mirror of
https://github.com/minio/minio.git
synced 2025-11-26 04:26:12 -05:00
Add mint versioning tests (#11500)
Co-authored-by: Harshavardhana <harsha@minio.io>
This commit is contained in:
277
mint/build/versioning/retention.go
Normal file
277
mint/build/versioning/retention.go
Normal file
@@ -0,0 +1,277 @@
|
||||
/*
|
||||
*
|
||||
* Mint, (C) 2021 Minio, Inc.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*
|
||||
*/
|
||||
|
||||
package main
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"math/rand"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws"
|
||||
"github.com/aws/aws-sdk-go/service/s3"
|
||||
)
|
||||
|
||||
// Test locking retention governance
|
||||
func testLockingRetentionGovernance() {
|
||||
startTime := time.Now()
|
||||
function := "testLockingRetentionGovernance"
|
||||
bucket := randString(60, rand.NewSource(time.Now().UnixNano()), "versioning-test-")
|
||||
object := "testObject"
|
||||
expiry := 1 * time.Minute
|
||||
args := map[string]interface{}{
|
||||
"bucketName": bucket,
|
||||
"objectName": object,
|
||||
"expiry": expiry,
|
||||
}
|
||||
|
||||
_, err := s3Client.CreateBucket(&s3.CreateBucketInput{
|
||||
Bucket: aws.String(bucket),
|
||||
ObjectLockEnabledForBucket: aws.Bool(true),
|
||||
})
|
||||
if err != nil {
|
||||
if strings.Contains(err.Error(), "NotImplemented: A header you provided implies functionality that is not implemented") {
|
||||
ignoreLog(function, args, startTime, "Versioning is not implemented").Info()
|
||||
return
|
||||
}
|
||||
failureLog(function, args, startTime, "", "CreateBucket failed", err).Fatal()
|
||||
return
|
||||
}
|
||||
defer cleanupBucket(bucket, function, args, startTime)
|
||||
|
||||
type uploadedObject struct {
|
||||
retention string
|
||||
retentionUntil time.Time
|
||||
successfulRemove bool
|
||||
versionId string
|
||||
deleteMarker bool
|
||||
}
|
||||
|
||||
uploads := []uploadedObject{
|
||||
{},
|
||||
{retention: "GOVERNANCE", retentionUntil: time.Now().UTC().Add(time.Hour)},
|
||||
{},
|
||||
}
|
||||
|
||||
// Upload versions and save their version IDs
|
||||
for i := range uploads {
|
||||
putInput := &s3.PutObjectInput{
|
||||
Body: aws.ReadSeekCloser(strings.NewReader("content")),
|
||||
Bucket: aws.String(bucket),
|
||||
Key: aws.String(object),
|
||||
}
|
||||
if uploads[i].retention != "" {
|
||||
putInput.ObjectLockMode = aws.String(uploads[i].retention)
|
||||
putInput.ObjectLockRetainUntilDate = aws.Time(uploads[i].retentionUntil)
|
||||
|
||||
}
|
||||
output, err := s3Client.PutObject(putInput)
|
||||
if err != nil {
|
||||
failureLog(function, args, startTime, "", fmt.Sprintf("PUT expected to succeed but got %v", err), err).Fatal()
|
||||
return
|
||||
}
|
||||
uploads[i].versionId = *output.VersionId
|
||||
}
|
||||
|
||||
// In all cases, we can remove an object by creating a delete marker
|
||||
// First delete without version ID
|
||||
deleteInput := &s3.DeleteObjectInput{
|
||||
Bucket: aws.String(bucket),
|
||||
Key: aws.String(object),
|
||||
}
|
||||
deleteOutput, err := s3Client.DeleteObject(deleteInput)
|
||||
if err != nil {
|
||||
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
||||
return
|
||||
}
|
||||
|
||||
uploads = append(uploads, uploadedObject{versionId: *deleteOutput.VersionId, deleteMarker: true})
|
||||
|
||||
// Put tagging on each version
|
||||
for i := range uploads {
|
||||
if uploads[i].deleteMarker {
|
||||
continue
|
||||
}
|
||||
deleteInput := &s3.DeleteObjectInput{
|
||||
Bucket: aws.String(bucket),
|
||||
Key: aws.String(object),
|
||||
VersionId: aws.String(uploads[i].versionId),
|
||||
}
|
||||
_, err = s3Client.DeleteObject(deleteInput)
|
||||
if err == nil && uploads[i].retention != "" {
|
||||
failureLog(function, args, startTime, "", "DELETE expected to fail but succeed instead", nil).Fatal()
|
||||
return
|
||||
}
|
||||
if err != nil && uploads[i].retention == "" {
|
||||
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
successLogger(function, args, startTime).Info()
|
||||
}
|
||||
|
||||
// Test locking retention compliance
|
||||
func testLockingRetentionCompliance() {
|
||||
startTime := time.Now()
|
||||
function := "testLockingRetentionCompliance"
|
||||
bucket := randString(60, rand.NewSource(time.Now().UnixNano()), "versioning-test-")
|
||||
object := "testObject"
|
||||
expiry := 1 * time.Minute
|
||||
args := map[string]interface{}{
|
||||
"bucketName": bucket,
|
||||
"objectName": object,
|
||||
"expiry": expiry,
|
||||
}
|
||||
|
||||
_, err := s3Client.CreateBucket(&s3.CreateBucketInput{
|
||||
Bucket: aws.String(bucket),
|
||||
ObjectLockEnabledForBucket: aws.Bool(true),
|
||||
})
|
||||
if err != nil {
|
||||
if strings.Contains(err.Error(), "NotImplemented: A header you provided implies functionality that is not implemented") {
|
||||
ignoreLog(function, args, startTime, "Versioning is not implemented").Info()
|
||||
return
|
||||
}
|
||||
failureLog(function, args, startTime, "", "CreateBucket failed", err).Fatal()
|
||||
return
|
||||
}
|
||||
|
||||
defer func() {
|
||||
start := time.Now()
|
||||
|
||||
input := &s3.ListObjectVersionsInput{
|
||||
Bucket: aws.String(bucket),
|
||||
}
|
||||
|
||||
for time.Since(start) < 30*time.Minute {
|
||||
err := s3Client.ListObjectVersionsPages(input,
|
||||
func(page *s3.ListObjectVersionsOutput, lastPage bool) bool {
|
||||
for _, v := range page.Versions {
|
||||
input := &s3.DeleteObjectInput{
|
||||
Bucket: &bucket,
|
||||
Key: v.Key,
|
||||
VersionId: v.VersionId,
|
||||
}
|
||||
_, err := s3Client.DeleteObject(input)
|
||||
if err != nil {
|
||||
return true
|
||||
}
|
||||
}
|
||||
for _, v := range page.DeleteMarkers {
|
||||
input := &s3.DeleteObjectInput{
|
||||
Bucket: &bucket,
|
||||
Key: v.Key,
|
||||
VersionId: v.VersionId,
|
||||
}
|
||||
_, err := s3Client.DeleteObject(input)
|
||||
if err != nil {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return true
|
||||
})
|
||||
|
||||
_, err = s3Client.DeleteBucket(&s3.DeleteBucketInput{
|
||||
Bucket: aws.String(bucket),
|
||||
})
|
||||
if err != nil {
|
||||
time.Sleep(30 * time.Second)
|
||||
continue
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
failureLog(function, args, startTime, "", "Unable to cleanup bucket after compliance tests", nil).Fatal()
|
||||
return
|
||||
|
||||
}()
|
||||
|
||||
type uploadedObject struct {
|
||||
retention string
|
||||
retentionUntil time.Time
|
||||
successfulRemove bool
|
||||
versionId string
|
||||
deleteMarker bool
|
||||
}
|
||||
|
||||
uploads := []uploadedObject{
|
||||
{},
|
||||
{retention: "COMPLIANCE", retentionUntil: time.Now().UTC().Add(time.Minute)},
|
||||
{},
|
||||
}
|
||||
|
||||
// Upload versions and save their version IDs
|
||||
for i := range uploads {
|
||||
putInput := &s3.PutObjectInput{
|
||||
Body: aws.ReadSeekCloser(strings.NewReader("content")),
|
||||
Bucket: aws.String(bucket),
|
||||
Key: aws.String(object),
|
||||
}
|
||||
if uploads[i].retention != "" {
|
||||
putInput.ObjectLockMode = aws.String(uploads[i].retention)
|
||||
putInput.ObjectLockRetainUntilDate = aws.Time(uploads[i].retentionUntil)
|
||||
|
||||
}
|
||||
output, err := s3Client.PutObject(putInput)
|
||||
if err != nil {
|
||||
failureLog(function, args, startTime, "", fmt.Sprintf("PUT expected to succeed but got %v", err), err).Fatal()
|
||||
return
|
||||
}
|
||||
uploads[i].versionId = *output.VersionId
|
||||
}
|
||||
|
||||
// In all cases, we can remove an object by creating a delete marker
|
||||
// First delete without version ID
|
||||
deleteInput := &s3.DeleteObjectInput{
|
||||
Bucket: aws.String(bucket),
|
||||
Key: aws.String(object),
|
||||
}
|
||||
deleteOutput, err := s3Client.DeleteObject(deleteInput)
|
||||
if err != nil {
|
||||
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
||||
return
|
||||
}
|
||||
|
||||
uploads = append(uploads, uploadedObject{versionId: *deleteOutput.VersionId, deleteMarker: true})
|
||||
|
||||
// Put tagging on each version
|
||||
for i := range uploads {
|
||||
if uploads[i].deleteMarker {
|
||||
continue
|
||||
}
|
||||
deleteInput := &s3.DeleteObjectInput{
|
||||
Bucket: aws.String(bucket),
|
||||
Key: aws.String(object),
|
||||
VersionId: aws.String(uploads[i].versionId),
|
||||
}
|
||||
_, err = s3Client.DeleteObject(deleteInput)
|
||||
if err == nil && uploads[i].retention != "" {
|
||||
failureLog(function, args, startTime, "", "DELETE expected to fail but succeed instead", nil).Fatal()
|
||||
return
|
||||
}
|
||||
if err != nil && uploads[i].retention == "" {
|
||||
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
successLogger(function, args, startTime).Info()
|
||||
}
|
||||
Reference in New Issue
Block a user