mirror of
https://github.com/overleaf/overleaf.git
synced 2024-11-21 20:47:08 -05:00
7f48c67512
* Add `unicorn/prefer-node-protocol` * Fix `unicorn/prefer-node-protocol` ESLint errors * Run `npm run format:fix` * Add sandboxed-module sourceTransformers in mocha setups Fix `no such file or directory, open 'node:fs'` in `sandboxed-module` * Remove `node:` in the SandboxedModule requires * Fix new linting errors with `node:` GitOrigin-RevId: 68f6e31e2191fcff4cb8058dd0a6914c14f59926
1384 lines
49 KiB
JavaScript
1384 lines
49 KiB
JavaScript
const chai = require('chai')
|
|
const { expect } = chai
|
|
const fs = require('node:fs')
|
|
const Stream = require('node:stream')
|
|
const Settings = require('@overleaf/settings')
|
|
const Path = require('node:path')
|
|
const FilestoreApp = require('./FilestoreApp')
|
|
const TestHelper = require('./TestHelper')
|
|
const fetch = require('node-fetch')
|
|
const { promisify } = require('node:util')
|
|
const { Storage } = require('@google-cloud/storage')
|
|
const streamifier = require('streamifier')
|
|
chai.use(require('chai-as-promised'))
|
|
const { ObjectId } = require('mongodb')
|
|
const ChildProcess = require('node:child_process')
|
|
|
|
const fsWriteFile = promisify(fs.writeFile)
|
|
const fsStat = promisify(fs.stat)
|
|
const exec = promisify(ChildProcess.exec)
|
|
const msleep = promisify(setTimeout)
|
|
|
|
if (!process.env.AWS_ACCESS_KEY_ID) {
|
|
throw new Error('please provide credentials for the AWS S3 test server')
|
|
}
|
|
|
|
process.on('unhandledRejection', e => {
|
|
// eslint-disable-next-line no-console
|
|
console.log('** Unhandled Promise Rejection **\n', e)
|
|
throw e
|
|
})
|
|
|
|
// store settings for multiple backends, so that we can test each one.
|
|
// fs will always be available - add others if they are configured
|
|
const { BackendSettings, s3Config, s3SSECConfig } = require('./TestConfig')
|
|
const {
|
|
AlreadyWrittenError,
|
|
NotFoundError,
|
|
NotImplementedError,
|
|
NoKEKMatchedError,
|
|
} = require('@overleaf/object-persistor/src/Errors')
|
|
const {
|
|
PerProjectEncryptedS3Persistor,
|
|
RootKeyEncryptionKey,
|
|
} = require('@overleaf/object-persistor/src/PerProjectEncryptedS3Persistor')
|
|
const { S3Persistor } = require('@overleaf/object-persistor/src/S3Persistor')
|
|
const crypto = require('node:crypto')
|
|
|
|
describe('Filestore', function () {
|
|
this.timeout(1000 * 10)
|
|
const filestoreUrl = `http://127.0.0.1:${Settings.internal.filestore.port}`
|
|
|
|
const seenSockets = []
|
|
async function expectNoSockets() {
|
|
try {
|
|
await msleep(1000)
|
|
const { stdout } = await exec('ss -tn')
|
|
const lines = stdout.split('\n')
|
|
const header = lines.shift()
|
|
|
|
const badSockets = []
|
|
for (const socket of lines) {
|
|
const fields = socket.split(' ').filter(part => part !== '')
|
|
if (
|
|
fields.length > 2 &&
|
|
parseInt(fields[1]) &&
|
|
!seenSockets.includes(socket)
|
|
) {
|
|
badSockets.push(socket)
|
|
seenSockets.push(socket)
|
|
}
|
|
}
|
|
|
|
if (badSockets.length) {
|
|
// eslint-disable-next-line no-console
|
|
console.error(
|
|
'ERR: Sockets still have receive buffer after connection closed'
|
|
)
|
|
console.error(header)
|
|
for (const socket of badSockets) {
|
|
// eslint-disable-next-line no-console
|
|
console.error(socket)
|
|
}
|
|
throw new Error('Sockets still open after connection closed')
|
|
}
|
|
} catch (err) {
|
|
expect(err).not.to.exist
|
|
}
|
|
}
|
|
|
|
// redefine the test suite for every available backend
|
|
for (const [backendVariantWithShardNumber, backendSettings] of Object.entries(
|
|
BackendSettings
|
|
)) {
|
|
describe(backendVariantWithShardNumber, function () {
|
|
let app,
|
|
previousEgress,
|
|
previousIngress,
|
|
metricPrefix,
|
|
projectId,
|
|
otherProjectId
|
|
|
|
const dataEncryptionKeySize =
|
|
backendSettings.backend === 's3SSEC' ? 32 : 0
|
|
|
|
const BUCKET_NAMES = [
|
|
process.env.GCS_USER_FILES_BUCKET_NAME,
|
|
process.env.GCS_TEMPLATE_FILES_BUCKET_NAME,
|
|
`${process.env.GCS_USER_FILES_BUCKET_NAME}-deleted`,
|
|
`${process.env.GCS_TEMPLATE_FILES_BUCKET_NAME}-deleted`,
|
|
]
|
|
|
|
before('start filestore with new settings', async function () {
|
|
// create the app with the relevant filestore settings
|
|
Settings.filestore = backendSettings
|
|
app = new FilestoreApp()
|
|
await app.runServer()
|
|
})
|
|
|
|
if (backendSettings.gcs) {
|
|
before('create gcs buckets', async function () {
|
|
// create test buckets for gcs
|
|
const storage = new Storage(Settings.filestore.gcs.endpoint)
|
|
for (const bucketName of BUCKET_NAMES) {
|
|
await storage.createBucket(bucketName)
|
|
}
|
|
})
|
|
|
|
after('delete gcs buckets', async function () {
|
|
// tear down all the gcs buckets
|
|
const storage = new Storage(Settings.filestore.gcs.endpoint)
|
|
for (const bucketName of BUCKET_NAMES) {
|
|
const bucket = storage.bucket(bucketName)
|
|
await bucket.deleteFiles()
|
|
await bucket.delete()
|
|
}
|
|
})
|
|
}
|
|
|
|
after('stop filestore app', async function () {
|
|
await app.stop()
|
|
})
|
|
|
|
beforeEach('fetch previous egress metric', async function () {
|
|
// retrieve previous metrics from the app
|
|
if (['s3', 's3SSEC', 'gcs'].includes(Settings.filestore.backend)) {
|
|
metricPrefix = Settings.filestore.backend.replace('SSEC', '')
|
|
previousEgress = await TestHelper.getMetric(
|
|
filestoreUrl,
|
|
`${metricPrefix}_egress`
|
|
)
|
|
}
|
|
projectId = new ObjectId().toString()
|
|
otherProjectId = new ObjectId().toString()
|
|
})
|
|
|
|
it('should send a 200 for the status endpoint', async function () {
|
|
const response = await fetch(`${filestoreUrl}/status`)
|
|
expect(response.status).to.equal(200)
|
|
const body = await response.text()
|
|
expect(body).to.contain('filestore')
|
|
expect(body).to.contain('up')
|
|
})
|
|
|
|
describe('with a file on the server', function () {
|
|
let fileId, fileUrl, constantFileContent
|
|
|
|
const localFileReadPath =
|
|
'/tmp/filestore_acceptance_tests_file_read.txt'
|
|
|
|
beforeEach('upload file', async function () {
|
|
fileId = new ObjectId().toString()
|
|
fileUrl = `${filestoreUrl}/project/${projectId}/file/${fileId}`
|
|
constantFileContent = [
|
|
'hello world',
|
|
`line 2 goes here ${Math.random()}`,
|
|
'there are 3 lines in all',
|
|
].join('\n')
|
|
|
|
await fsWriteFile(localFileReadPath, constantFileContent)
|
|
|
|
const readStream = fs.createReadStream(localFileReadPath)
|
|
const res = await fetch(fileUrl, { method: 'POST', body: readStream })
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
})
|
|
|
|
beforeEach('retrieve previous ingress metric', async function () {
|
|
// The upload request can bump the ingress metric.
|
|
// The content hash validation might require a full download
|
|
// in case the ETag field of the upload response is not a md5 sum.
|
|
if (['s3', 's3SSEC', 'gcs'].includes(Settings.filestore.backend)) {
|
|
previousIngress = await TestHelper.getMetric(
|
|
filestoreUrl,
|
|
`${metricPrefix}_ingress`
|
|
)
|
|
}
|
|
})
|
|
|
|
it('should return 404 for a non-existant id', async function () {
|
|
const url = fileUrl + '___this_is_clearly_wrong___'
|
|
const response = await fetch(url)
|
|
expect(response.status).to.equal(404)
|
|
})
|
|
|
|
it('should return the file size on a HEAD request', async function () {
|
|
const expectedLength = Buffer.byteLength(constantFileContent)
|
|
const res = await fetch(fileUrl, { method: 'HEAD' })
|
|
expect(res.status).to.equal(200)
|
|
expect(res.headers.get('Content-Length')).to.equal(
|
|
expectedLength.toString()
|
|
)
|
|
})
|
|
|
|
it('should be able get the file back', async function () {
|
|
const res = await fetch(fileUrl)
|
|
const body = await res.text()
|
|
expect(body).to.equal(constantFileContent)
|
|
})
|
|
|
|
it('should send a 200 for the health-check endpoint using the file', async function () {
|
|
Settings.health_check = {
|
|
project_id: projectId,
|
|
file_id: fileId,
|
|
}
|
|
const response = await fetch(`${filestoreUrl}/health_check`)
|
|
expect(response.status).to.equal(200)
|
|
const body = await response.text()
|
|
expect(body).to.equal('OK')
|
|
})
|
|
|
|
it('should not leak a socket', async function () {
|
|
const res = await fetch(fileUrl)
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
await res.text()
|
|
await expectNoSockets()
|
|
})
|
|
|
|
it('should be able to get back the first 9 bytes of the file', async function () {
|
|
const res = await fetch(fileUrl, { headers: { Range: 'bytes=0-8' } })
|
|
const body = await res.text()
|
|
expect(body).to.equal('hello wor')
|
|
})
|
|
|
|
it('should be able to get back bytes 4 through 10 of the file', async function () {
|
|
const res = await fetch(fileUrl, { headers: { Range: 'bytes=4-10' } })
|
|
const body = await res.text()
|
|
expect(body).to.equal('o world')
|
|
})
|
|
|
|
it('should be able to delete the file', async function () {
|
|
const response = await fetch(fileUrl, { method: 'DELETE' })
|
|
expect(response.status).to.equal(204)
|
|
const response2 = await fetch(fileUrl)
|
|
expect(response2.status).to.equal(404)
|
|
})
|
|
|
|
it('should be able to copy files', async function () {
|
|
const newProjectID = new ObjectId().toString()
|
|
const newFileId = new ObjectId().toString()
|
|
const newFileUrl = `${filestoreUrl}/project/${newProjectID}/file/${newFileId}`
|
|
let response = await fetch(newFileUrl, {
|
|
method: 'PUT',
|
|
body: JSON.stringify({
|
|
source: {
|
|
project_id: projectId,
|
|
file_id: fileId,
|
|
},
|
|
}),
|
|
headers: {
|
|
'Content-Type': 'application/json',
|
|
},
|
|
})
|
|
expect(response.status).to.equal(200)
|
|
response = await fetch(fileUrl, { method: 'DELETE' })
|
|
expect(response.status).to.equal(204)
|
|
response = await fetch(newFileUrl)
|
|
const body = await response.text()
|
|
expect(body).to.equal(constantFileContent)
|
|
})
|
|
|
|
it('should be able to overwrite the file', async function () {
|
|
const newContent = `here is some different content, ${Math.random()}`
|
|
const readStream = streamifier.createReadStream(newContent)
|
|
await fetch(fileUrl, { method: 'POST', body: readStream })
|
|
|
|
const response = await fetch(fileUrl)
|
|
const body = await response.text()
|
|
expect(body).to.equal(newContent)
|
|
})
|
|
|
|
describe('IfNoneMatch', function () {
|
|
if (backendSettings.backend === 'fs') {
|
|
it('should refuse to handle IfNoneMatch', async function () {
|
|
await expect(
|
|
app.persistor.sendStream(
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/${fileId}`,
|
|
fs.createReadStream(localFileReadPath),
|
|
{ ifNoneMatch: '*' }
|
|
)
|
|
).to.be.rejectedWith(NotImplementedError)
|
|
})
|
|
} else {
|
|
it('should reject sendStream on the same key with IfNoneMatch', async function () {
|
|
await expect(
|
|
app.persistor.sendStream(
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/${fileId}`,
|
|
fs.createReadStream(localFileReadPath),
|
|
{ ifNoneMatch: '*' }
|
|
)
|
|
).to.be.rejectedWith(AlreadyWrittenError)
|
|
})
|
|
it('should allow sendStream on a different key with IfNoneMatch', async function () {
|
|
await app.persistor.sendStream(
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/${fileId}-other`,
|
|
fs.createReadStream(localFileReadPath),
|
|
{ ifNoneMatch: '*' }
|
|
)
|
|
})
|
|
}
|
|
})
|
|
|
|
if (backendSettings.backend !== 'fs') {
|
|
it('should record an egress metric for the upload', async function () {
|
|
const metric = await TestHelper.getMetric(
|
|
filestoreUrl,
|
|
`${metricPrefix}_egress`
|
|
)
|
|
expect(metric - previousEgress).to.equal(
|
|
constantFileContent.length + dataEncryptionKeySize
|
|
)
|
|
})
|
|
|
|
it('should record an ingress metric when downloading the file', async function () {
|
|
const response = await fetch(fileUrl)
|
|
expect(response.ok).to.be.true
|
|
await response.text()
|
|
const metric = await TestHelper.getMetric(
|
|
filestoreUrl,
|
|
`${metricPrefix}_ingress`
|
|
)
|
|
expect(metric - previousIngress).to.equal(
|
|
constantFileContent.length + dataEncryptionKeySize
|
|
)
|
|
})
|
|
|
|
it('should record an ingress metric for a partial download', async function () {
|
|
const response = await fetch(fileUrl, {
|
|
headers: { Range: 'bytes=0-8' },
|
|
})
|
|
expect(response.ok).to.be.true
|
|
await response.text()
|
|
const metric = await TestHelper.getMetric(
|
|
filestoreUrl,
|
|
`${metricPrefix}_ingress`
|
|
)
|
|
expect(metric - previousIngress).to.equal(9 + dataEncryptionKeySize)
|
|
})
|
|
}
|
|
})
|
|
|
|
describe('with multiple files', function () {
|
|
let fileIds, fileUrls, otherFileUrls, projectUrl, otherProjectUrl
|
|
const localFileReadPaths = [
|
|
'/tmp/filestore_acceptance_tests_file_read_1.txt',
|
|
'/tmp/filestore_acceptance_tests_file_read_2.txt',
|
|
'/tmp/filestore_acceptance_tests_file_read_3.txt',
|
|
]
|
|
const constantFileContents = [
|
|
[
|
|
'hello world',
|
|
`line 2 goes here ${Math.random()}`,
|
|
'there are 3 lines in all',
|
|
].join('\n'),
|
|
[
|
|
`for reference: ${Math.random()}`,
|
|
'cats are the best animals',
|
|
'wombats are a close second',
|
|
].join('\n'),
|
|
[
|
|
`another file: ${Math.random()}`,
|
|
'with multiple lines',
|
|
'the end',
|
|
].join('\n'),
|
|
]
|
|
|
|
before('create local files', async function () {
|
|
return await Promise.all([
|
|
fsWriteFile(localFileReadPaths[0], constantFileContents[0]),
|
|
fsWriteFile(localFileReadPaths[1], constantFileContents[1]),
|
|
fsWriteFile(localFileReadPaths[2], constantFileContents[2]),
|
|
])
|
|
})
|
|
|
|
beforeEach('upload two files', async function () {
|
|
projectUrl = `${filestoreUrl}/project/${projectId}`
|
|
otherProjectUrl = `${filestoreUrl}/project/${otherProjectId}`
|
|
fileIds = [
|
|
new ObjectId().toString(),
|
|
new ObjectId().toString(),
|
|
new ObjectId().toString(),
|
|
]
|
|
fileUrls = [
|
|
`${projectUrl}/file/${fileIds[0]}`,
|
|
`${projectUrl}/file/${fileIds[1]}`,
|
|
]
|
|
otherFileUrls = [`${otherProjectUrl}/file/${fileIds[2]}`]
|
|
|
|
await Promise.all([
|
|
fetch(fileUrls[0], {
|
|
method: 'POST',
|
|
body: fs.createReadStream(localFileReadPaths[0]),
|
|
}),
|
|
fetch(fileUrls[1], {
|
|
method: 'POST',
|
|
body: fs.createReadStream(localFileReadPaths[1]),
|
|
}),
|
|
fetch(otherFileUrls[0], {
|
|
method: 'POST',
|
|
body: fs.createReadStream(localFileReadPaths[2]),
|
|
}),
|
|
])
|
|
})
|
|
|
|
it('should get the directory size', async function () {
|
|
const response = await fetch(
|
|
`${filestoreUrl}/project/${projectId}/size`
|
|
)
|
|
const body = await response.text()
|
|
expect(parseInt(JSON.parse(body)['total bytes'])).to.equal(
|
|
constantFileContents[0].length + constantFileContents[1].length
|
|
)
|
|
})
|
|
|
|
it('should store the files', async function () {
|
|
for (const index in fileUrls) {
|
|
const response = await fetch(fileUrls[index])
|
|
const body = await response.text()
|
|
expect(body).to.equal(constantFileContents[index])
|
|
}
|
|
})
|
|
|
|
it('should be able to delete the project', async function () {
|
|
let response = await fetch(projectUrl, { method: 'DELETE' })
|
|
expect(response.status).to.equal(204)
|
|
|
|
for (const index in fileUrls) {
|
|
response = await fetch(fileUrls[index])
|
|
expect(response.status).to.equal(404)
|
|
}
|
|
})
|
|
|
|
it('should not delete files in other projects', async function () {
|
|
for (const index in otherFileUrls) {
|
|
const response = await fetch(otherFileUrls[index])
|
|
expect(response.status).to.equal(200)
|
|
}
|
|
})
|
|
|
|
it('should not delete a partial project id', async function () {
|
|
const response = await fetch(`${filestoreUrl}/project/5`, {
|
|
method: 'DELETE',
|
|
})
|
|
expect(response.status).to.equal(400)
|
|
})
|
|
})
|
|
|
|
describe('with a large file', function () {
|
|
this.timeout(1000 * 20)
|
|
let fileId, fileUrl, largeFileContent, error
|
|
|
|
beforeEach('upload large file', async function () {
|
|
fileId = new ObjectId().toString()
|
|
fileUrl = `${filestoreUrl}/project/${projectId}/file/${fileId}`
|
|
|
|
largeFileContent = '_wombat_'.repeat(1024 * 1024) // 8 megabytes
|
|
largeFileContent += Math.random()
|
|
|
|
const readStream = streamifier.createReadStream(largeFileContent)
|
|
const res = await fetch(fileUrl, { method: 'POST', body: readStream })
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
})
|
|
|
|
it('should be able to get the file back', async function () {
|
|
const response = await fetch(fileUrl)
|
|
const body = await response.text()
|
|
expect(body).to.equal(largeFileContent)
|
|
})
|
|
|
|
it('should not throw an error', function () {
|
|
expect(error).not.to.exist
|
|
})
|
|
|
|
it('should not leak a socket', async function () {
|
|
const response = await fetch(fileUrl)
|
|
await response.text()
|
|
await expectNoSockets()
|
|
})
|
|
|
|
it('should not leak a socket if the connection is aborted', async function () {
|
|
const controller = new AbortController()
|
|
const response = await fetch(fileUrl, { signal: controller.signal })
|
|
expect(response.ok).to.be.true
|
|
controller.abort()
|
|
await expectNoSockets()
|
|
})
|
|
})
|
|
|
|
if (
|
|
(backendSettings.backend === 's3' && !backendSettings.fallback) ||
|
|
(backendSettings.backend === 'gcs' &&
|
|
backendSettings.fallback?.backend === 's3')
|
|
) {
|
|
describe('with a file in a specific bucket', function () {
|
|
let constantFileContent, fileId, fileUrl, bucketName
|
|
|
|
beforeEach('upload file into random bucket', async function () {
|
|
constantFileContent = `This is a file in a different S3 bucket ${Math.random()}`
|
|
fileId = new ObjectId().toString()
|
|
bucketName = `random-bucket-${new ObjectId().toString()}`
|
|
fileUrl = `${filestoreUrl}/bucket/${bucketName}/key/${fileId}`
|
|
|
|
const s3 = new S3Persistor({
|
|
...s3Config(),
|
|
key: process.env.MINIO_ROOT_USER,
|
|
secret: process.env.MINIO_ROOT_PASSWORD,
|
|
})._getClientForBucket(bucketName)
|
|
await s3
|
|
.createBucket({
|
|
Bucket: bucketName,
|
|
})
|
|
.promise()
|
|
await s3
|
|
.upload({
|
|
Bucket: bucketName,
|
|
Key: fileId,
|
|
Body: constantFileContent,
|
|
})
|
|
.promise()
|
|
})
|
|
|
|
it('should get the file from the specified bucket', async function () {
|
|
const response = await fetch(fileUrl)
|
|
const body = await response.text()
|
|
expect(body).to.equal(constantFileContent)
|
|
})
|
|
})
|
|
}
|
|
|
|
if (backendSettings.backend === 'gcs') {
|
|
describe('when deleting a file in GCS', function () {
|
|
let fileId, fileUrl, content, error, dateBefore, dateAfter
|
|
|
|
beforeEach('upload and delete file', async function () {
|
|
fileId = new ObjectId()
|
|
fileUrl = `${filestoreUrl}/project/${projectId}/file/${fileId}`
|
|
|
|
content = '_wombat_' + Math.random()
|
|
|
|
const readStream = streamifier.createReadStream(content)
|
|
let res = await fetch(fileUrl, { method: 'POST', body: readStream })
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
dateBefore = new Date()
|
|
res = await fetch(fileUrl, { method: 'DELETE' })
|
|
dateAfter = new Date()
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
})
|
|
|
|
it('should not throw an error', function () {
|
|
expect(error).not.to.exist
|
|
})
|
|
|
|
it('should copy the file to the deleted-files bucket', async function () {
|
|
let date = dateBefore
|
|
const keys = []
|
|
while (date <= dateAfter) {
|
|
keys.push(`${projectId}/${fileId}-${date.toISOString()}`)
|
|
date = new Date(date.getTime() + 1)
|
|
}
|
|
await TestHelper.expectPersistorToHaveSomeFile(
|
|
app.persistor,
|
|
`${Settings.filestore.stores.user_files}-deleted`,
|
|
keys,
|
|
content
|
|
)
|
|
})
|
|
|
|
it('should remove the file from the original bucket', async function () {
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor,
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/${fileId}`
|
|
)
|
|
})
|
|
})
|
|
}
|
|
|
|
if (backendSettings.fallback) {
|
|
describe('with a fallback', function () {
|
|
let constantFileContent,
|
|
fileId,
|
|
fileKey,
|
|
fileUrl,
|
|
bucket,
|
|
fallbackBucket
|
|
|
|
beforeEach('prepare fallback', function () {
|
|
constantFileContent = `This is yet more file content ${Math.random()}`
|
|
fileId = new ObjectId().toString()
|
|
fileKey = `${projectId}/${fileId}`
|
|
fileUrl = `${filestoreUrl}/project/${projectId}/file/${fileId}`
|
|
|
|
bucket = Settings.filestore.stores.user_files
|
|
fallbackBucket = Settings.filestore.fallback.buckets[bucket]
|
|
})
|
|
|
|
describe('with a file in the fallback bucket', function () {
|
|
beforeEach('upload into fallback', async function () {
|
|
await TestHelper.uploadStringToPersistor(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should not find file in the primary', async function () {
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey
|
|
)
|
|
})
|
|
|
|
it('should find the file in the fallback', async function () {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
describe('when copyOnMiss is disabled', function () {
|
|
beforeEach('swap copyOnMiss=false', function () {
|
|
app.persistor.settings.copyOnMiss = false
|
|
})
|
|
|
|
it('should fetch the file', async function () {
|
|
const res = await fetch(fileUrl)
|
|
const body = await res.text()
|
|
expect(body).to.equal(constantFileContent)
|
|
})
|
|
|
|
it('should not copy the file to the primary', async function () {
|
|
const response = await fetch(fileUrl)
|
|
expect(response.ok).to.be.true
|
|
await response.text()
|
|
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey
|
|
)
|
|
})
|
|
})
|
|
|
|
describe('when copyOnMiss is enabled', function () {
|
|
beforeEach('swap copyOnMiss=true', function () {
|
|
app.persistor.settings.copyOnMiss = true
|
|
})
|
|
|
|
it('should fetch the file', async function () {
|
|
const res = await fetch(fileUrl)
|
|
const body = await res.text()
|
|
expect(body).to.equal(constantFileContent)
|
|
})
|
|
|
|
it('copies the file to the primary', async function () {
|
|
const response = await fetch(fileUrl)
|
|
expect(response.ok).to.be.true
|
|
await response.text()
|
|
// wait for the file to copy in the background
|
|
await msleep(1000)
|
|
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
})
|
|
|
|
describe('when copying a file', function () {
|
|
let newFileId, newFileUrl, newFileKey, opts
|
|
|
|
beforeEach('prepare to copy file', function () {
|
|
const newProjectID = new ObjectId().toString()
|
|
newFileId = new ObjectId().toString()
|
|
newFileUrl = `${filestoreUrl}/project/${newProjectID}/file/${newFileId}`
|
|
newFileKey = `${newProjectID}/${newFileId}`
|
|
|
|
opts = {
|
|
method: 'put',
|
|
body: JSON.stringify({
|
|
source: {
|
|
project_id: projectId,
|
|
file_id: fileId,
|
|
},
|
|
}),
|
|
headers: {
|
|
'Content-Type': 'application/json',
|
|
},
|
|
}
|
|
})
|
|
|
|
describe('when copyOnMiss is false', function () {
|
|
beforeEach('copy with copyOnMiss=false', async function () {
|
|
app.persistor.settings.copyOnMiss = false
|
|
|
|
const response = await fetch(newFileUrl, opts)
|
|
expect(response.status).to.equal(200)
|
|
})
|
|
|
|
it('should leave the old file in the old bucket', async function () {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should not create a new file in the old bucket', async function () {
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
newFileKey
|
|
)
|
|
})
|
|
|
|
it('should create a new file in the new bucket', async function () {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
newFileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should not copy the old file to the primary with the old key', async function () {
|
|
// wait for the file to copy in the background
|
|
await msleep(1000)
|
|
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey
|
|
)
|
|
})
|
|
})
|
|
|
|
describe('when copyOnMiss is true', function () {
|
|
beforeEach('copy with copyOnMiss=false', async function () {
|
|
app.persistor.settings.copyOnMiss = true
|
|
|
|
const response = await fetch(newFileUrl, opts)
|
|
expect(response.status).to.equal(200)
|
|
})
|
|
|
|
it('should leave the old file in the old bucket', async function () {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should not create a new file in the old bucket', async function () {
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
newFileKey
|
|
)
|
|
})
|
|
|
|
it('should create a new file in the new bucket', async function () {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
newFileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should copy the old file to the primary with the old key', async function () {
|
|
// wait for the file to copy in the background
|
|
await msleep(1000)
|
|
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('when sending a file', function () {
|
|
beforeEach('upload file', async function () {
|
|
const readStream =
|
|
streamifier.createReadStream(constantFileContent)
|
|
const res = await fetch(fileUrl, {
|
|
method: 'POST',
|
|
body: readStream,
|
|
})
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
})
|
|
|
|
it('should store the file on the primary', async function () {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should not store the file on the fallback', async function () {
|
|
await TestHelper.expectPersistorNotToHaveFile(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
`${projectId}/${fileId}`
|
|
)
|
|
})
|
|
})
|
|
|
|
describe('when deleting a file', function () {
|
|
describe('when the file exists on the primary', function () {
|
|
beforeEach('upload into primary', async function () {
|
|
await TestHelper.uploadStringToPersistor(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should delete the file', async function () {
|
|
const response1 = await fetch(fileUrl, { method: 'DELETE' })
|
|
expect(response1.status).to.equal(204)
|
|
const response2 = await fetch(fileUrl)
|
|
expect(response2.status).to.equal(404)
|
|
})
|
|
})
|
|
|
|
describe('when the file exists on the fallback', function () {
|
|
beforeEach('upload into fallback', async function () {
|
|
await TestHelper.uploadStringToPersistor(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
})
|
|
|
|
it('should delete the file', async function () {
|
|
const response1 = await fetch(fileUrl, { method: 'DELETE' })
|
|
expect(response1.status).to.equal(204)
|
|
const response2 = await fetch(fileUrl)
|
|
expect(response2.status).to.equal(404)
|
|
})
|
|
})
|
|
|
|
describe('when the file exists on both the primary and the fallback', function () {
|
|
beforeEach(
|
|
'upload into both primary and fallback',
|
|
async function () {
|
|
await TestHelper.uploadStringToPersistor(
|
|
app.persistor.primaryPersistor,
|
|
bucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
await TestHelper.uploadStringToPersistor(
|
|
app.persistor.fallbackPersistor,
|
|
fallbackBucket,
|
|
fileKey,
|
|
constantFileContent
|
|
)
|
|
}
|
|
)
|
|
|
|
it('should delete the files', async function () {
|
|
const response1 = await fetch(fileUrl, { method: 'DELETE' })
|
|
expect(response1.status).to.equal(204)
|
|
const response2 = await fetch(fileUrl)
|
|
expect(response2.status).to.equal(404)
|
|
})
|
|
})
|
|
|
|
describe('when the file does not exist', function () {
|
|
it('should return return 204', async function () {
|
|
// S3 doesn't give us a 404 when the object doesn't exist, so to stay
|
|
// consistent we merrily return 204 ourselves here as well
|
|
const response = await fetch(fileUrl, { method: 'DELETE' })
|
|
expect(response.status).to.equal(204)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
describe('with a pdf file', function () {
|
|
let fileId, fileUrl, localFileSize
|
|
const localFileReadPath = Path.resolve(
|
|
__dirname,
|
|
'../../fixtures/test.pdf'
|
|
)
|
|
|
|
beforeEach('upload test.pdf', async function () {
|
|
fileId = new ObjectId().toString()
|
|
fileUrl = `${filestoreUrl}/project/${projectId}/file/${fileId}`
|
|
const stat = await fsStat(localFileReadPath)
|
|
localFileSize = stat.size
|
|
const readStream = fs.createReadStream(localFileReadPath)
|
|
const res = await fetch(fileUrl, { method: 'POST', body: readStream })
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
})
|
|
|
|
it('should be able get the file back', async function () {
|
|
const response = await fetch(fileUrl)
|
|
const body = await response.text()
|
|
expect(body.substring(0, 8)).to.equal('%PDF-1.5')
|
|
})
|
|
|
|
if (backendSettings.backend !== 'fs') {
|
|
it('should record an egress metric for the upload', async function () {
|
|
const metric = await TestHelper.getMetric(
|
|
filestoreUrl,
|
|
`${metricPrefix}_egress`
|
|
)
|
|
expect(metric - previousEgress).to.equal(
|
|
localFileSize + dataEncryptionKeySize
|
|
)
|
|
})
|
|
}
|
|
|
|
describe('getting the preview image', function () {
|
|
this.timeout(1000 * 20)
|
|
let previewFileUrl
|
|
|
|
beforeEach('prepare previewFileUrl for preview', function () {
|
|
previewFileUrl = `${fileUrl}?style=preview`
|
|
})
|
|
|
|
it('should not time out', async function () {
|
|
const response = await fetch(previewFileUrl)
|
|
expect(response.status).to.equal(200)
|
|
await response.arrayBuffer()
|
|
})
|
|
|
|
it('should respond with image data', async function () {
|
|
// note: this test relies of the imagemagick conversion working
|
|
const response = await fetch(previewFileUrl)
|
|
expect(response.status).to.equal(200)
|
|
const body = await response.text()
|
|
expect(body.length).to.be.greaterThan(400)
|
|
expect(body.substr(1, 3)).to.equal('PNG')
|
|
})
|
|
})
|
|
|
|
describe('warming the cache', function () {
|
|
this.timeout(1000 * 20)
|
|
let previewFileUrl
|
|
|
|
beforeEach('prepare previewFileUrl for cacheWarn', function () {
|
|
previewFileUrl = `${fileUrl}?style=preview&cacheWarm=true`
|
|
})
|
|
|
|
it('should not time out', async function () {
|
|
const response = await fetch(previewFileUrl)
|
|
expect(response.status).to.equal(200)
|
|
await response.arrayBuffer()
|
|
})
|
|
|
|
it('should not leak sockets', async function () {
|
|
const response1 = await fetch(previewFileUrl)
|
|
expect(response1.status).to.equal(200)
|
|
// do not read the response body, should be destroyed immediately
|
|
const response2 = await fetch(previewFileUrl)
|
|
expect(response2.status).to.equal(200)
|
|
// do not read the response body, should be destroyed immediately
|
|
await expectNoSockets()
|
|
})
|
|
|
|
it("should respond with only an 'OK'", async function () {
|
|
// note: this test relies of the imagemagick conversion working
|
|
const response = await fetch(previewFileUrl)
|
|
const body = await response.text()
|
|
expect(body).to.equal('OK')
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('with server side encryption', function () {
|
|
if (backendSettings.backend !== 's3SSEC') return
|
|
|
|
before('sanity check top-level variable', function () {
|
|
expect(dataEncryptionKeySize).to.equal(32)
|
|
})
|
|
|
|
let fileId1,
|
|
fileId2,
|
|
fileKey1,
|
|
fileKey2,
|
|
fileKeyOtherProject,
|
|
fileUrl1,
|
|
fileUrl2
|
|
beforeEach('prepare ids', function () {
|
|
fileId1 = new ObjectId().toString()
|
|
fileId2 = new ObjectId().toString()
|
|
fileKey1 = `${projectId}/${fileId1}`
|
|
fileKey2 = `${projectId}/${fileId2}`
|
|
fileKeyOtherProject = `${new ObjectId().toString()}/${new ObjectId().toString()}`
|
|
fileUrl1 = `${filestoreUrl}/project/${projectId}/file/${fileId1}`
|
|
fileUrl2 = `${filestoreUrl}/project/${projectId}/file/${fileId2}`
|
|
})
|
|
|
|
beforeEach('ensure DEK is missing', async function () {
|
|
// Cannot use test helper expectPersistorNotToHaveFile here, we need to use the KEK.
|
|
await expect(
|
|
app.persistor.getDataEncryptionKeySize(
|
|
backendSettings.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.rejectedWith(NotFoundError)
|
|
})
|
|
|
|
async function createRandomContent(url, suffix = '') {
|
|
const content = Math.random().toString() + suffix
|
|
const res = await fetch(url, {
|
|
method: 'POST',
|
|
body: Stream.Readable.from([content]),
|
|
})
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
return async () => {
|
|
const res = await fetch(url, { method: 'GET' })
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
expect(await res.text()).to.equal(content)
|
|
}
|
|
}
|
|
|
|
it('should create a DEK when asked explicitly', async function () {
|
|
await app.persistor.generateDataEncryptionKey(
|
|
backendSettings.stores.user_files,
|
|
fileKey1
|
|
)
|
|
expect(
|
|
await app.persistor.getDataEncryptionKeySize(
|
|
backendSettings.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.equal(32)
|
|
})
|
|
|
|
it('should create a DEK from writes', async function () {
|
|
await createRandomContent(fileUrl1)
|
|
expect(
|
|
await app.persistor.getDataEncryptionKeySize(
|
|
backendSettings.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.equal(32)
|
|
})
|
|
|
|
it('should not create a DEK from reads', async function () {
|
|
const res = await fetch(fileUrl1, {
|
|
method: 'GET',
|
|
})
|
|
if (res.status !== 404) throw new Error(`${res.status} should be 404`)
|
|
|
|
// Cannot use test helper expectPersistorNotToHaveFile here, we need to use the KEK.
|
|
await expect(
|
|
app.persistor.getDataEncryptionKeySize(
|
|
backendSettings.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.rejectedWith(NotFoundError)
|
|
})
|
|
|
|
it('should never overwrite a data encryption key', async function () {
|
|
const checkGET = await createRandomContent(fileUrl1)
|
|
|
|
await expect(
|
|
app.persistor.generateDataEncryptionKey(
|
|
backendSettings.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.rejectedWith(AlreadyWrittenError)
|
|
|
|
await checkGET()
|
|
})
|
|
|
|
it('should re-use the data encryption key after a write', async function () {
|
|
const checkGET1 = await createRandomContent(fileUrl1, '1')
|
|
const checkGET2 = await createRandomContent(fileUrl2, '2')
|
|
await checkGET1()
|
|
await checkGET2()
|
|
})
|
|
|
|
describe('kek rotation', function () {
|
|
const newKEK = new RootKeyEncryptionKey(
|
|
crypto.generateKeySync('aes', { length: 256 }).export(),
|
|
Buffer.alloc(32)
|
|
)
|
|
const oldKEK = new RootKeyEncryptionKey(
|
|
crypto.generateKeySync('aes', { length: 256 }).export(),
|
|
Buffer.alloc(32)
|
|
)
|
|
const migrationStep0 = new PerProjectEncryptedS3Persistor({
|
|
...s3SSECConfig(),
|
|
automaticallyRotateDEKEncryption: false,
|
|
async getRootKeyEncryptionKeys() {
|
|
return [oldKEK] // only old key
|
|
},
|
|
})
|
|
const migrationStep1 = new PerProjectEncryptedS3Persistor({
|
|
...s3SSECConfig(),
|
|
automaticallyRotateDEKEncryption: false,
|
|
async getRootKeyEncryptionKeys() {
|
|
return [oldKEK, newKEK] // new key as fallback
|
|
},
|
|
})
|
|
const migrationStep2 = new PerProjectEncryptedS3Persistor({
|
|
...s3SSECConfig(),
|
|
automaticallyRotateDEKEncryption: true, // <- different compared to partiallyRotated
|
|
async getRootKeyEncryptionKeys() {
|
|
return [newKEK, oldKEK] // old keys as fallback
|
|
},
|
|
})
|
|
const migrationStep3 = new PerProjectEncryptedS3Persistor({
|
|
...s3SSECConfig(),
|
|
automaticallyRotateDEKEncryption: true,
|
|
async getRootKeyEncryptionKeys() {
|
|
return [newKEK] // only new key
|
|
},
|
|
})
|
|
|
|
async function checkWrites(
|
|
fileKey,
|
|
writer,
|
|
readersSuccess,
|
|
readersFailed
|
|
) {
|
|
const content = Math.random().toString()
|
|
await writer.sendStream(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey,
|
|
Stream.Readable.from([content])
|
|
)
|
|
|
|
for (const persistor of readersSuccess) {
|
|
await TestHelper.expectPersistorToHaveFile(
|
|
persistor,
|
|
backendSettings.stores.user_files,
|
|
fileKey,
|
|
content
|
|
)
|
|
}
|
|
|
|
for (const persistor of readersFailed) {
|
|
await expect(
|
|
TestHelper.expectPersistorToHaveFile(
|
|
persistor,
|
|
backendSettings.stores.user_files,
|
|
fileKey,
|
|
content
|
|
)
|
|
).to.be.rejectedWith(NoKEKMatchedError)
|
|
}
|
|
}
|
|
|
|
const stages = [
|
|
{
|
|
name: 'stage 0 - [old]',
|
|
prev: migrationStep0,
|
|
cur: migrationStep0,
|
|
fail: [migrationStep3],
|
|
},
|
|
{
|
|
name: 'stage 1 - [old,new]',
|
|
prev: migrationStep0,
|
|
cur: migrationStep1,
|
|
fail: [],
|
|
},
|
|
{
|
|
name: 'stage 2 - [new,old]',
|
|
prev: migrationStep1,
|
|
cur: migrationStep2,
|
|
fail: [],
|
|
},
|
|
{
|
|
name: 'stage 3 - [new]',
|
|
prev: migrationStep2,
|
|
cur: migrationStep3,
|
|
fail: [migrationStep0],
|
|
},
|
|
]
|
|
|
|
for (const { name, prev, cur, fail } of stages) {
|
|
describe(name, function () {
|
|
this.timeout(1000 * 30)
|
|
|
|
it('can read old writes', async function () {
|
|
await checkWrites(fileKey1, prev, [prev, cur], fail)
|
|
await checkWrites(fileKey2, prev, [prev, cur], fail) // check again after access
|
|
await checkWrites(fileKeyOtherProject, prev, [prev, cur], fail)
|
|
})
|
|
it('can read new writes', async function () {
|
|
await checkWrites(fileKey1, prev, [prev, cur], fail)
|
|
await checkWrites(fileKey2, cur, [prev, cur], fail) // check again after access
|
|
await checkWrites(fileKeyOtherProject, cur, [prev, cur], fail)
|
|
})
|
|
})
|
|
}
|
|
|
|
describe('full migration', function () {
|
|
it('can read old writes if rotated in sequence', async function () {
|
|
await checkWrites(
|
|
fileKey1,
|
|
migrationStep0,
|
|
[
|
|
migrationStep0,
|
|
migrationStep1,
|
|
migrationStep2, // migrates
|
|
migrationStep3,
|
|
],
|
|
[]
|
|
)
|
|
})
|
|
it('cannot read/write if not rotated', async function () {
|
|
await checkWrites(
|
|
fileKey1,
|
|
migrationStep0,
|
|
[migrationStep0],
|
|
[migrationStep3]
|
|
)
|
|
})
|
|
})
|
|
})
|
|
|
|
let s3Client
|
|
before('create s3 client', function () {
|
|
s3Client = new S3Persistor(s3Config())._getClientForBucket('')
|
|
})
|
|
|
|
async function checkDEKStorage({
|
|
dekBucketKeys = [],
|
|
userFilesBucketKeys = [],
|
|
}) {
|
|
await createRandomContent(fileUrl1)
|
|
|
|
const { Contents: dekEntries } = await s3Client
|
|
.listObjectsV2({
|
|
Bucket: process.env.AWS_S3_USER_FILES_DEK_BUCKET_NAME,
|
|
Prefix: `${projectId}/`,
|
|
})
|
|
.promise()
|
|
expect(dekEntries).to.have.length(dekBucketKeys.length)
|
|
// Order is not predictable, use members
|
|
expect(dekEntries.map(o => o.Key)).to.have.members(dekBucketKeys)
|
|
|
|
const { Contents: userFilesEntries } = await s3Client
|
|
.listObjectsV2({
|
|
Bucket: backendSettings.stores.user_files,
|
|
Prefix: `${projectId}/`,
|
|
})
|
|
.promise()
|
|
expect(userFilesEntries).to.have.length(userFilesBucketKeys.length)
|
|
// Order is not predictable, use members
|
|
expect(userFilesEntries.map(o => o.Key)).to.have.members(
|
|
userFilesBucketKeys
|
|
)
|
|
}
|
|
|
|
it('should use a custom bucket for DEKs', async function () {
|
|
await checkDEKStorage({
|
|
dekBucketKeys: [`${projectId}/dek`],
|
|
userFilesBucketKeys: [fileKey1],
|
|
})
|
|
})
|
|
|
|
describe('deleteDirectory', function () {
|
|
let checkGET2
|
|
beforeEach('create files', async function () {
|
|
await createRandomContent(fileUrl1, '1')
|
|
checkGET2 = await createRandomContent(fileUrl2, '2')
|
|
})
|
|
it('should delete sub-folder and keep DEK', async function () {
|
|
await app.persistor.deleteDirectory(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey1 // not really a sub-folder, but it will do for this test.
|
|
)
|
|
expect(
|
|
await app.persistor.checkIfObjectExists(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.equal(false)
|
|
expect(
|
|
await app.persistor.checkIfObjectExists(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey2
|
|
)
|
|
).to.equal(true)
|
|
expect(
|
|
await app.persistor.getDataEncryptionKeySize(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey2
|
|
)
|
|
).to.equal(32)
|
|
await checkGET2()
|
|
})
|
|
it('should delete project folder and DEK', async function () {
|
|
await app.persistor.deleteDirectory(
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/`
|
|
)
|
|
expect(
|
|
await app.persistor.checkIfObjectExists(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey1
|
|
)
|
|
).to.equal(false)
|
|
expect(
|
|
await app.persistor.checkIfObjectExists(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey2
|
|
)
|
|
).to.equal(false)
|
|
await expect(
|
|
app.persistor.getDataEncryptionKeySize(
|
|
Settings.filestore.stores.user_files,
|
|
fileKey2
|
|
)
|
|
).to.rejectedWith(NotFoundError)
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('checkIfObjectExists', function () {
|
|
it('should return false when the object does not exist', async function () {
|
|
expect(
|
|
await app.persistor.checkIfObjectExists(
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/${new ObjectId().toString()}`
|
|
)
|
|
).to.equal(false)
|
|
})
|
|
it('should return true when the object exists', async function () {
|
|
const fileId = new ObjectId().toString()
|
|
const fileUrl = `${filestoreUrl}/project/${projectId}/file/${fileId}`
|
|
const res = await fetch(fileUrl, {
|
|
method: 'POST',
|
|
body: Stream.Readable.from(['hello']),
|
|
})
|
|
if (!res.ok) throw new Error(res.statusText)
|
|
expect(
|
|
await app.persistor.checkIfObjectExists(
|
|
Settings.filestore.stores.user_files,
|
|
`${projectId}/${fileId}`
|
|
)
|
|
).to.equal(true)
|
|
})
|
|
})
|
|
})
|
|
}
|
|
})
|