mirror of
https://github.com/minio/minio.git
synced 2024-12-30 17:13:20 -05:00
445d080826
* Add aws-sdk-go tests (/mint/build/versioning): extend testLockingRetentionGovernance * Add aws-sdk-go tests (/mint/build/versioning): extend testLockingLegalhold Co-authored-by: Andre Bruch <ab@andrebruch.com> Signed-off-by: Harshavardhana <harsha@minio.io>
306 lines
8.9 KiB
Go
306 lines
8.9 KiB
Go
/*
|
|
*
|
|
* Mint, (C) 2021 Minio, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"math/rand"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
|
)
|
|
|
|
// Test locking retention governance
|
|
func testLockingRetentionGovernance() {
|
|
startTime := time.Now()
|
|
function := "testLockingRetentionGovernance"
|
|
bucket := randString(60, rand.NewSource(time.Now().UnixNano()), "versioning-test-")
|
|
object := "testObject"
|
|
expiry := 1 * time.Minute
|
|
args := map[string]interface{}{
|
|
"bucketName": bucket,
|
|
"objectName": object,
|
|
"expiry": expiry,
|
|
}
|
|
|
|
_, err := s3Client.CreateBucket(&s3.CreateBucketInput{
|
|
Bucket: aws.String(bucket),
|
|
ObjectLockEnabledForBucket: aws.Bool(true),
|
|
})
|
|
if err != nil {
|
|
if strings.Contains(err.Error(), "NotImplemented: A header you provided implies functionality that is not implemented") {
|
|
ignoreLog(function, args, startTime, "Versioning is not implemented").Info()
|
|
return
|
|
}
|
|
failureLog(function, args, startTime, "", "CreateBucket failed", err).Fatal()
|
|
return
|
|
}
|
|
defer cleanupBucket(bucket, function, args, startTime)
|
|
|
|
type uploadedObject struct {
|
|
retention string
|
|
retentionUntil time.Time
|
|
successfulRemove bool
|
|
versionId string
|
|
deleteMarker bool
|
|
}
|
|
|
|
uploads := []uploadedObject{
|
|
{},
|
|
{retention: "GOVERNANCE", retentionUntil: time.Now().UTC().Add(time.Hour)},
|
|
{},
|
|
}
|
|
|
|
// Upload versions and save their version IDs
|
|
for i := range uploads {
|
|
putInput := &s3.PutObjectInput{
|
|
Body: aws.ReadSeekCloser(strings.NewReader("content")),
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
}
|
|
if uploads[i].retention != "" {
|
|
putInput.ObjectLockMode = aws.String(uploads[i].retention)
|
|
putInput.ObjectLockRetainUntilDate = aws.Time(uploads[i].retentionUntil)
|
|
|
|
}
|
|
output, err := s3Client.PutObject(putInput)
|
|
if err != nil {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("PUT expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
uploads[i].versionId = *output.VersionId
|
|
}
|
|
|
|
// Change RetainUntilDate
|
|
retentionUntil := time.Now().UTC().Add(time.Hour).Truncate(time.Second)
|
|
putRetentionInput := &s3.PutObjectRetentionInput{
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
VersionId: &uploads[1].versionId,
|
|
Retention: &s3.ObjectLockRetention{
|
|
Mode: aws.String(uploads[1].retention),
|
|
RetainUntilDate: aws.Time(retentionUntil),
|
|
},
|
|
}
|
|
_, err = s3Client.PutObjectRetention(putRetentionInput)
|
|
if err != nil {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("PutObjectRetention expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
|
|
getRetentionInput := &s3.GetObjectRetentionInput{
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
VersionId: aws.String(uploads[1].versionId),
|
|
}
|
|
retentionOutput, err := s3Client.GetObjectRetention(getRetentionInput)
|
|
if err != nil || retentionOutput.Retention.RetainUntilDate.String() != retentionUntil.String() {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("GetObjectRetention expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
|
|
// In all cases, we can remove an object by creating a delete marker
|
|
// First delete without version ID
|
|
deleteInput := &s3.DeleteObjectInput{
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
}
|
|
deleteOutput, err := s3Client.DeleteObject(deleteInput)
|
|
if err != nil {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
|
|
uploads = append(uploads, uploadedObject{versionId: *deleteOutput.VersionId, deleteMarker: true})
|
|
|
|
// Put tagging on each version
|
|
for i := range uploads {
|
|
if uploads[i].deleteMarker {
|
|
continue
|
|
}
|
|
deleteInput := &s3.DeleteObjectInput{
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
VersionId: aws.String(uploads[i].versionId),
|
|
}
|
|
_, err = s3Client.DeleteObject(deleteInput)
|
|
if err == nil && uploads[i].retention != "" {
|
|
failureLog(function, args, startTime, "", "DELETE expected to fail but succeed instead", nil).Fatal()
|
|
return
|
|
}
|
|
if err != nil && uploads[i].retention == "" {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
}
|
|
|
|
successLogger(function, args, startTime).Info()
|
|
}
|
|
|
|
// Test locking retention compliance
|
|
func testLockingRetentionCompliance() {
|
|
startTime := time.Now()
|
|
function := "testLockingRetentionCompliance"
|
|
bucket := randString(60, rand.NewSource(time.Now().UnixNano()), "versioning-test-")
|
|
object := "testObject"
|
|
expiry := 1 * time.Minute
|
|
args := map[string]interface{}{
|
|
"bucketName": bucket,
|
|
"objectName": object,
|
|
"expiry": expiry,
|
|
}
|
|
|
|
_, err := s3Client.CreateBucket(&s3.CreateBucketInput{
|
|
Bucket: aws.String(bucket),
|
|
ObjectLockEnabledForBucket: aws.Bool(true),
|
|
})
|
|
if err != nil {
|
|
if strings.Contains(err.Error(), "NotImplemented: A header you provided implies functionality that is not implemented") {
|
|
ignoreLog(function, args, startTime, "Versioning is not implemented").Info()
|
|
return
|
|
}
|
|
failureLog(function, args, startTime, "", "CreateBucket failed", err).Fatal()
|
|
return
|
|
}
|
|
|
|
defer func() {
|
|
start := time.Now()
|
|
|
|
input := &s3.ListObjectVersionsInput{
|
|
Bucket: aws.String(bucket),
|
|
}
|
|
|
|
for time.Since(start) < 30*time.Minute {
|
|
err := s3Client.ListObjectVersionsPages(input,
|
|
func(page *s3.ListObjectVersionsOutput, lastPage bool) bool {
|
|
for _, v := range page.Versions {
|
|
input := &s3.DeleteObjectInput{
|
|
Bucket: &bucket,
|
|
Key: v.Key,
|
|
VersionId: v.VersionId,
|
|
}
|
|
_, err := s3Client.DeleteObject(input)
|
|
if err != nil {
|
|
return true
|
|
}
|
|
}
|
|
for _, v := range page.DeleteMarkers {
|
|
input := &s3.DeleteObjectInput{
|
|
Bucket: &bucket,
|
|
Key: v.Key,
|
|
VersionId: v.VersionId,
|
|
}
|
|
_, err := s3Client.DeleteObject(input)
|
|
if err != nil {
|
|
return true
|
|
}
|
|
}
|
|
return true
|
|
})
|
|
|
|
_, err = s3Client.DeleteBucket(&s3.DeleteBucketInput{
|
|
Bucket: aws.String(bucket),
|
|
})
|
|
if err != nil {
|
|
time.Sleep(30 * time.Second)
|
|
continue
|
|
}
|
|
return
|
|
}
|
|
|
|
failureLog(function, args, startTime, "", "Unable to cleanup bucket after compliance tests", nil).Fatal()
|
|
return
|
|
|
|
}()
|
|
|
|
type uploadedObject struct {
|
|
retention string
|
|
retentionUntil time.Time
|
|
successfulRemove bool
|
|
versionId string
|
|
deleteMarker bool
|
|
}
|
|
|
|
uploads := []uploadedObject{
|
|
{},
|
|
{retention: "COMPLIANCE", retentionUntil: time.Now().UTC().Add(time.Minute)},
|
|
{},
|
|
}
|
|
|
|
// Upload versions and save their version IDs
|
|
for i := range uploads {
|
|
putInput := &s3.PutObjectInput{
|
|
Body: aws.ReadSeekCloser(strings.NewReader("content")),
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
}
|
|
if uploads[i].retention != "" {
|
|
putInput.ObjectLockMode = aws.String(uploads[i].retention)
|
|
putInput.ObjectLockRetainUntilDate = aws.Time(uploads[i].retentionUntil)
|
|
|
|
}
|
|
output, err := s3Client.PutObject(putInput)
|
|
if err != nil {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("PUT expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
uploads[i].versionId = *output.VersionId
|
|
}
|
|
|
|
// In all cases, we can remove an object by creating a delete marker
|
|
// First delete without version ID
|
|
deleteInput := &s3.DeleteObjectInput{
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
}
|
|
deleteOutput, err := s3Client.DeleteObject(deleteInput)
|
|
if err != nil {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
|
|
uploads = append(uploads, uploadedObject{versionId: *deleteOutput.VersionId, deleteMarker: true})
|
|
|
|
// Put tagging on each version
|
|
for i := range uploads {
|
|
if uploads[i].deleteMarker {
|
|
continue
|
|
}
|
|
deleteInput := &s3.DeleteObjectInput{
|
|
Bucket: aws.String(bucket),
|
|
Key: aws.String(object),
|
|
VersionId: aws.String(uploads[i].versionId),
|
|
}
|
|
_, err = s3Client.DeleteObject(deleteInput)
|
|
if err == nil && uploads[i].retention != "" {
|
|
failureLog(function, args, startTime, "", "DELETE expected to fail but succeed instead", nil).Fatal()
|
|
return
|
|
}
|
|
if err != nil && uploads[i].retention == "" {
|
|
failureLog(function, args, startTime, "", fmt.Sprintf("DELETE expected to succeed but got %v", err), err).Fatal()
|
|
return
|
|
}
|
|
}
|
|
|
|
successLogger(function, args, startTime).Info()
|
|
}
|