2022-01-27 00:01:03 +00:00
|
|
|
// Copyright (C) 2022 Storj Labs, Inc.
|
|
|
|
// See LICENSE for copying information.
|
|
|
|
|
|
|
|
package metabase_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"storj.io/common/storj"
|
|
|
|
"storj.io/common/testcontext"
|
|
|
|
"storj.io/common/testrand"
|
|
|
|
"storj.io/storj/satellite/metabase"
|
|
|
|
"storj.io/storj/satellite/metabase/metabasetest"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestBeginCopyObject(t *testing.T) {
|
|
|
|
metabasetest.Run(t, func(ctx *testcontext.Context, t *testing.T, db *metabase.DB) {
|
|
|
|
obj := metabasetest.RandObjectStream()
|
|
|
|
|
|
|
|
for _, test := range metabasetest.InvalidObjectLocations(obj.Location()) {
|
|
|
|
test := test
|
|
|
|
t.Run(test.Name, func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
metabasetest.BeginCopyObject{
|
|
|
|
Opts: metabase.BeginCopyObject{
|
|
|
|
ObjectLocation: test.ObjectLocation,
|
|
|
|
},
|
|
|
|
ErrClass: test.ErrClass,
|
|
|
|
ErrText: test.ErrText,
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("invalid version", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.BeginCopyObject{
|
|
|
|
Opts: metabase.BeginCopyObject{
|
|
|
|
ObjectLocation: obj.Location(),
|
|
|
|
Version: 0,
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "Version invalid: 0",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("begin copy object", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
expectedMetadataNonce := testrand.Nonce()
|
|
|
|
expectedMetadataKey := testrand.Bytes(265)
|
|
|
|
expectedObject := metabasetest.CreateTestObject{
|
|
|
|
CommitObject: &metabase.CommitObject{
|
|
|
|
ObjectStream: obj,
|
|
|
|
EncryptedMetadata: testrand.Bytes(64),
|
|
|
|
EncryptedMetadataNonce: expectedMetadataNonce[:],
|
|
|
|
EncryptedMetadataEncryptedKey: expectedMetadataKey,
|
|
|
|
},
|
|
|
|
}.Run(ctx, t, db, obj, 10)
|
|
|
|
|
|
|
|
var encKeyAndNonces []metabase.EncryptedKeyAndNonce
|
|
|
|
expectedRawSegments := make([]metabase.RawSegment, 10)
|
|
|
|
for i := range expectedRawSegments {
|
|
|
|
expectedRawSegments[i] = metabasetest.DefaultRawSegment(expectedObject.ObjectStream, metabase.SegmentPosition{
|
|
|
|
Index: uint32(i),
|
|
|
|
})
|
|
|
|
expectedRawSegments[i].PlainOffset = int64(i) * int64(expectedRawSegments[i].PlainSize)
|
|
|
|
expectedRawSegments[i].EncryptedSize = 1060
|
|
|
|
|
|
|
|
encKeyAndNonces = append(encKeyAndNonces, metabase.EncryptedKeyAndNonce{
|
|
|
|
EncryptedKeyNonce: expectedRawSegments[i].EncryptedKeyNonce,
|
|
|
|
EncryptedKey: expectedRawSegments[i].EncryptedKey,
|
|
|
|
Position: expectedRawSegments[i].Position,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
metabasetest.BeginCopyObject{
|
|
|
|
Opts: metabase.BeginCopyObject{
|
|
|
|
Version: expectedObject.Version,
|
|
|
|
ObjectLocation: obj.Location(),
|
|
|
|
},
|
|
|
|
Result: metabase.BeginCopyObjectResult{
|
|
|
|
StreamID: expectedObject.StreamID,
|
|
|
|
EncryptedMetadata: expectedObject.EncryptedMetadata,
|
|
|
|
EncryptedMetadataKey: expectedMetadataKey,
|
|
|
|
EncryptedMetadataKeyNonce: expectedMetadataNonce[:],
|
|
|
|
EncryptedKeysNonces: encKeyAndNonces,
|
|
|
|
EncryptionParameters: expectedObject.Encryption,
|
|
|
|
},
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{
|
|
|
|
Objects: []metabase.RawObject{
|
|
|
|
metabase.RawObject(expectedObject),
|
|
|
|
},
|
|
|
|
Segments: expectedRawSegments,
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestFinishCopyObject(t *testing.T) {
|
|
|
|
metabasetest.Run(t, func(ctx *testcontext.Context, t *testing.T, db *metabase.DB) {
|
|
|
|
obj := metabasetest.RandObjectStream()
|
|
|
|
newBucketName := "New bucket name"
|
|
|
|
|
|
|
|
for _, test := range metabasetest.InvalidObjectStreams(obj) {
|
|
|
|
test := test
|
|
|
|
t.Run(test.Name, func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: test.ObjectStream,
|
|
|
|
},
|
|
|
|
ErrClass: test.ErrClass,
|
|
|
|
ErrText: test.ErrText,
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("invalid NewBucket", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
ObjectStream: obj,
|
|
|
|
NewEncryptedObjectKey: []byte{1, 2, 3},
|
|
|
|
NewEncryptedMetadataKey: []byte{1, 2, 3},
|
|
|
|
NewEncryptedMetadataKeyNonce: []byte{1, 2, 3},
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "NewBucket is missing",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("copy to the same StreamID", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
ObjectStream: obj,
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
NewStreamID: obj.StreamID,
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "StreamIDs are identical",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("invalid NewEncryptedObjectKey", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: obj,
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "NewEncryptedObjectKey is missing",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("copy to the same EncryptedObjectKey", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
NewEncryptedObjectKey: []byte(obj.ObjectKey),
|
|
|
|
ObjectStream: obj,
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "source and destination encrypted object key are identical",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("invalid EncryptedMetadataKeyNonce", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: obj,
|
|
|
|
NewEncryptedObjectKey: []byte{0},
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "EncryptedMetadataKeyNonce is missing",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("invalid EncryptedMetadataKey", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: obj,
|
|
|
|
NewEncryptedObjectKey: []byte{0},
|
|
|
|
NewEncryptedMetadataKeyNonce: []byte{0},
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "EncryptedMetadataKey is missing",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("object does not exist", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
newObj := metabasetest.RandObjectStream()
|
|
|
|
|
|
|
|
newEncryptedMetadataKeyNonce := testrand.Nonce()
|
|
|
|
newEncryptedMetadataKey := testrand.Bytes(32)
|
|
|
|
newEncryptedKeysNonces := make([]metabase.EncryptedKeyAndNonce, 10)
|
|
|
|
newObjectKey := testrand.Bytes(32)
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: newObj,
|
|
|
|
NewSegmentKeys: newEncryptedKeysNonces,
|
|
|
|
NewEncryptedObjectKey: newObjectKey,
|
|
|
|
NewEncryptedMetadataKeyNonce: newEncryptedMetadataKeyNonce.Bytes(),
|
|
|
|
NewEncryptedMetadataKey: newEncryptedMetadataKey,
|
|
|
|
},
|
|
|
|
ErrClass: &storj.ErrObjectNotFound,
|
|
|
|
ErrText: "metabase: sql: no rows in result set",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("less amount of segments", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
numberOfSegments := 10
|
|
|
|
newObjectKey := testrand.Bytes(32)
|
|
|
|
|
|
|
|
newObj := metabasetest.CreateTestObject{
|
|
|
|
CommitObject: &metabase.CommitObject{
|
|
|
|
ObjectStream: obj,
|
|
|
|
EncryptedMetadata: testrand.Bytes(64),
|
|
|
|
EncryptedMetadataNonce: testrand.Nonce().Bytes(),
|
|
|
|
EncryptedMetadataEncryptedKey: testrand.Bytes(265),
|
|
|
|
},
|
|
|
|
}.Run(ctx, t, db, obj, byte(numberOfSegments))
|
|
|
|
|
|
|
|
newEncryptedMetadataKeyNonce := testrand.Nonce()
|
|
|
|
newEncryptedMetadataKey := testrand.Bytes(32)
|
|
|
|
newEncryptedKeysNonces := make([]metabase.EncryptedKeyAndNonce, newObj.SegmentCount-1)
|
|
|
|
expectedSegments := make([]metabase.RawSegment, newObj.SegmentCount)
|
|
|
|
|
|
|
|
for i := 0; i < int(newObj.SegmentCount-1); i++ {
|
|
|
|
newEncryptedKeysNonces[i] = metabase.EncryptedKeyAndNonce{
|
|
|
|
Position: metabase.SegmentPosition{Index: uint32(i)},
|
|
|
|
EncryptedKeyNonce: testrand.Nonce().Bytes(),
|
|
|
|
EncryptedKey: testrand.Bytes(32),
|
|
|
|
}
|
|
|
|
|
|
|
|
expectedSegments[i] = metabasetest.DefaultRawSegment(newObj.ObjectStream, metabase.SegmentPosition{Index: uint32(i)})
|
|
|
|
expectedSegments[i].EncryptedKeyNonce = newEncryptedKeysNonces[i].EncryptedKeyNonce
|
|
|
|
expectedSegments[i].EncryptedKey = newEncryptedKeysNonces[i].EncryptedKey
|
|
|
|
expectedSegments[i].PlainOffset = int64(int32(i) * expectedSegments[i].PlainSize)
|
|
|
|
expectedSegments[i].EncryptedSize = int32(0)
|
|
|
|
}
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: obj,
|
|
|
|
NewSegmentKeys: newEncryptedKeysNonces,
|
|
|
|
NewEncryptedObjectKey: newObjectKey,
|
|
|
|
NewEncryptedMetadataKeyNonce: newEncryptedMetadataKeyNonce.Bytes(),
|
|
|
|
NewEncryptedMetadataKey: newEncryptedMetadataKey,
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.ErrInvalidRequest,
|
|
|
|
ErrText: "wrong amount of segments keys received (received 10, need 9)",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("wrong segment indexes", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
numberOfSegments := 10
|
|
|
|
newObjectKey := testrand.Bytes(32)
|
|
|
|
|
|
|
|
newObj := metabasetest.CreateTestObject{
|
|
|
|
CommitObject: &metabase.CommitObject{
|
|
|
|
ObjectStream: obj,
|
|
|
|
EncryptedMetadata: testrand.Bytes(64),
|
|
|
|
EncryptedMetadataNonce: testrand.Nonce().Bytes(),
|
|
|
|
EncryptedMetadataEncryptedKey: testrand.Bytes(265),
|
|
|
|
},
|
|
|
|
}.Run(ctx, t, db, obj, byte(numberOfSegments))
|
|
|
|
|
|
|
|
newEncryptedMetadataKeyNonce := testrand.Nonce()
|
|
|
|
newEncryptedMetadataKey := testrand.Bytes(32)
|
|
|
|
newEncryptedKeysNonces := make([]metabase.EncryptedKeyAndNonce, newObj.SegmentCount)
|
|
|
|
expectedEncryptedSize := 1060
|
|
|
|
expectedSegments := make([]metabase.RawSegment, newObj.SegmentCount)
|
|
|
|
|
|
|
|
for i := 0; i < int(newObj.SegmentCount); i++ {
|
|
|
|
newEncryptedKeysNonces[i] = metabase.EncryptedKeyAndNonce{
|
|
|
|
Position: metabase.SegmentPosition{Index: uint32(i + 5)},
|
|
|
|
EncryptedKeyNonce: testrand.Nonce().Bytes(),
|
|
|
|
EncryptedKey: testrand.Bytes(32),
|
|
|
|
}
|
|
|
|
|
|
|
|
expectedSegments[i] = metabasetest.DefaultRawSegment(newObj.ObjectStream, metabase.SegmentPosition{Index: uint32(i)})
|
|
|
|
expectedSegments[i].EncryptedKeyNonce = newEncryptedKeysNonces[i].EncryptedKeyNonce
|
|
|
|
expectedSegments[i].EncryptedKey = newEncryptedKeysNonces[i].EncryptedKey
|
|
|
|
expectedSegments[i].PlainOffset = int64(int32(i) * expectedSegments[i].PlainSize)
|
|
|
|
expectedSegments[i].EncryptedSize = int32(expectedEncryptedSize)
|
|
|
|
}
|
|
|
|
|
|
|
|
metabasetest.FinishCopyObject{
|
|
|
|
Opts: metabase.FinishCopyObject{
|
|
|
|
NewStreamID: testrand.UUID(),
|
|
|
|
NewBucket: newBucketName,
|
|
|
|
ObjectStream: obj,
|
|
|
|
NewSegmentKeys: newEncryptedKeysNonces,
|
|
|
|
NewEncryptedObjectKey: newObjectKey,
|
|
|
|
NewEncryptedMetadataKeyNonce: newEncryptedMetadataKeyNonce.Bytes(),
|
|
|
|
NewEncryptedMetadataKey: newEncryptedMetadataKey,
|
|
|
|
},
|
|
|
|
ErrClass: &metabase.Error,
|
|
|
|
ErrText: "missing new segment keys for segment 0",
|
|
|
|
}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("finish copy object with existing metadata", func(t *testing.T) {
|
|
|
|
defer metabasetest.DeleteAll{}.Check(ctx, t, db)
|
|
|
|
|
|
|
|
numberOfSegments := 10
|
|
|
|
copyStream := metabasetest.RandObjectStream()
|
|
|
|
|
|
|
|
originalObj := metabasetest.CreateTestObject{
|
|
|
|
CommitObject: &metabase.CommitObject{
|
|
|
|
ObjectStream: obj,
|
|
|
|
EncryptedMetadata: testrand.Bytes(64),
|
|
|
|
EncryptedMetadataNonce: testrand.Nonce().Bytes(),
|
|
|
|
EncryptedMetadataEncryptedKey: testrand.Bytes(265),
|
|
|
|
},
|
|
|
|
}.Run(ctx, t, db, obj, byte(numberOfSegments))
|
|
|
|
|
|
|
|
copyObj, expectedSegments := metabasetest.CreateObjectCopy{
|
|
|
|
OriginalObject: originalObj,
|
|
|
|
CopyObjectStream: ©Stream,
|
|
|
|
}.Run(ctx, t, db)
|
|
|
|
|
|
|
|
metabasetest.Verify{
|
|
|
|
Objects: []metabase.RawObject{
|
|
|
|
metabase.RawObject(originalObj),
|
|
|
|
metabase.RawObject(copyObj),
|
|
|
|
},
|
|
|
|
Segments: expectedSegments,
|
2022-02-17 23:26:03 +00:00
|
|
|
Copies: []metabase.RawCopy{{
|
|
|
|
StreamID: copyStream.StreamID,
|
|
|
|
AncestorStreamID: originalObj.StreamID,
|
|
|
|
}},
|
2022-01-27 00:01:03 +00:00
|
|
|
}.Check(ctx, t, db)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
// TODO: test with new metadata
|
|
|
|
}
|