mperham-right_aws 1.10.1
Sign up to get free protection for your applications and to get access to all the features.
- data/History.txt +249 -0
- data/Manifest.txt +34 -0
- data/README.txt +166 -0
- data/Rakefile +112 -0
- data/lib/acf/right_acf_interface.rb +379 -0
- data/lib/awsbase/benchmark_fix.rb +39 -0
- data/lib/awsbase/right_awsbase.rb +810 -0
- data/lib/awsbase/support.rb +111 -0
- data/lib/ec2/right_ec2.rb +1737 -0
- data/lib/right_aws.rb +69 -0
- data/lib/s3/right_s3.rb +1094 -0
- data/lib/s3/right_s3_interface.rb +1175 -0
- data/lib/sdb/active_sdb.rb +930 -0
- data/lib/sdb/right_sdb_interface.rb +698 -0
- data/lib/sqs/right_sqs.rb +388 -0
- data/lib/sqs/right_sqs_gen2.rb +286 -0
- data/lib/sqs/right_sqs_gen2_interface.rb +444 -0
- data/lib/sqs/right_sqs_interface.rb +596 -0
- data/test/acf/test_helper.rb +2 -0
- data/test/acf/test_right_acf.rb +146 -0
- data/test/ec2/test_helper.rb +2 -0
- data/test/ec2/test_right_ec2.rb +108 -0
- data/test/http_connection.rb +87 -0
- data/test/s3/test_helper.rb +2 -0
- data/test/s3/test_right_s3.rb +419 -0
- data/test/s3/test_right_s3_stubbed.rb +95 -0
- data/test/sdb/test_active_sdb.rb +299 -0
- data/test/sdb/test_helper.rb +3 -0
- data/test/sdb/test_right_sdb.rb +247 -0
- data/test/sqs/test_helper.rb +2 -0
- data/test/sqs/test_right_sqs.rb +291 -0
- data/test/sqs/test_right_sqs_gen2.rb +209 -0
- data/test/test_credentials.rb +37 -0
- data/test/ts_right_aws.rb +14 -0
- metadata +98 -0
@@ -0,0 +1,146 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/test_helper.rb'
|
2
|
+
|
3
|
+
class TestAcf < Test::Unit::TestCase
|
4
|
+
|
5
|
+
RIGHT_OBJECT_TEXT = 'Right test message'
|
6
|
+
|
7
|
+
STDOUT.sync = true
|
8
|
+
|
9
|
+
def setup
|
10
|
+
@acf= Rightscale::AcfInterface.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key)
|
11
|
+
@s3 = Rightscale::S3.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key)
|
12
|
+
@bucket_name = "right-acf-awesome-test-bucket-0001"
|
13
|
+
@bucket_domain = "#{@bucket_name}.s3.amazonaws.com"
|
14
|
+
end
|
15
|
+
|
16
|
+
def test_01_list_distributions_part1
|
17
|
+
distributions = nil
|
18
|
+
assert_nothing_raised(Rightscale::AwsError) do
|
19
|
+
distributions = @acf.list_distributions
|
20
|
+
end
|
21
|
+
assert distributions.is_a?(Array)
|
22
|
+
end
|
23
|
+
|
24
|
+
def test_02_try_to_create_for_bad_bucket
|
25
|
+
# a bucket does not exist
|
26
|
+
assert_raise(Rightscale::AwsError) do
|
27
|
+
@acf.create_distribution("right-cloudfront-awesome-test-bucket-not-exist", "Mustn't to be born", true)
|
28
|
+
end
|
29
|
+
# a bucket is not a domain naming complied guy
|
30
|
+
bucket_name = 'right_cloudfront_awesome_test_bucket_BAD'
|
31
|
+
@s3.bucket(bucket_name, :create)
|
32
|
+
assert_raise(Rightscale::AwsError) do
|
33
|
+
@acf.create_distribution(bucket_name, "Mustn't to be born", true)
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
def test_03_create
|
38
|
+
comment = 'WooHoo!!!'
|
39
|
+
# create a test bucket
|
40
|
+
@s3.bucket(@bucket_name, :create)
|
41
|
+
# create a distribution
|
42
|
+
distribution = @acf.create_distribution(@bucket_domain, comment, true)
|
43
|
+
assert_equal comment, distribution[:comment]
|
44
|
+
assert distribution[:cnames].size == 0
|
45
|
+
assert distribution[:enabled]
|
46
|
+
end
|
47
|
+
|
48
|
+
def test_04_list_distributions_part2
|
49
|
+
distributions = @acf.list_distributions
|
50
|
+
assert distributions.size > 0
|
51
|
+
end
|
52
|
+
|
53
|
+
def get_test_distribution
|
54
|
+
@acf.list_distributions.select{ |d| d[:origin] == @bucket_domain }.first
|
55
|
+
end
|
56
|
+
|
57
|
+
def test_05_get_distribution
|
58
|
+
old = get_test_distribution
|
59
|
+
assert_nothing_raised do
|
60
|
+
@acf.get_distribution(old[:aws_id])
|
61
|
+
end
|
62
|
+
end
|
63
|
+
|
64
|
+
def test_06_get_and_set_config
|
65
|
+
config = nil
|
66
|
+
old = get_test_distribution
|
67
|
+
assert_nothing_raised do
|
68
|
+
config = @acf.get_distribution_config(old[:aws_id])
|
69
|
+
end
|
70
|
+
# change a config
|
71
|
+
config[:enabled] = false
|
72
|
+
config[:cnames] << 'x1.myawesomesite.com'
|
73
|
+
config[:cnames] << 'x2.myawesomesite.com'
|
74
|
+
# set config
|
75
|
+
set_config_result = nil
|
76
|
+
assert_nothing_raised do
|
77
|
+
set_config_result = @acf.set_distribution_config(old[:aws_id], config)
|
78
|
+
end
|
79
|
+
assert set_config_result
|
80
|
+
# reget the config and check
|
81
|
+
new_config = nil
|
82
|
+
assert_nothing_raised do
|
83
|
+
new_config = @acf.get_distribution_config(old[:aws_id])
|
84
|
+
end
|
85
|
+
assert !new_config[:enabled]
|
86
|
+
assert_equal new_config[:cnames].sort, ['x1.myawesomesite.com', 'x2.myawesomesite.com']
|
87
|
+
assert_not_equal config[:e_tag], new_config[:e_tag]
|
88
|
+
|
89
|
+
# try to update the old config again (must fail because ETAG has changed)
|
90
|
+
assert_raise(Rightscale::AwsError) do
|
91
|
+
@acf.set_distribution_config(old[:aws_id], config)
|
92
|
+
end
|
93
|
+
end
|
94
|
+
|
95
|
+
def test_07_caching
|
96
|
+
# enable caching
|
97
|
+
@acf.params[:cache] = true
|
98
|
+
# list distributions
|
99
|
+
@acf.list_distributions
|
100
|
+
# list the distributions again - cache should hit
|
101
|
+
assert_raise(Rightscale::AwsNoChange) do
|
102
|
+
@acf.list_distributions
|
103
|
+
end
|
104
|
+
# disable caching
|
105
|
+
@acf.params[:cache] = true
|
106
|
+
end
|
107
|
+
|
108
|
+
def test_08_delete_distribution
|
109
|
+
# we need ETAG so use get_distribution
|
110
|
+
distribution = @acf.get_distribution(get_test_distribution[:aws_id])
|
111
|
+
# try to delete a distribution
|
112
|
+
# should fail because
|
113
|
+
if distribution[:status] == 'InProgress'
|
114
|
+
# should fail because the distribution is not deployed yet
|
115
|
+
assert_raise(Rightscale::AwsError) do
|
116
|
+
@acf.delete_distribution(distribution[:aws_id], distribution[:e_tag])
|
117
|
+
end
|
118
|
+
# wait for a deployed state
|
119
|
+
print "waiting up to 5 min while the distribution is being deployed: "
|
120
|
+
100.times do
|
121
|
+
print '.'
|
122
|
+
distribution = @acf.get_distribution(distribution[:aws_id])
|
123
|
+
if distribution[:status] == 'Deployed'
|
124
|
+
print ' done'
|
125
|
+
break
|
126
|
+
end
|
127
|
+
sleep 3
|
128
|
+
end
|
129
|
+
puts
|
130
|
+
end
|
131
|
+
|
132
|
+
# only disabled and deployed distribution can be deleted
|
133
|
+
assert_equal 'Deployed', distribution[:status]
|
134
|
+
assert !distribution[:enabled]
|
135
|
+
|
136
|
+
# delete the distribution
|
137
|
+
assert_nothing_raised do
|
138
|
+
@acf.delete_distribution(distribution[:aws_id], distribution[:e_tag])
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
def test_09_drop_bucket
|
143
|
+
assert @s3.bucket(@bucket_name).delete
|
144
|
+
end
|
145
|
+
|
146
|
+
end
|
@@ -0,0 +1,108 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/test_helper.rb'
|
2
|
+
require 'pp'
|
3
|
+
|
4
|
+
class TestEc2 < Test::Unit::TestCase
|
5
|
+
|
6
|
+
# Some of RightEc2 instance methods concerning instance launching and image registration
|
7
|
+
# are not tested here due to their potentially risk.
|
8
|
+
|
9
|
+
def setup
|
10
|
+
@ec2 = Rightscale::Ec2.new(TestCredentials.aws_access_key_id,
|
11
|
+
TestCredentials.aws_secret_access_key)
|
12
|
+
@key = 'right_ec2_awesome_test_key'
|
13
|
+
@group = 'right_ec2_awesome_test_security_group'
|
14
|
+
end
|
15
|
+
|
16
|
+
def test_01_create_describe_key_pairs
|
17
|
+
new_key = @ec2.create_key_pair(@key)
|
18
|
+
assert new_key[:aws_material][/BEGIN RSA PRIVATE KEY/], "New key material is absent"
|
19
|
+
keys = @ec2.describe_key_pairs
|
20
|
+
assert keys.map{|key| key[:aws_key_name] }.include?(@key), "#{@key} must exist"
|
21
|
+
end
|
22
|
+
|
23
|
+
def test_02_create_security_group
|
24
|
+
assert @ec2.create_security_group(@group,'My awesone test group'), 'Create_security_group fail'
|
25
|
+
group = @ec2.describe_security_groups([@group])[0]
|
26
|
+
assert_equal @group, group[:aws_group_name], 'Group must be created but does not exist'
|
27
|
+
end
|
28
|
+
|
29
|
+
def test_03_perms_add
|
30
|
+
assert @ec2.authorize_security_group_named_ingress(@group, TestCredentials.account_number, 'default')
|
31
|
+
assert @ec2.authorize_security_group_IP_ingress(@group, 80,80,'udp','192.168.1.0/8')
|
32
|
+
end
|
33
|
+
|
34
|
+
def test_04_check_new_perms_exist
|
35
|
+
assert_equal 2, @ec2.describe_security_groups([@group])[0][:aws_perms].size
|
36
|
+
end
|
37
|
+
|
38
|
+
def test_05_perms_remove
|
39
|
+
assert @ec2.revoke_security_group_IP_ingress(@group, 80,80,'udp','192.168.1.0/8')
|
40
|
+
assert @ec2.revoke_security_group_named_ingress(@group,
|
41
|
+
TestCredentials.account_number, 'default')
|
42
|
+
end
|
43
|
+
|
44
|
+
def test_06_describe_images
|
45
|
+
images = @ec2.describe_images
|
46
|
+
assert images.size>0, 'Amazon must have at least some public images'
|
47
|
+
# unknown image
|
48
|
+
assert_raise(Rightscale::AwsError){ @ec2.describe_images(['ami-ABCDEFGH'])}
|
49
|
+
end
|
50
|
+
|
51
|
+
def test_07_describe_instanses
|
52
|
+
assert @ec2.describe_instances
|
53
|
+
# unknown image
|
54
|
+
assert_raise(Rightscale::AwsError){ @ec2.describe_instances(['i-ABCDEFGH'])}
|
55
|
+
end
|
56
|
+
|
57
|
+
def test_08_delete_security_group
|
58
|
+
assert @ec2.delete_security_group(@group), 'Delete_security_group fail'
|
59
|
+
end
|
60
|
+
|
61
|
+
def test_09_delete_key_pair
|
62
|
+
assert @ec2.delete_key_pair(@key), 'Delete_key_pair fail'
|
63
|
+
## Hmmm... Amazon does not through the exception any more. It now just returns a 'true' if the key does not exist any more...
|
64
|
+
## # key must be deleted already
|
65
|
+
## assert_raise(Rightscale::AwsError) { @ec2.delete_key_pair(@key) }
|
66
|
+
end
|
67
|
+
|
68
|
+
def test_10_signature_version_0
|
69
|
+
ec2 = Rightscale::Ec2.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key, :signature_version => '0')
|
70
|
+
images = ec2.describe_images
|
71
|
+
assert images.size>0, 'Amazon must have at least some public images'
|
72
|
+
# check that the request has correct signature version
|
73
|
+
assert ec2.last_request.path.include?('SignatureVersion=0')
|
74
|
+
end
|
75
|
+
|
76
|
+
def test_11_regions
|
77
|
+
regions = nil
|
78
|
+
assert_nothing_raised do
|
79
|
+
regions = @ec2.describe_regions
|
80
|
+
end
|
81
|
+
# check we got more that 0 regions
|
82
|
+
assert regions.size > 0
|
83
|
+
# check an access to regions
|
84
|
+
regions.each do |region|
|
85
|
+
regional_ec2 = Rightscale::Ec2.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key, :region => region)
|
86
|
+
# do we have a correct endpoint server?
|
87
|
+
assert_equal "#{region}.ec2.amazonaws.com", regional_ec2.params[:server]
|
88
|
+
# get a list of images from every region
|
89
|
+
images = nil
|
90
|
+
assert_nothing_raised do
|
91
|
+
images = regional_ec2.describe_regions
|
92
|
+
end
|
93
|
+
# every region must have images
|
94
|
+
assert images.size > 0
|
95
|
+
end
|
96
|
+
end
|
97
|
+
|
98
|
+
def test_12_endpoint_url
|
99
|
+
ec2 = Rightscale::Ec2.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key, :endpoint_url => 'a://b.c:0/d/', :region => 'z')
|
100
|
+
# :endpoint_url has a priority hence :region should be ommitted
|
101
|
+
assert_equal 'a', ec2.params[:protocol]
|
102
|
+
assert_equal 'b.c', ec2.params[:server]
|
103
|
+
assert_equal '/d/', ec2.params[:service]
|
104
|
+
assert_equal 0, ec2.params[:port]
|
105
|
+
assert_nil ec2.params[:region]
|
106
|
+
end
|
107
|
+
|
108
|
+
end
|
@@ -0,0 +1,87 @@
|
|
1
|
+
=begin
|
2
|
+
Copyright (c) 2007 RightScale, Inc.
|
3
|
+
|
4
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
5
|
+
a copy of this software and associated documentation files (the
|
6
|
+
'Software'), to deal in the Software without restriction, including
|
7
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
8
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
9
|
+
permit persons to whom the Software is furnished to do so, subject to
|
10
|
+
the following conditions:
|
11
|
+
|
12
|
+
The above copyright notice and this permission notice shall be
|
13
|
+
included in all copies or substantial portions of the Software.
|
14
|
+
|
15
|
+
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND,
|
16
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
17
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
18
|
+
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
19
|
+
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
20
|
+
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
21
|
+
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
22
|
+
=end
|
23
|
+
|
24
|
+
# Stub extension/redefinition of RightHttpConnection for testing purposes.
|
25
|
+
require 'net/http'
|
26
|
+
require 'rubygems'
|
27
|
+
require 'right_http_connection'
|
28
|
+
|
29
|
+
module Net
|
30
|
+
class HTTPResponse
|
31
|
+
alias_method :real_body, :body
|
32
|
+
def setmsg(msg)
|
33
|
+
@mymsg = msg
|
34
|
+
end
|
35
|
+
|
36
|
+
def body
|
37
|
+
# defined?() helps us to get rid of a bunch of 'warnings'
|
38
|
+
(defined?(@mymsg) && @mymsg) ? @mymsg : real_body
|
39
|
+
end
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
module Rightscale
|
44
|
+
|
45
|
+
class HttpConnection
|
46
|
+
@@response_stack = []
|
47
|
+
|
48
|
+
alias_method :real_request, :request
|
49
|
+
|
50
|
+
def request(request_params, &block)
|
51
|
+
if(@@response_stack.length == 0)
|
52
|
+
return real_request(request_params, &block)
|
53
|
+
end
|
54
|
+
|
55
|
+
if(block)
|
56
|
+
# Do something special
|
57
|
+
else
|
58
|
+
next_response = HttpConnection::pop()
|
59
|
+
classname = Net::HTTPResponse::CODE_TO_OBJ["#{next_response[:code]}"]
|
60
|
+
response = classname.new("1.1", next_response[:code], next_response[:msg])
|
61
|
+
if(next_response[:msg])
|
62
|
+
response.setmsg(next_response[:msg])
|
63
|
+
end
|
64
|
+
response
|
65
|
+
end
|
66
|
+
end
|
67
|
+
|
68
|
+
def self.reset
|
69
|
+
@@response_stack = []
|
70
|
+
end
|
71
|
+
|
72
|
+
def self.push(code, msg=nil)
|
73
|
+
response = {:code => code, :msg => msg}
|
74
|
+
@@response_stack << response
|
75
|
+
end
|
76
|
+
|
77
|
+
def self.pop
|
78
|
+
@@response_stack.pop
|
79
|
+
end
|
80
|
+
|
81
|
+
def self.length
|
82
|
+
@@response_stack.length
|
83
|
+
end
|
84
|
+
|
85
|
+
end
|
86
|
+
|
87
|
+
end
|
@@ -0,0 +1,419 @@
|
|
1
|
+
require File.dirname(__FILE__) + '/test_helper.rb'
|
2
|
+
|
3
|
+
class TestS3 < Test::Unit::TestCase
|
4
|
+
|
5
|
+
RIGHT_OBJECT_TEXT = 'Right test message'
|
6
|
+
|
7
|
+
def setup
|
8
|
+
@s3 = Rightscale::S3Interface.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key)
|
9
|
+
@bucket = 'right_s3_awesome_test_bucket_000A1'
|
10
|
+
@bucket2 = 'right_s3_awesome_test_bucket_000A2'
|
11
|
+
@key1 = 'test/woohoo1/'
|
12
|
+
@key2 = 'test1/key/woohoo2'
|
13
|
+
@key3 = 'test2/A%B@C_D&E?F+G=H"I'
|
14
|
+
@key1_copy = 'test/woohoo1_2'
|
15
|
+
@key1_new_name = 'test/woohoo1_3'
|
16
|
+
@key2_new_name = 'test1/key/woohoo2_new'
|
17
|
+
@s = Rightscale::S3.new(TestCredentials.aws_access_key_id, TestCredentials.aws_secret_access_key)
|
18
|
+
end
|
19
|
+
|
20
|
+
#---------------------------
|
21
|
+
# Rightscale::S3Interface
|
22
|
+
#---------------------------
|
23
|
+
|
24
|
+
def test_01_create_bucket
|
25
|
+
assert @s3.create_bucket(@bucket), 'Create_bucket fail'
|
26
|
+
end
|
27
|
+
|
28
|
+
def test_02_list_all_my_buckets
|
29
|
+
assert @s3.list_all_my_buckets.map{|bucket| bucket[:name]}.include?(@bucket), "#{@bucket} must exist in bucket list"
|
30
|
+
end
|
31
|
+
|
32
|
+
def test_03_list_empty_bucket
|
33
|
+
assert_equal 0, @s3.list_bucket(@bucket).size, "#{@bucket} isn't empty, arrgh!"
|
34
|
+
end
|
35
|
+
|
36
|
+
def test_04_put
|
37
|
+
assert @s3.put(@bucket, @key1, RIGHT_OBJECT_TEXT, 'x-amz-meta-family'=>'Woohoo1!'), 'Put bucket fail'
|
38
|
+
assert @s3.put(@bucket, @key2, RIGHT_OBJECT_TEXT, 'x-amz-meta-family'=>'Woohoo2!'), 'Put bucket fail'
|
39
|
+
assert @s3.put(@bucket, @key3, RIGHT_OBJECT_TEXT, 'x-amz-meta-family'=>'Woohoo3!'), 'Put bucket fail'
|
40
|
+
end
|
41
|
+
|
42
|
+
def test_05_get_and_get_object
|
43
|
+
assert_raise(Rightscale::AwsError) { @s3.get(@bucket, 'undefined/key') }
|
44
|
+
data1 = @s3.get(@bucket, @key1)
|
45
|
+
assert_equal RIGHT_OBJECT_TEXT, data1[:object], "Object text must be equal to '#{RIGHT_OBJECT_TEXT}'"
|
46
|
+
assert_equal RIGHT_OBJECT_TEXT, @s3.get_object(@bucket, @key1), "Get_object text must return '#{RIGHT_OBJECT_TEXT}'"
|
47
|
+
assert_equal 'Woohoo1!', data1[:headers]['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo1!'"
|
48
|
+
assert_equal RIGHT_OBJECT_TEXT, @s3.get_object(@bucket, @key3), "Get_object text must return '#{RIGHT_OBJECT_TEXT}'"
|
49
|
+
end
|
50
|
+
|
51
|
+
def test_06_head
|
52
|
+
assert_equal 'Woohoo1!', @s3.head(@bucket,@key1)['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo1!'"
|
53
|
+
end
|
54
|
+
|
55
|
+
|
56
|
+
def test_07_streaming_get
|
57
|
+
resp = String.new
|
58
|
+
assert_raise(Rightscale::AwsError) do
|
59
|
+
@s3.get(@bucket, 'undefined/key') do |chunk|
|
60
|
+
resp += chunk
|
61
|
+
end
|
62
|
+
end
|
63
|
+
|
64
|
+
resp = String.new
|
65
|
+
data1 = @s3.get(@bucket, @key1) do |chunk|
|
66
|
+
resp += chunk
|
67
|
+
end
|
68
|
+
assert_equal RIGHT_OBJECT_TEXT, resp, "Object text must be equal to '#{RIGHT_OBJECT_TEXT}'"
|
69
|
+
assert_equal @s3.get_object(@bucket, @key1), resp, "Streaming iface must return same as non-streaming"
|
70
|
+
assert_equal 'Woohoo1!', data1[:headers]['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo1!'"
|
71
|
+
end
|
72
|
+
|
73
|
+
def test_08_keys
|
74
|
+
keys = @s3.list_bucket(@bucket).map{|b| b[:key]}
|
75
|
+
assert_equal keys.size, 3, "There should be 3 keys"
|
76
|
+
assert(keys.include?(@key1))
|
77
|
+
assert(keys.include?(@key2))
|
78
|
+
assert(keys.include?(@key3))
|
79
|
+
end
|
80
|
+
|
81
|
+
def test_09_copy_key
|
82
|
+
#--- test COPY
|
83
|
+
# copy a key
|
84
|
+
assert @s3.copy(@bucket, @key1, @bucket, @key1_copy)
|
85
|
+
# check it was copied well
|
86
|
+
assert_equal RIGHT_OBJECT_TEXT, @s3.get_object(@bucket, @key1_copy), "copied object must have the same data"
|
87
|
+
# check meta-headers were copied
|
88
|
+
headers = @s3.head(@bucket, @key1_copy)
|
89
|
+
assert_equal 'Woohoo1!', headers['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo1!'"
|
90
|
+
#--- test REPLACE
|
91
|
+
assert @s3.copy(@bucket, @key1, @bucket, @key1_copy, :replace, 'x-amz-meta-family' => 'oooops!')
|
92
|
+
# check it was copied well
|
93
|
+
assert_equal RIGHT_OBJECT_TEXT, @s3.get_object(@bucket, @key1_copy), "copied object must have the same data"
|
94
|
+
# check meta-headers were overwrittenn
|
95
|
+
headers = @s3.head(@bucket, @key1_copy)
|
96
|
+
assert_equal 'oooops!', headers['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'oooops!'"
|
97
|
+
end
|
98
|
+
|
99
|
+
def test_10_move_key
|
100
|
+
# move a key
|
101
|
+
assert @s3.move(@bucket, @key1, @bucket, @key1_new_name)
|
102
|
+
# check it's data was moved correctly
|
103
|
+
assert_equal RIGHT_OBJECT_TEXT, @s3.get_object(@bucket, @key1_new_name), "moved object must have the same data"
|
104
|
+
# check meta-headers were moved
|
105
|
+
headers = @s3.head(@bucket, @key1_new_name)
|
106
|
+
assert_equal 'Woohoo1!', headers['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo1!'"
|
107
|
+
# check the original key is not exists any more
|
108
|
+
keys = @s3.list_bucket(@bucket).map{|b| b[:key]}
|
109
|
+
assert(!keys.include?(@key1))
|
110
|
+
end
|
111
|
+
|
112
|
+
def test_11_rename_key
|
113
|
+
# rename a key
|
114
|
+
assert @s3.rename(@bucket, @key2, @key2_new_name)
|
115
|
+
# check the new key data
|
116
|
+
assert_equal RIGHT_OBJECT_TEXT, @s3.get_object(@bucket, @key2_new_name), "moved object must have the same data"
|
117
|
+
# check meta-headers
|
118
|
+
headers = @s3.head(@bucket, @key2_new_name)
|
119
|
+
assert_equal 'Woohoo2!', headers['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo2!'"
|
120
|
+
# check the original key is not exists any more
|
121
|
+
keys = @s3.list_bucket(@bucket).map{|b| b[:key]}
|
122
|
+
assert(!keys.include?(@key2))
|
123
|
+
end
|
124
|
+
def test_12_retrieve_object
|
125
|
+
assert_raise(Rightscale::AwsError) { @s3.retrieve_object(:bucket => @bucket, :key => 'undefined/key') }
|
126
|
+
data1 = @s3.retrieve_object(:bucket => @bucket, :key => @key1_new_name)
|
127
|
+
assert_equal RIGHT_OBJECT_TEXT, data1[:object], "Object text must be equal to '#{RIGHT_OBJECT_TEXT}'"
|
128
|
+
assert_equal 'Woohoo1!', data1[:headers]['x-amz-meta-family'], "x-amz-meta-family header must be equal to 'Woohoo1!'"
|
129
|
+
end
|
130
|
+
def test_13_delete_folder
|
131
|
+
assert_equal 1, @s3.delete_folder(@bucket, 'test').size, "Only one key(#{@key1}) must be deleted!"
|
132
|
+
end
|
133
|
+
|
134
|
+
def test_14_delete_bucket
|
135
|
+
assert_raise(Rightscale::AwsError) { @s3.delete_bucket(@bucket) }
|
136
|
+
assert @s3.clear_bucket(@bucket), 'Clear_bucket fail'
|
137
|
+
assert_equal 0, @s3.list_bucket(@bucket).size, 'Bucket must be empty'
|
138
|
+
assert @s3.delete_bucket(@bucket)
|
139
|
+
assert !@s3.list_all_my_buckets.map{|bucket| bucket[:name]}.include?(@bucket), "#{@bucket} must not exist"
|
140
|
+
end
|
141
|
+
|
142
|
+
|
143
|
+
|
144
|
+
|
145
|
+
#---------------------------
|
146
|
+
# Rightscale::S3 classes
|
147
|
+
#---------------------------
|
148
|
+
|
149
|
+
def test_20_s3
|
150
|
+
# create bucket
|
151
|
+
bucket = @s.bucket(@bucket, true)
|
152
|
+
assert bucket
|
153
|
+
# check that the bucket exists
|
154
|
+
assert @s.buckets.map{|b| b.name}.include?(@bucket)
|
155
|
+
# delete bucket
|
156
|
+
assert bucket.clear
|
157
|
+
assert bucket.delete
|
158
|
+
end
|
159
|
+
|
160
|
+
def test_21_bucket_create_put_get_key
|
161
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, true)
|
162
|
+
# check that the bucket exists
|
163
|
+
assert @s.buckets.map{|b| b.name}.include?(@bucket)
|
164
|
+
assert bucket.keys.empty?
|
165
|
+
# put data
|
166
|
+
assert bucket.put(@key3, RIGHT_OBJECT_TEXT, {'family'=>'123456'})
|
167
|
+
# get data and compare
|
168
|
+
assert_equal RIGHT_OBJECT_TEXT, bucket.get(@key3)
|
169
|
+
# get key object
|
170
|
+
key = bucket.key(@key3, true)
|
171
|
+
assert_equal Rightscale::S3::Key, key.class
|
172
|
+
assert key.exists?
|
173
|
+
assert_equal '123456', key.meta_headers['family']
|
174
|
+
end
|
175
|
+
|
176
|
+
def test_22_keys
|
177
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
178
|
+
# create first key
|
179
|
+
key3 = Rightscale::S3::Key.create(bucket, @key3)
|
180
|
+
key3.refresh
|
181
|
+
assert key3.exists?
|
182
|
+
assert_equal '123456', key3.meta_headers['family']
|
183
|
+
# create second key
|
184
|
+
key2 = Rightscale::S3::Key.create(bucket, @key2)
|
185
|
+
assert !key2.refresh
|
186
|
+
assert !key2.exists?
|
187
|
+
assert_raise(Rightscale::AwsError) { key2.head }
|
188
|
+
# store key
|
189
|
+
key2.meta_headers = {'family'=>'111222333'}
|
190
|
+
assert key2.put(RIGHT_OBJECT_TEXT)
|
191
|
+
# make sure that the key exists
|
192
|
+
assert key2.refresh
|
193
|
+
assert key2.exists?
|
194
|
+
assert key2.head
|
195
|
+
# get its data
|
196
|
+
assert_equal RIGHT_OBJECT_TEXT, key2.get
|
197
|
+
# drop key
|
198
|
+
assert key2.delete
|
199
|
+
assert !key2.exists?
|
200
|
+
end
|
201
|
+
|
202
|
+
def test_23_rename_key
|
203
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
204
|
+
# -- 1 -- (key based rename)
|
205
|
+
# create a key
|
206
|
+
key = bucket.key('test/copy/1')
|
207
|
+
key.put(RIGHT_OBJECT_TEXT)
|
208
|
+
original_key = key.clone
|
209
|
+
assert key.exists?, "'test/copy/1' should exist"
|
210
|
+
# rename it
|
211
|
+
key.rename('test/copy/2')
|
212
|
+
assert_equal 'test/copy/2', key.name
|
213
|
+
assert key.exists?, "'test/copy/2' should exist"
|
214
|
+
# the original key should not exist
|
215
|
+
assert !original_key.exists?, "'test/copy/1' should not exist"
|
216
|
+
# -- 2 -- (bucket based rename)
|
217
|
+
bucket.rename_key('test/copy/2', 'test/copy/3')
|
218
|
+
assert bucket.key('test/copy/3').exists?, "'test/copy/3' should exist"
|
219
|
+
assert !bucket.key('test/copy/2').exists?, "'test/copy/2' should not exist"
|
220
|
+
end
|
221
|
+
|
222
|
+
def test_24_copy_key
|
223
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
224
|
+
# -- 1 -- (key based copy)
|
225
|
+
# create a key
|
226
|
+
key = bucket.key('test/copy/10')
|
227
|
+
key.put(RIGHT_OBJECT_TEXT)
|
228
|
+
# make copy
|
229
|
+
new_key = key.copy('test/copy/11')
|
230
|
+
# make sure both the keys exist and have a correct data
|
231
|
+
assert key.exists?, "'test/copy/10' should exist"
|
232
|
+
assert new_key.exists?, "'test/copy/11' should exist"
|
233
|
+
assert_equal RIGHT_OBJECT_TEXT, key.get
|
234
|
+
assert_equal RIGHT_OBJECT_TEXT, new_key.get
|
235
|
+
# -- 2 -- (bucket based copy)
|
236
|
+
bucket.copy_key('test/copy/11', 'test/copy/12')
|
237
|
+
assert bucket.key('test/copy/11').exists?, "'test/copy/11' should exist"
|
238
|
+
assert bucket.key('test/copy/12').exists?, "'test/copy/12' should exist"
|
239
|
+
assert_equal RIGHT_OBJECT_TEXT, bucket.key('test/copy/11').get
|
240
|
+
assert_equal RIGHT_OBJECT_TEXT, bucket.key('test/copy/12').get
|
241
|
+
end
|
242
|
+
|
243
|
+
def test_25_move_key
|
244
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
245
|
+
# -- 1 -- (key based copy)
|
246
|
+
# create a key
|
247
|
+
key = bucket.key('test/copy/20')
|
248
|
+
key.put(RIGHT_OBJECT_TEXT)
|
249
|
+
# move
|
250
|
+
new_key = key.move('test/copy/21')
|
251
|
+
# make sure both the keys exist and have a correct data
|
252
|
+
assert !key.exists?, "'test/copy/20' should not exist"
|
253
|
+
assert new_key.exists?, "'test/copy/21' should exist"
|
254
|
+
assert_equal RIGHT_OBJECT_TEXT, new_key.get
|
255
|
+
# -- 2 -- (bucket based copy)
|
256
|
+
bucket.copy_key('test/copy/21', 'test/copy/22')
|
257
|
+
assert bucket.key('test/copy/21').exists?, "'test/copy/21' should not exist"
|
258
|
+
assert bucket.key('test/copy/22').exists?, "'test/copy/22' should exist"
|
259
|
+
assert_equal RIGHT_OBJECT_TEXT, bucket.key('test/copy/22').get
|
260
|
+
end
|
261
|
+
|
262
|
+
def test_26_save_meta
|
263
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
264
|
+
# create a key
|
265
|
+
key = bucket.key('test/copy/30')
|
266
|
+
key.put(RIGHT_OBJECT_TEXT)
|
267
|
+
assert key.meta_headers.blank?
|
268
|
+
# store some meta keys
|
269
|
+
meta = {'family' => 'oops','race' => 'troll'}
|
270
|
+
assert_equal meta, key.save_meta(meta)
|
271
|
+
# reload meta
|
272
|
+
assert_equal meta, key.reload_meta
|
273
|
+
end
|
274
|
+
|
275
|
+
def test_27_clear_delete
|
276
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
277
|
+
# add another key
|
278
|
+
bucket.put(@key2, RIGHT_OBJECT_TEXT)
|
279
|
+
# delete 'folder'
|
280
|
+
assert_equal 1, bucket.delete_folder(@key1).size
|
281
|
+
# delete
|
282
|
+
assert_raise(Rightscale::AwsError) { bucket.delete }
|
283
|
+
bucket.delete(true)
|
284
|
+
end
|
285
|
+
|
286
|
+
# Grantees
|
287
|
+
|
288
|
+
def test_30_create_bucket
|
289
|
+
bucket = @s.bucket(@bucket, true, 'public-read')
|
290
|
+
assert bucket
|
291
|
+
end
|
292
|
+
|
293
|
+
def test_31_list_grantees
|
294
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
295
|
+
# get grantees list
|
296
|
+
grantees = bucket.grantees
|
297
|
+
# check that the grantees count equal to 2 (root, AllUsers)
|
298
|
+
assert_equal 2, grantees.size
|
299
|
+
end
|
300
|
+
|
301
|
+
def test_32_grant_revoke_drop
|
302
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
303
|
+
# Take 'AllUsers' grantee
|
304
|
+
grantee = Rightscale::S3::Grantee.new(bucket,'http://acs.amazonaws.com/groups/global/AllUsers')
|
305
|
+
# Check exists?
|
306
|
+
assert grantee.exists?
|
307
|
+
# Add grant as String
|
308
|
+
assert grantee.grant('WRITE')
|
309
|
+
# Add grants as Array
|
310
|
+
assert grantee.grant(['READ_ACP', 'WRITE_ACP'])
|
311
|
+
# Check perms count
|
312
|
+
assert_equal 4, grantee.perms.size
|
313
|
+
# revoke 'WRITE_ACP'
|
314
|
+
assert grantee.revoke('WRITE_ACP')
|
315
|
+
# Check manual perm removal method
|
316
|
+
grantee.perms -= ['READ_ACP']
|
317
|
+
grantee.apply
|
318
|
+
assert_equal 2, grantee.perms.size
|
319
|
+
# Check grantee removal if it has no permissions
|
320
|
+
assert grantee.perms = []
|
321
|
+
assert grantee.apply
|
322
|
+
assert !grantee.exists?
|
323
|
+
# Check multiple perms assignment
|
324
|
+
assert grantee.grant('FULL_CONTROL', 'READ', 'WRITE')
|
325
|
+
assert_equal ['FULL_CONTROL','READ','WRITE'].sort, grantee.perms.sort
|
326
|
+
# Check multiple perms removal
|
327
|
+
assert grantee.revoke('FULL_CONTROL', 'WRITE')
|
328
|
+
assert_equal ['READ'], grantee.perms
|
329
|
+
# check 'Drop' method
|
330
|
+
assert grantee.drop
|
331
|
+
assert !grantee.exists?
|
332
|
+
assert_equal 1, bucket.grantees.size
|
333
|
+
# Delete bucket
|
334
|
+
bucket.delete(true)
|
335
|
+
end
|
336
|
+
|
337
|
+
def test_33_key_grantees
|
338
|
+
# Create bucket
|
339
|
+
bucket = @s.bucket(@bucket, true)
|
340
|
+
# Create key
|
341
|
+
key = bucket.key(@key1)
|
342
|
+
assert key.put(RIGHT_OBJECT_TEXT, 'public-read')
|
343
|
+
# Get grantees list (must be == 2)
|
344
|
+
grantees = key.grantees
|
345
|
+
assert grantees
|
346
|
+
assert_equal 2, grantees.size
|
347
|
+
# Take one of grantees and give him 'Write' perms
|
348
|
+
grantee = grantees[0]
|
349
|
+
assert grantee.grant('WRITE')
|
350
|
+
# Drop grantee
|
351
|
+
assert grantee.drop
|
352
|
+
# Drop bucket
|
353
|
+
bucket.delete(true)
|
354
|
+
end
|
355
|
+
|
356
|
+
def test_34_bucket_create_put_with_perms
|
357
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, true)
|
358
|
+
# check that the bucket exists
|
359
|
+
assert @s.buckets.map{|b| b.name}.include?(@bucket)
|
360
|
+
assert bucket.keys.empty?
|
361
|
+
# put data (with canned ACL)
|
362
|
+
assert bucket.put(@key1, RIGHT_OBJECT_TEXT, {'family'=>'123456'}, "public-read")
|
363
|
+
# get data and compare
|
364
|
+
assert_equal RIGHT_OBJECT_TEXT, bucket.get(@key1)
|
365
|
+
# get key object
|
366
|
+
key = bucket.key(@key1, true)
|
367
|
+
assert_equal Rightscale::S3::Key, key.class
|
368
|
+
assert key.exists?
|
369
|
+
assert_equal '123456', key.meta_headers['family']
|
370
|
+
end
|
371
|
+
|
372
|
+
def test_35_key_put_with_perms
|
373
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
374
|
+
# create first key
|
375
|
+
key1 = Rightscale::S3::Key.create(bucket, @key1)
|
376
|
+
key1.refresh
|
377
|
+
assert key1.exists?
|
378
|
+
assert key1.put(RIGHT_OBJECT_TEXT, "public-read")
|
379
|
+
# get its data
|
380
|
+
assert_equal RIGHT_OBJECT_TEXT, key1.get
|
381
|
+
# drop key
|
382
|
+
assert key1.delete
|
383
|
+
assert !key1.exists?
|
384
|
+
end
|
385
|
+
|
386
|
+
def test_36_set_amazon_problems
|
387
|
+
original_problems = RightAws::S3Interface.amazon_problems
|
388
|
+
assert(original_problems.length > 0)
|
389
|
+
RightAws::S3Interface.amazon_problems= original_problems << "A New Problem"
|
390
|
+
new_problems = RightAws::S3Interface.amazon_problems
|
391
|
+
assert_equal(new_problems, original_problems)
|
392
|
+
|
393
|
+
RightAws::S3Interface.amazon_problems= nil
|
394
|
+
assert_nil(RightAws::S3Interface.amazon_problems)
|
395
|
+
end
|
396
|
+
|
397
|
+
def test_37_access_logging
|
398
|
+
bucket = Rightscale::S3::Bucket.create(@s, @bucket, false)
|
399
|
+
targetbucket = Rightscale::S3::Bucket.create(@s, @bucket2, true)
|
400
|
+
# Take 'AllUsers' grantee
|
401
|
+
grantee = Rightscale::S3::Grantee.new(targetbucket,'http://acs.amazonaws.com/groups/s3/LogDelivery')
|
402
|
+
|
403
|
+
assert grantee.grant(['READ_ACP', 'WRITE'])
|
404
|
+
|
405
|
+
assert bucket.enable_logging(:targetbucket => targetbucket, :targetprefix => "loggylogs/")
|
406
|
+
|
407
|
+
assert_equal(bucket.logging_info, {:enabled => true, :targetbucket => @bucket2, :targetprefix => "loggylogs/"})
|
408
|
+
|
409
|
+
assert bucket.disable_logging
|
410
|
+
|
411
|
+
# check 'Drop' method
|
412
|
+
assert grantee.drop
|
413
|
+
|
414
|
+
# Delete bucket
|
415
|
+
bucket.delete(true)
|
416
|
+
targetbucket.delete(true)
|
417
|
+
end
|
418
|
+
|
419
|
+
end
|