mirror of
https://github.com/minio/minio.git
synced 2024-12-24 06:05:55 -05:00
api/complete-multipart: fixes and tests. (#2719)
* api/complete-multipart: tests and simplification. - Removing the logic of sending white space characters. - Fix for incorrect HTTP response status for certain cases. - Tests for New Multipart Upload and Complete Multipart Upload. * tests: test for Delelete Object API handler
This commit is contained in:
parent
32f097b4d6
commit
b8903d842c
@ -20,6 +20,21 @@ package cmd
|
|||||||
|
|
||||||
import "net/http"
|
import "net/http"
|
||||||
|
|
||||||
|
// Represents additional fields necessary for ErrPartTooSmall S3 error.
|
||||||
|
type completeMultipartAPIError struct {
|
||||||
|
// Proposed size represents uploaded size of the part.
|
||||||
|
ProposedSize int64
|
||||||
|
// Minimum size allowed epresents the minimum size allowed per
|
||||||
|
// part. Defaults to 5MB.
|
||||||
|
MinSizeAllowed int64
|
||||||
|
// Part number of the part which is incorrect.
|
||||||
|
PartNumber int
|
||||||
|
// ETag of the part which is incorrect.
|
||||||
|
PartETag string
|
||||||
|
// Other default XML error responses.
|
||||||
|
APIErrorResponse
|
||||||
|
}
|
||||||
|
|
||||||
// writeErrorResponsePartTooSmall - function is used specifically to
|
// writeErrorResponsePartTooSmall - function is used specifically to
|
||||||
// construct a proper error response during CompleteMultipartUpload
|
// construct a proper error response during CompleteMultipartUpload
|
||||||
// when one of the parts is < 5MB.
|
// when one of the parts is < 5MB.
|
||||||
@ -28,25 +43,16 @@ import "net/http"
|
|||||||
// error. So we construct a new type which lies well within the scope
|
// error. So we construct a new type which lies well within the scope
|
||||||
// of this function.
|
// of this function.
|
||||||
func writePartSmallErrorResponse(w http.ResponseWriter, r *http.Request, err PartTooSmall) {
|
func writePartSmallErrorResponse(w http.ResponseWriter, r *http.Request, err PartTooSmall) {
|
||||||
// Represents additional fields necessary for ErrPartTooSmall S3 error.
|
|
||||||
type completeMultipartAPIError struct {
|
apiError := getAPIError(toAPIErrorCode(err))
|
||||||
// Proposed size represents uploaded size of the part.
|
|
||||||
ProposedSize int64
|
|
||||||
// Minimum size allowed epresents the minimum size allowed per
|
|
||||||
// part. Defaults to 5MB.
|
|
||||||
MinSizeAllowed int64
|
|
||||||
// Part number of the part which is incorrect.
|
|
||||||
PartNumber int
|
|
||||||
// ETag of the part which is incorrect.
|
|
||||||
PartETag string
|
|
||||||
// Other default XML error responses.
|
|
||||||
APIErrorResponse
|
|
||||||
}
|
|
||||||
// Generate complete multipart error response.
|
// Generate complete multipart error response.
|
||||||
errorResponse := getAPIErrorResponse(getAPIError(toAPIErrorCode(err)), r.URL.Path)
|
errorResponse := getAPIErrorResponse(apiError, r.URL.Path)
|
||||||
cmpErrResp := completeMultipartAPIError{err.PartSize, int64(5242880), err.PartNumber, err.PartETag, errorResponse}
|
cmpErrResp := completeMultipartAPIError{err.PartSize, int64(5242880), err.PartNumber, err.PartETag, errorResponse}
|
||||||
encodedErrorResponse := encodeResponse(cmpErrResp)
|
encodedErrorResponse := encodeResponse(cmpErrResp)
|
||||||
// Write error body
|
|
||||||
|
// respond with 400 bad request.
|
||||||
|
w.WriteHeader(apiError.HTTPStatusCode)
|
||||||
|
// Write error body.
|
||||||
w.Write(encodedErrorResponse)
|
w.Write(encodedErrorResponse)
|
||||||
w.(http.Flusher).Flush()
|
w.(http.Flusher).Flush()
|
||||||
}
|
}
|
||||||
|
@ -489,18 +489,18 @@ func writeSuccessNoContent(w http.ResponseWriter) {
|
|||||||
|
|
||||||
// writeErrorRespone write error headers
|
// writeErrorRespone write error headers
|
||||||
func writeErrorResponse(w http.ResponseWriter, req *http.Request, errorCode APIErrorCode, resource string) {
|
func writeErrorResponse(w http.ResponseWriter, req *http.Request, errorCode APIErrorCode, resource string) {
|
||||||
error := getAPIError(errorCode)
|
apiError := getAPIError(errorCode)
|
||||||
// set common headers
|
// set common headers
|
||||||
setCommonHeaders(w)
|
setCommonHeaders(w)
|
||||||
// write Header
|
// write Header
|
||||||
w.WriteHeader(error.HTTPStatusCode)
|
w.WriteHeader(apiError.HTTPStatusCode)
|
||||||
writeErrorResponseNoHeader(w, req, errorCode, resource)
|
writeErrorResponseNoHeader(w, req, errorCode, resource)
|
||||||
}
|
}
|
||||||
|
|
||||||
func writeErrorResponseNoHeader(w http.ResponseWriter, req *http.Request, errorCode APIErrorCode, resource string) {
|
func writeErrorResponseNoHeader(w http.ResponseWriter, req *http.Request, errorCode APIErrorCode, resource string) {
|
||||||
error := getAPIError(errorCode)
|
apiError := getAPIError(errorCode)
|
||||||
// Generate error response.
|
// Generate error response.
|
||||||
errorResponse := getAPIErrorResponse(error, resource)
|
errorResponse := getAPIErrorResponse(apiError, resource)
|
||||||
encodedErrorResponse := encodeResponse(errorResponse)
|
encodedErrorResponse := encodeResponse(errorResponse)
|
||||||
// HEAD should have no body, do not attempt to write to it
|
// HEAD should have no body, do not attempt to write to it
|
||||||
if req.Method != "HEAD" {
|
if req.Method != "HEAD" {
|
||||||
|
@ -741,7 +741,7 @@ func (api objectAPIHandlers) ListObjectPartsHandler(w http.ResponseWriter, r *ht
|
|||||||
writeSuccessResponse(w, encodedSuccessResponse)
|
writeSuccessResponse(w, encodedSuccessResponse)
|
||||||
}
|
}
|
||||||
|
|
||||||
// CompleteMultipartUploadHandler - Complete multipart upload
|
// CompleteMultipartUploadHandler - Complete multipart upload.
|
||||||
func (api objectAPIHandlers) CompleteMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
|
func (api objectAPIHandlers) CompleteMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
|
||||||
vars := mux.Vars(r)
|
vars := mux.Vars(r)
|
||||||
bucket := vars["bucket"]
|
bucket := vars["bucket"]
|
||||||
@ -802,29 +802,11 @@ func (api objectAPIHandlers) CompleteMultipartUploadHandler(w http.ResponseWrite
|
|||||||
part.ETag = strings.TrimSuffix(part.ETag, "\"")
|
part.ETag = strings.TrimSuffix(part.ETag, "\"")
|
||||||
completeParts = append(completeParts, part)
|
completeParts = append(completeParts, part)
|
||||||
}
|
}
|
||||||
// Complete multipart upload.
|
|
||||||
// Send 200 OK
|
md5Sum, err = objectAPI.CompleteMultipartUpload(bucket, object, uploadID, completeParts)
|
||||||
setCommonHeaders(w)
|
|
||||||
w.WriteHeader(http.StatusOK)
|
|
||||||
// Xml headers need to be sent before we possibly send whitespace characters
|
|
||||||
// to the client.
|
|
||||||
_, err = w.Write([]byte(xml.Header))
|
|
||||||
if err != nil {
|
|
||||||
errorIf(err, "Unable to write XML header for complete multipart upload")
|
|
||||||
writeErrorResponseNoHeader(w, r, ErrInternalError, r.URL.Path)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
doneCh := make(chan struct{})
|
|
||||||
|
|
||||||
// Signal that completeMultipartUpload is over via doneCh
|
|
||||||
go func(doneCh chan<- struct{}) {
|
|
||||||
md5Sum, err = objectAPI.CompleteMultipartUpload(bucket, object, uploadID, completeParts)
|
|
||||||
doneCh <- struct{}{}
|
|
||||||
}(doneCh)
|
|
||||||
|
|
||||||
sendWhiteSpaceChars(w, doneCh)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
err = errorCause(err)
|
||||||
errorIf(err, "Unable to complete multipart upload.")
|
errorIf(err, "Unable to complete multipart upload.")
|
||||||
switch oErr := err.(type) {
|
switch oErr := err.(type) {
|
||||||
case PartTooSmall:
|
case PartTooSmall:
|
||||||
@ -832,7 +814,7 @@ func (api objectAPIHandlers) CompleteMultipartUploadHandler(w http.ResponseWrite
|
|||||||
writePartSmallErrorResponse(w, r, oErr)
|
writePartSmallErrorResponse(w, r, oErr)
|
||||||
default:
|
default:
|
||||||
// Handle all other generic issues.
|
// Handle all other generic issues.
|
||||||
writeErrorResponseNoHeader(w, r, toAPIErrorCode(err), r.URL.Path)
|
writeErrorResponse(w, r, toAPIErrorCode(err), r.URL.Path)
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -841,7 +823,7 @@ func (api objectAPIHandlers) CompleteMultipartUploadHandler(w http.ResponseWrite
|
|||||||
location := getLocation(r)
|
location := getLocation(r)
|
||||||
// Generate complete multipart response.
|
// Generate complete multipart response.
|
||||||
response := generateCompleteMultpartUploadResponse(bucket, object, location, md5Sum)
|
response := generateCompleteMultpartUploadResponse(bucket, object, location, md5Sum)
|
||||||
encodedSuccessResponse, err := xml.Marshal(response)
|
encodedSuccessResponse := encodeResponse(response)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errorIf(err, "Unable to parse CompleteMultipartUpload response")
|
errorIf(err, "Unable to parse CompleteMultipartUpload response")
|
||||||
writeErrorResponseNoHeader(w, r, ErrInternalError, r.URL.Path)
|
writeErrorResponseNoHeader(w, r, ErrInternalError, r.URL.Path)
|
||||||
|
@ -18,10 +18,14 @@ package cmd
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"crypto/md5"
|
||||||
|
"encoding/hex"
|
||||||
|
"encoding/xml"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"sync"
|
||||||
"testing"
|
"testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -511,3 +515,433 @@ func testAPICopyObjectHandler(obj ObjectLayer, instanceType, bucketName string,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Wrapper for calling NewMultipartUpload tests for both XL multiple disks and single node setup.
|
||||||
|
// First register the HTTP handler for NewMutlipartUpload, then a HTTP request for NewMultipart upload is made.
|
||||||
|
// The UploadID from the response body is parsed and its existance is asserted with an attempt to ListParts using it.
|
||||||
|
func TestAPINewMultipartHandler(t *testing.T) {
|
||||||
|
ExecObjectLayerAPITest(t, testAPINewMultipartHandler, []string{"NewMultipart"})
|
||||||
|
}
|
||||||
|
|
||||||
|
func testAPINewMultipartHandler(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,
|
||||||
|
credentials credential, t TestErrHandler) {
|
||||||
|
|
||||||
|
objectName := "test-object-new-multipart"
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
// construct HTTP request for copy object.
|
||||||
|
req, err := newTestSignedRequest("POST", getNewMultipartURL("", bucketName, objectName), 0, nil, credentials.AccessKeyID, credentials.SecretAccessKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create HTTP request for copy Object: <ERROR> %v", err)
|
||||||
|
}
|
||||||
|
// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.
|
||||||
|
// Call the ServeHTTP to executes the registered handler.
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
// Assert the response code with the expected status.
|
||||||
|
if rec.Code != http.StatusOK {
|
||||||
|
t.Fatalf("%s: Expected the response status to be `%d`, but instead found `%d`", instanceType, http.StatusOK, rec.Code)
|
||||||
|
}
|
||||||
|
// decode the response body.
|
||||||
|
decoder := xml.NewDecoder(rec.Body)
|
||||||
|
multipartResponse := &InitiateMultipartUploadResponse{}
|
||||||
|
|
||||||
|
err = decoder.Decode(multipartResponse)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error decoding the recorded response Body")
|
||||||
|
}
|
||||||
|
// verify the uploadID my making an attempt to list parts.
|
||||||
|
_, err = obj.ListObjectParts(bucketName, objectName, multipartResponse.UploadID, 0, 1)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Invalid UploadID: <ERROR> %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wrapper for calling NewMultipartUploadParallel tests for both XL multiple disks and single node setup.
|
||||||
|
// The objective of the test is to initialte multipart upload on the same object 10 times concurrently,
|
||||||
|
// The UploadID from the response body is parsed and its existance is asserted with an attempt to ListParts using it.
|
||||||
|
func TestAPINewMultipartHandlerParallel(t *testing.T) {
|
||||||
|
ExecObjectLayerAPITest(t, testAPINewMultipartHandlerParallel, []string{"NewMultipart"})
|
||||||
|
}
|
||||||
|
|
||||||
|
func testAPINewMultipartHandlerParallel(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,
|
||||||
|
credentials credential, t TestErrHandler) {
|
||||||
|
// used for storing the uploadID's parsed on concurrent HTTP requests for NewMultipart upload on the same object.
|
||||||
|
testUploads := struct {
|
||||||
|
sync.Mutex
|
||||||
|
uploads []string
|
||||||
|
}{}
|
||||||
|
|
||||||
|
objectName := "test-object-new-multipart-parallel"
|
||||||
|
var wg sync.WaitGroup
|
||||||
|
for i := 0; i < 10; i++ {
|
||||||
|
wg.Add(1)
|
||||||
|
// Initiate NewMultipart upload on the same object 10 times concurrrently.
|
||||||
|
go func() {
|
||||||
|
defer wg.Done()
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
// construct HTTP request for copy object.
|
||||||
|
req, err := newTestSignedRequest("POST", getNewMultipartURL("", bucketName, objectName), 0, nil, credentials.AccessKeyID, credentials.SecretAccessKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create HTTP request for copy Object: <ERROR> %v", err)
|
||||||
|
}
|
||||||
|
// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.
|
||||||
|
// Call the ServeHTTP to executes the registered handler.
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
// Assert the response code with the expected status.
|
||||||
|
if rec.Code != http.StatusOK {
|
||||||
|
t.Fatalf("Minio %s: Expected the response status to be `%d`, but instead found `%d`", instanceType, http.StatusOK, rec.Code)
|
||||||
|
}
|
||||||
|
// decode the response body.
|
||||||
|
decoder := xml.NewDecoder(rec.Body)
|
||||||
|
multipartResponse := &InitiateMultipartUploadResponse{}
|
||||||
|
|
||||||
|
err = decoder.Decode(multipartResponse)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Minio %s: Error decoding the recorded response Body", instanceType)
|
||||||
|
}
|
||||||
|
// push the obtained upload ID from the response into the array.
|
||||||
|
testUploads.Lock()
|
||||||
|
testUploads.uploads = append(testUploads.uploads, multipartResponse.UploadID)
|
||||||
|
testUploads.Unlock()
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
// Wait till all go routines finishes execution.
|
||||||
|
wg.Wait()
|
||||||
|
// Validate the upload ID by an attempt to list parts using it.
|
||||||
|
for _, uploadID := range testUploads.uploads {
|
||||||
|
_, err := obj.ListObjectParts(bucketName, objectName, uploadID, 0, 1)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Invalid UploadID: <ERROR> %s", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// The UploadID from the response body is parsed and its existance is asserted with an attempt to ListParts using it.
|
||||||
|
func TestAPICompleteMultipartHandler(t *testing.T) {
|
||||||
|
ExecObjectLayerAPITest(t, testAPICompleteMultipartHandler, []string{"CompleteMultipart"})
|
||||||
|
}
|
||||||
|
|
||||||
|
func testAPICompleteMultipartHandler(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,
|
||||||
|
credentials credential, t TestErrHandler) {
|
||||||
|
|
||||||
|
// Calculates MD5 sum of the given byte array.
|
||||||
|
findMD5 := func(toBeHashed []byte) string {
|
||||||
|
hasher := md5.New()
|
||||||
|
hasher.Write(toBeHashed)
|
||||||
|
return hex.EncodeToString(hasher.Sum(nil))
|
||||||
|
}
|
||||||
|
|
||||||
|
objectName := "test-object-new-multipart"
|
||||||
|
|
||||||
|
uploadID, err := obj.NewMultipartUpload(bucketName, objectName, nil)
|
||||||
|
if err != nil {
|
||||||
|
// Failed to create NewMultipartUpload, abort.
|
||||||
|
t.Fatalf("Minio %s : <ERROR> %s", instanceType, err)
|
||||||
|
}
|
||||||
|
var uploadIDs []string
|
||||||
|
uploadIDs = append(uploadIDs, uploadID)
|
||||||
|
// Parts with size greater than 5 MB.
|
||||||
|
// Generating a 6MB byte array.
|
||||||
|
validPart := bytes.Repeat([]byte("abcdef"), 1024*1024)
|
||||||
|
validPartMD5 := findMD5(validPart)
|
||||||
|
// Create multipart parts.
|
||||||
|
// Need parts to be uploaded before CompleteMultiPartUpload can be called tested.
|
||||||
|
parts := []struct {
|
||||||
|
bucketName string
|
||||||
|
objName string
|
||||||
|
uploadID string
|
||||||
|
PartID int
|
||||||
|
inputReaderData string
|
||||||
|
inputMd5 string
|
||||||
|
intputDataSize int64
|
||||||
|
}{
|
||||||
|
// Case 1-4.
|
||||||
|
// Creating sequence of parts for same uploadID.
|
||||||
|
{bucketName, objectName, uploadIDs[0], 1, "abcd", "e2fc714c4727ee9395f324cd2e7f331f", int64(len("abcd"))},
|
||||||
|
{bucketName, objectName, uploadIDs[0], 2, "efgh", "1f7690ebdd9b4caf8fab49ca1757bf27", int64(len("efgh"))},
|
||||||
|
{bucketName, objectName, uploadIDs[0], 3, "ijkl", "09a0877d04abf8759f99adec02baf579", int64(len("abcd"))},
|
||||||
|
{bucketName, objectName, uploadIDs[0], 4, "mnop", "e132e96a5ddad6da8b07bba6f6131fef", int64(len("abcd"))},
|
||||||
|
// Part with size larger than 5Mb.
|
||||||
|
{bucketName, objectName, uploadIDs[0], 5, string(validPart), validPartMD5, int64(len(string(validPart)))},
|
||||||
|
{bucketName, objectName, uploadIDs[0], 6, string(validPart), validPartMD5, int64(len(string(validPart)))},
|
||||||
|
}
|
||||||
|
// Iterating over creatPartCases to generate multipart chunks.
|
||||||
|
for _, part := range parts {
|
||||||
|
_, err = obj.PutObjectPart(part.bucketName, part.objName, part.uploadID, part.PartID, part.intputDataSize, bytes.NewBufferString(part.inputReaderData), part.inputMd5)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%s : %s", instanceType, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Parts to be sent as input for CompleteMultipartUpload.
|
||||||
|
inputParts := []struct {
|
||||||
|
parts []completePart
|
||||||
|
}{
|
||||||
|
// inputParts - 0.
|
||||||
|
// Case for replicating ETag mismatch.
|
||||||
|
{
|
||||||
|
[]completePart{
|
||||||
|
{ETag: "abcd", PartNumber: 1},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// inputParts - 1.
|
||||||
|
// should error out with part too small.
|
||||||
|
{
|
||||||
|
[]completePart{
|
||||||
|
{ETag: "e2fc714c4727ee9395f324cd2e7f331f", PartNumber: 1},
|
||||||
|
{ETag: "1f7690ebdd9b4caf8fab49ca1757bf27", PartNumber: 2},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// inputParts - 2.
|
||||||
|
// Case with invalid Part number.
|
||||||
|
{
|
||||||
|
[]completePart{
|
||||||
|
{ETag: "e2fc714c4727ee9395f324cd2e7f331f", PartNumber: 10},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// inputParts - 3.
|
||||||
|
// Case with valid parts,but parts are unsorted.
|
||||||
|
// Part size greater than 5MB.
|
||||||
|
{
|
||||||
|
[]completePart{
|
||||||
|
{ETag: validPartMD5, PartNumber: 6},
|
||||||
|
{ETag: validPartMD5, PartNumber: 5},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
// inputParts - 4.
|
||||||
|
// Case with valid part.
|
||||||
|
// Part size greater than 5MB.
|
||||||
|
{
|
||||||
|
[]completePart{
|
||||||
|
{ETag: validPartMD5, PartNumber: 5},
|
||||||
|
{ETag: validPartMD5, PartNumber: 6},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
// on succesfull complete multipart operation the s3MD5 for the parts uploaded iwll be returned.
|
||||||
|
s3MD5, err := completeMultipartMD5(inputParts[3].parts...)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Obtaining S3MD5 failed")
|
||||||
|
}
|
||||||
|
// generating the response body content for the success case.
|
||||||
|
successResponse := generateCompleteMultpartUploadResponse(bucketName, objectName, getGetObjectURL("", bucketName, objectName), s3MD5)
|
||||||
|
encodedSuccessResponse := encodeResponse(successResponse)
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
bucket string
|
||||||
|
object string
|
||||||
|
uploadID string
|
||||||
|
parts []completePart
|
||||||
|
// Expected output of CompleteMultipartUpload.
|
||||||
|
expectedContent []byte
|
||||||
|
// Expected HTTP Response status.
|
||||||
|
expectedRespStatus int
|
||||||
|
}{
|
||||||
|
// Test case - 1.
|
||||||
|
// Upload and PartNumber exists, But a deliberate ETag mismatch is introduced.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: uploadIDs[0],
|
||||||
|
parts: inputParts[0].parts,
|
||||||
|
expectedContent: encodeResponse(getAPIErrorResponse(getAPIError(toAPIErrorCode(BadDigest{})),
|
||||||
|
getGetObjectURL("", bucketName, objectName))),
|
||||||
|
expectedRespStatus: http.StatusBadRequest,
|
||||||
|
},
|
||||||
|
// Test case - 2.
|
||||||
|
// No parts specified in completePart{}.
|
||||||
|
// Should return ErrMalformedXML in the response body.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: uploadIDs[0],
|
||||||
|
parts: []completePart{},
|
||||||
|
expectedContent: encodeResponse(getAPIErrorResponse(getAPIError(ErrMalformedXML), getGetObjectURL("", bucketName, objectName))),
|
||||||
|
expectedRespStatus: http.StatusBadRequest,
|
||||||
|
},
|
||||||
|
// Test case - 3.
|
||||||
|
// Non-Existant uploadID.
|
||||||
|
// 404 Not Found response status expected.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: "abc",
|
||||||
|
parts: inputParts[0].parts,
|
||||||
|
expectedContent: encodeResponse(getAPIErrorResponse(getAPIError(toAPIErrorCode(InvalidUploadID{UploadID: "abc"})), getGetObjectURL("", bucketName, objectName))),
|
||||||
|
expectedRespStatus: http.StatusNotFound,
|
||||||
|
},
|
||||||
|
// Test case - 4.
|
||||||
|
// Case with part size being less than minimum allowed size.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: uploadIDs[0],
|
||||||
|
parts: inputParts[1].parts,
|
||||||
|
expectedContent: encodeResponse(completeMultipartAPIError{int64(4), int64(5242880), 1, "e2fc714c4727ee9395f324cd2e7f331f",
|
||||||
|
getAPIErrorResponse(getAPIError(toAPIErrorCode(PartTooSmall{PartNumber: 1})),
|
||||||
|
getGetObjectURL("", bucketName, objectName))}),
|
||||||
|
expectedRespStatus: http.StatusBadRequest,
|
||||||
|
},
|
||||||
|
// Test case - 5.
|
||||||
|
// TestCase with invalid Part Number.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: uploadIDs[0],
|
||||||
|
parts: inputParts[2].parts,
|
||||||
|
expectedContent: encodeResponse(getAPIErrorResponse(getAPIError(toAPIErrorCode(InvalidPart{})), getGetObjectURL("", bucketName, objectName))),
|
||||||
|
expectedRespStatus: http.StatusBadRequest,
|
||||||
|
},
|
||||||
|
// Test case - 6.
|
||||||
|
// Parts are not sorted according to the part number.
|
||||||
|
// This should return ErrInvalidPartOrder in the response body.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: uploadIDs[0],
|
||||||
|
parts: inputParts[3].parts,
|
||||||
|
expectedContent: encodeResponse(getAPIErrorResponse(getAPIError(ErrInvalidPartOrder), getGetObjectURL("", bucketName, objectName))),
|
||||||
|
expectedRespStatus: http.StatusBadRequest,
|
||||||
|
},
|
||||||
|
// Test case - 7.
|
||||||
|
// Test case with proper parts.
|
||||||
|
// Should successed and the content in the response body is asserted.
|
||||||
|
{
|
||||||
|
bucket: bucketName,
|
||||||
|
object: objectName,
|
||||||
|
uploadID: uploadIDs[0],
|
||||||
|
parts: inputParts[4].parts,
|
||||||
|
expectedContent: encodedSuccessResponse,
|
||||||
|
expectedRespStatus: http.StatusOK,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, testCase := range testCases {
|
||||||
|
var req *http.Request
|
||||||
|
// Complete multipart upload parts.
|
||||||
|
completeUploads := &completeMultipartUpload{
|
||||||
|
Parts: testCase.parts,
|
||||||
|
}
|
||||||
|
completeBytes, err := xml.Marshal(completeUploads)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Error XML encoding of parts: <ERROR> %s.", err)
|
||||||
|
}
|
||||||
|
// Indicating that all parts are uploaded and initiating completeMultipartUpload.
|
||||||
|
req, err = newTestSignedRequest("POST", getCompleteMultipartUploadURL("", bucketName, objectName, testCase.uploadID),
|
||||||
|
int64(len(completeBytes)), bytes.NewReader(completeBytes), credentials.AccessKeyID, credentials.SecretAccessKey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create HTTP request for copy Object: <ERROR> %v", err)
|
||||||
|
}
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
// construct HTTP request for copy object.
|
||||||
|
|
||||||
|
// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.
|
||||||
|
// Call the ServeHTTP to executes the registered handler.
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
// Assert the response code with the expected status.
|
||||||
|
if rec.Code != testCase.expectedRespStatus {
|
||||||
|
t.Errorf("Case %d: Minio %s: Expected the response status to be `%d`, but instead found `%d`", i+1, instanceType, testCase.expectedRespStatus, rec.Code)
|
||||||
|
}
|
||||||
|
|
||||||
|
// read the response body.
|
||||||
|
actualContent, err := ioutil.ReadAll(rec.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Test %d : Minio %s: Failed parsing response body: <ERROR> %v", i+1, instanceType, err)
|
||||||
|
}
|
||||||
|
// Verify whether the bucket obtained object is same as the one inserted.
|
||||||
|
if !bytes.Equal(testCase.expectedContent, actualContent) {
|
||||||
|
t.Errorf("Test %d : Minio %s: Object content differs from expected value.", i+1, instanceType)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wrapper for calling Delete Object API handler tests for both XL multiple disks and FS single drive setup.
|
||||||
|
func TestAPIDeleteOjectHandler(t *testing.T) {
|
||||||
|
ExecObjectLayerAPITest(t, testAPIDeleteOjectHandler, []string{"DeleteObject"})
|
||||||
|
}
|
||||||
|
|
||||||
|
func testAPIDeleteOjectHandler(obj ObjectLayer, instanceType, bucketName string, apiRouter http.Handler,
|
||||||
|
credentials credential, t TestErrHandler) {
|
||||||
|
|
||||||
|
switch obj.(type) {
|
||||||
|
case fsObjects:
|
||||||
|
return
|
||||||
|
}
|
||||||
|
objectName := "test-object"
|
||||||
|
// set of byte data for PutObject.
|
||||||
|
// object has to be inserted before running tests for Deleting the object.
|
||||||
|
bytesData := []struct {
|
||||||
|
byteData []byte
|
||||||
|
}{
|
||||||
|
{generateBytesData(6 * 1024 * 1024)},
|
||||||
|
}
|
||||||
|
|
||||||
|
// set of inputs for uploading the objects before tests for deleting them is done.
|
||||||
|
putObjectInputs := []struct {
|
||||||
|
bucketName string
|
||||||
|
objectName string
|
||||||
|
contentLength int64
|
||||||
|
textData []byte
|
||||||
|
metaData map[string]string
|
||||||
|
}{
|
||||||
|
// case - 1.
|
||||||
|
{bucketName, objectName, int64(len(bytesData[0].byteData)), bytesData[0].byteData, make(map[string]string)},
|
||||||
|
}
|
||||||
|
// iterate through the above set of inputs and upload the object.
|
||||||
|
for i, input := range putObjectInputs {
|
||||||
|
// uploading the object.
|
||||||
|
_, err := obj.PutObject(input.bucketName, input.objectName, input.contentLength, bytes.NewBuffer(input.textData), input.metaData)
|
||||||
|
// if object upload fails stop the test.
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Put Object case %d: Error uploading object: <ERROR> %v", i+1, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// test cases with inputs and expected result for DeleteObject.
|
||||||
|
testCases := []struct {
|
||||||
|
bucketName string
|
||||||
|
objectName string
|
||||||
|
|
||||||
|
expectedRespStatus int // expected response status body.
|
||||||
|
}{
|
||||||
|
// Test case - 1.
|
||||||
|
// Deleting an existing object.
|
||||||
|
// Expected to return HTTP resposne status code 204.
|
||||||
|
{
|
||||||
|
bucketName: bucketName,
|
||||||
|
objectName: objectName,
|
||||||
|
|
||||||
|
expectedRespStatus: http.StatusNoContent,
|
||||||
|
},
|
||||||
|
// Test case - 2.
|
||||||
|
// Attempt to delete an object which is already deleted.
|
||||||
|
// Still should return http response status 204.
|
||||||
|
{
|
||||||
|
bucketName: bucketName,
|
||||||
|
objectName: objectName,
|
||||||
|
|
||||||
|
expectedRespStatus: http.StatusNoContent,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Iterating over the cases, call DeleteObjectHandler and validate the HTTP response.
|
||||||
|
for i, testCase := range testCases {
|
||||||
|
// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
// construct HTTP request for Get Object end point.
|
||||||
|
req, err := newTestSignedRequest("DELETE", getDeleteObjectURL("", testCase.bucketName, testCase.objectName),
|
||||||
|
0, nil, credentials.AccessKeyID, credentials.SecretAccessKey)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Test %d: Failed to create HTTP request for Get Object: <ERROR> %v", i+1, err)
|
||||||
|
}
|
||||||
|
// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic of the handler.
|
||||||
|
// Call the ServeHTTP to execute the handler,`func (api objectAPIHandlers) DeleteObjectHandler` handles the request.
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
// Assert the response code with the expected status.
|
||||||
|
if rec.Code != testCase.expectedRespStatus {
|
||||||
|
t.Fatalf("Minio %s: Case %d: Expected the response status to be `%d`, but instead found `%d`", instanceType, i+1, testCase.expectedRespStatus, rec.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -1314,10 +1314,13 @@ func initTestAPIEndPoints(objLayer ObjectLayer, apiFunctions []string) http.Hand
|
|||||||
case "ListBuckets":
|
case "ListBuckets":
|
||||||
apiRouter.Methods("GET").HandlerFunc(api.ListBucketsHandler)
|
apiRouter.Methods("GET").HandlerFunc(api.ListBucketsHandler)
|
||||||
// Register GetObject handler.
|
// Register GetObject handler.
|
||||||
case "GetObject`":
|
case "GetObject":
|
||||||
bucket.Methods("GET").Path("/{object:.+}").HandlerFunc(api.GetObjectHandler)
|
bucket.Methods("GET").Path("/{object:.+}").HandlerFunc(api.GetObjectHandler)
|
||||||
// Register GetObject handler.
|
// Register Delete Object handler.
|
||||||
case "CopyObject`":
|
case "DeleteObject":
|
||||||
|
bucket.Methods("DELETE").Path("/{object:.+}").HandlerFunc(api.DeleteObjectHandler)
|
||||||
|
// Register Copy Object handler.
|
||||||
|
case "CopyObject":
|
||||||
bucket.Methods("PUT").Path("/{object:.+}").HeadersRegexp("X-Amz-Copy-Source", ".*?(\\/|%2F).*?").HandlerFunc(api.CopyObjectHandler)
|
bucket.Methods("PUT").Path("/{object:.+}").HeadersRegexp("X-Amz-Copy-Source", ".*?(\\/|%2F).*?").HandlerFunc(api.CopyObjectHandler)
|
||||||
// Register PutBucket Policy handler.
|
// Register PutBucket Policy handler.
|
||||||
case "PutBucketPolicy":
|
case "PutBucketPolicy":
|
||||||
@ -1334,12 +1337,20 @@ func initTestAPIEndPoints(objLayer ObjectLayer, apiFunctions []string) http.Hand
|
|||||||
// Register HeadBucket handler.
|
// Register HeadBucket handler.
|
||||||
case "HeadBucket":
|
case "HeadBucket":
|
||||||
bucket.Methods("HEAD").HandlerFunc(api.HeadBucketHandler)
|
bucket.Methods("HEAD").HandlerFunc(api.HeadBucketHandler)
|
||||||
|
// Register New Multipart upload handler.
|
||||||
|
case "NewMultipart":
|
||||||
|
bucket.Methods("POST").Path("/{object:.+}").HandlerFunc(api.NewMultipartUploadHandler).Queries("uploads", "")
|
||||||
|
|
||||||
// Register ListMultipartUploads handler.
|
// Register ListMultipartUploads handler.
|
||||||
case "ListMultipartUploads":
|
case "ListMultipartUploads":
|
||||||
bucket.Methods("GET").HandlerFunc(api.ListMultipartUploadsHandler).Queries("uploads", "")
|
bucket.Methods("GET").HandlerFunc(api.ListMultipartUploadsHandler).Queries("uploads", "")
|
||||||
|
// Register Complete Multipart Upload handler.
|
||||||
|
case "CompleteMultipart":
|
||||||
|
bucket.Methods("POST").Path("/{object:.+}").HandlerFunc(api.CompleteMultipartUploadHandler).Queries("uploadId", "{uploadId:.*}")
|
||||||
// Register GetBucketNotification Handler.
|
// Register GetBucketNotification Handler.
|
||||||
case "GetBucketNotification":
|
case "GetBucketNotification":
|
||||||
bucket.Methods("GET").HandlerFunc(api.GetBucketNotificationHandler).Queries("notification", "")
|
bucket.Methods("GET").HandlerFunc(api.GetBucketNotificationHandler).Queries("notification", "")
|
||||||
|
// Register PutBucketNotification Handler.
|
||||||
case "PutBucketNotification":
|
case "PutBucketNotification":
|
||||||
bucket.Methods("PUT").HandlerFunc(api.PutBucketNotificationHandler).Queries("notification", "")
|
bucket.Methods("PUT").HandlerFunc(api.PutBucketNotificationHandler).Queries("notification", "")
|
||||||
// Register all api endpoints by default.
|
// Register all api endpoints by default.
|
||||||
|
Loading…
Reference in New Issue
Block a user