aboutsummaryrefslogblamecommitdiff
path: root/src/garage/tests/bucket.rs
blob: 0dec3cfa89ca2dc3cb829866238d9e6f903fc3c5 (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
                  
                                   
                                                
 




                                    


                                                                   
                                                               










                                                                                       
                                                               

                                                                                       













                                                                                           


                                 
                               
                                                              
                                                                       










































                                                                                                        
                          

                                 
                               
                                                              
                                                                       
         
use crate::common;
use crate::common::ext::CommandExt;
use aws_sdk_s3::model::BucketLocationConstraint;
use aws_sdk_s3::output::DeleteBucketOutput;

#[tokio::test]
async fn test_bucket_all() {
	let ctx = common::context();
	let bucket_name = "hello";

	{
		// Check bucket cannot be created if not authorized
		ctx.garage
			.command()
			.args(["key", "deny"])
			.args(["--create-bucket", &ctx.key.id])
			.quiet()
			.expect_success_output("Could not deny key to create buckets");

		// Try create bucket, should fail
		let r = ctx.client.create_bucket().bucket(bucket_name).send().await;
		assert!(r.is_err());
	}
	{
		// Now allow key to create bucket
		ctx.garage
			.command()
			.args(["key", "allow"])
			.args(["--create-bucket", &ctx.key.id])
			.quiet()
			.expect_success_output("Could not deny key to create buckets");

		// Create bucket
		//@TODO check with an invalid bucket name + with an already existing bucket
		let r = ctx
			.client
			.create_bucket()
			.bucket(bucket_name)
			.send()
			.await
			.unwrap();

		assert_eq!(r.location.unwrap(), "/hello");
	}
	{
		// List buckets
		let r = ctx.client.list_buckets().send().await.unwrap();
		assert!(r
			.buckets
			.as_ref()
			.unwrap()
			.iter()
			.filter(|x| x.name.as_ref().is_some())
			.any(|x| x.name.as_ref().unwrap() == "hello"));
	}
	{
		// Get its location
		let r = ctx
			.client
			.get_bucket_location()
			.bucket(bucket_name)
			.send()
			.await
			.unwrap();

		match r.location_constraint.unwrap() {
			BucketLocationConstraint::Unknown(v) if v.as_str() == "garage-integ-test" => (),
			_ => unreachable!("wrong region"),
		}
	}
	{
		// (Stub) check GetVersioning
		let r = ctx
			.client
			.get_bucket_versioning()
			.bucket(bucket_name)
			.send()
			.await
			.unwrap();

		assert!(r.status.is_none());
	}
	{
		// Delete bucket
		// @TODO add a check with a non-empty bucket and check failure
		let r = ctx
			.client
			.delete_bucket()
			.bucket(bucket_name)
			.send()
			.await
			.unwrap();

		assert_eq!(r, DeleteBucketOutput::builder().build());
	}
	{
		// Check bucket is deleted with List buckets
		let r = ctx.client.list_buckets().send().await.unwrap();
		assert!(!r
			.buckets
			.as_ref()
			.unwrap()
			.iter()
			.filter(|x| x.name.as_ref().is_some())
			.any(|x| x.name.as_ref().unwrap() == "hello"));
	}
}