mirror of https://github.com/minio/minio.git
2764 lines
108 KiB
Go
2764 lines
108 KiB
Go
/*
|
|
* MinIO Cloud Storage, (C) 2015, 2016, 2017, 2018 MinIO, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/xml"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"math/rand"
|
|
"net/http"
|
|
"net/url"
|
|
"reflect"
|
|
"strings"
|
|
"sync"
|
|
"testing"
|
|
"time"
|
|
|
|
humanize "github.com/dustin/go-humanize"
|
|
xhttp "github.com/minio/minio/cmd/http"
|
|
"github.com/minio/minio/pkg/policy"
|
|
)
|
|
|
|
// API suite container common to both FS and XL.
|
|
type TestSuiteCommon struct {
|
|
serverType string
|
|
testServer TestServer
|
|
endPoint string
|
|
accessKey string
|
|
secretKey string
|
|
signer signerType
|
|
secure bool
|
|
transport *http.Transport
|
|
}
|
|
|
|
type check struct {
|
|
*testing.T
|
|
testType string
|
|
}
|
|
|
|
// Assert - checks if gotValue is same as expectedValue, if not fails the test.
|
|
func (c *check) Assert(gotValue interface{}, expectedValue interface{}) {
|
|
if !reflect.DeepEqual(gotValue, expectedValue) {
|
|
c.Fatalf("Test %s:%s expected %v, got %v", getSource(), c.testType, expectedValue, gotValue)
|
|
}
|
|
}
|
|
|
|
func verifyError(c *check, response *http.Response, code, description string, statusCode int) {
|
|
data, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
errorResponse := APIErrorResponse{}
|
|
err = xml.Unmarshal(data, &errorResponse)
|
|
c.Assert(err, nil)
|
|
c.Assert(errorResponse.Code, code)
|
|
c.Assert(errorResponse.Message, description)
|
|
c.Assert(response.StatusCode, statusCode)
|
|
}
|
|
|
|
func runAllTests(suite *TestSuiteCommon, c *check) {
|
|
suite.SetUpSuite(c)
|
|
suite.TestObjectDir(c)
|
|
suite.TestBucketPolicy(c)
|
|
suite.TestDeleteBucket(c)
|
|
suite.TestDeleteBucketNotEmpty(c)
|
|
suite.TestDeleteMultipleObjects(c)
|
|
suite.TestDeleteObject(c)
|
|
suite.TestNonExistentBucket(c)
|
|
suite.TestEmptyObject(c)
|
|
suite.TestBucket(c)
|
|
suite.TestObjectGetAnonymous(c)
|
|
suite.TestObjectGet(c)
|
|
suite.TestMultipleObjects(c)
|
|
suite.TestNotImplemented(c)
|
|
suite.TestHeader(c)
|
|
suite.TestPutBucket(c)
|
|
suite.TestCopyObject(c)
|
|
suite.TestPutObject(c)
|
|
suite.TestListBuckets(c)
|
|
suite.TestValidateSignature(c)
|
|
suite.TestSHA256Mismatch(c)
|
|
suite.TestPutObjectLongName(c)
|
|
suite.TestNotBeAbleToCreateObjectInNonexistentBucket(c)
|
|
suite.TestHeadOnObjectLastModified(c)
|
|
suite.TestHeadOnBucket(c)
|
|
suite.TestContentTypePersists(c)
|
|
suite.TestPartialContent(c)
|
|
suite.TestListObjectsHandler(c)
|
|
suite.TestListObjectsHandlerErrors(c)
|
|
suite.TestPutBucketErrors(c)
|
|
suite.TestGetObjectLarge10MiB(c)
|
|
suite.TestGetObjectLarge11MiB(c)
|
|
suite.TestGetPartialObjectMisAligned(c)
|
|
suite.TestGetPartialObjectLarge11MiB(c)
|
|
suite.TestGetPartialObjectLarge10MiB(c)
|
|
suite.TestGetObjectErrors(c)
|
|
suite.TestGetObjectRangeErrors(c)
|
|
suite.TestObjectMultipartAbort(c)
|
|
suite.TestBucketMultipartList(c)
|
|
suite.TestValidateObjectMultipartUploadID(c)
|
|
suite.TestObjectMultipartListError(c)
|
|
suite.TestObjectValidMD5(c)
|
|
suite.TestObjectMultipart(c)
|
|
suite.TearDownSuite(c)
|
|
}
|
|
|
|
func TestServerSuite(t *testing.T) {
|
|
testCases := []*TestSuiteCommon{
|
|
// Init and run test on FS backend with signature v4.
|
|
{serverType: "FS", signer: signerV4},
|
|
// Init and run test on FS backend with signature v2.
|
|
{serverType: "FS", signer: signerV2},
|
|
// Init and run test on FS backend, with tls enabled.
|
|
{serverType: "FS", signer: signerV4, secure: true},
|
|
// Init and run test on XL backend.
|
|
{serverType: "XL", signer: signerV4},
|
|
// Init and run test on XLSet backend.
|
|
{serverType: "XLSet", signer: signerV4},
|
|
}
|
|
for i, testCase := range testCases {
|
|
t.Run(fmt.Sprintf("Test: %d, ServerType: %s", i+1, testCase.serverType), func(t *testing.T) {
|
|
runAllTests(testCase, &check{t, testCase.serverType})
|
|
})
|
|
}
|
|
}
|
|
|
|
// Setting up the test suite.
|
|
// Starting the Test server with temporary FS backend.
|
|
func (s *TestSuiteCommon) SetUpSuite(c *check) {
|
|
if s.secure {
|
|
cert, key, err := generateTLSCertKey("127.0.0.1")
|
|
c.Assert(err, nil)
|
|
|
|
s.testServer = StartTestTLSServer(c, s.serverType, cert, key)
|
|
|
|
rootCAs := x509.NewCertPool()
|
|
rootCAs.AppendCertsFromPEM(cert)
|
|
tlsConfig := &tls.Config{
|
|
RootCAs: rootCAs,
|
|
}
|
|
tlsConfig.BuildNameToCertificate()
|
|
|
|
s.transport = &http.Transport{
|
|
TLSClientConfig: tlsConfig,
|
|
}
|
|
} else {
|
|
s.testServer = StartTestServer(c, s.serverType)
|
|
s.transport = &http.Transport{}
|
|
}
|
|
s.endPoint = s.testServer.Server.URL
|
|
s.accessKey = s.testServer.AccessKey
|
|
s.secretKey = s.testServer.SecretKey
|
|
}
|
|
|
|
// Called implicitly by "gopkg.in/check.v1" after all tests are run.
|
|
func (s *TestSuiteCommon) TearDownSuite(c *check) {
|
|
s.testServer.Stop()
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestBucketSQSNotificationWebHook(c *check) {
|
|
// Sample bucket notification.
|
|
bucketNotificationBuf := `<NotificationConfiguration><QueueConfiguration><Event>s3:ObjectCreated:Put</Event><Filter><S3Key><FilterRule><Name>prefix</Name><Value>images/</Value></FilterRule></S3Key></Filter><Id>1</Id><Queue>arn:minio:sqs:us-east-1:444455556666:webhook</Queue></QueueConfiguration></NotificationConfiguration>`
|
|
// generate a random bucket Name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("PUT", getPutNotificationURL(s.endPoint, bucketName),
|
|
int64(len(bucketNotificationBuf)), bytes.NewReader([]byte(bucketNotificationBuf)), s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "InvalidArgument", "A specified destination ARN does not exist or is not well-formed. Verify the destination ARN.", http.StatusBadRequest)
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestObjectDir(c *check) {
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, "my-object-directory/"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, "my-object-directory/"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
helloReader := bytes.NewReader([]byte("Hello, World"))
|
|
request.ContentLength = helloReader.Size()
|
|
request.Body = ioutil.NopCloser(helloReader)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "XMinioInvalidObjectName", "Object name contains unsupported characters.", http.StatusBadRequest)
|
|
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, "my-object-directory/"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, "my-object-directory/"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("DELETE", getDeleteObjectURL(s.endPoint, bucketName, "my-object-directory/"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestBucketSQSNotificationAMQP(c *check) {
|
|
// Sample bucket notification.
|
|
bucketNotificationBuf := `<NotificationConfiguration><QueueConfiguration><Event>s3:ObjectCreated:Put</Event><Filter><S3Key><FilterRule><Name>prefix</Name><Value>images/</Value></FilterRule></S3Key></Filter><Id>1</Id><Queue>arn:minio:sqs:us-east-1:444455556666:amqp</Queue></QueueConfiguration></NotificationConfiguration>`
|
|
// generate a random bucket Name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("PUT", getPutNotificationURL(s.endPoint, bucketName),
|
|
int64(len(bucketNotificationBuf)), bytes.NewReader([]byte(bucketNotificationBuf)), s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "InvalidArgument", "A specified destination ARN does not exist or is not well-formed. Verify the destination ARN.", http.StatusBadRequest)
|
|
}
|
|
|
|
// TestBucketPolicy - Inserts the bucket policy and verifies it by fetching the policy back.
|
|
// Deletes the policy and verifies the deletion by fetching it back.
|
|
func (s *TestSuiteCommon) TestBucketPolicy(c *check) {
|
|
// Sample bucket policy.
|
|
bucketPolicyBuf := `{"Version":"2012-10-17","Statement":[{"Action":["s3:GetBucketLocation","s3:ListBucket"],"Effect":"Allow","Principal":{"AWS":["*"]},"Resource":["arn:aws:s3:::%s"]},{"Action":["s3:GetObject"],"Effect":"Allow","Principal":{"AWS":["*"]},"Resource":["arn:aws:s3:::%s/this*"]}]}`
|
|
|
|
// generate a random bucket Name.
|
|
bucketName := getRandomBucketName()
|
|
// create the policy statement string with the randomly generated bucket name.
|
|
bucketPolicyStr := fmt.Sprintf(bucketPolicyBuf, bucketName, bucketName)
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
/// Put a new bucket policy.
|
|
request, err = newTestSignedRequest("PUT", getPutPolicyURL(s.endPoint, bucketName),
|
|
int64(len(bucketPolicyStr)), bytes.NewReader([]byte(bucketPolicyStr)), s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
|
|
// Fetch the uploaded policy.
|
|
request, err = newTestSignedRequest("GET", getGetPolicyURL(s.endPoint, bucketName), 0, nil,
|
|
s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
bucketPolicyReadBuf, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
// Verify if downloaded policy matches with previousy uploaded.
|
|
expectedPolicy, err := policy.ParseConfig(strings.NewReader(bucketPolicyStr), bucketName)
|
|
c.Assert(err, nil)
|
|
gotPolicy, err := policy.ParseConfig(bytes.NewReader(bucketPolicyReadBuf), bucketName)
|
|
c.Assert(err, nil)
|
|
c.Assert(reflect.DeepEqual(expectedPolicy, gotPolicy), true)
|
|
|
|
// Delete policy.
|
|
request, err = newTestSignedRequest("DELETE", getDeletePolicyURL(s.endPoint, bucketName), 0, nil,
|
|
s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
|
|
// Verify if the policy was indeed deleted.
|
|
request, err = newTestSignedRequest("GET", getGetPolicyURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusNotFound)
|
|
}
|
|
|
|
// TestDeleteBucket - validates DELETE bucket operation.
|
|
func (s *TestSuiteCommon) TestDeleteBucket(c *check) {
|
|
bucketName := getRandomBucketName()
|
|
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// construct request to delete the bucket.
|
|
request, err = newTestSignedRequest("DELETE", getDeleteBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert the response status code.
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
}
|
|
|
|
// TestDeleteBucketNotEmpty - Validates the operation during an attempt to delete a non-empty bucket.
|
|
func (s *TestSuiteCommon) TestDeleteBucketNotEmpty(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// generate http request for an object upload.
|
|
// "test-object" is the object name.
|
|
objectName := "test-object"
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the request to complete object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the status code of the response.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// constructing http request to delete the bucket.
|
|
// making an attempt to delete an non-empty bucket.
|
|
// expected to fail.
|
|
request, err = newTestSignedRequest("DELETE", getDeleteBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusConflict)
|
|
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestListenBucketNotificationHandler(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
req, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(req)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
invalidBucket := "Invalid\\Bucket"
|
|
tooByte := bytes.Repeat([]byte("a"), 1025)
|
|
tooBigPrefix := string(tooByte)
|
|
validEvents := []string{"s3:ObjectCreated:*", "s3:ObjectRemoved:*"}
|
|
invalidEvents := []string{"invalidEvent"}
|
|
|
|
req, err = newTestSignedRequest("GET",
|
|
getListenBucketNotificationURL(s.endPoint, invalidBucket, []string{}, []string{}, []string{}),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err = client.Do(req)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "InvalidBucketName", "The specified bucket is not valid.", http.StatusBadRequest)
|
|
|
|
req, err = newTestSignedRequest("GET",
|
|
getListenBucketNotificationURL(s.endPoint, bucketName, []string{}, []string{}, invalidEvents),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err = client.Do(req)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "InvalidArgument", "A specified event is not supported for notifications.", http.StatusBadRequest)
|
|
|
|
req, err = newTestSignedRequest("GET",
|
|
getListenBucketNotificationURL(s.endPoint, bucketName, []string{tooBigPrefix}, []string{}, validEvents),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err = client.Do(req)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "InvalidArgument", "Size of filter rule value cannot exceed 1024 bytes in UTF-8 representation", http.StatusBadRequest)
|
|
|
|
req, err = newTestSignedBadSHARequest("GET",
|
|
getListenBucketNotificationURL(s.endPoint, bucketName, []string{}, []string{}, validEvents),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err = client.Do(req)
|
|
c.Assert(err, nil)
|
|
if s.signer == signerV4 {
|
|
verifyError(c, response, "XAmzContentSHA256Mismatch", "The provided 'x-amz-content-sha256' header does not match what was computed.", http.StatusBadRequest)
|
|
}
|
|
}
|
|
|
|
// Test deletes multple objects and verifies server resonse.
|
|
func (s *TestSuiteCommon) TestDeleteMultipleObjects(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "prefix/myobject"
|
|
delObjReq := DeleteObjectsRequest{
|
|
Quiet: false,
|
|
}
|
|
for i := 0; i < 10; i++ {
|
|
// Obtain http request to upload object.
|
|
// object Name contains a prefix.
|
|
objName := fmt.Sprintf("%d/%s", i, objectName)
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the http request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the status of http response.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// Append all objects.
|
|
delObjReq.Objects = append(delObjReq.Objects, ObjectIdentifier{
|
|
ObjectName: objName,
|
|
})
|
|
}
|
|
// Marshal delete request.
|
|
deleteReqBytes, err := xml.Marshal(delObjReq)
|
|
c.Assert(err, nil)
|
|
|
|
// Delete list of objects.
|
|
request, err = newTestSignedRequest("POST", getMultiDeleteObjectURL(s.endPoint, bucketName),
|
|
int64(len(deleteReqBytes)), bytes.NewReader(deleteReqBytes), s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var deleteResp = DeleteObjectsResponse{}
|
|
delRespBytes, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
err = xml.Unmarshal(delRespBytes, &deleteResp)
|
|
c.Assert(err, nil)
|
|
for i := 0; i < 10; i++ {
|
|
// All the objects should be under deleted list (including non-existent object)
|
|
c.Assert(deleteResp.DeletedObjects[i], delObjReq.Objects[i])
|
|
}
|
|
c.Assert(len(deleteResp.Errors), 0)
|
|
|
|
// Attempt second time results should be same, NoSuchKey for objects not found
|
|
// shouldn't be set.
|
|
request, err = newTestSignedRequest("POST", getMultiDeleteObjectURL(s.endPoint, bucketName),
|
|
int64(len(deleteReqBytes)), bytes.NewReader(deleteReqBytes), s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
deleteResp = DeleteObjectsResponse{}
|
|
delRespBytes, err = ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
err = xml.Unmarshal(delRespBytes, &deleteResp)
|
|
c.Assert(err, nil)
|
|
for i := 0; i < 10; i++ {
|
|
c.Assert(deleteResp.DeletedObjects[i], delObjReq.Objects[i])
|
|
}
|
|
c.Assert(len(deleteResp.Errors), 0)
|
|
}
|
|
|
|
// Tests delete object responses and success.
|
|
func (s *TestSuiteCommon) TestDeleteObject(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "prefix/myobject"
|
|
// obtain http request to upload object.
|
|
// object Name contains a prefix.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the http request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the status of http response.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// object name was "prefix/myobject", an attempt to delete "prefix"
|
|
// Should not delete "prefix/myobject"
|
|
request, err = newTestSignedRequest("DELETE", getDeleteObjectURL(s.endPoint, bucketName, "prefix"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
|
|
// create http request to HEAD on the object.
|
|
// this helps to validate the existence of the bucket.
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert the HTTP response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// create HTTP request to delete the object.
|
|
request, err = newTestSignedRequest("DELETE", getDeleteObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the http request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
|
|
// Delete of non-existent data should return success.
|
|
request, err = newTestSignedRequest("DELETE", getDeleteObjectURL(s.endPoint, bucketName, "prefix/myobject1"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the http request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status.
|
|
c.Assert(response.StatusCode, http.StatusNoContent)
|
|
}
|
|
|
|
// TestNonExistentBucket - Asserts response for HEAD on non-existent bucket.
|
|
func (s *TestSuiteCommon) TestNonExistentBucket(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// create request to HEAD on the bucket.
|
|
// HEAD on an bucket helps validate the existence of the bucket.
|
|
request, err := newTestSignedRequest("HEAD", getHEADBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the http request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert the response.
|
|
c.Assert(response.StatusCode, http.StatusNotFound)
|
|
}
|
|
|
|
// TestEmptyObject - Asserts the response for operation on a 0 byte object.
|
|
func (s *TestSuiteCommon) TestEmptyObject(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the http request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "test-object"
|
|
// construct http request for uploading the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the upload request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// make HTTP request to fetch the object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the http request to fetch object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var buffer bytes.Buffer
|
|
// extract the body of the response.
|
|
responseBody, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
// assert the http response body content.
|
|
c.Assert(true, bytes.Equal(responseBody, buffer.Bytes()))
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestBucket(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
request, err = newTestSignedRequest("HEAD", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
}
|
|
|
|
// Tests get anonymous object.
|
|
func (s *TestSuiteCommon) TestObjectGetAnonymous(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
buffer := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the make bucket http request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the response http status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "testObject"
|
|
// create HTTP request to upload the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the HTTP response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// initiate anonymous HTTP request to fetch the object which does not exist. We need to return AccessDenied.
|
|
response, err = client.Get(getGetObjectURL(s.endPoint, bucketName, objectName+".1"))
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
verifyError(c, response, "AccessDenied", "Access Denied.", http.StatusForbidden)
|
|
|
|
// initiate anonymous HTTP request to fetch the object which does exist. We need to return AccessDenied.
|
|
response, err = client.Get(getGetObjectURL(s.endPoint, bucketName, objectName))
|
|
c.Assert(err, nil)
|
|
// assert the http response status code.
|
|
verifyError(c, response, "AccessDenied", "Access Denied.", http.StatusForbidden)
|
|
}
|
|
|
|
// TestGetObject - Tests fetching of a small object after its insertion into the bucket.
|
|
func (s *TestSuiteCommon) TestObjectGet(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
buffer := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the make bucket http request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the response http status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "testObject"
|
|
// create HTTP request to upload the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the HTTP response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// concurrently reading the object, safety check for races.
|
|
var wg sync.WaitGroup
|
|
for i := 0; i < testConcurrencyLevel; i++ {
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
// HTTP request to create the bucket.
|
|
// create HTTP request to fetch the object.
|
|
getRequest, err := newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
reqClient := http.Client{Transport: s.transport}
|
|
// execute the http request to fetch the object.
|
|
getResponse, err := reqClient.Do(getRequest)
|
|
c.Assert(err, nil)
|
|
defer getResponse.Body.Close()
|
|
// assert the http response status code.
|
|
c.Assert(getResponse.StatusCode, http.StatusOK)
|
|
|
|
// extract response body content.
|
|
responseBody, err := ioutil.ReadAll(getResponse.Body)
|
|
c.Assert(err, nil)
|
|
// assert the HTTP response body content with the expected content.
|
|
c.Assert(responseBody, []byte("hello world"))
|
|
}()
|
|
|
|
}
|
|
wg.Wait()
|
|
}
|
|
|
|
// TestMultipleObjects - Validates upload and fetching of multiple object into the bucket.
|
|
func (s *TestSuiteCommon) TestMultipleObjects(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create the bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// constructing HTTP request to fetch a non-existent object.
|
|
// expected to fail, error response asserted for expected error values later.
|
|
objectName := "testObject"
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Asserting the error response with the expected values.
|
|
verifyError(c, response, "NoSuchKey", "The specified key does not exist.", http.StatusNotFound)
|
|
|
|
objectName = "testObject1"
|
|
// content for the object to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello one"))
|
|
// create HTTP request for the object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the returned values.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// create HTTP request to fetch the object which was uploaded above.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert whether 200 OK response status is obtained.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// extract the response body.
|
|
responseBody, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
// assert the content body for the expected object data.
|
|
c.Assert(true, bytes.Equal(responseBody, []byte("hello one")))
|
|
|
|
// data for new object to be uploaded.
|
|
buffer2 := bytes.NewReader([]byte("hello two"))
|
|
objectName = "testObject2"
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer2.Len()), buffer2, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the response status code for expected value 200 OK.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// fetch the object which was uploaded above.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to fetch the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// assert the response status code for expected value 200 OK.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// verify response data
|
|
responseBody, err = ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
c.Assert(true, bytes.Equal(responseBody, []byte("hello two")))
|
|
|
|
// data for new object to be uploaded.
|
|
buffer3 := bytes.NewReader([]byte("hello three"))
|
|
objectName = "testObject3"
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer3.Len()), buffer3, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// verify the response code with the expected value of 200 OK.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// fetch the object which was uploaded above.
|
|
request, err = newTestSignedRequest("GET", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// verify object.
|
|
responseBody, err = ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
c.Assert(true, bytes.Equal(responseBody, []byte("hello three")))
|
|
}
|
|
|
|
// TestNotImplemented - validates if object policy is implemented, should return 'NotImplemented'.
|
|
func (s *TestSuiteCommon) TestNotImplemented(c *check) {
|
|
// Generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
request, err := newTestSignedRequest("GET", s.endPoint+SlashSeparator+bucketName+"/object?policy",
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusNotImplemented)
|
|
}
|
|
|
|
// TestHeader - Validates the error response for an attempt to fetch non-existent object.
|
|
func (s *TestSuiteCommon) TestHeader(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// obtain HTTP request to fetch an object from non-existent bucket/object.
|
|
request, err := newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, "testObject"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// asserting for the expected error response.
|
|
verifyError(c, response, "NoSuchBucket", "The specified bucket does not exist", http.StatusNotFound)
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestPutBucket(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// Block 1: Testing for racey access
|
|
// The assertion is removed from this block since the purpose of this block is to find races
|
|
// The purpose this block is not to check for correctness of functionality
|
|
// Run the test with -race flag to utilize this
|
|
var wg sync.WaitGroup
|
|
for i := 0; i < testConcurrencyLevel; i++ {
|
|
wg.Add(1)
|
|
go func() {
|
|
defer wg.Done()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
if err != nil {
|
|
c.Errorf("Put bucket Failed: <ERROR> %s", err)
|
|
return
|
|
}
|
|
defer response.Body.Close()
|
|
}()
|
|
}
|
|
wg.Wait()
|
|
|
|
bucketName = getRandomBucketName()
|
|
//Block 2: testing for correctness of the functionality
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
response.Body.Close()
|
|
}
|
|
|
|
// TestCopyObject - Validates copy object.
|
|
// The following is the test flow.
|
|
// 1. Create bucket.
|
|
// 2. Insert Object.
|
|
// 3. Use "X-Amz-Copy-Source" header to copy the previously created object.
|
|
// 4. Validate the content of copied object.
|
|
func (s *TestSuiteCommon) TestCopyObject(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// content for the object to be created.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
objectName := "testObject"
|
|
// create HTTP request for object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
request.Header.Set("Content-Type", "application/json")
|
|
if s.signer == signerV2 {
|
|
c.Assert(err, nil)
|
|
err = signRequestV2(request, s.accessKey, s.secretKey)
|
|
}
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName2 := "testObject2"
|
|
// Unlike the actual PUT object request, the request to Copy Object doesn't contain request body,
|
|
// empty body with the "X-Amz-Copy-Source" header pointing to the object to copies it in the backend.
|
|
request, err = newTestRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName2), 0, nil)
|
|
c.Assert(err, nil)
|
|
// setting the "X-Amz-Copy-Source" to allow copying the content of previously uploaded object.
|
|
request.Header.Set("X-Amz-Copy-Source", url.QueryEscape(SlashSeparator+bucketName+SlashSeparator+objectName))
|
|
if s.signer == signerV4 {
|
|
err = signRequestV4(request, s.accessKey, s.secretKey)
|
|
} else {
|
|
err = signRequestV2(request, s.accessKey, s.secretKey)
|
|
}
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
// the content is expected to have the content of previous disk.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// creating HTTP request to fetch the previously uploaded object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName2),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// executing the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// validating the response status code.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// reading the response body.
|
|
// response body is expected to have the copied content of the first uploaded object.
|
|
object, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
c.Assert(string(object), "hello world")
|
|
}
|
|
|
|
// TestPutObject - Tests successful put object request.
|
|
func (s *TestSuiteCommon) TestPutObject(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// content for new object upload.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
objectName := "testObject"
|
|
// creating HTTP request for object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// fetch the object back and verify its contents.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to fetch the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
c.Assert(response.ContentLength, int64(len([]byte("hello world"))))
|
|
var buffer2 bytes.Buffer
|
|
// retrieve the contents of response body.
|
|
n, err := io.Copy(&buffer2, response.Body)
|
|
c.Assert(err, nil)
|
|
c.Assert(n, int64(len([]byte("hello world"))))
|
|
// asserted the contents of the fetched object with the expected result.
|
|
c.Assert(true, bytes.Equal(buffer2.Bytes(), []byte("hello world")))
|
|
|
|
// Test the response when object name ends with a slash.
|
|
// This is a special case with size as '0' and object ends with
|
|
// a slash separator, we treat it like a valid operation and
|
|
// return success.
|
|
// The response Etag headers should contain Md5Sum of empty string.
|
|
objectName = "objectwith/"
|
|
// create HTTP request for object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
if s.signer == signerV2 {
|
|
c.Assert(err, nil)
|
|
err = signRequestV2(request, s.accessKey, s.secretKey)
|
|
}
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// The response Etag header should contain Md5sum of an empty string.
|
|
c.Assert(response.Header.Get(xhttp.ETag), "\""+emptyETag+"\"")
|
|
}
|
|
|
|
// TestListBuckets - Make request for listing of all buckets.
|
|
// XML response is parsed.
|
|
// Its success verifies the format of the response.
|
|
func (s *TestSuiteCommon) TestListBuckets(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to list buckets.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// create HTTP request for listing buckets.
|
|
request, err = newTestSignedRequest("GET", getListBucketURL(s.endPoint),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to list buckets.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var results ListBucketsResponse
|
|
// parse the list bucket response.
|
|
decoder := xml.NewDecoder(response.Body)
|
|
err = decoder.Decode(&results)
|
|
// validating that the xml-decoding/parsing was successful.
|
|
c.Assert(err, nil)
|
|
|
|
// Fetch the bucket created above
|
|
var createdBucket Bucket
|
|
for _, b := range results.Buckets.Buckets {
|
|
if b.Name == bucketName {
|
|
createdBucket = b
|
|
}
|
|
}
|
|
c.Assert(createdBucket.Name != "", true)
|
|
|
|
// Parse the bucket modtime
|
|
creationTime, err := time.Parse(timeFormatAMZLong, createdBucket.CreationDate)
|
|
c.Assert(err, nil)
|
|
|
|
// Check if bucket modtime is consistent (not less than current time and not late more than 5 minutes)
|
|
timeNow := time.Now().UTC()
|
|
c.Assert(creationTime.Before(timeNow), true)
|
|
c.Assert(timeNow.Sub(creationTime) < time.Minute*5, true)
|
|
}
|
|
|
|
// This tests validate if PUT handler can successfully detect signature mismatch.
|
|
func (s *TestSuiteCommon) TestValidateSignature(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// Execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objName := "test-object"
|
|
|
|
// Body is on purpose set to nil so that we get payload generated for empty bytes.
|
|
|
|
// Create new HTTP request with incorrect secretKey to generate an incorrect signature.
|
|
secretKey := s.secretKey + "a"
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objName), 0, nil, s.accessKey, secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "SignatureDoesNotMatch", "The request signature we calculated does not match the signature you provided. Check your key and signing method.", http.StatusForbidden)
|
|
}
|
|
|
|
// This tests validate if PUT handler can successfully detect SHA256 mismatch.
|
|
func (s *TestSuiteCommon) TestSHA256Mismatch(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// Execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objName := "test-object"
|
|
|
|
// Body is on purpose set to nil so that we get payload generated for empty bytes.
|
|
|
|
// Create new HTTP request with incorrect secretKey to generate an incorrect signature.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objName), 0, nil, s.accessKey, s.secretKey, s.signer)
|
|
if s.signer == signerV4 {
|
|
c.Assert(request.Header.Get("x-amz-content-sha256"), "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855")
|
|
}
|
|
// Set the body to generate signature mismatch.
|
|
helloReader := bytes.NewReader([]byte("Hello, World"))
|
|
request.ContentLength = helloReader.Size()
|
|
request.Body = ioutil.NopCloser(helloReader)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
if s.signer == signerV4 {
|
|
verifyError(c, response, "XAmzContentSHA256Mismatch", "The provided 'x-amz-content-sha256' header does not match what was computed.", http.StatusBadRequest)
|
|
}
|
|
}
|
|
|
|
// TestPutObjectLongName - Validates the error response
|
|
// on an attempt to upload an object with long name.
|
|
func (s *TestSuiteCommon) TestPutObjectLongName(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// Execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// Content for the object to be uploaded.
|
|
buffer := bytes.NewReader([]byte("hello world"))
|
|
// make long object name.
|
|
longObjName := fmt.Sprintf("%0255d/%0255d/%0255d", 1, 1, 1)
|
|
if IsDocker() || IsKubernetes() {
|
|
longObjName = fmt.Sprintf("%0242d/%0242d/%0242d", 1, 1, 1)
|
|
}
|
|
// create new HTTP request to insert the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, longObjName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
//make long object name.
|
|
longObjName = fmt.Sprintf("%0255d/%0255d/%0255d/%0255d/%0255d", 1, 1, 1, 1, 1)
|
|
if IsDocker() || IsKubernetes() {
|
|
longObjName = fmt.Sprintf("%0242d/%0242d/%0242d/%0242d/%0242d", 1, 1, 1, 1, 1)
|
|
}
|
|
// create new HTTP request to insert the object.
|
|
buffer = bytes.NewReader([]byte("hello world"))
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, longObjName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusBadRequest)
|
|
verifyError(c, response, "KeyTooLongError", "Your key is too long", http.StatusBadRequest)
|
|
|
|
// make object name with prefix as slash
|
|
longObjName = fmt.Sprintf("/%0255d/%0255d", 1, 1)
|
|
buffer = bytes.NewReader([]byte("hello world"))
|
|
// create new HTTP request to insert the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, longObjName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusBadRequest)
|
|
verifyError(c, response, "XMinioInvalidObjectName", "Object name contains a leading slash.", http.StatusBadRequest)
|
|
|
|
//make object name as unsuported
|
|
longObjName = fmt.Sprintf("%0256d", 1)
|
|
buffer = bytes.NewReader([]byte("hello world"))
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, longObjName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "XMinioInvalidObjectName", "Object name contains unsupported characters.", http.StatusBadRequest)
|
|
}
|
|
|
|
// TestNotBeAbleToCreateObjectInNonexistentBucket - Validates the error response
|
|
// on an attempt to upload an object into a non-existent bucket.
|
|
func (s *TestSuiteCommon) TestNotBeAbleToCreateObjectInNonexistentBucket(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// content of the object to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
|
|
// preparing for upload by generating the upload URL.
|
|
objectName := "test-object"
|
|
request, err := newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// Execute the HTTP request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert the response error message.
|
|
verifyError(c, response, "NoSuchBucket", "The specified bucket does not exist", http.StatusNotFound)
|
|
}
|
|
|
|
// TestHeadOnObjectLastModified - Asserts response for HEAD on an object.
|
|
// HEAD requests on an object validates the existence of the object.
|
|
// The responses for fetching the object when If-Modified-Since
|
|
// and If-Unmodified-Since headers set are validated.
|
|
// If-Modified-Since - Return the object only if it has been modified since the specified time, else return a 304 (not modified).
|
|
// If-Unmodified-Since - Return the object only if it has not been modified since the specified time, else return a 412 (precondition failed).
|
|
func (s *TestSuiteCommon) TestHeadOnObjectLastModified(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// preparing for object upload.
|
|
objectName := "test-object"
|
|
// content for the object to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
// obtaining URL for uploading the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// executing the HTTP request to download the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// make HTTP request to obtain object info.
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// verify the status of the HTTP response.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// retrieve the info of last modification time of the object from the response header.
|
|
lastModified := response.Header.Get("Last-Modified")
|
|
// Parse it into time.Time structure.
|
|
t, err := time.Parse(http.TimeFormat, lastModified)
|
|
c.Assert(err, nil)
|
|
|
|
// make HTTP request to obtain object info.
|
|
// But this time set the "If-Modified-Since" header to be 10 minute more than the actual
|
|
// last modified time of the object.
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
request.Header.Set("If-Modified-Since", t.Add(10*time.Minute).UTC().Format(http.TimeFormat))
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since the "If-Modified-Since" header was ahead in time compared to the actual
|
|
// modified time of the object expecting the response status to be http.StatusNotModified.
|
|
c.Assert(response.StatusCode, http.StatusNotModified)
|
|
|
|
// Again, obtain the object info.
|
|
// This time setting "If-Unmodified-Since" to a time after the object is modified.
|
|
// As documented above, expecting http.StatusPreconditionFailed.
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
request.Header.Set("If-Unmodified-Since", t.Add(-10*time.Minute).UTC().Format(http.TimeFormat))
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusPreconditionFailed)
|
|
|
|
// make HTTP request to obtain object info.
|
|
// But this time set a date with unrecognized format to the "If-Modified-Since" header
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
request.Header.Set("If-Unmodified-Since", "Mon, 02 Jan 2006 15:04:05 +00:00")
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since the "If-Modified-Since" header was ahead in time compared to the actual
|
|
// modified time of the object expecting the response status to be http.StatusNotModified.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
}
|
|
|
|
// TestHeadOnBucket - Validates response for HEAD on the bucket.
|
|
// HEAD request on the bucket validates the existence of the bucket.
|
|
func (s *TestSuiteCommon) TestHeadOnBucket(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getHEADBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// make HEAD request on the bucket.
|
|
request, err = newTestSignedRequest("HEAD", getHEADBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Asserting the response status for expected value of http.StatusOK.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
}
|
|
|
|
// TestContentTypePersists - Object upload with different Content-type is first done.
|
|
// And then a HEAD and GET request on these objects are done to validate if the same Content-Type set during upload persists.
|
|
func (s *TestSuiteCommon) TestContentTypePersists(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// Uploading a new object with Content-Type "image/png".
|
|
// content for the object to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
objectName := "test-object.png"
|
|
// constructing HTTP request for object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
request.Header.Set("Content-Type", "image/png")
|
|
if s.signer == signerV2 {
|
|
err = signRequestV2(request, s.accessKey, s.secretKey)
|
|
c.Assert(err, nil)
|
|
}
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// Fetching the object info using HEAD request for the object which was uploaded above.
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// Execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Verify if the Content-Type header is set during the object persists.
|
|
c.Assert(response.Header.Get("Content-Type"), "image/png")
|
|
|
|
// Fetching the object itself and then verify the Content-Type header.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// Execute the HTTP to fetch the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// Verify if the Content-Type header is set during the object persists.
|
|
c.Assert(response.Header.Get("Content-Type"), "image/png")
|
|
|
|
// Uploading a new object with Content-Type "application/json".
|
|
objectName = "test-object.json"
|
|
buffer2 := bytes.NewReader([]byte("hello world"))
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer2.Len()), buffer2, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// setting the request header to be application/json.
|
|
request.Header.Set("Content-Type", "application/json")
|
|
if s.signer == signerV2 {
|
|
err = signRequestV2(request, s.accessKey, s.secretKey)
|
|
c.Assert(err, nil)
|
|
}
|
|
|
|
// Execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// Obtain the info of the object which was uploaded above using HEAD request.
|
|
request, err = newTestSignedRequest("HEAD", getHeadObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// Execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert if the content-type header set during the object upload persists.
|
|
c.Assert(response.Header.Get("Content-Type"), "application/json")
|
|
|
|
// Fetch the object and assert whether the Content-Type header persists.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// Execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert if the content-type header set during the object upload persists.
|
|
c.Assert(response.Header.Get("Content-Type"), "application/json")
|
|
}
|
|
|
|
// TestPartialContent - Validating for GetObject with partial content request.
|
|
// By setting the Range header, A request to send specific bytes range of data from an
|
|
// already uploaded object can be done.
|
|
func (s *TestSuiteCommon) TestPartialContent(c *check) {
|
|
bucketName := getRandomBucketName()
|
|
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
buffer1 := bytes.NewReader([]byte("Hello World"))
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, "bar"),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// Prepare request
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, "bar"),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
request.Header.Add("Range", "bytes=6-7")
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusPartialContent)
|
|
partialObject, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
c.Assert(string(partialObject), "Wo")
|
|
}
|
|
|
|
// TestListObjectsHandler - Setting valid parameters to List Objects
|
|
// and then asserting the response with the expected one.
|
|
func (s *TestSuiteCommon) TestListObjectsHandler(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
for _, objectName := range []string{"foo bar 1", "foo bar 2"} {
|
|
buffer := bytes.NewReader([]byte("Hello World"))
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer.Len()), buffer, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
}
|
|
|
|
var testCases = []struct {
|
|
getURL string
|
|
expectedStrings []string
|
|
}{
|
|
{getListObjectsV1URL(s.endPoint, bucketName, "", "1000", ""), []string{"<Key>foo bar 1</Key>", "<Key>foo bar 2</Key>"}},
|
|
{getListObjectsV1URL(s.endPoint, bucketName, "", "1000", "url"), []string{"<Key>foo+bar+1</Key>", "<Key>foo+bar+2</Key>"}},
|
|
{getListObjectsV2URL(s.endPoint, bucketName, "", "1000", "", ""),
|
|
[]string{
|
|
"<Key>foo bar 1</Key>",
|
|
"<Key>foo bar 2</Key>",
|
|
"<Owner><ID></ID><DisplayName></DisplayName></Owner>",
|
|
},
|
|
},
|
|
{getListObjectsV2URL(s.endPoint, bucketName, "", "1000", "true", ""),
|
|
[]string{
|
|
"<Key>foo bar 1</Key>",
|
|
"<Key>foo bar 2</Key>",
|
|
fmt.Sprintf("<Owner><ID>%s</ID><DisplayName></DisplayName></Owner>", globalMinioDefaultOwnerID),
|
|
},
|
|
},
|
|
{getListObjectsV2URL(s.endPoint, bucketName, "", "1000", "", "url"), []string{"<Key>foo+bar+1</Key>", "<Key>foo+bar+2</Key>"}},
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
|
// create listObjectsV1 request with valid parameters
|
|
request, err = newTestSignedRequest("GET", testCase.getURL, 0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
getContent, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
for _, expectedStr := range testCase.expectedStrings {
|
|
c.Assert(strings.Contains(string(getContent), expectedStr), true)
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestListObjectsHandlerErrors - Setting invalid parameters to List Objects
|
|
// and then asserting the error response with the expected one.
|
|
func (s *TestSuiteCommon) TestListObjectsHandlerErrors(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// create listObjectsV1 request with invalid value of max-keys parameter. max-keys is set to -2.
|
|
request, err = newTestSignedRequest("GET", getListObjectsV1URL(s.endPoint, bucketName, "", "-2", ""),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// validating the error response.
|
|
verifyError(c, response, "InvalidArgument", "Argument maxKeys must be an integer between 0 and 2147483647", http.StatusBadRequest)
|
|
|
|
// create listObjectsV2 request with invalid value of max-keys parameter. max-keys is set to -2.
|
|
request, err = newTestSignedRequest("GET", getListObjectsV2URL(s.endPoint, bucketName, "", "-2", "", ""),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// validating the error response.
|
|
verifyError(c, response, "InvalidArgument", "Argument maxKeys must be an integer between 0 and 2147483647", http.StatusBadRequest)
|
|
|
|
}
|
|
|
|
// TestPutBucketErrors - request for non valid bucket operation
|
|
// and validate it with expected error result.
|
|
func (s *TestSuiteCommon) TestPutBucketErrors(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// generating a HTTP request to create bucket.
|
|
// using invalid bucket name.
|
|
request, err := newTestSignedRequest("PUT", s.endPoint+"/putbucket-.",
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expected to fail with error message "InvalidBucketName".
|
|
verifyError(c, response, "InvalidBucketName", "The specified bucket is not valid.", http.StatusBadRequest)
|
|
// HTTP request to create the bucket.
|
|
request, err = newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// make HTTP request to create the same bucket again.
|
|
// expected to fail with error message "BucketAlreadyOwnedByYou".
|
|
request, err = newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "BucketAlreadyOwnedByYou", "Your previous request to create the named bucket succeeded and you already own it.",
|
|
http.StatusConflict)
|
|
|
|
// request for ACL.
|
|
// Since MinIO server doesn't support ACL's the request is expected to fail with "NotImplemented" error message.
|
|
request, err = newTestSignedRequest("PUT", s.endPoint+SlashSeparator+bucketName+"?acl",
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "NotImplemented", "A header you provided implies functionality that is not implemented", http.StatusNotImplemented)
|
|
}
|
|
|
|
func (s *TestSuiteCommon) TestGetObjectLarge10MiB(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// form HTTP reqest to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create the bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var buffer bytes.Buffer
|
|
line := `1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,123"`
|
|
// Create 10MiB content where each line contains 1024 characters.
|
|
for i := 0; i < 10*1024; i++ {
|
|
buffer.WriteString(fmt.Sprintf("[%05d] %s\n", i, line))
|
|
}
|
|
putContent := buffer.String()
|
|
|
|
buf := bytes.NewReader([]byte(putContent))
|
|
|
|
objectName := "test-big-object"
|
|
// create HTTP request for object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buf.Len()), buf, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Assert the status code to verify successful upload.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// prepare HTTP requests to download the object.
|
|
request, err = newTestSignedRequest("GET", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to download the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// extract the content from response body.
|
|
getContent, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
// Compare putContent and getContent.
|
|
c.Assert(string(getContent), putContent)
|
|
}
|
|
|
|
// TestGetObjectLarge11MiB - Tests validate fetching of an object of size 11MB.
|
|
func (s *TestSuiteCommon) TestGetObjectLarge11MiB(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var buffer bytes.Buffer
|
|
line := `1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,123`
|
|
// Create 11MiB content where each line contains 1024 characters.
|
|
for i := 0; i < 11*1024; i++ {
|
|
buffer.WriteString(fmt.Sprintf("[%05d] %s\n", i, line))
|
|
}
|
|
putMD5 := getMD5Hash(buffer.Bytes())
|
|
|
|
objectName := "test-11Mb-object"
|
|
// Put object
|
|
buf := bytes.NewReader(buffer.Bytes())
|
|
// create HTTP request foe object upload.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buf.Len()), buf, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request for object upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// create HTTP request to download the object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// fetch the content from response body.
|
|
getContent, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
// Get etag of the response content.
|
|
getMD5 := getMD5Hash(getContent)
|
|
|
|
// Compare putContent and getContent.
|
|
c.Assert(putMD5, getMD5)
|
|
}
|
|
|
|
// TestGetPartialObjectMisAligned - tests get object partially mis-aligned.
|
|
// create a large buffer of mis-aligned data and upload it.
|
|
// then make partial range requests to while fetching it back and assert the response content.
|
|
func (s *TestSuiteCommon) TestGetPartialObjectMisAligned(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create the bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var buffer bytes.Buffer
|
|
// data to be written into buffer.
|
|
data := "1234567890"
|
|
// seed the random number generator once.
|
|
rand.Seed(3)
|
|
// generate a random number between 13 and 200.
|
|
randInt := getRandomRange(13, 200, -1)
|
|
// write into buffer till length of the buffer is greater than the generated random number.
|
|
for i := 0; i <= randInt; i += 10 {
|
|
buffer.WriteString(data)
|
|
}
|
|
// String content which is used for put object range test.
|
|
putBytes := buffer.Bytes()
|
|
putBytes = putBytes[:randInt]
|
|
// randomize the order of bytes in the byte array and create a reader.
|
|
putBytes = randomizeBytes(putBytes, -1)
|
|
buf := bytes.NewReader(putBytes)
|
|
putContent := string(putBytes)
|
|
objectName := "test-big-file"
|
|
// HTTP request to upload the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buf.Len()), buf, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// test Cases containing data to make partial range requests.
|
|
// also has expected response data.
|
|
var testCases = []struct {
|
|
byteRange string
|
|
expectedString string
|
|
}{
|
|
// request for byte range 10-11.
|
|
// expecting the result to contain only putContent[10:12] bytes.
|
|
{"10-11", putContent[10:12]},
|
|
// request for object data after the first byte.
|
|
{"1-", putContent[1:]},
|
|
// request for object data after the first byte.
|
|
{"6-", putContent[6:]},
|
|
// request for last 2 bytes of th object.
|
|
{"-2", putContent[len(putContent)-2:]},
|
|
// request for last 7 bytes of the object.
|
|
{"-7", putContent[len(putContent)-7:]},
|
|
}
|
|
|
|
for _, t := range testCases {
|
|
// HTTP request to download the object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// Get partial content based on the byte range set.
|
|
request.Header.Add("Range", "bytes="+t.byteRange)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since only part of the object is requested, expecting response status to be http.StatusPartialContent .
|
|
c.Assert(response.StatusCode, http.StatusPartialContent)
|
|
// parse the HTTP response body.
|
|
getContent, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
// Compare putContent and getContent.
|
|
c.Assert(string(getContent), t.expectedString)
|
|
}
|
|
}
|
|
|
|
// TestGetPartialObjectLarge11MiB - Test validates partial content request for a 11MiB object.
|
|
func (s *TestSuiteCommon) TestGetPartialObjectLarge11MiB(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create the bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var buffer bytes.Buffer
|
|
line := `234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,123`
|
|
// Create 11MiB content where each line contains 1024
|
|
// characters.
|
|
for i := 0; i < 11*1024; i++ {
|
|
buffer.WriteString(fmt.Sprintf("[%05d] %s\n", i, line))
|
|
}
|
|
putContent := buffer.String()
|
|
|
|
objectName := "test-large-11Mb-object"
|
|
|
|
buf := bytes.NewReader([]byte(putContent))
|
|
// HTTP request to upload the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buf.Len()), buf, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// HTTP request to download the object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// This range spans into first two blocks.
|
|
request.Header.Add("Range", "bytes=10485750-10485769")
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since only part of the object is requested, expecting response status to be http.StatusPartialContent .
|
|
c.Assert(response.StatusCode, http.StatusPartialContent)
|
|
// read the downloaded content from the response body.
|
|
getContent, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
// Compare putContent and getContent.
|
|
c.Assert(string(getContent), putContent[10485750:10485770])
|
|
}
|
|
|
|
// TestGetPartialObjectLarge11MiB - Test validates partial content request for a 10MiB object.
|
|
func (s *TestSuiteCommon) TestGetPartialObjectLarge10MiB(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
// expecting the error to be nil.
|
|
c.Assert(err, nil)
|
|
// expecting the HTTP response status code to 200 OK.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
var buffer bytes.Buffer
|
|
line := `1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,1234567890,
|
|
1234567890,1234567890,1234567890,123`
|
|
// Create 10MiB content where each line contains 1024 characters.
|
|
for i := 0; i < 10*1024; i++ {
|
|
buffer.WriteString(fmt.Sprintf("[%05d] %s\n", i, line))
|
|
}
|
|
|
|
putContent := buffer.String()
|
|
buf := bytes.NewReader([]byte(putContent))
|
|
|
|
objectName := "test-big-10Mb-file"
|
|
// HTTP request to upload the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buf.Len()), buf, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// verify whether upload was successful.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// HTTP request to download the object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// Get partial content based on the byte range set.
|
|
request.Header.Add("Range", "bytes=2048-2058")
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to download the partila content.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since only part of the object is requested, expecting response status to be http.StatusPartialContent .
|
|
c.Assert(response.StatusCode, http.StatusPartialContent)
|
|
// read the downloaded content from the response body.
|
|
getContent, err := ioutil.ReadAll(response.Body)
|
|
c.Assert(err, nil)
|
|
|
|
// Compare putContent and getContent.
|
|
c.Assert(string(getContent), putContent[2048:2059])
|
|
}
|
|
|
|
// TestGetObjectErrors - Tests validate error response for invalid object operations.
|
|
func (s *TestSuiteCommon) TestGetObjectErrors(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "test-non-exitent-object"
|
|
// HTTP request to download the object.
|
|
// Since the specified object doesn't exist in the given bucket,
|
|
// expected to fail with error message "NoSuchKey"
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
verifyError(c, response, "NoSuchKey", "The specified key does not exist.", http.StatusNotFound)
|
|
|
|
// request to download an object, but an invalid bucket name is set.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, "getobjecterrors-.", objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expected to fail with "InvalidBucketName".
|
|
verifyError(c, response, "InvalidBucketName", "The specified bucket is not valid.", http.StatusBadRequest)
|
|
}
|
|
|
|
// TestGetObjectRangeErrors - Validate error response when object is fetched with incorrect byte range value.
|
|
func (s *TestSuiteCommon) TestGetObjectRangeErrors(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// content for the object to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("Hello World"))
|
|
|
|
objectName := "test-object"
|
|
// HTTP request to upload the object.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the object.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// verify whether upload was successful.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// HTTP request to download the object.
|
|
request, err = newTestSignedRequest("GET", getGetObjectURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
// Invalid byte range set.
|
|
request.Header.Add("Range", "bytes=-0")
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expected to fail with "InvalidRange" error message.
|
|
verifyError(c, response, "InvalidRange", "The requested range is not satisfiable", http.StatusRequestedRangeNotSatisfiable)
|
|
}
|
|
|
|
// TestObjectMultipartAbort - Test validates abortion of a multipart upload after uploading 2 parts.
|
|
func (s *TestSuiteCommon) TestObjectMultipartAbort(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
objectName := "test-multipart-object"
|
|
|
|
// 1. Initiate 2 uploads for the same object
|
|
// 2. Upload 2 parts for the second upload
|
|
// 3. Abort the second upload.
|
|
// 4. Abort the first upload.
|
|
// This will test abort upload when there are more than one upload IDs
|
|
// and the case where there is only one upload ID.
|
|
|
|
// construct HTTP request to initiate a NewMultipart upload.
|
|
request, err = newTestSignedRequest("POST", getNewMultipartURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// execute the HTTP request initiating the new multipart upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// parse the response body and obtain the new upload ID.
|
|
decoder := xml.NewDecoder(response.Body)
|
|
newResponse := &InitiateMultipartUploadResponse{}
|
|
|
|
err = decoder.Decode(newResponse)
|
|
c.Assert(err, nil)
|
|
c.Assert(len(newResponse.UploadID) > 0, true)
|
|
|
|
// construct HTTP request to initiate a NewMultipart upload.
|
|
request, err = newTestSignedRequest("POST", getNewMultipartURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// execute the HTTP request initiating the new multipart upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// parse the response body and obtain the new upload ID.
|
|
decoder = xml.NewDecoder(response.Body)
|
|
newResponse = &InitiateMultipartUploadResponse{}
|
|
|
|
err = decoder.Decode(newResponse)
|
|
c.Assert(err, nil)
|
|
c.Assert(len(newResponse.UploadID) > 0, true)
|
|
// uploadID to be used for rest of the multipart operations on the object.
|
|
uploadID := newResponse.UploadID
|
|
|
|
// content for the part to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request for the part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "1"),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to upload the first part.
|
|
response1, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response1.StatusCode, http.StatusOK)
|
|
|
|
// content for the second part to be uploaded.
|
|
buffer2 := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request for the second part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "2"),
|
|
int64(buffer2.Len()), buffer2, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to upload the second part.
|
|
response2, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response2.StatusCode, http.StatusOK)
|
|
// HTTP request for aborting the multipart upload.
|
|
request, err = newTestSignedRequest("DELETE", getAbortMultipartUploadURL(s.endPoint, bucketName, objectName, uploadID),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to abort the multipart upload.
|
|
response3, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expecting the response status code to be http.StatusNoContent.
|
|
// The assertion validates the success of Abort Multipart operation.
|
|
c.Assert(response3.StatusCode, http.StatusNoContent)
|
|
}
|
|
|
|
// TestBucketMultipartList - Initiates a NewMultipart upload, uploads parts and validates listing of the parts.
|
|
func (s *TestSuiteCommon) TestBucketMultipartList(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName), 0,
|
|
nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, 200)
|
|
|
|
objectName := "test-multipart-object"
|
|
// construct HTTP request to initiate a NewMultipart upload.
|
|
request, err = newTestSignedRequest("POST", getNewMultipartURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request initiating the new multipart upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expecting the response status code to be http.StatusOK(200 OK) .
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// parse the response body and obtain the new upload ID.
|
|
decoder := xml.NewDecoder(response.Body)
|
|
newResponse := &InitiateMultipartUploadResponse{}
|
|
|
|
err = decoder.Decode(newResponse)
|
|
c.Assert(err, nil)
|
|
c.Assert(len(newResponse.UploadID) > 0, true)
|
|
// uploadID to be used for rest of the multipart operations on the object.
|
|
uploadID := newResponse.UploadID
|
|
|
|
// content for the part to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request for the part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "1"),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to upload the first part.
|
|
response1, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response1.StatusCode, http.StatusOK)
|
|
|
|
// content for the second part to be uploaded.
|
|
buffer2 := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request for the second part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "2"),
|
|
int64(buffer2.Len()), buffer2, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to upload the second part.
|
|
response2, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response2.StatusCode, http.StatusOK)
|
|
|
|
// HTTP request to ListMultipart Uploads.
|
|
request, err = newTestSignedRequest("GET", getListMultipartURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response3, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response3.StatusCode, http.StatusOK)
|
|
|
|
// The reason to duplicate this structure here is to verify if the
|
|
// unmarshalling works from a client perspective, specifically
|
|
// while unmarshalling time.Time type for 'Initiated' field.
|
|
// time.Time does not honor xml marshaler, it means that we need
|
|
// to encode/format it before giving it to xml marshaling.
|
|
|
|
// This below check adds client side verification to see if its
|
|
// truly parseable.
|
|
|
|
// listMultipartUploadsResponse - format for list multipart uploads response.
|
|
type listMultipartUploadsResponse struct {
|
|
XMLName xml.Name `xml:"http://s3.amazonaws.com/doc/2006-03-01/ ListMultipartUploadsResult" json:"-"`
|
|
|
|
Bucket string
|
|
KeyMarker string
|
|
UploadIDMarker string `xml:"UploadIdMarker"`
|
|
NextKeyMarker string
|
|
NextUploadIDMarker string `xml:"NextUploadIdMarker"`
|
|
EncodingType string
|
|
MaxUploads int
|
|
IsTruncated bool
|
|
// All the in progress multipart uploads.
|
|
Uploads []struct {
|
|
Key string
|
|
UploadID string `xml:"UploadId"`
|
|
Initiator Initiator
|
|
Owner Owner
|
|
StorageClass string
|
|
Initiated time.Time // Keep this native to be able to parse properly.
|
|
}
|
|
Prefix string
|
|
Delimiter string
|
|
CommonPrefixes []CommonPrefix
|
|
}
|
|
|
|
// parse the response body.
|
|
decoder = xml.NewDecoder(response3.Body)
|
|
newResponse3 := &listMultipartUploadsResponse{}
|
|
err = decoder.Decode(newResponse3)
|
|
c.Assert(err, nil)
|
|
// Assert the bucket name in the response with the expected bucketName.
|
|
c.Assert(newResponse3.Bucket, bucketName)
|
|
// Assert the bucket name in the response with the expected bucketName.
|
|
c.Assert(newResponse3.IsTruncated, false)
|
|
}
|
|
|
|
// TestValidateObjectMultipartUploadID - Test Initiates a new multipart upload and validates the uploadID.
|
|
func (s *TestSuiteCommon) TestValidateObjectMultipartUploadID(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, 200)
|
|
|
|
objectName := "directory1/directory2/object"
|
|
// construct HTTP request to initiate a NewMultipart upload.
|
|
request, err = newTestSignedRequest("POST", getNewMultipartURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request initiating the new multipart upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
|
|
// parse the response body and obtain the new upload ID.
|
|
decoder := xml.NewDecoder(response.Body)
|
|
newResponse := &InitiateMultipartUploadResponse{}
|
|
err = decoder.Decode(newResponse)
|
|
// expecting the decoding error to be nil.
|
|
c.Assert(err, nil)
|
|
// Verifying for Upload ID value to be greater than 0.
|
|
c.Assert(len(newResponse.UploadID) > 0, true)
|
|
}
|
|
|
|
// TestObjectMultipartListError - Initiates a NewMultipart upload, uploads parts and validates
|
|
// error response for an incorrect max-parts parameter .
|
|
func (s *TestSuiteCommon) TestObjectMultipartListError(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, 200)
|
|
|
|
objectName := "test-multipart-object"
|
|
// construct HTTP request to initiate a NewMultipart upload.
|
|
request, err = newTestSignedRequest("POST", getNewMultipartURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request initiating the new multipart upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// parse the response body and obtain the new upload ID.
|
|
decoder := xml.NewDecoder(response.Body)
|
|
newResponse := &InitiateMultipartUploadResponse{}
|
|
|
|
err = decoder.Decode(newResponse)
|
|
c.Assert(err, nil)
|
|
c.Assert(len(newResponse.UploadID) > 0, true)
|
|
// uploadID to be used for rest of the multipart operations on the object.
|
|
uploadID := newResponse.UploadID
|
|
|
|
// content for the part to be uploaded.
|
|
buffer1 := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request for the part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "1"),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request to upload the first part.
|
|
response1, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response1.StatusCode, http.StatusOK)
|
|
|
|
// content for the second part to be uploaded.
|
|
buffer2 := bytes.NewReader([]byte("hello world"))
|
|
// HTTP request for the second part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "2"),
|
|
int64(buffer2.Len()), buffer2, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
// execute the HTTP request to upload the second part.
|
|
response2, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response2.StatusCode, http.StatusOK)
|
|
|
|
// HTTP request to ListMultipart Uploads.
|
|
// max-keys is set to valid value of 1
|
|
request, err = newTestSignedRequest("GET", getListMultipartURLWithParams(s.endPoint, bucketName, objectName, uploadID, "1", "", ""),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response3, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response3.StatusCode, http.StatusOK)
|
|
|
|
// HTTP request to ListMultipart Uploads.
|
|
// max-keys is set to invalid value of -2.
|
|
request, err = newTestSignedRequest("GET", getListMultipartURLWithParams(s.endPoint, bucketName, objectName, uploadID, "-2", "", ""),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// execute the HTTP request.
|
|
response4, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since max-keys parameter in the ListMultipart request set to invalid value of -2,
|
|
// its expected to fail with error message "InvalidArgument".
|
|
verifyError(c, response4, "InvalidArgument", "Argument max-parts must be an integer between 0 and 2147483647", http.StatusBadRequest)
|
|
}
|
|
|
|
// TestObjectValidMD5 - First uploads an object with a valid Content-Md5 header and verifies the status,
|
|
// then upload an object in a wrong Content-Md5 and validate the error response.
|
|
func (s *TestSuiteCommon) TestObjectValidMD5(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, 200)
|
|
|
|
// Create a byte array of 5MB.
|
|
// content for the object to be uploaded.
|
|
data := bytes.Repeat([]byte("0123456789abcdef"), 5*humanize.MiByte/16)
|
|
// calculate etag of the data.
|
|
etagBase64 := getMD5HashBase64(data)
|
|
|
|
buffer1 := bytes.NewReader(data)
|
|
objectName := "test-1-object"
|
|
// HTTP request for the object to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// set the Content-Md5 to be the hash to content.
|
|
request.Header.Set("Content-Md5", etagBase64)
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expecting a successful upload.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
objectName = "test-2-object"
|
|
buffer1 = bytes.NewReader(data)
|
|
// HTTP request for the object to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPutObjectURL(s.endPoint, bucketName, objectName),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// set Content-Md5 to invalid value.
|
|
request.Header.Set("Content-Md5", "kvLTlMrX9NpYDQlEIFlnDA==")
|
|
// expecting a failure during upload.
|
|
client = http.Client{Transport: s.transport}
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// Since Content-Md5 header was wrong, expecting to fail with "SignatureDoesNotMatch" error.
|
|
verifyError(c, response, "SignatureDoesNotMatch", "The request signature we calculated does not match the signature you provided. Check your key and signing method.", http.StatusForbidden)
|
|
}
|
|
|
|
// TestObjectMultipart - Initiates a NewMultipart upload, uploads 2 parts,
|
|
// completes the multipart upload and validates the status of the operation.
|
|
func (s *TestSuiteCommon) TestObjectMultipart(c *check) {
|
|
// generate a random bucket name.
|
|
bucketName := getRandomBucketName()
|
|
// HTTP request to create the bucket.
|
|
request, err := newTestSignedRequest("PUT", getMakeBucketURL(s.endPoint, bucketName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client := http.Client{Transport: s.transport}
|
|
// execute the HTTP request to create bucket.
|
|
response, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response.StatusCode, 200)
|
|
|
|
objectName := "test-multipart-object"
|
|
// construct HTTP request to initiate a NewMultipart upload.
|
|
request, err = newTestSignedRequest("POST", getNewMultipartURL(s.endPoint, bucketName, objectName),
|
|
0, nil, s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request initiating the new multipart upload.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// expecting the response status code to be http.StatusOK(200 OK).
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
// parse the response body and obtain the new upload ID.
|
|
decoder := xml.NewDecoder(response.Body)
|
|
newResponse := &InitiateMultipartUploadResponse{}
|
|
|
|
err = decoder.Decode(newResponse)
|
|
c.Assert(err, nil)
|
|
c.Assert(len(newResponse.UploadID) > 0, true)
|
|
// uploadID to be used for rest of the multipart operations on the object.
|
|
uploadID := newResponse.UploadID
|
|
|
|
// content for the part to be uploaded.
|
|
// Create a byte array of 5MB.
|
|
data := bytes.Repeat([]byte("0123456789abcdef"), 5*humanize.MiByte/16)
|
|
// calculate etag of the data.
|
|
md5SumBase64 := getMD5HashBase64(data)
|
|
|
|
buffer1 := bytes.NewReader(data)
|
|
// HTTP request for the part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "1"),
|
|
int64(buffer1.Len()), buffer1, s.accessKey, s.secretKey, s.signer)
|
|
// set the Content-Md5 header to the base64 encoding the etag of the content.
|
|
request.Header.Set("Content-Md5", md5SumBase64)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the first part.
|
|
response1, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response1.StatusCode, http.StatusOK)
|
|
|
|
// content for the second part to be uploaded.
|
|
// Create a byte array of 1 byte.
|
|
data = []byte("0")
|
|
|
|
// calculate etag of the data.
|
|
md5SumBase64 = getMD5HashBase64(data)
|
|
|
|
buffer2 := bytes.NewReader(data)
|
|
// HTTP request for the second part to be uploaded.
|
|
request, err = newTestSignedRequest("PUT", getPartUploadURL(s.endPoint, bucketName, objectName, uploadID, "2"),
|
|
int64(buffer2.Len()), buffer2, s.accessKey, s.secretKey, s.signer)
|
|
// set the Content-Md5 header to the base64 encoding the etag of the content.
|
|
request.Header.Set("Content-Md5", md5SumBase64)
|
|
c.Assert(err, nil)
|
|
|
|
client = http.Client{Transport: s.transport}
|
|
// execute the HTTP request to upload the second part.
|
|
response2, err := client.Do(request)
|
|
c.Assert(err, nil)
|
|
c.Assert(response2.StatusCode, http.StatusOK)
|
|
|
|
// Complete multipart upload
|
|
completeUploads := &CompleteMultipartUpload{
|
|
Parts: []CompletePart{
|
|
{
|
|
PartNumber: 1,
|
|
ETag: response1.Header.Get("ETag"),
|
|
},
|
|
{
|
|
PartNumber: 2,
|
|
ETag: response2.Header.Get("ETag"),
|
|
},
|
|
},
|
|
}
|
|
|
|
completeBytes, err := xml.Marshal(completeUploads)
|
|
c.Assert(err, nil)
|
|
// Indicating that all parts are uploaded and initiating CompleteMultipartUpload.
|
|
request, err = newTestSignedRequest("POST", getCompleteMultipartUploadURL(s.endPoint, bucketName, objectName, uploadID),
|
|
int64(len(completeBytes)), bytes.NewReader(completeBytes), s.accessKey, s.secretKey, s.signer)
|
|
c.Assert(err, nil)
|
|
// Execute the complete multipart request.
|
|
response, err = client.Do(request)
|
|
c.Assert(err, nil)
|
|
// verify whether complete multipart was successful.
|
|
c.Assert(response.StatusCode, http.StatusOK)
|
|
var parts []CompletePart
|
|
for _, part := range completeUploads.Parts {
|
|
part.ETag = canonicalizeETag(part.ETag)
|
|
parts = append(parts, part)
|
|
}
|
|
etag := getCompleteMultipartMD5(parts)
|
|
c.Assert(canonicalizeETag(response.Header.Get(xhttp.ETag)), etag)
|
|
}
|