integration_test.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648
  1. // Copyright 2014 Google Inc. All Rights Reserved.
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package storage
  15. import (
  16. "bytes"
  17. "crypto/md5"
  18. "fmt"
  19. "io"
  20. "io/ioutil"
  21. "log"
  22. "math/rand"
  23. "net/http"
  24. "os"
  25. "regexp"
  26. "strconv"
  27. "strings"
  28. "testing"
  29. "time"
  30. "golang.org/x/net/context"
  31. "google.golang.org/cloud"
  32. "google.golang.org/cloud/internal/testutil"
  33. )
  34. // suffix is a timestamp-based suffix which is added, where possible, to all
  35. // buckets and objects created by tests. This reduces flakiness when the tests
  36. // are run in parallel and allows automatic cleaning up of artifacts left when
  37. // tests fail.
  38. var suffix = fmt.Sprintf("-t%d", time.Now().UnixNano())
  39. var ranIntegrationTest bool
  40. func TestMain(m *testing.M) {
  41. // Run the tests, then follow by running any cleanup required.
  42. exit := m.Run()
  43. if ranIntegrationTest {
  44. if err := cleanup(); err != nil {
  45. log.Fatalf("Post-test cleanup failed: %v", err)
  46. }
  47. }
  48. os.Exit(exit)
  49. }
  50. // testConfig returns the Client used to access GCS and the default bucket
  51. // name to use. testConfig skips the current test if credentials are not
  52. // available or when being run in Short mode.
  53. func testConfig(ctx context.Context, t *testing.T) (*Client, string) {
  54. if testing.Short() {
  55. t.Skip("Integration tests skipped in short mode")
  56. }
  57. client, bucket := config(ctx)
  58. if client == nil {
  59. t.Skip("Integration tests skipped. See CONTRIBUTING.md for details")
  60. }
  61. ranIntegrationTest = true
  62. return client, bucket
  63. }
  64. // config is like testConfig, but it doesn't need a *testing.T.
  65. func config(ctx context.Context) (*Client, string) {
  66. ts := testutil.TokenSource(ctx, ScopeFullControl)
  67. if ts == nil {
  68. return nil, ""
  69. }
  70. p := testutil.ProjID()
  71. if p == "" {
  72. log.Fatal("The project ID must be set. See CONTRIBUTING.md for details")
  73. }
  74. client, err := NewClient(ctx, cloud.WithTokenSource(ts))
  75. if err != nil {
  76. log.Fatalf("NewClient: %v", err)
  77. }
  78. return client, p
  79. }
  80. func TestAdminClient(t *testing.T) {
  81. if testing.Short() {
  82. t.Skip("Integration tests skipped in short mode")
  83. }
  84. ctx := context.Background()
  85. ts := testutil.TokenSource(ctx, ScopeFullControl)
  86. if ts == nil {
  87. t.Skip("Integration tests skipped. See CONTRIBUTING.md for details")
  88. }
  89. projectID := testutil.ProjID()
  90. newBucket := projectID + suffix
  91. t.Logf("Testing admin with Bucket %q", newBucket)
  92. client, err := NewAdminClient(ctx, projectID, cloud.WithTokenSource(ts))
  93. if err != nil {
  94. t.Fatalf("Could not create client: %v", err)
  95. }
  96. defer client.Close()
  97. if err := client.CreateBucket(ctx, newBucket, nil); err != nil {
  98. t.Errorf("CreateBucket(%v, %v) failed %v", newBucket, nil, err)
  99. }
  100. if err := client.DeleteBucket(ctx, newBucket); err != nil {
  101. t.Errorf("DeleteBucket(%v) failed %v", newBucket, err)
  102. t.Logf("TODO: Warning this test left a new bucket in the cloud project, it must be deleted manually")
  103. }
  104. attrs := BucketAttrs{
  105. DefaultObjectACL: []ACLRule{{Entity: "domain-google.com", Role: RoleReader}},
  106. }
  107. if err := client.CreateBucket(ctx, newBucket, &attrs); err != nil {
  108. t.Errorf("CreateBucket(%v, %v) failed %v", newBucket, attrs, err)
  109. }
  110. if err := client.DeleteBucket(ctx, newBucket); err != nil {
  111. t.Errorf("DeleteBucket(%v) failed %v", newBucket, err)
  112. t.Logf("TODO: Warning this test left a new bucket in the cloud project, it must be deleted manually")
  113. }
  114. }
  115. func TestIntegration_ConditionalDelete(t *testing.T) {
  116. ctx := context.Background()
  117. client, bucket := testConfig(ctx, t)
  118. defer client.Close()
  119. o := client.Bucket(bucket).Object("conddel" + suffix)
  120. wc := o.NewWriter(ctx)
  121. wc.ContentType = "text/plain"
  122. if _, err := wc.Write([]byte("foo")); err != nil {
  123. t.Fatal(err)
  124. }
  125. if err := wc.Close(); err != nil {
  126. t.Fatal(err)
  127. }
  128. gen := wc.Attrs().Generation
  129. metaGen := wc.Attrs().MetaGeneration
  130. if err := o.WithConditions(Generation(gen - 1)).Delete(ctx); err == nil {
  131. t.Fatalf("Unexpected successful delete with Generation")
  132. }
  133. if err := o.WithConditions(IfMetaGenerationMatch(metaGen + 1)).Delete(ctx); err == nil {
  134. t.Fatalf("Unexpected successful delete with IfMetaGenerationMatch")
  135. }
  136. if err := o.WithConditions(IfMetaGenerationNotMatch(metaGen)).Delete(ctx); err == nil {
  137. t.Fatalf("Unexpected successful delete with IfMetaGenerationNotMatch")
  138. }
  139. if err := o.WithConditions(Generation(gen)).Delete(ctx); err != nil {
  140. t.Fatalf("final delete failed: %v", err)
  141. }
  142. }
  143. func TestObjects(t *testing.T) {
  144. ctx := context.Background()
  145. client, bucket := testConfig(ctx, t)
  146. defer client.Close()
  147. bkt := client.Bucket(bucket)
  148. const defaultType = "text/plain"
  149. // Populate object names and make a map for their contents.
  150. objects := []string{
  151. "obj1" + suffix,
  152. "obj2" + suffix,
  153. "obj/with/slashes" + suffix,
  154. }
  155. contents := make(map[string][]byte)
  156. // Test Writer.
  157. for _, obj := range objects {
  158. t.Logf("Writing %q", obj)
  159. wc := bkt.Object(obj).NewWriter(ctx)
  160. wc.ContentType = defaultType
  161. c := randomContents()
  162. if _, err := wc.Write(c); err != nil {
  163. t.Errorf("Write for %v failed with %v", obj, err)
  164. }
  165. if err := wc.Close(); err != nil {
  166. t.Errorf("Close for %v failed with %v", obj, err)
  167. }
  168. contents[obj] = c
  169. }
  170. // Test Reader.
  171. for _, obj := range objects {
  172. t.Logf("Creating a reader to read %v", obj)
  173. rc, err := bkt.Object(obj).NewReader(ctx)
  174. if err != nil {
  175. t.Errorf("Can't create a reader for %v, errored with %v", obj, err)
  176. }
  177. slurp, err := ioutil.ReadAll(rc)
  178. if err != nil {
  179. t.Errorf("Can't ReadAll object %v, errored with %v", obj, err)
  180. }
  181. if got, want := slurp, contents[obj]; !bytes.Equal(got, want) {
  182. t.Errorf("Contents (%q) = %q; want %q", obj, got, want)
  183. }
  184. if got, want := rc.Size(), len(contents[obj]); got != int64(want) {
  185. t.Errorf("Size (%q) = %d; want %d", obj, got, want)
  186. }
  187. if got, want := rc.ContentType(), "text/plain"; got != want {
  188. t.Errorf("ContentType (%q) = %q; want %q", obj, got, want)
  189. }
  190. rc.Close()
  191. // Test SignedURL
  192. opts := &SignedURLOptions{
  193. GoogleAccessID: "xxx@clientid",
  194. PrivateKey: dummyKey("rsa"),
  195. Method: "GET",
  196. MD5: []byte("202cb962ac59075b964b07152d234b70"),
  197. Expires: time.Date(2020, time.October, 2, 10, 0, 0, 0, time.UTC),
  198. ContentType: "application/json",
  199. Headers: []string{"x-header1", "x-header2"},
  200. }
  201. u, err := SignedURL(bucket, obj, opts)
  202. if err != nil {
  203. t.Fatalf("SignedURL(%q, %q) errored with %v", bucket, obj, err)
  204. }
  205. res, err := client.hc.Get(u)
  206. if err != nil {
  207. t.Fatalf("Can't get URL %q: %v", u, err)
  208. }
  209. slurp, err = ioutil.ReadAll(res.Body)
  210. if err != nil {
  211. t.Fatalf("Can't ReadAll signed object %v, errored with %v", obj, err)
  212. }
  213. if got, want := slurp, contents[obj]; !bytes.Equal(got, want) {
  214. t.Errorf("Contents (%v) = %q; want %q", obj, got, want)
  215. }
  216. res.Body.Close()
  217. }
  218. obj := objects[0]
  219. objlen := int64(len(contents[obj]))
  220. // Test Range Reader.
  221. for i, r := range []struct {
  222. offset, length, want int64
  223. }{
  224. {0, objlen, objlen},
  225. {0, objlen / 2, objlen / 2},
  226. {objlen / 2, objlen, objlen / 2},
  227. {0, 0, 0},
  228. {objlen / 2, 0, 0},
  229. {objlen / 2, -1, objlen / 2},
  230. {0, objlen * 2, objlen},
  231. } {
  232. t.Logf("%d: bkt.Object(%v).NewRangeReader(ctx, %d, %d)", i, obj, r.offset, r.length)
  233. rc, err := bkt.Object(obj).NewRangeReader(ctx, r.offset, r.length)
  234. if err != nil {
  235. t.Errorf("%d: Can't create a range reader for %v, errored with %v", i, obj, err)
  236. continue
  237. }
  238. if rc.Size() != objlen {
  239. t.Errorf("%d: Reader has a content-size of %d, want %d", i, rc.Size(), objlen)
  240. }
  241. if rc.Remain() != r.want {
  242. t.Errorf("%d: Reader's available bytes reported as %d, want %d", i, rc.Remain(), r.want)
  243. }
  244. slurp, err := ioutil.ReadAll(rc)
  245. if err != nil {
  246. t.Errorf("%d:Can't ReadAll object %v, errored with %v", i, obj, err)
  247. continue
  248. }
  249. if len(slurp) != int(r.want) {
  250. t.Errorf("%d:RangeReader (%d, %d): Read %d bytes, wanted %d bytes", i, r.offset, r.length, len(slurp), r.want)
  251. continue
  252. }
  253. if got, want := slurp, contents[obj][r.offset:r.offset+r.want]; !bytes.Equal(got, want) {
  254. t.Errorf("RangeReader (%d, %d) = %q; want %q", r.offset, r.length, got, want)
  255. }
  256. rc.Close()
  257. }
  258. // Test NotFound.
  259. _, err := bkt.Object("obj-not-exists").NewReader(ctx)
  260. if err != ErrObjectNotExist {
  261. t.Errorf("Object should not exist, err found to be %v", err)
  262. }
  263. objName := objects[0]
  264. // Test StatObject.
  265. o, err := bkt.Object(objName).Attrs(ctx)
  266. if err != nil {
  267. t.Error(err)
  268. }
  269. if got, want := o.Name, objName; got != want {
  270. t.Errorf("Name (%v) = %q; want %q", objName, got, want)
  271. }
  272. if got, want := o.ContentType, defaultType; got != want {
  273. t.Errorf("ContentType (%v) = %q; want %q", objName, got, want)
  274. }
  275. created := o.Created
  276. // Check that the object is newer than its containing bucket.
  277. bAttrs, err := bkt.Attrs(ctx)
  278. if err != nil {
  279. t.Error(err)
  280. }
  281. if o.Created.Before(bAttrs.Created) {
  282. t.Errorf("Object %v is older than its containing bucket, %v", o, bAttrs)
  283. }
  284. // Test object copy.
  285. copyName := "copy-" + objName
  286. copyObj, err := bkt.Object(objName).CopyTo(ctx, bkt.Object(copyName), nil)
  287. if err != nil {
  288. t.Errorf("CopyTo failed with %v", err)
  289. }
  290. if copyObj.Name != copyName {
  291. t.Errorf("Copy object's name = %q; want %q", copyObj.Name, copyName)
  292. }
  293. if copyObj.Bucket != bucket {
  294. t.Errorf("Copy object's bucket = %q; want %q", copyObj.Bucket, bucket)
  295. }
  296. // Test UpdateAttrs.
  297. updated, err := bkt.Object(objName).Update(ctx, ObjectAttrs{
  298. ContentType: "text/html",
  299. ACL: []ACLRule{{Entity: "domain-google.com", Role: RoleReader}},
  300. })
  301. if err != nil {
  302. t.Errorf("UpdateAttrs failed with %v", err)
  303. }
  304. if want := "text/html"; updated.ContentType != want {
  305. t.Errorf("updated.ContentType == %q; want %q", updated.ContentType, want)
  306. }
  307. if want := created; updated.Created != want {
  308. t.Errorf("updated.Created == %q; want %q", updated.Created, want)
  309. }
  310. if !updated.Created.Before(updated.Updated) {
  311. t.Errorf("updated.Updated should be newer than update.Created")
  312. }
  313. // Test checksums.
  314. checksumCases := []struct {
  315. name string
  316. contents [][]byte
  317. size int64
  318. md5 string
  319. crc32c uint32
  320. }{
  321. {
  322. name: "checksum-object",
  323. contents: [][]byte{[]byte("hello"), []byte("world")},
  324. size: 10,
  325. md5: "fc5e038d38a57032085441e7fe7010b0",
  326. crc32c: 1456190592,
  327. },
  328. {
  329. name: "zero-object",
  330. contents: [][]byte{},
  331. size: 0,
  332. md5: "d41d8cd98f00b204e9800998ecf8427e",
  333. crc32c: 0,
  334. },
  335. }
  336. for _, c := range checksumCases {
  337. wc := bkt.Object(c.name).NewWriter(ctx)
  338. for _, data := range c.contents {
  339. if _, err := wc.Write(data); err != nil {
  340. t.Errorf("Write(%q) failed with %q", data, err)
  341. }
  342. }
  343. if err = wc.Close(); err != nil {
  344. t.Errorf("%q: close failed with %q", c.name, err)
  345. }
  346. obj := wc.Attrs()
  347. if got, want := obj.Size, c.size; got != want {
  348. t.Errorf("Object (%q) Size = %v; want %v", c.name, got, want)
  349. }
  350. if got, want := fmt.Sprintf("%x", obj.MD5), c.md5; got != want {
  351. t.Errorf("Object (%q) MD5 = %q; want %q", c.name, got, want)
  352. }
  353. if got, want := obj.CRC32C, c.crc32c; got != want {
  354. t.Errorf("Object (%q) CRC32C = %v; want %v", c.name, got, want)
  355. }
  356. }
  357. // Test public ACL.
  358. publicObj := objects[0]
  359. if err = bkt.Object(publicObj).ACL().Set(ctx, AllUsers, RoleReader); err != nil {
  360. t.Errorf("PutACLEntry failed with %v", err)
  361. }
  362. publicClient, err := NewClient(ctx, cloud.WithBaseHTTP(http.DefaultClient))
  363. if err != nil {
  364. t.Fatal(err)
  365. }
  366. rc, err := publicClient.Bucket(bucket).Object(publicObj).NewReader(ctx)
  367. if err != nil {
  368. t.Error(err)
  369. }
  370. slurp, err := ioutil.ReadAll(rc)
  371. if err != nil {
  372. t.Errorf("ReadAll failed with %v", err)
  373. }
  374. if !bytes.Equal(slurp, contents[publicObj]) {
  375. t.Errorf("Public object's content: got %q, want %q", slurp, contents[publicObj])
  376. }
  377. rc.Close()
  378. // Test writer error handling.
  379. wc := publicClient.Bucket(bucket).Object(publicObj).NewWriter(ctx)
  380. if _, err := wc.Write([]byte("hello")); err != nil {
  381. t.Errorf("Write unexpectedly failed with %v", err)
  382. }
  383. if err = wc.Close(); err == nil {
  384. t.Error("Close expected an error, found none")
  385. }
  386. // Test deleting the copy object.
  387. if err := bkt.Object(copyName).Delete(ctx); err != nil {
  388. t.Errorf("Deletion of %v failed with %v", copyName, err)
  389. }
  390. _, err = bkt.Object(copyName).Attrs(ctx)
  391. if err != ErrObjectNotExist {
  392. t.Errorf("Copy is expected to be deleted, stat errored with %v", err)
  393. }
  394. }
  395. func TestACL(t *testing.T) {
  396. ctx := context.Background()
  397. client, bucket := testConfig(ctx, t)
  398. defer client.Close()
  399. bkt := client.Bucket(bucket)
  400. entity := ACLEntity("domain-google.com")
  401. if err := client.Bucket(bucket).DefaultObjectACL().Set(ctx, entity, RoleReader); err != nil {
  402. t.Errorf("Can't put default ACL rule for the bucket, errored with %v", err)
  403. }
  404. aclObjects := []string{"acl1" + suffix, "acl2" + suffix}
  405. for _, obj := range aclObjects {
  406. t.Logf("Writing %v", obj)
  407. wc := bkt.Object(obj).NewWriter(ctx)
  408. c := randomContents()
  409. if _, err := wc.Write(c); err != nil {
  410. t.Errorf("Write for %v failed with %v", obj, err)
  411. }
  412. if err := wc.Close(); err != nil {
  413. t.Errorf("Close for %v failed with %v", obj, err)
  414. }
  415. }
  416. name := aclObjects[0]
  417. o := bkt.Object(name)
  418. acl, err := o.ACL().List(ctx)
  419. if err != nil {
  420. t.Errorf("Can't retrieve ACL of %v", name)
  421. }
  422. aclFound := false
  423. for _, rule := range acl {
  424. if rule.Entity == entity && rule.Role == RoleReader {
  425. aclFound = true
  426. }
  427. }
  428. if !aclFound {
  429. t.Error("Expected to find an ACL rule for google.com domain users, but not found")
  430. }
  431. if err := o.ACL().Delete(ctx, entity); err != nil {
  432. t.Errorf("Can't delete the ACL rule for the entity: %v", entity)
  433. }
  434. if err := bkt.ACL().Set(ctx, "user-jbd@google.com", RoleReader); err != nil {
  435. t.Errorf("Error while putting bucket ACL rule: %v", err)
  436. }
  437. bACL, err := bkt.ACL().List(ctx)
  438. if err != nil {
  439. t.Errorf("Error while getting the ACL of the bucket: %v", err)
  440. }
  441. bACLFound := false
  442. for _, rule := range bACL {
  443. if rule.Entity == "user-jbd@google.com" && rule.Role == RoleReader {
  444. bACLFound = true
  445. }
  446. }
  447. if !bACLFound {
  448. t.Error("Expected to find an ACL rule for jbd@google.com user, but not found")
  449. }
  450. if err := bkt.ACL().Delete(ctx, "user-jbd@google.com"); err != nil {
  451. t.Errorf("Error while deleting bucket ACL rule: %v", err)
  452. }
  453. }
  454. func TestValidObjectNames(t *testing.T) {
  455. ctx := context.Background()
  456. client, bucket := testConfig(ctx, t)
  457. defer client.Close()
  458. bkt := client.Bucket(bucket)
  459. // NOTE(djd): This test can't append suffix to each name, since we're checking the validity
  460. // of these exact names. This test will still pass if the objects are not deleted between
  461. // test runs, but we attempt deletion to keep the bucket clean.
  462. validNames := []string{
  463. "gopher",
  464. "Гоферови",
  465. "a",
  466. strings.Repeat("a", 1024),
  467. }
  468. for _, name := range validNames {
  469. w := bkt.Object(name).NewWriter(ctx)
  470. if _, err := w.Write([]byte("data")); err != nil {
  471. t.Errorf("Object %q write failed: %v. Want success", name, err)
  472. continue
  473. }
  474. if err := w.Close(); err != nil {
  475. t.Errorf("Object %q close failed: %v. Want success", name, err)
  476. continue
  477. }
  478. defer bkt.Object(name).Delete(ctx)
  479. }
  480. invalidNames := []string{
  481. "", // Too short.
  482. strings.Repeat("a", 1025), // Too long.
  483. "new\nlines",
  484. "bad\xffunicode",
  485. }
  486. for _, name := range invalidNames {
  487. w := bkt.Object(name).NewWriter(ctx)
  488. // Invalid object names will either cause failure during Write or Close.
  489. if _, err := w.Write([]byte("data")); err != nil {
  490. continue
  491. }
  492. if err := w.Close(); err != nil {
  493. continue
  494. }
  495. defer bkt.Object(name).Delete(ctx)
  496. t.Errorf("%q should have failed. Didn't", name)
  497. }
  498. }
  499. func TestWriterContentType(t *testing.T) {
  500. ctx := context.Background()
  501. client, bucket := testConfig(ctx, t)
  502. defer client.Close()
  503. obj := client.Bucket(bucket).Object("content" + suffix)
  504. testCases := []struct {
  505. content string
  506. setType, wantType string
  507. }{
  508. {
  509. content: "It was the best of times, it was the worst of times.",
  510. wantType: "text/plain; charset=utf-8",
  511. },
  512. {
  513. content: "<html><head><title>My first page</title></head></html>",
  514. wantType: "text/html; charset=utf-8",
  515. },
  516. {
  517. content: "<html><head><title>My first page</title></head></html>",
  518. setType: "text/html",
  519. wantType: "text/html",
  520. },
  521. {
  522. content: "<html><head><title>My first page</title></head></html>",
  523. setType: "image/jpeg",
  524. wantType: "image/jpeg",
  525. },
  526. }
  527. for _, tt := range testCases {
  528. w := obj.NewWriter(ctx)
  529. w.ContentType = tt.setType
  530. if _, err := w.Write([]byte(tt.content)); err != nil {
  531. t.Errorf("w.Write: %v", err)
  532. }
  533. if err := w.Close(); err != nil {
  534. t.Errorf("w.Close: %v", err)
  535. }
  536. attrs, err := obj.Attrs(ctx)
  537. if err != nil {
  538. t.Errorf("obj.Attrs: %v", err)
  539. continue
  540. }
  541. if got := attrs.ContentType; got != tt.wantType {
  542. t.Errorf("Content-Type = %q; want %q\nContent: %q\nSet Content-Type: %q", got, tt.wantType, tt.content, tt.setType)
  543. }
  544. }
  545. }
  546. // cleanup deletes any objects in the default bucket which were created
  547. // during this test run (those with the designated suffix), and any
  548. // objects whose suffix indicates they were created over an hour ago.
  549. func cleanup() error {
  550. if testing.Short() {
  551. return nil // Don't clean up in short mode.
  552. }
  553. ctx := context.Background()
  554. client, bucket := config(ctx)
  555. if client == nil {
  556. return nil // Don't cleanup if we're not configured correctly.
  557. }
  558. defer client.Close()
  559. suffixRE := regexp.MustCompile(`-t(\d+)$`)
  560. deadline := time.Now().Add(-1 * time.Hour)
  561. var q *Query
  562. for {
  563. o, err := client.Bucket(bucket).List(ctx, q)
  564. if err != nil {
  565. return fmt.Errorf("cleanup list failed: %v", err)
  566. }
  567. for _, obj := range o.Results {
  568. // Delete the object if it matches the suffix exactly,
  569. // or has a suffix marked before the deadline.
  570. del := strings.HasSuffix(obj.Name, suffix)
  571. if m := suffixRE.FindStringSubmatch(obj.Name); m != nil {
  572. if ns, err := strconv.ParseInt(m[1], 10, 64); err == nil && time.Unix(0, ns).Before(deadline) {
  573. del = true
  574. }
  575. }
  576. if !del {
  577. continue
  578. }
  579. log.Printf("Cleanup deletion of %q", obj.Name)
  580. if err := client.Bucket(bucket).Object(obj.Name).Delete(ctx); err != nil {
  581. // Print the error out, but keep going.
  582. log.Printf("Cleanup deletion of %q failed: %v", obj.Name, err)
  583. }
  584. }
  585. if o.Next == nil {
  586. break
  587. }
  588. q = o.Next
  589. }
  590. // TODO(djd): Similarly list and clean up buckets.
  591. return nil
  592. }
  593. func randomContents() []byte {
  594. h := md5.New()
  595. io.WriteString(h, fmt.Sprintf("hello world%d", rand.Intn(100000)))
  596. return h.Sum(nil)
  597. }