mirror of
https://git.deuxfleurs.fr/Deuxfleurs/garage.git
synced 2024-11-25 01:21:01 +00:00
a36248a169
This page of the AWS docs indicate that Content-Type should be part of the CanonicalHeaders (and therefore SignedHeaders) strings in signature calculation: https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-header-based-auth.html However, testing with Minio Client revealed that it did not sign the Content-Type header, and therefore we broke CI by expecting it to be signed. With this commit, we don't mandate Content-Type to be signed anymore, for better compatibility with the ecosystem. Testing against the official behavior of S3 on AWS has not been done.
186 lines
6.6 KiB
Bash
Executable file
186 lines
6.6 KiB
Bash
Executable file
#!/usr/bin/env bash
|
|
|
|
set -ex
|
|
|
|
export LC_ALL=C.UTF-8
|
|
export LANG=C.UTF-8
|
|
SCRIPT_FOLDER="`dirname \"$0\"`"
|
|
REPO_FOLDER="${SCRIPT_FOLDER}/../"
|
|
GARAGE_DEBUG="${REPO_FOLDER}/target/debug/"
|
|
GARAGE_RELEASE="${REPO_FOLDER}/target/release/"
|
|
NIX_RELEASE="${REPO_FOLDER}/result/bin/:${REPO_FOLDER}/result-bin/bin/"
|
|
PATH="${GARAGE_DEBUG}:${GARAGE_RELEASE}:${NIX_RELEASE}:$PATH"
|
|
CMDOUT=/tmp/garage.cmd.tmp
|
|
|
|
# @FIXME Duck is not ready for testing, we have a bug
|
|
SKIP_DUCK=1
|
|
|
|
echo "⏳ Setup"
|
|
${SCRIPT_FOLDER}/dev-clean.sh
|
|
${SCRIPT_FOLDER}/dev-cluster.sh > /tmp/garage.log 2>&1 &
|
|
sleep 6
|
|
${SCRIPT_FOLDER}/dev-configure.sh
|
|
${SCRIPT_FOLDER}/dev-bucket.sh
|
|
|
|
which garage
|
|
garage -c /tmp/config.1.toml status
|
|
garage -c /tmp/config.1.toml key list
|
|
garage -c /tmp/config.1.toml bucket list
|
|
|
|
dd if=/dev/urandom of=/tmp/garage.1.rnd bs=1k count=2 # No multipart, inline storage (< INLINE_THRESHOLD = 3072 bytes)
|
|
dd if=/dev/urandom of=/tmp/garage.2.rnd bs=1M count=5 # No multipart but file will be chunked
|
|
dd if=/dev/urandom of=/tmp/garage.3.rnd bs=1M count=10 # by default, AWS starts using multipart at 8MB
|
|
|
|
dd if=/dev/urandom of=/tmp/garage.part1.rnd bs=1M count=5
|
|
dd if=/dev/urandom of=/tmp/garage.part2.rnd bs=1M count=5
|
|
dd if=/dev/urandom of=/tmp/garage.part3.rnd bs=1M count=5
|
|
dd if=/dev/urandom of=/tmp/garage.part4.rnd bs=1M count=5
|
|
|
|
# data of lower entropy, to test compression
|
|
dd if=/dev/urandom bs=1k count=2 | base64 -w0 > /tmp/garage.1.b64
|
|
dd if=/dev/urandom bs=1M count=5 | base64 -w0 > /tmp/garage.2.b64
|
|
dd if=/dev/urandom bs=1M count=10 | base64 -w0 > /tmp/garage.3.b64
|
|
|
|
echo "🧪 S3 API testing..."
|
|
|
|
# AWS
|
|
if [ -z "$SKIP_AWS" ]; then
|
|
echo "🛠️ Testing with awscli (aws s3)"
|
|
source ${SCRIPT_FOLDER}/dev-env-aws.sh
|
|
aws s3 ls
|
|
for idx in {1..3}.{rnd,b64}; do
|
|
aws s3 cp "/tmp/garage.$idx" "s3://eprouvette/&+-é\"/garage.$idx.aws"
|
|
aws s3 ls s3://eprouvette
|
|
aws s3 cp "s3://eprouvette/&+-é\"/garage.$idx.aws" "/tmp/garage.$idx.dl"
|
|
diff /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rm /tmp/garage.$idx.dl
|
|
aws s3 rm "s3://eprouvette/&+-é\"/garage.$idx.aws"
|
|
done
|
|
|
|
echo "🛠️ Testing multipart uploads with awscli (aws s3api)"
|
|
UPLOAD=$(aws s3api create-multipart-upload --bucket eprouvette --key 'upload' | jq -r ".UploadId")
|
|
echo "Upload ID: $UPLOAD"
|
|
ETAG3=$(aws s3api upload-part --bucket eprouvette --key 'upload' \
|
|
--part-number 3 --body "/tmp/garage.part1.rnd" --upload-id "$UPLOAD" \
|
|
| jq -r ".ETag")
|
|
ETAG2=$(aws s3api upload-part --bucket eprouvette --key 'upload' \
|
|
--part-number 2 --body "/tmp/garage.part2.rnd" --upload-id "$UPLOAD" \
|
|
| jq -r ".ETag")
|
|
ETAG3=$(aws s3api upload-part --bucket eprouvette --key 'upload' \
|
|
--part-number 3 --body "/tmp/garage.part3.rnd" --upload-id "$UPLOAD" \
|
|
| jq -r ".ETag")
|
|
ETAG6=$(aws s3api upload-part --bucket eprouvette --key 'upload' \
|
|
--part-number 6 --body "/tmp/garage.part4.rnd" --upload-id "$UPLOAD" \
|
|
| jq -r ".ETag")
|
|
MPU="{\"Parts\":[{\"PartNumber\":2,\"ETag\":$ETAG2}, {\"PartNumber\":3,\"ETag\":$ETAG3}, {\"PartNumber\":6,\"ETag\":$ETAG6}]}"
|
|
echo $MPU > /tmp/garage.mpu.json
|
|
aws s3api complete-multipart-upload --multipart-upload file:///tmp/garage.mpu.json \
|
|
--bucket eprouvette --key 'upload' --upload-id "$UPLOAD"
|
|
aws s3api get-object --bucket eprouvette --key upload /tmp/garage.mpu.get
|
|
if [ "$(md5sum /tmp/garage.mpu.get | cut -d ' ' -f 1)" != "$(cat /tmp/garage.part{2,3,4}.rnd | md5sum | cut -d ' ' -f 1)" ]; then
|
|
echo "Invalid multipart upload"
|
|
exit 1
|
|
fi
|
|
aws s3api delete-object --bucket eprouvette --key upload
|
|
fi
|
|
|
|
# S3CMD
|
|
if [ -z "$SKIP_S3CMD" ]; then
|
|
echo "🛠️ Testing with s3cmd"
|
|
source ${SCRIPT_FOLDER}/dev-env-s3cmd.sh
|
|
s3cmd ls
|
|
for idx in {1..3}.{rnd,b64}; do
|
|
s3cmd put "/tmp/garage.$idx" "s3://eprouvette/&+-é\"/garage.$idx.s3cmd"
|
|
s3cmd ls s3://eprouvette
|
|
s3cmd get "s3://eprouvette/&+-é\"/garage.$idx.s3cmd" "/tmp/garage.$idx.dl"
|
|
diff /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rm /tmp/garage.$idx.dl
|
|
s3cmd rm "s3://eprouvette/&+-é\"/garage.$idx.s3cmd"
|
|
done
|
|
fi
|
|
|
|
# Minio Client
|
|
if [ -z "$SKIP_MC" ]; then
|
|
echo "🛠️ Testing with mc (minio client)"
|
|
source ${SCRIPT_FOLDER}/dev-env-mc.sh
|
|
mc ls garage/
|
|
for idx in {1..3}.{rnd,b64}; do
|
|
mc cp "/tmp/garage.$idx" "garage/eprouvette/&+-é\"/garage.$idx.mc"
|
|
mc ls garage/eprouvette
|
|
mc cp "garage/eprouvette/&+-é\"/garage.$idx.mc" "/tmp/garage.$idx.dl"
|
|
diff /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rm /tmp/garage.$idx.dl
|
|
mc rm "garage/eprouvette/&+-é\"/garage.$idx.mc"
|
|
done
|
|
fi
|
|
|
|
# RClone
|
|
if [ -z "$SKIP_RCLONE" ]; then
|
|
echo "🛠️ Testing with rclone"
|
|
source ${SCRIPT_FOLDER}/dev-env-rclone.sh
|
|
rclone lsd garage:
|
|
for idx in {1..3}.{rnd,b64}; do
|
|
cp /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rclone copy "/tmp/garage.$idx.dl" "garage:eprouvette/&+-é\"/"
|
|
rm /tmp/garage.$idx.dl
|
|
rclone ls garage:eprouvette
|
|
rclone copy "garage:eprouvette/&+-é\"/garage.$idx.dl" "/tmp/"
|
|
diff /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rm /tmp/garage.$idx.dl
|
|
rclone delete "garage:eprouvette/&+-é\"/garage.$idx.dl"
|
|
done
|
|
fi
|
|
|
|
# Duck (aka Cyberduck CLI)
|
|
if [ -z "$SKIP_DUCK" ]; then
|
|
echo "🛠️ Testing with duck (aka cyberduck cli)"
|
|
source ${SCRIPT_FOLDER}/dev-env-duck.sh
|
|
duck --list garage:/
|
|
duck --mkdir "garage:/eprouvette/duck"
|
|
for idx in {1..3}.{rnd,b64}; do
|
|
duck --verbose --upload "garage:/eprouvette/duck/" "/tmp/garage.$idx"
|
|
duck --list garage:/eprouvette/duck/
|
|
duck --download "garage:/eprouvette/duck/garage.$idx" "/tmp/garage.$idx.dl"
|
|
diff /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rm /tmp/garage.$idx.dl
|
|
duck --delete "garage:/eprouvette/duck/garage.$idx.dk"
|
|
done
|
|
fi
|
|
|
|
if [ -z "$SKIP_WINSCP" ]; then
|
|
echo "🛠️ Testing with winscp"
|
|
source ${SCRIPT_FOLDER}/dev-env-winscp.sh
|
|
winscp <<EOF
|
|
open $WINSCP_URL
|
|
ls
|
|
mkdir eprouvette/winscp
|
|
EOF
|
|
for idx in {1..3}.{rnd,b64}; do
|
|
winscp <<EOF
|
|
open $WINSCP_URL
|
|
put Z:\\tmp\\garage.$idx eprouvette/winscp/garage.$idx.winscp
|
|
ls eprouvette/winscp/
|
|
get eprouvette/winscp/garage.$idx.winscp Z:\\tmp\\garage.$idx.dl
|
|
rm eprouvette/winscp/garage.$idx.winscp
|
|
EOF
|
|
diff /tmp/garage.$idx /tmp/garage.$idx.dl
|
|
rm /tmp/garage.$idx.dl
|
|
done
|
|
winscp <<EOF
|
|
open $WINSCP_URL
|
|
rm eprouvette/winscp
|
|
EOF
|
|
fi
|
|
|
|
rm /tmp/garage.part{1..4}.rnd
|
|
rm /tmp/garage.{1..3}.{rnd,b64}
|
|
|
|
echo "🏁 Teardown"
|
|
AWS_ACCESS_KEY_ID=`cat /tmp/garage.s3 |cut -d' ' -f1`
|
|
AWS_SECRET_ACCESS_KEY=`cat /tmp/garage.s3 |cut -d' ' -f2`
|
|
garage -c /tmp/config.1.toml bucket deny --read --write eprouvette --key $AWS_ACCESS_KEY_ID
|
|
garage -c /tmp/config.1.toml bucket delete --yes eprouvette
|
|
garage -c /tmp/config.1.toml key delete --yes $AWS_ACCESS_KEY_ID
|
|
exec 3>&-
|
|
|
|
echo "✅ Success"
|