155 lines
4.4 KiB
Go
155 lines
4.4 KiB
Go
package objectstore_test
|
|
|
|
import (
|
|
"context"
|
|
"io"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"gitlab.com/gitlab-org/gitlab-workhorse/internal/objectstore"
|
|
"gitlab.com/gitlab-org/gitlab-workhorse/internal/objectstore/test"
|
|
)
|
|
|
|
const testTimeout = 10 * time.Second
|
|
|
|
type osFactory func() (*test.ObjectstoreStub, *httptest.Server)
|
|
|
|
func testObjectUploadNoErrors(t *testing.T, startObjectStore osFactory, useDeleteURL bool, contentType string) {
|
|
osStub, ts := startObjectStore()
|
|
defer ts.Close()
|
|
|
|
objectURL := ts.URL + test.ObjectPath
|
|
var deleteURL string
|
|
if useDeleteURL {
|
|
deleteURL = objectURL
|
|
}
|
|
|
|
putHeaders := map[string]string{"Content-Type": contentType}
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
deadline := time.Now().Add(testTimeout)
|
|
object, err := objectstore.NewObject(objectURL, deleteURL, putHeaders, test.ObjectSize)
|
|
require.NoError(t, err)
|
|
|
|
// copy data
|
|
n, err := object.Consume(ctx, strings.NewReader(test.ObjectContent), deadline)
|
|
require.NoError(t, err)
|
|
require.Equal(t, test.ObjectSize, n, "Uploaded file mismatch")
|
|
|
|
require.Equal(t, contentType, osStub.GetHeader(test.ObjectPath, "Content-Type"))
|
|
|
|
// Checking MD5 extraction
|
|
require.Equal(t, osStub.GetObjectMD5(test.ObjectPath), object.ETag())
|
|
|
|
// Checking cleanup
|
|
cancel()
|
|
require.Equal(t, 1, osStub.PutsCnt(), "Object hasn't been uploaded")
|
|
|
|
var expectedDeleteCnt int
|
|
if useDeleteURL {
|
|
expectedDeleteCnt = 1
|
|
}
|
|
// Poll because the object removal is async
|
|
for i := 0; i < 100; i++ {
|
|
if osStub.DeletesCnt() == expectedDeleteCnt {
|
|
break
|
|
}
|
|
time.Sleep(10 * time.Millisecond)
|
|
}
|
|
|
|
if useDeleteURL {
|
|
require.Equal(t, 1, osStub.DeletesCnt(), "Object hasn't been deleted")
|
|
} else {
|
|
require.Equal(t, 0, osStub.DeletesCnt(), "Object has been deleted")
|
|
}
|
|
}
|
|
|
|
func TestObjectUpload(t *testing.T) {
|
|
t.Run("with delete URL", func(t *testing.T) {
|
|
testObjectUploadNoErrors(t, test.StartObjectStore, true, "application/octet-stream")
|
|
})
|
|
t.Run("without delete URL", func(t *testing.T) {
|
|
testObjectUploadNoErrors(t, test.StartObjectStore, false, "application/octet-stream")
|
|
})
|
|
t.Run("with custom content type", func(t *testing.T) {
|
|
testObjectUploadNoErrors(t, test.StartObjectStore, false, "image/jpeg")
|
|
})
|
|
t.Run("with upcase ETAG", func(t *testing.T) {
|
|
factory := func() (*test.ObjectstoreStub, *httptest.Server) {
|
|
md5s := map[string]string{
|
|
test.ObjectPath: strings.ToUpper(test.ObjectMD5),
|
|
}
|
|
|
|
return test.StartObjectStoreWithCustomMD5(md5s)
|
|
}
|
|
|
|
testObjectUploadNoErrors(t, factory, false, "application/octet-stream")
|
|
})
|
|
}
|
|
|
|
func TestObjectUpload404(t *testing.T) {
|
|
ts := httptest.NewServer(http.NotFoundHandler())
|
|
defer ts.Close()
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
deadline := time.Now().Add(testTimeout)
|
|
objectURL := ts.URL + test.ObjectPath
|
|
object, err := objectstore.NewObject(objectURL, "", map[string]string{}, test.ObjectSize)
|
|
require.NoError(t, err)
|
|
_, err = object.Consume(ctx, strings.NewReader(test.ObjectContent), deadline)
|
|
|
|
require.Error(t, err)
|
|
_, isStatusCodeError := err.(objectstore.StatusCodeError)
|
|
require.True(t, isStatusCodeError, "Should fail with StatusCodeError")
|
|
require.Contains(t, err.Error(), "404")
|
|
}
|
|
|
|
type endlessReader struct{}
|
|
|
|
func (e *endlessReader) Read(p []byte) (n int, err error) {
|
|
for i := 0; i < len(p); i++ {
|
|
p[i] = '*'
|
|
}
|
|
|
|
return len(p), nil
|
|
}
|
|
|
|
// TestObjectUploadBrokenConnection purpose is to ensure that errors caused by the upload destination get propagated back correctly.
|
|
// This is important for troubleshooting in production.
|
|
func TestObjectUploadBrokenConnection(t *testing.T) {
|
|
// This test server closes connection immediately
|
|
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
hj, ok := w.(http.Hijacker)
|
|
if !ok {
|
|
require.FailNow(t, "webserver doesn't support hijacking")
|
|
}
|
|
conn, _, err := hj.Hijack()
|
|
if err != nil {
|
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
|
return
|
|
}
|
|
conn.Close()
|
|
}))
|
|
defer ts.Close()
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
deadline := time.Now().Add(testTimeout)
|
|
objectURL := ts.URL + test.ObjectPath
|
|
object, err := objectstore.NewObject(objectURL, "", map[string]string{}, -1)
|
|
require.NoError(t, err)
|
|
|
|
_, copyErr := object.Consume(ctx, &endlessReader{}, deadline)
|
|
require.Error(t, copyErr)
|
|
require.NotEqual(t, io.ErrClosedPipe, copyErr, "We are shadowing the real error")
|
|
}
|