{
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
Key: aws.String(object),
|
||||||
|
VersionId: aws.String(versionId),
|
||||||
|
Retention: &s3.ObjectLockRetention{
|
||||||
|
Mode: aws.String(retentionMode),
|
||||||
|
RetainUntilDate: aws.Time(oneMinuteRetention),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
_, err = s3Client.PutObjectRetention(putRetentionInput)
|
||||||
|
if err == nil {
|
||||||
|
failureLog(function, args, startTime, "", "PutObjectRetention expected to fail but succeeded", nil).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Remove retention without governance bypass
|
||||||
|
putRetentionInput = &s3.PutObjectRetentionInput{
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
Key: aws.String(object),
|
||||||
|
VersionId: aws.String(versionId),
|
||||||
|
Retention: &s3.ObjectLockRetention{
|
||||||
|
Mode: aws.String(""),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = s3Client.PutObjectRetention(putRetentionInput)
|
||||||
|
if err == nil {
|
||||||
|
failureLog(function, args, startTime, "", "Operation expected to fail but succeeded", nil).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if retentionMode == "GOVERNANCE" {
|
||||||
|
// Remove governance retention without govenance bypass
|
||||||
|
putRetentionInput = &s3.PutObjectRetentionInput{
|
||||||
|
Bucket: aws.String(bucket),
|
||||||
|
Key: aws.String(object),
|
||||||
|
VersionId: aws.String(versionId),
|
||||||
|
BypassGovernanceRetention: aws.Bool(true),
|
||||||
|
Retention: &s3.ObjectLockRetention{
|
||||||
|
Mode: aws.String(""),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = s3Client.PutObjectRetention(putRetentionInput)
|
||||||
|
if err != nil {
|
||||||
|
failureLog(function, args, startTime, "", fmt.Sprintf("Expected to succeed but failed with %v", err), err).Fatal()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
successLogger(function, args, startTime).Info()
|
||||||
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user