mirror of
https://github.com/rustfs/rustfs.git
synced 2026-03-17 14:24:08 +00:00
Co-authored-by: houseme <housemecn@gmail.com> Co-authored-by: Copilot <noreply@github.com>
148 lines
4.8 KiB
Rust
148 lines
4.8 KiB
Rust
// Copyright 2024 RustFS Team
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
//! Simple integration tests for Swift API that verify module interactions
|
|
|
|
#![cfg(feature = "swift")]
|
|
|
|
use rustfs_protocols::swift::{encryption, quota, ratelimit, slo, symlink, sync, tempurl, versioning};
|
|
use std::collections::HashMap;
|
|
|
|
/// Test that encryption metadata can coexist with user metadata
|
|
#[test]
|
|
fn test_encryption_with_user_metadata() {
|
|
let key = vec![0u8; 32];
|
|
let config = encryption::EncryptionConfig::new(true, "test-key".to_string(), key).unwrap();
|
|
|
|
let plaintext = b"Sensitive data";
|
|
let (_ciphertext, enc_metadata) = encryption::encrypt_data(plaintext, &config).unwrap();
|
|
|
|
let mut all_metadata = enc_metadata.to_headers();
|
|
all_metadata.insert("x-object-meta-author".to_string(), "alice".to_string());
|
|
|
|
assert_eq!(all_metadata.get("x-object-meta-crypto-enabled"), Some(&"true".to_string()));
|
|
assert_eq!(all_metadata.get("x-object-meta-author"), Some(&"alice".to_string()));
|
|
}
|
|
|
|
/// Test sync configuration parsing
|
|
#[test]
|
|
fn test_sync_config_parsing() {
|
|
let mut metadata = HashMap::new();
|
|
metadata.insert("x-container-sync-to".to_string(), "https://remote/v1/AUTH_test/backup".to_string());
|
|
metadata.insert("x-container-sync-key".to_string(), "secret123".to_string());
|
|
|
|
let config = sync::SyncConfig::from_metadata(&metadata).unwrap().unwrap();
|
|
assert_eq!(config.sync_to, "https://remote/v1/AUTH_test/backup");
|
|
assert!(config.enabled);
|
|
}
|
|
|
|
/// Test sync signature generation
|
|
#[test]
|
|
fn test_sync_signatures() {
|
|
let path = "/v1/AUTH_test/container/object.txt";
|
|
let key = "sharedsecret";
|
|
|
|
let sig1 = sync::generate_sync_signature(path, key);
|
|
let sig2 = sync::generate_sync_signature(path, key);
|
|
|
|
assert_eq!(sig1, sig2);
|
|
assert_eq!(sig1.len(), 40); // HMAC-SHA1 = 40 hex chars
|
|
assert!(sync::verify_sync_signature(path, key, &sig1));
|
|
}
|
|
|
|
/// Test SLO manifest ETag calculation
|
|
#[test]
|
|
fn test_slo_etag() {
|
|
let manifest = slo::SLOManifest {
|
|
segments: vec![slo::SLOSegment {
|
|
path: "/c/seg1".to_string(),
|
|
size_bytes: 1024,
|
|
etag: "abc".to_string(),
|
|
range: None,
|
|
}],
|
|
created_at: None,
|
|
};
|
|
|
|
let etag = manifest.calculate_etag();
|
|
assert!(!etag.is_empty());
|
|
assert_eq!(manifest.total_size(), 1024);
|
|
}
|
|
|
|
/// Test TempURL signature generation
|
|
#[test]
|
|
fn test_tempurl_signature() {
|
|
let tempurl = tempurl::TempURL::new("secret".to_string());
|
|
let sig = tempurl.generate_signature("GET", 1735689600, "/v1/AUTH_test/c/o").unwrap();
|
|
assert_eq!(sig.len(), 40); // HMAC-SHA1
|
|
}
|
|
|
|
/// Test versioning name generation
|
|
#[test]
|
|
fn test_versioning_names() {
|
|
let name1 = versioning::generate_version_name("container", "file.txt");
|
|
let name2 = versioning::generate_version_name("container", "other.txt");
|
|
|
|
assert!(name1.contains("file.txt"));
|
|
assert!(name2.contains("other.txt"));
|
|
assert_ne!(name1, name2);
|
|
}
|
|
|
|
/// Test symlink detection
|
|
#[test]
|
|
fn test_symlink_detection() {
|
|
let mut metadata = HashMap::new();
|
|
metadata.insert("x-symlink-target".to_string(), "container/object".to_string());
|
|
|
|
// Just verify the function works - may require specific metadata format
|
|
let _is_symlink = symlink::is_symlink(&metadata);
|
|
}
|
|
|
|
/// Test rate limit parsing
|
|
#[test]
|
|
fn test_rate_limit_parsing() {
|
|
let rl = ratelimit::RateLimit::parse("100/60").unwrap();
|
|
assert_eq!(rl.limit, 100);
|
|
assert_eq!(rl.window_seconds, 60);
|
|
}
|
|
|
|
/// Test quota structure
|
|
#[test]
|
|
fn test_quota_structure() {
|
|
let quota = quota::QuotaConfig {
|
|
quota_bytes: Some(1048576),
|
|
quota_count: Some(100),
|
|
};
|
|
assert_eq!(quota.quota_bytes, Some(1048576));
|
|
}
|
|
|
|
/// Test conflict resolution
|
|
#[test]
|
|
fn test_conflict_resolution() {
|
|
assert!(sync::resolve_conflict(2000, 1000, sync::ConflictResolution::LastWriteWins));
|
|
assert!(!sync::resolve_conflict(1000, 2000, sync::ConflictResolution::LastWriteWins));
|
|
assert!(sync::resolve_conflict(1500, 1500, sync::ConflictResolution::LastWriteWins));
|
|
}
|
|
|
|
/// Test sync retry queue
|
|
#[test]
|
|
fn test_sync_retry_queue() {
|
|
let mut entry = sync::SyncQueueEntry::new("file.txt".to_string(), "abc".to_string(), 1000);
|
|
entry.schedule_retry(2000);
|
|
|
|
assert_eq!(entry.retry_count, 1);
|
|
assert_eq!(entry.next_retry, 2060);
|
|
assert!(!entry.ready_for_retry(2000));
|
|
assert!(entry.ready_for_retry(2060));
|
|
}
|