Files
rustfs/crates/protocols/tests/swift_simple_integration.rs
Senol Colak b07383760f Add OpenStack Swift API Support (#2066)
Co-authored-by: houseme <housemecn@gmail.com>
Co-authored-by: Copilot <noreply@github.com>
2026-03-08 01:11:35 +08:00

148 lines
4.8 KiB
Rust

// Copyright 2024 RustFS Team
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//! Simple integration tests for Swift API that verify module interactions
#![cfg(feature = "swift")]
use rustfs_protocols::swift::{encryption, quota, ratelimit, slo, symlink, sync, tempurl, versioning};
use std::collections::HashMap;
/// Test that encryption metadata can coexist with user metadata
#[test]
fn test_encryption_with_user_metadata() {
let key = vec![0u8; 32];
let config = encryption::EncryptionConfig::new(true, "test-key".to_string(), key).unwrap();
let plaintext = b"Sensitive data";
let (_ciphertext, enc_metadata) = encryption::encrypt_data(plaintext, &config).unwrap();
let mut all_metadata = enc_metadata.to_headers();
all_metadata.insert("x-object-meta-author".to_string(), "alice".to_string());
assert_eq!(all_metadata.get("x-object-meta-crypto-enabled"), Some(&"true".to_string()));
assert_eq!(all_metadata.get("x-object-meta-author"), Some(&"alice".to_string()));
}
/// Test sync configuration parsing
#[test]
fn test_sync_config_parsing() {
let mut metadata = HashMap::new();
metadata.insert("x-container-sync-to".to_string(), "https://remote/v1/AUTH_test/backup".to_string());
metadata.insert("x-container-sync-key".to_string(), "secret123".to_string());
let config = sync::SyncConfig::from_metadata(&metadata).unwrap().unwrap();
assert_eq!(config.sync_to, "https://remote/v1/AUTH_test/backup");
assert!(config.enabled);
}
/// Test sync signature generation
#[test]
fn test_sync_signatures() {
let path = "/v1/AUTH_test/container/object.txt";
let key = "sharedsecret";
let sig1 = sync::generate_sync_signature(path, key);
let sig2 = sync::generate_sync_signature(path, key);
assert_eq!(sig1, sig2);
assert_eq!(sig1.len(), 40); // HMAC-SHA1 = 40 hex chars
assert!(sync::verify_sync_signature(path, key, &sig1));
}
/// Test SLO manifest ETag calculation
#[test]
fn test_slo_etag() {
let manifest = slo::SLOManifest {
segments: vec![slo::SLOSegment {
path: "/c/seg1".to_string(),
size_bytes: 1024,
etag: "abc".to_string(),
range: None,
}],
created_at: None,
};
let etag = manifest.calculate_etag();
assert!(!etag.is_empty());
assert_eq!(manifest.total_size(), 1024);
}
/// Test TempURL signature generation
#[test]
fn test_tempurl_signature() {
let tempurl = tempurl::TempURL::new("secret".to_string());
let sig = tempurl.generate_signature("GET", 1735689600, "/v1/AUTH_test/c/o").unwrap();
assert_eq!(sig.len(), 40); // HMAC-SHA1
}
/// Test versioning name generation
#[test]
fn test_versioning_names() {
let name1 = versioning::generate_version_name("container", "file.txt");
let name2 = versioning::generate_version_name("container", "other.txt");
assert!(name1.contains("file.txt"));
assert!(name2.contains("other.txt"));
assert_ne!(name1, name2);
}
/// Test symlink detection
#[test]
fn test_symlink_detection() {
let mut metadata = HashMap::new();
metadata.insert("x-symlink-target".to_string(), "container/object".to_string());
// Just verify the function works - may require specific metadata format
let _is_symlink = symlink::is_symlink(&metadata);
}
/// Test rate limit parsing
#[test]
fn test_rate_limit_parsing() {
let rl = ratelimit::RateLimit::parse("100/60").unwrap();
assert_eq!(rl.limit, 100);
assert_eq!(rl.window_seconds, 60);
}
/// Test quota structure
#[test]
fn test_quota_structure() {
let quota = quota::QuotaConfig {
quota_bytes: Some(1048576),
quota_count: Some(100),
};
assert_eq!(quota.quota_bytes, Some(1048576));
}
/// Test conflict resolution
#[test]
fn test_conflict_resolution() {
assert!(sync::resolve_conflict(2000, 1000, sync::ConflictResolution::LastWriteWins));
assert!(!sync::resolve_conflict(1000, 2000, sync::ConflictResolution::LastWriteWins));
assert!(sync::resolve_conflict(1500, 1500, sync::ConflictResolution::LastWriteWins));
}
/// Test sync retry queue
#[test]
fn test_sync_retry_queue() {
let mut entry = sync::SyncQueueEntry::new("file.txt".to_string(), "abc".to_string(), 1000);
entry.schedule_retry(2000);
assert_eq!(entry.retry_count, 1);
assert_eq!(entry.next_retry, 2060);
assert!(!entry.ready_for_retry(2000));
assert!(entry.ready_for_retry(2060));
}