2016-01-17 11:08:28 +01:00
|
|
|
// Integration tests - test rclone by doing real transactions to a
|
|
|
|
// storage provider to and from the local disk.
|
|
|
|
//
|
|
|
|
// By default it will use a local fs, however you can provide a
|
|
|
|
// -remote option to use a different remote. The test_all.go script
|
|
|
|
// is a wrapper to call this for all the test remotes.
|
|
|
|
//
|
|
|
|
// FIXME not safe for concurrent running of tests until fs.Config is
|
|
|
|
// no longer a global
|
|
|
|
//
|
|
|
|
// NB When writing tests
|
|
|
|
//
|
|
|
|
// Make sure every series of writes to the remote has a
|
|
|
|
// fstest.CheckItems() before use. This make sure the directory
|
|
|
|
// listing is now consistent and stops cascading errors.
|
|
|
|
//
|
2019-07-18 12:13:54 +02:00
|
|
|
// Call accounting.GlobalStats().ResetCounters() before every fs.Sync() as it
|
2018-01-12 17:30:54 +01:00
|
|
|
// uses the error count internally.
|
2014-08-01 18:58:39 +02:00
|
|
|
|
2018-01-12 17:30:54 +01:00
|
|
|
package operations_test
|
2014-08-01 18:58:39 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2019-06-17 10:34:30 +02:00
|
|
|
"context"
|
2021-11-04 11:12:57 +01:00
|
|
|
"errors"
|
2017-01-11 15:59:53 +01:00
|
|
|
"fmt"
|
2017-02-13 11:48:26 +01:00
|
|
|
"io"
|
2018-11-02 18:29:57 +01:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2018-12-31 12:58:55 +01:00
|
|
|
"os"
|
2014-08-01 18:58:39 +02:00
|
|
|
"regexp"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2019-07-28 19:47:38 +02:00
|
|
|
_ "github.com/rclone/rclone/backend/all" // import all backends
|
|
|
|
"github.com/rclone/rclone/fs"
|
|
|
|
"github.com/rclone/rclone/fs/accounting"
|
|
|
|
"github.com/rclone/rclone/fs/filter"
|
|
|
|
"github.com/rclone/rclone/fs/fshttp"
|
|
|
|
"github.com/rclone/rclone/fs/hash"
|
|
|
|
"github.com/rclone/rclone/fs/operations"
|
|
|
|
"github.com/rclone/rclone/fstest"
|
2021-10-07 14:37:31 +02:00
|
|
|
"github.com/rclone/rclone/fstest/fstests"
|
2016-06-25 15:28:26 +02:00
|
|
|
"github.com/stretchr/testify/assert"
|
2016-06-29 18:59:31 +02:00
|
|
|
"github.com/stretchr/testify/require"
|
2022-06-24 16:33:45 +02:00
|
|
|
"golang.org/x/text/cases"
|
|
|
|
"golang.org/x/text/language"
|
2014-08-01 18:58:39 +02:00
|
|
|
)
|
|
|
|
|
2016-01-17 11:08:28 +01:00
|
|
|
// Some times used in the tests
|
|
|
|
var (
|
|
|
|
t1 = fstest.Time("2001-02-03T04:05:06.499999999Z")
|
|
|
|
t2 = fstest.Time("2011-12-25T12:59:59.123456789Z")
|
|
|
|
t3 = fstest.Time("2011-12-30T12:59:59.000000000Z")
|
|
|
|
)
|
|
|
|
|
|
|
|
// TestMain drives the tests
|
|
|
|
func TestMain(m *testing.M) {
|
2017-10-29 13:23:10 +01:00
|
|
|
fstest.TestMain(m)
|
2014-08-01 18:58:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestMkdir(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2018-01-12 17:30:54 +01:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.Mkdir(ctx, r.Fremote, "")
|
2018-01-12 17:30:54 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
fstest.CheckListing(t, r.Fremote, []fstest.Item{})
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.Mkdir(ctx, r.Fremote, "")
|
2018-01-12 17:30:54 +01:00
|
|
|
require.NoError(t, err)
|
2014-08-01 18:58:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestLsd(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteObject(ctx, "sub dir/hello world", "hello world", t1)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2014-08-01 18:58:39 +02:00
|
|
|
var buf bytes.Buffer
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.ListDir(ctx, r.Fremote, &buf)
|
2016-06-29 18:59:31 +02:00
|
|
|
require.NoError(t, err)
|
2014-08-01 18:58:39 +02:00
|
|
|
res := buf.String()
|
2016-06-29 18:59:31 +02:00
|
|
|
assert.Contains(t, res, "sub dir\n")
|
2014-08-01 18:58:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestLs(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteBoth(ctx, "potato2", "------------------------------------------------------------", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "empty space", "-", t2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2014-08-01 18:58:39 +02:00
|
|
|
var buf bytes.Buffer
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.List(ctx, r.Fremote, &buf)
|
2016-06-29 18:59:31 +02:00
|
|
|
require.NoError(t, err)
|
2014-08-01 18:58:39 +02:00
|
|
|
res := buf.String()
|
2019-06-29 03:17:18 +02:00
|
|
|
assert.Contains(t, res, " 1 empty space\n")
|
2016-06-29 18:59:31 +02:00
|
|
|
assert.Contains(t, res, " 60 potato2\n")
|
2014-08-01 18:58:39 +02:00
|
|
|
}
|
|
|
|
|
2018-10-19 18:41:14 +02:00
|
|
|
func TestLsWithFilesFrom(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
2018-10-19 18:41:14 +02:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteBoth(ctx, "potato2", "------------------------------------------------------------", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "empty space", "-", t2)
|
2018-10-19 18:41:14 +02:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2018-10-19 18:41:14 +02:00
|
|
|
|
|
|
|
// Set the --files-from equivalent
|
|
|
|
f, err := filter.NewFilter(nil)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, f.AddFile("potato2"))
|
|
|
|
require.NoError(t, f.AddFile("notfound"))
|
|
|
|
|
2020-11-26 18:10:41 +01:00
|
|
|
// Change the active filter
|
|
|
|
ctx = filter.ReplaceConfig(ctx, f)
|
2018-10-19 18:41:14 +02:00
|
|
|
|
|
|
|
var buf bytes.Buffer
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.List(ctx, r.Fremote, &buf)
|
2018-10-19 18:41:14 +02:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, " 60 potato2\n", buf.String())
|
2019-02-13 18:14:51 +01:00
|
|
|
|
|
|
|
// Now try with --no-traverse
|
2020-11-05 12:33:32 +01:00
|
|
|
ci.NoTraverse = true
|
2019-02-13 18:14:51 +01:00
|
|
|
|
|
|
|
buf.Reset()
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.List(ctx, r.Fremote, &buf)
|
2019-02-13 18:14:51 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, " 60 potato2\n", buf.String())
|
2018-10-19 18:41:14 +02:00
|
|
|
}
|
|
|
|
|
2014-08-01 18:58:39 +02:00
|
|
|
func TestLsLong(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteBoth(ctx, "potato2", "------------------------------------------------------------", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "empty space", "-", t2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2014-08-01 18:58:39 +02:00
|
|
|
var buf bytes.Buffer
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.ListLong(ctx, r.Fremote, &buf)
|
2016-06-29 18:59:31 +02:00
|
|
|
require.NoError(t, err)
|
2014-08-01 18:58:39 +02:00
|
|
|
res := buf.String()
|
2015-08-17 00:24:34 +02:00
|
|
|
lines := strings.Split(strings.Trim(res, "\n"), "\n")
|
2016-06-29 18:59:31 +02:00
|
|
|
assert.Equal(t, 2, len(lines))
|
2015-08-17 00:24:34 +02:00
|
|
|
|
|
|
|
timeFormat := "2006-01-02 15:04:05.000000000"
|
2017-10-29 13:23:10 +01:00
|
|
|
precision := r.Fremote.Precision()
|
2015-09-22 20:04:12 +02:00
|
|
|
location := time.Now().Location()
|
2015-08-17 00:24:34 +02:00
|
|
|
checkTime := func(m, filename string, expected time.Time) {
|
2015-09-22 20:04:12 +02:00
|
|
|
modTime, err := time.ParseInLocation(timeFormat, m, location) // parse as localtime
|
2015-08-17 00:24:34 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Error parsing %q: %v", m, err)
|
|
|
|
} else {
|
2020-04-21 16:46:01 +02:00
|
|
|
fstest.AssertTimeEqualWithPrecision(t, filename, expected, modTime, precision)
|
2015-08-17 00:24:34 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-29 03:17:18 +02:00
|
|
|
m1 := regexp.MustCompile(`(?m)^ 1 (\d{4}-\d\d-\d\d \d\d:\d\d:\d\d\.\d{9}) empty space$`)
|
2015-08-17 00:24:34 +02:00
|
|
|
if ms := m1.FindStringSubmatch(res); ms == nil {
|
2014-08-01 18:58:39 +02:00
|
|
|
t.Errorf("empty space missing: %q", res)
|
2015-08-17 00:24:34 +02:00
|
|
|
} else {
|
|
|
|
checkTime(ms[1], "empty space", t2.Local())
|
2014-08-01 18:58:39 +02:00
|
|
|
}
|
2015-08-17 00:24:34 +02:00
|
|
|
|
|
|
|
m2 := regexp.MustCompile(`(?m)^ 60 (\d{4}-\d\d-\d\d \d\d:\d\d:\d\d\.\d{9}) potato2$`)
|
|
|
|
if ms := m2.FindStringSubmatch(res); ms == nil {
|
2014-08-01 18:58:39 +02:00
|
|
|
t.Errorf("potato2 missing: %q", res)
|
2015-08-17 00:24:34 +02:00
|
|
|
} else {
|
|
|
|
checkTime(ms[1], "potato2", t1.Local())
|
2014-08-01 18:58:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:09:31 +02:00
|
|
|
func TestHashSums(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteBoth(ctx, "potato2", "------------------------------------------------------------", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "empty space", "-", t2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-10-15 11:44:06 +02:00
|
|
|
hashes := r.Fremote.Hashes()
|
2017-05-26 16:09:31 +02:00
|
|
|
|
2021-10-15 11:44:06 +02:00
|
|
|
var quickXorHash hash.Type
|
|
|
|
err := quickXorHash.Set("QuickXorHash")
|
2016-06-29 18:59:31 +02:00
|
|
|
require.NoError(t, err)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-10-15 11:44:06 +02:00
|
|
|
for _, test := range []struct {
|
|
|
|
name string
|
|
|
|
download bool
|
|
|
|
base64 bool
|
|
|
|
ht hash.Type
|
|
|
|
want []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
ht: hash.MD5,
|
|
|
|
want: []string{
|
|
|
|
"336d5ebc5436534e61d16e63ddfca327 empty space\n",
|
|
|
|
"d6548b156ea68a4e003e786df99eee76 potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: hash.MD5,
|
|
|
|
download: true,
|
|
|
|
want: []string{
|
|
|
|
"336d5ebc5436534e61d16e63ddfca327 empty space\n",
|
|
|
|
"d6548b156ea68a4e003e786df99eee76 potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: hash.SHA1,
|
|
|
|
want: []string{
|
|
|
|
"3bc15c8aae3e4124dd409035f32ea2fd6835efc9 empty space\n",
|
|
|
|
"9dc7f7d3279715991a22853f5981df582b7f9f6d potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: hash.SHA1,
|
|
|
|
download: true,
|
|
|
|
want: []string{
|
|
|
|
"3bc15c8aae3e4124dd409035f32ea2fd6835efc9 empty space\n",
|
|
|
|
"9dc7f7d3279715991a22853f5981df582b7f9f6d potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: quickXorHash,
|
|
|
|
want: []string{
|
|
|
|
"2d00000000000000000000000100000000000000 empty space\n",
|
|
|
|
"4001dad296b6b4a52d6d694b67dad296b6b4a52d potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: quickXorHash,
|
|
|
|
download: true,
|
|
|
|
want: []string{
|
|
|
|
"2d00000000000000000000000100000000000000 empty space\n",
|
|
|
|
"4001dad296b6b4a52d6d694b67dad296b6b4a52d potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: quickXorHash,
|
|
|
|
base64: true,
|
|
|
|
want: []string{
|
|
|
|
"LQAAAAAAAAAAAAAAAQAAAAAAAAA= empty space\n",
|
|
|
|
"QAHa0pa2tKUtbWlLZ9rSlra0pS0= potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ht: quickXorHash,
|
|
|
|
base64: true,
|
|
|
|
download: true,
|
|
|
|
want: []string{
|
|
|
|
"LQAAAAAAAAAAAAAAAQAAAAAAAAA= empty space\n",
|
|
|
|
"QAHa0pa2tKUtbWlLZ9rSlra0pS0= potato2\n",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
} {
|
|
|
|
if !hashes.Contains(test.ht) {
|
|
|
|
continue
|
|
|
|
}
|
2022-06-24 16:33:45 +02:00
|
|
|
name := cases.Title(language.Und, cases.NoLower).String(test.ht.String())
|
2021-10-15 11:44:06 +02:00
|
|
|
if test.download {
|
|
|
|
name += "Download"
|
|
|
|
}
|
|
|
|
if test.base64 {
|
|
|
|
name += "Base64"
|
|
|
|
}
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
var buf bytes.Buffer
|
|
|
|
err := operations.HashLister(ctx, test.ht, test.base64, test.download, r.Fremote, &buf)
|
|
|
|
require.NoError(t, err)
|
|
|
|
res := buf.String()
|
|
|
|
for _, line := range test.want {
|
|
|
|
assert.Contains(t, res, line)
|
|
|
|
}
|
|
|
|
})
|
2019-10-26 21:27:33 +02:00
|
|
|
}
|
2016-01-17 11:08:28 +01:00
|
|
|
}
|
|
|
|
|
2021-10-07 14:37:31 +02:00
|
|
|
func TestHashSumsWithErrors(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
memFs, err := fs.NewFs(ctx, ":memory:")
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Make a test file
|
|
|
|
content := "-"
|
|
|
|
item1 := fstest.NewItem("file1", content, t1)
|
2022-06-27 13:29:13 +02:00
|
|
|
_ = fstests.PutTestContents(ctx, t, memFs, &item1, content, true)
|
2021-10-07 14:37:31 +02:00
|
|
|
|
|
|
|
// MemoryFS supports MD5
|
|
|
|
buf := &bytes.Buffer{}
|
|
|
|
err = operations.HashLister(ctx, hash.MD5, false, false, memFs, buf)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Contains(t, buf.String(), "336d5ebc5436534e61d16e63ddfca327 file1\n")
|
|
|
|
|
|
|
|
// MemoryFS can't do SHA1, but UNSUPPORTED must not appear in the output
|
|
|
|
buf.Reset()
|
|
|
|
err = operations.HashLister(ctx, hash.SHA1, false, false, memFs, buf)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.NotContains(t, buf.String(), " UNSUPPORTED ")
|
|
|
|
|
|
|
|
// ERROR must not appear in the output either
|
|
|
|
assert.NotContains(t, buf.String(), " ERROR ")
|
|
|
|
// TODO mock an unreadable file
|
|
|
|
}
|
|
|
|
|
2021-11-03 00:34:20 +01:00
|
|
|
func TestHashStream(t *testing.T) {
|
|
|
|
reader := strings.NewReader("")
|
2022-08-20 16:38:02 +02:00
|
|
|
in := io.NopCloser(reader)
|
2021-11-03 00:34:20 +01:00
|
|
|
out := &bytes.Buffer{}
|
|
|
|
for _, test := range []struct {
|
|
|
|
input string
|
|
|
|
ht hash.Type
|
|
|
|
wantHex string
|
|
|
|
wantBase64 string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
input: "",
|
|
|
|
ht: hash.MD5,
|
|
|
|
wantHex: "d41d8cd98f00b204e9800998ecf8427e -\n",
|
|
|
|
wantBase64: "1B2M2Y8AsgTpgAmY7PhCfg== -\n",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
input: "",
|
|
|
|
ht: hash.SHA1,
|
|
|
|
wantHex: "da39a3ee5e6b4b0d3255bfef95601890afd80709 -\n",
|
|
|
|
wantBase64: "2jmj7l5rSw0yVb_vlWAYkK_YBwk= -\n",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
input: "Hello world!",
|
|
|
|
ht: hash.MD5,
|
|
|
|
wantHex: "86fb269d190d2c85f6e0468ceca42a20 -\n",
|
|
|
|
wantBase64: "hvsmnRkNLIX24EaM7KQqIA== -\n",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
input: "Hello world!",
|
|
|
|
ht: hash.SHA1,
|
|
|
|
wantHex: "d3486ae9136e7856bc42212385ea797094475802 -\n",
|
|
|
|
wantBase64: "00hq6RNueFa8QiEjhep5cJRHWAI= -\n",
|
|
|
|
},
|
|
|
|
} {
|
|
|
|
reader.Reset(test.input)
|
|
|
|
require.NoError(t, operations.HashSumStream(test.ht, false, in, out))
|
|
|
|
assert.Equal(t, test.wantHex, out.String())
|
|
|
|
_, _ = reader.Seek(0, io.SeekStart)
|
|
|
|
out.Reset()
|
|
|
|
require.NoError(t, operations.HashSumStream(test.ht, true, in, out))
|
|
|
|
assert.Equal(t, test.wantBase64, out.String())
|
|
|
|
out.Reset()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-10 17:50:28 +01:00
|
|
|
func TestSuffixName(t *testing.T) {
|
2020-11-05 12:33:32 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
2019-03-10 17:50:28 +01:00
|
|
|
for _, test := range []struct {
|
|
|
|
remote string
|
|
|
|
suffix string
|
|
|
|
keepExt bool
|
|
|
|
want string
|
|
|
|
}{
|
|
|
|
{"test.txt", "", false, "test.txt"},
|
|
|
|
{"test.txt", "", true, "test.txt"},
|
|
|
|
{"test.txt", "-suffix", false, "test.txt-suffix"},
|
|
|
|
{"test.txt", "-suffix", true, "test-suffix.txt"},
|
|
|
|
{"test.txt.csv", "-suffix", false, "test.txt.csv-suffix"},
|
2023-03-26 17:55:03 +02:00
|
|
|
{"test.txt.csv", "-suffix", true, "test-suffix.txt.csv"},
|
2019-03-10 17:50:28 +01:00
|
|
|
{"test", "-suffix", false, "test-suffix"},
|
|
|
|
{"test", "-suffix", true, "test-suffix"},
|
2023-03-26 17:55:03 +02:00
|
|
|
{"test.html", "-suffix", true, "test-suffix.html"},
|
|
|
|
{"test.html.txt", "-suffix", true, "test-suffix.html.txt"},
|
|
|
|
{"test.csv.html.txt", "-suffix", true, "test-suffix.csv.html.txt"},
|
|
|
|
{"test.badext.csv.html.txt", "-suffix", true, "test.badext-suffix.csv.html.txt"},
|
|
|
|
{"test.badext", "-suffix", true, "test-suffix.badext"},
|
2019-03-10 17:50:28 +01:00
|
|
|
} {
|
2020-11-05 12:33:32 +01:00
|
|
|
ci.Suffix = test.suffix
|
|
|
|
ci.SuffixKeepExtension = test.keepExt
|
|
|
|
got := operations.SuffixName(ctx, test.remote)
|
2019-03-10 17:50:28 +01:00
|
|
|
assert.Equal(t, test.want, got, fmt.Sprintf("%+v", test))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-02 20:48:48 +02:00
|
|
|
func TestCount(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteBoth(ctx, "potato2", "------------------------------------------------------------", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "empty space", "-", t2)
|
|
|
|
file3 := r.WriteBoth(ctx, "sub dir/potato3", "hello", t2)
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
2016-06-02 22:02:44 +02:00
|
|
|
|
|
|
|
// Check the MaxDepth too
|
2020-11-05 12:33:32 +01:00
|
|
|
ci.MaxDepth = 1
|
2016-01-17 11:08:28 +01:00
|
|
|
|
2022-04-06 14:15:07 +02:00
|
|
|
objects, size, sizeless, err := operations.Count(ctx, r.Fremote)
|
2016-06-29 18:59:31 +02:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(2), objects)
|
2019-06-29 03:17:18 +02:00
|
|
|
assert.Equal(t, int64(61), size)
|
2022-04-06 14:15:07 +02:00
|
|
|
assert.Equal(t, int64(0), sizeless)
|
2015-10-02 20:48:48 +02:00
|
|
|
}
|
|
|
|
|
2015-12-02 23:25:32 +01:00
|
|
|
func TestDelete(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
fi, err := filter.NewFilter(nil)
|
|
|
|
require.NoError(t, err)
|
|
|
|
fi.Opt.MaxSize = 60
|
|
|
|
ctx = filter.ReplaceConfig(ctx, fi)
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteObject(ctx, "small", "1234567890", t2) // 10 bytes
|
|
|
|
file2 := r.WriteObject(ctx, "medium", "------------------------------------------------------------", t1) // 60 bytes
|
|
|
|
file3 := r.WriteObject(ctx, "large", "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", t1) // 100 bytes
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
2015-12-02 23:25:32 +01:00
|
|
|
|
2021-02-17 21:21:09 +01:00
|
|
|
err = operations.Delete(ctx, r.Fremote)
|
2016-06-29 18:59:31 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file3)
|
2015-12-02 23:25:32 +01:00
|
|
|
}
|
|
|
|
|
2023-03-10 13:09:47 +01:00
|
|
|
func isChunker(f fs.Fs) bool {
|
|
|
|
return strings.HasPrefix(f.Name(), "TestChunker")
|
|
|
|
}
|
|
|
|
|
|
|
|
func skipIfChunker(t *testing.T, f fs.Fs) {
|
|
|
|
if isChunker(f) {
|
|
|
|
t.Skip("Skipping test on chunker backend")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-03 16:53:02 +02:00
|
|
|
func TestMaxDelete(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
accounting.GlobalStats().ResetCounters()
|
|
|
|
ci.MaxDelete = 2
|
|
|
|
defer r.Finalise()
|
2023-03-10 13:09:47 +01:00
|
|
|
skipIfChunker(t, r.Fremote) // chunker does copy/delete on s3
|
2022-08-03 16:53:02 +02:00
|
|
|
file1 := r.WriteObject(ctx, "small", "1234567890", t2) // 10 bytes
|
|
|
|
file2 := r.WriteObject(ctx, "medium", "------------------------------------------------------------", t1) // 60 bytes
|
|
|
|
file3 := r.WriteObject(ctx, "large", "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", t1) // 100 bytes
|
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
|
|
|
err := operations.Delete(ctx, r.Fremote)
|
|
|
|
|
|
|
|
require.Error(t, err)
|
|
|
|
objects, _, _, err := operations.Count(ctx, r.Fremote)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(1), objects)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestMaxDeleteSizeLargeFile one of the files is larger than allowed
|
|
|
|
func TestMaxDeleteSizeLargeFile(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
accounting.GlobalStats().ResetCounters()
|
|
|
|
ci.MaxDeleteSize = 70
|
|
|
|
defer r.Finalise()
|
2023-03-10 13:09:47 +01:00
|
|
|
skipIfChunker(t, r.Fremote) // chunker does copy/delete on s3
|
2022-08-03 16:53:02 +02:00
|
|
|
file1 := r.WriteObject(ctx, "small", "1234567890", t2) // 10 bytes
|
|
|
|
file2 := r.WriteObject(ctx, "medium", "------------------------------------------------------------", t1) // 60 bytes
|
|
|
|
file3 := r.WriteObject(ctx, "large", "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", t1) // 100 bytes
|
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
|
|
|
|
|
|
|
err := operations.Delete(ctx, r.Fremote)
|
|
|
|
require.Error(t, err)
|
|
|
|
r.CheckRemoteItems(t, file3)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMaxDeleteSize(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
accounting.GlobalStats().ResetCounters()
|
|
|
|
ci.MaxDeleteSize = 160
|
|
|
|
defer r.Finalise()
|
2023-03-10 13:09:47 +01:00
|
|
|
skipIfChunker(t, r.Fremote) // chunker does copy/delete on s3
|
2022-08-03 16:53:02 +02:00
|
|
|
file1 := r.WriteObject(ctx, "small", "1234567890", t2) // 10 bytes
|
|
|
|
file2 := r.WriteObject(ctx, "medium", "------------------------------------------------------------", t1) // 60 bytes
|
|
|
|
file3 := r.WriteObject(ctx, "large", "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA", t1) // 100 bytes
|
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
|
|
|
|
|
|
|
err := operations.Delete(ctx, r.Fremote)
|
|
|
|
require.Error(t, err)
|
|
|
|
objects, _, _, err := operations.Count(ctx, r.Fremote)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(1), objects) // 10 or 100 bytes
|
|
|
|
}
|
|
|
|
|
2020-06-12 18:01:23 +02:00
|
|
|
func TestRetry(t *testing.T) {
|
2021-03-11 15:44:01 +01:00
|
|
|
ctx := context.Background()
|
|
|
|
|
2020-06-12 18:01:23 +02:00
|
|
|
var i int
|
|
|
|
var err error
|
|
|
|
fn := func() error {
|
|
|
|
i--
|
|
|
|
if i <= 0 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
i, err = 3, io.EOF
|
2021-03-11 15:44:01 +01:00
|
|
|
assert.Equal(t, nil, operations.Retry(ctx, nil, 5, fn))
|
2020-06-12 18:01:23 +02:00
|
|
|
assert.Equal(t, 0, i)
|
|
|
|
|
|
|
|
i, err = 10, io.EOF
|
2021-03-11 15:44:01 +01:00
|
|
|
assert.Equal(t, io.EOF, operations.Retry(ctx, nil, 5, fn))
|
2020-06-12 18:01:23 +02:00
|
|
|
assert.Equal(t, 5, i)
|
|
|
|
|
|
|
|
i, err = 10, fs.ErrorObjectNotFound
|
2021-03-11 15:44:01 +01:00
|
|
|
assert.Equal(t, fs.ErrorObjectNotFound, operations.Retry(ctx, nil, 5, fn))
|
2020-06-12 18:01:23 +02:00
|
|
|
assert.Equal(t, 9, i)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2016-08-18 23:43:02 +02:00
|
|
|
func TestCat(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
file1 := r.WriteBoth(ctx, "file1", "ABCDEFGHIJ", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "file2", "012345678", t2)
|
2016-08-18 23:43:02 +02:00
|
|
|
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2016-08-18 23:43:02 +02:00
|
|
|
|
2017-02-08 09:09:41 +01:00
|
|
|
for _, test := range []struct {
|
2023-04-24 13:01:53 +02:00
|
|
|
offset int64
|
|
|
|
count int64
|
|
|
|
separator string
|
|
|
|
a string
|
|
|
|
b string
|
2017-02-08 09:09:41 +01:00
|
|
|
}{
|
2023-04-24 13:01:53 +02:00
|
|
|
{0, -1, "", "ABCDEFGHIJ", "012345678"},
|
|
|
|
{0, 5, "", "ABCDE", "01234"},
|
|
|
|
{-3, -1, "", "HIJ", "678"},
|
|
|
|
{1, 3, "", "BCD", "123"},
|
|
|
|
{0, -1, "\n", "ABCDEFGHIJ", "012345678"},
|
2017-02-08 09:09:41 +01:00
|
|
|
} {
|
|
|
|
var buf bytes.Buffer
|
2023-04-24 13:01:53 +02:00
|
|
|
err := operations.Cat(ctx, r.Fremote, &buf, test.offset, test.count, []byte(test.separator))
|
2017-02-08 09:09:41 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
res := buf.String()
|
2016-08-18 23:43:02 +02:00
|
|
|
|
2023-04-24 13:01:53 +02:00
|
|
|
if res != test.a+test.separator+test.b+test.separator && res != test.b+test.separator+test.a+test.separator {
|
|
|
|
t.Errorf("Incorrect output from Cat(%d,%d,%s): %q", test.offset, test.count, test.separator, res)
|
2017-02-08 09:09:41 +01:00
|
|
|
}
|
2016-08-18 23:43:02 +02:00
|
|
|
}
|
|
|
|
}
|
2016-11-27 12:49:31 +01:00
|
|
|
|
2018-10-27 00:47:23 +02:00
|
|
|
func TestPurge(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2018-11-14 18:14:02 +01:00
|
|
|
r := fstest.NewRunIndividual(t) // make new container (azureblob has delayed mkdir after rmdir)
|
2020-11-05 17:27:01 +01:00
|
|
|
r.Mkdir(ctx, r.Fremote)
|
2018-10-27 00:47:23 +02:00
|
|
|
|
|
|
|
// Make some files and dirs
|
2020-11-05 17:27:01 +01:00
|
|
|
r.ForceMkdir(ctx, r.Fremote)
|
|
|
|
file1 := r.WriteObject(ctx, "A1/B1/C1/one", "aaa", t1)
|
2018-10-27 00:47:23 +02:00
|
|
|
//..and dirs we expect to delete
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B2/C2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1/C3"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A3"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A3/B3"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A3/B3/C4"))
|
2018-10-27 00:47:23 +02:00
|
|
|
//..and one more file at the end
|
2020-11-05 17:27:01 +01:00
|
|
|
file2 := r.WriteObject(ctx, "A1/two", "bbb", t2)
|
2018-10-27 00:47:23 +02:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{
|
|
|
|
file1, file2,
|
|
|
|
},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B1/C1",
|
|
|
|
"A2",
|
|
|
|
"A1/B2",
|
|
|
|
"A1/B2/C2",
|
|
|
|
"A1/B1/C3",
|
|
|
|
"A3",
|
|
|
|
"A3/B3",
|
|
|
|
"A3/B3/C4",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2018-10-27 00:47:23 +02:00
|
|
|
)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Purge(ctx, r.Fremote, "A1/B1"))
|
2018-10-27 00:47:23 +02:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{
|
|
|
|
file2,
|
|
|
|
},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A2",
|
|
|
|
"A1/B2",
|
|
|
|
"A1/B2/C2",
|
|
|
|
"A3",
|
|
|
|
"A3/B3",
|
|
|
|
"A3/B3/C4",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2018-10-27 00:47:23 +02:00
|
|
|
)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Purge(ctx, r.Fremote, ""))
|
2018-10-27 00:47:23 +02:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{},
|
|
|
|
[]string{},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2018-10-27 00:47:23 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-12-13 11:23:54 +01:00
|
|
|
func TestRmdirsNoLeaveRoot(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
r.Mkdir(ctx, r.Fremote)
|
2016-11-28 13:23:24 +01:00
|
|
|
|
2016-11-27 12:49:31 +01:00
|
|
|
// Make some files and dirs we expect to keep
|
2020-11-05 17:27:01 +01:00
|
|
|
r.ForceMkdir(ctx, r.Fremote)
|
|
|
|
file1 := r.WriteObject(ctx, "A1/B1/C1/one", "aaa", t1)
|
2016-11-27 12:49:31 +01:00
|
|
|
//..and dirs we expect to delete
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B2/C2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1/C3"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A3"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A3/B3"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A3/B3/C4"))
|
2017-04-26 19:41:01 +02:00
|
|
|
//..and one more file at the end
|
2020-11-05 17:27:01 +01:00
|
|
|
file2 := r.WriteObject(ctx, "A1/two", "bbb", t2)
|
2016-11-27 12:49:31 +01:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
2017-10-29 13:23:10 +01:00
|
|
|
r.Fremote,
|
2016-11-27 12:49:31 +01:00
|
|
|
[]fstest.Item{
|
|
|
|
file1, file2,
|
|
|
|
},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B1/C1",
|
|
|
|
"A2",
|
|
|
|
"A1/B2",
|
|
|
|
"A1/B2/C2",
|
|
|
|
"A1/B1/C3",
|
|
|
|
"A3",
|
|
|
|
"A3/B3",
|
|
|
|
"A3/B3/C4",
|
2017-08-09 16:51:27 +02:00
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2016-11-27 12:49:31 +01:00
|
|
|
)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Rmdirs(ctx, r.Fremote, "A3/B3/C4", false))
|
2018-10-27 00:47:23 +02:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{
|
|
|
|
file1, file2,
|
|
|
|
},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B1/C1",
|
|
|
|
"A2",
|
|
|
|
"A1/B2",
|
|
|
|
"A1/B2/C2",
|
|
|
|
"A1/B1/C3",
|
|
|
|
"A3",
|
|
|
|
"A3/B3",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2018-10-27 00:47:23 +02:00
|
|
|
)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Rmdirs(ctx, r.Fremote, "", false))
|
2016-11-27 12:49:31 +01:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
2017-10-29 13:23:10 +01:00
|
|
|
r.Fremote,
|
2016-11-27 12:49:31 +01:00
|
|
|
[]fstest.Item{
|
|
|
|
file1, file2,
|
|
|
|
},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B1/C1",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2016-11-27 12:49:31 +01:00
|
|
|
)
|
|
|
|
|
2023-08-17 12:05:12 +02:00
|
|
|
// Delete the files so we can remove everything including the root
|
|
|
|
for _, file := range []fstest.Item{file1, file2} {
|
|
|
|
o, err := r.Fremote.NewObject(ctx, file.Path)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, o.Remove(ctx))
|
|
|
|
}
|
|
|
|
|
|
|
|
require.NoError(t, operations.Rmdirs(ctx, r.Fremote, "", false))
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{},
|
|
|
|
[]string{},
|
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
|
|
|
)
|
2016-11-27 12:49:31 +01:00
|
|
|
}
|
2016-10-23 18:34:17 +02:00
|
|
|
|
2017-12-13 11:23:54 +01:00
|
|
|
func TestRmdirsLeaveRoot(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-12-13 11:23:54 +01:00
|
|
|
r := fstest.NewRun(t)
|
2020-11-05 17:27:01 +01:00
|
|
|
r.Mkdir(ctx, r.Fremote)
|
2017-12-13 11:23:54 +01:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
r.ForceMkdir(ctx, r.Fremote)
|
2017-12-13 11:23:54 +01:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1/C1"))
|
2017-12-13 11:23:54 +01:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B1/C1",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2017-12-13 11:23:54 +01:00
|
|
|
)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Rmdirs(ctx, r.Fremote, "A1", true))
|
2017-12-13 11:23:54 +01:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2017-12-13 11:23:54 +01:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2021-02-09 11:12:23 +01:00
|
|
|
func TestRmdirsWithFilter(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, fi := filter.AddConfig(ctx)
|
|
|
|
require.NoError(t, fi.AddRule("+ /A1/B1/**"))
|
|
|
|
require.NoError(t, fi.AddRule("- *"))
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
r.Mkdir(ctx, r.Fremote)
|
|
|
|
|
|
|
|
r.ForceMkdir(ctx, r.Fremote)
|
|
|
|
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1/C1"))
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B1/C1",
|
|
|
|
},
|
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
|
|
|
)
|
|
|
|
|
|
|
|
require.NoError(t, operations.Rmdirs(ctx, r.Fremote, "", false))
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
[]fstest.Item{},
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
},
|
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2018-11-02 18:29:57 +01:00
|
|
|
func TestCopyURL(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
2018-11-02 18:29:57 +01:00
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
2019-03-08 21:33:22 +01:00
|
|
|
contents := "file contents\n"
|
2018-11-02 18:29:57 +01:00
|
|
|
file1 := r.WriteFile("file1", contents, t1)
|
2019-03-08 21:33:22 +01:00
|
|
|
file2 := r.WriteFile("file2", contents, t1)
|
2020-11-05 17:27:01 +01:00
|
|
|
r.Mkdir(ctx, r.Fremote)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t)
|
2018-11-02 18:29:57 +01:00
|
|
|
|
2019-03-08 21:33:22 +01:00
|
|
|
// check when reading from regular HTTP server
|
2019-08-05 20:20:50 +02:00
|
|
|
status := 0
|
2022-06-19 15:39:05 +02:00
|
|
|
nameHeader := false
|
|
|
|
headerFilename := "headerfilename.txt"
|
2019-03-08 21:33:22 +01:00
|
|
|
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
2019-08-05 20:20:50 +02:00
|
|
|
if status != 0 {
|
2023-03-25 08:20:46 +01:00
|
|
|
http.Error(w, "an error occurred", status)
|
2019-08-05 20:20:50 +02:00
|
|
|
}
|
2022-06-19 15:39:05 +02:00
|
|
|
if nameHeader {
|
|
|
|
w.Header().Set("Content-Disposition", `attachment; filename="folder\`+headerFilename+`"`)
|
|
|
|
}
|
2018-11-02 18:29:57 +01:00
|
|
|
_, err := w.Write([]byte(contents))
|
|
|
|
assert.NoError(t, err)
|
2019-03-08 21:33:22 +01:00
|
|
|
})
|
|
|
|
ts := httptest.NewServer(handler)
|
2018-11-02 18:29:57 +01:00
|
|
|
defer ts.Close()
|
|
|
|
|
2021-07-28 18:05:21 +02:00
|
|
|
o, err := operations.CopyURL(ctx, r.Fremote, "file1", ts.URL, false, false, false)
|
2018-11-02 18:29:57 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(contents)), o.Size())
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(t, r.Fremote, []fstest.Item{file1}, nil, fs.ModTimeNotSupported)
|
2019-03-08 21:33:22 +01:00
|
|
|
|
2020-04-19 13:40:17 +02:00
|
|
|
// Check file clobbering
|
2021-07-28 18:05:21 +02:00
|
|
|
_, err = operations.CopyURL(ctx, r.Fremote, "file1", ts.URL, false, false, true)
|
2020-04-19 13:40:17 +02:00
|
|
|
require.Error(t, err)
|
|
|
|
|
2019-09-03 18:25:19 +02:00
|
|
|
// Check auto file naming
|
|
|
|
status = 0
|
|
|
|
urlFileName := "filename.txt"
|
2021-07-28 18:05:21 +02:00
|
|
|
o, err = operations.CopyURL(ctx, r.Fremote, "", ts.URL+"/"+urlFileName, true, false, false)
|
2019-09-03 18:25:19 +02:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(contents)), o.Size())
|
|
|
|
assert.Equal(t, urlFileName, o.Remote())
|
|
|
|
|
2022-06-19 15:39:05 +02:00
|
|
|
// Check header file naming
|
|
|
|
nameHeader = true
|
|
|
|
o, err = operations.CopyURL(ctx, r.Fremote, "", ts.URL, true, true, false)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(contents)), o.Size())
|
|
|
|
assert.Equal(t, headerFilename, o.Remote())
|
|
|
|
|
2019-09-03 18:25:19 +02:00
|
|
|
// Check auto file naming when url without file name
|
2021-07-28 18:05:21 +02:00
|
|
|
_, err = operations.CopyURL(ctx, r.Fremote, "file1", ts.URL, true, false, false)
|
2019-09-03 18:25:19 +02:00
|
|
|
require.Error(t, err)
|
|
|
|
|
2022-06-19 15:39:05 +02:00
|
|
|
// Check header file naming without header set
|
|
|
|
nameHeader = false
|
|
|
|
_, err = operations.CopyURL(ctx, r.Fremote, "file1", ts.URL, true, true, false)
|
|
|
|
require.Error(t, err)
|
|
|
|
|
2019-08-05 20:20:50 +02:00
|
|
|
// Check an error is returned for a 404
|
|
|
|
status = http.StatusNotFound
|
2021-07-28 18:05:21 +02:00
|
|
|
o, err = operations.CopyURL(ctx, r.Fremote, "file1", ts.URL, false, false, false)
|
2019-08-05 20:20:50 +02:00
|
|
|
require.Error(t, err)
|
|
|
|
assert.Contains(t, err.Error(), "Not Found")
|
|
|
|
assert.Nil(t, o)
|
|
|
|
status = 0
|
|
|
|
|
2019-03-08 21:33:22 +01:00
|
|
|
// check when reading from unverified HTTPS server
|
2020-11-05 12:33:32 +01:00
|
|
|
ci.InsecureSkipVerify = true
|
2019-03-08 21:33:22 +01:00
|
|
|
fshttp.ResetTransport()
|
2021-02-17 21:21:09 +01:00
|
|
|
defer fshttp.ResetTransport()
|
2019-03-08 21:33:22 +01:00
|
|
|
tss := httptest.NewTLSServer(handler)
|
|
|
|
defer tss.Close()
|
|
|
|
|
2021-07-28 18:05:21 +02:00
|
|
|
o, err = operations.CopyURL(ctx, r.Fremote, "file2", tss.URL, false, false, false)
|
2019-03-08 21:33:22 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(contents)), o.Size())
|
2022-06-19 15:39:05 +02:00
|
|
|
fstest.CheckListingWithPrecision(t, r.Fremote, []fstest.Item{file1, file2, fstest.NewItem(urlFileName, contents, t1), fstest.NewItem(headerFilename, contents, t1)}, nil, fs.ModTimeNotSupported)
|
2018-11-02 18:29:57 +01:00
|
|
|
}
|
|
|
|
|
2019-12-18 18:02:13 +01:00
|
|
|
func TestCopyURLToWriter(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2019-12-18 18:02:13 +01:00
|
|
|
contents := "file contents\n"
|
|
|
|
|
|
|
|
// check when reading from regular HTTP server
|
|
|
|
status := 0
|
|
|
|
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if status != 0 {
|
2023-03-25 08:20:46 +01:00
|
|
|
http.Error(w, "an error occurred", status)
|
2019-12-18 18:02:13 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
_, err := w.Write([]byte(contents))
|
|
|
|
assert.NoError(t, err)
|
|
|
|
})
|
|
|
|
ts := httptest.NewServer(handler)
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
// test normal fetch
|
|
|
|
var buf bytes.Buffer
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.CopyURLToWriter(ctx, ts.URL, &buf)
|
2019-12-18 18:02:13 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, contents, buf.String())
|
|
|
|
|
|
|
|
// test fetch with error
|
|
|
|
status = http.StatusNotFound
|
|
|
|
buf.Reset()
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.CopyURLToWriter(ctx, ts.URL, &buf)
|
2019-12-18 18:02:13 +01:00
|
|
|
require.Error(t, err)
|
|
|
|
assert.Contains(t, err.Error(), "Not Found")
|
|
|
|
assert.Equal(t, 0, len(buf.String()))
|
|
|
|
}
|
|
|
|
|
2016-10-23 18:34:17 +02:00
|
|
|
func TestMoveFile(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2017-10-29 13:23:10 +01:00
|
|
|
r := fstest.NewRun(t)
|
2016-10-23 18:34:17 +02:00
|
|
|
|
|
|
|
file1 := r.WriteFile("file1", "file1 contents", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1)
|
2016-10-23 18:34:17 +02:00
|
|
|
|
|
|
|
file2 := file1
|
|
|
|
file2.Path = "sub/file2"
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.MoveFile(ctx, r.Fremote, r.Flocal, file2.Path, file1.Path)
|
2016-10-23 18:34:17 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file2)
|
2016-10-23 18:34:17 +02:00
|
|
|
|
|
|
|
r.WriteFile("file1", "file1 contents", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1)
|
2016-10-23 18:34:17 +02:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.MoveFile(ctx, r.Fremote, r.Flocal, file2.Path, file1.Path)
|
2016-10-23 18:34:17 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file2)
|
2017-05-27 17:30:26 +02:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.MoveFile(ctx, r.Fremote, r.Fremote, file2.Path, file2.Path)
|
2017-05-27 17:30:26 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file2)
|
2016-10-23 18:34:17 +02:00
|
|
|
}
|
|
|
|
|
2021-07-29 18:42:55 +02:00
|
|
|
func TestMoveFileWithIgnoreExisting(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
file1 := r.WriteFile("file1", "file1 contents", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1)
|
2021-07-29 18:42:55 +02:00
|
|
|
|
|
|
|
ci.IgnoreExisting = true
|
|
|
|
|
|
|
|
err := operations.MoveFile(ctx, r.Fremote, r.Flocal, file1.Path, file1.Path)
|
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file1)
|
2021-07-29 18:42:55 +02:00
|
|
|
|
|
|
|
// Recreate file with updated content
|
|
|
|
file1b := r.WriteFile("file1", "file1 modified", t2)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1b)
|
2021-07-29 18:42:55 +02:00
|
|
|
|
|
|
|
// Ensure modified file did not transfer and was not deleted
|
|
|
|
err = operations.MoveFile(ctx, r.Fremote, r.Flocal, file1.Path, file1b.Path)
|
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1b)
|
|
|
|
r.CheckRemoteItems(t, file1)
|
2021-07-29 18:42:55 +02:00
|
|
|
}
|
|
|
|
|
2019-06-10 12:01:13 +02:00
|
|
|
func TestCaseInsensitiveMoveFile(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2019-06-10 12:01:13 +02:00
|
|
|
r := fstest.NewRun(t)
|
|
|
|
if !r.Fremote.Features().CaseInsensitive {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
file1 := r.WriteFile("file1", "file1 contents", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1)
|
2019-06-10 12:01:13 +02:00
|
|
|
|
|
|
|
file2 := file1
|
|
|
|
file2.Path = "sub/file2"
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.MoveFile(ctx, r.Fremote, r.Flocal, file2.Path, file1.Path)
|
2019-06-10 12:01:13 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file2)
|
2019-06-10 12:01:13 +02:00
|
|
|
|
|
|
|
r.WriteFile("file1", "file1 contents", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1)
|
2019-06-10 12:01:13 +02:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.MoveFile(ctx, r.Fremote, r.Flocal, file2.Path, file1.Path)
|
2019-06-10 12:01:13 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file2)
|
2019-06-10 12:01:13 +02:00
|
|
|
|
|
|
|
file2Capitalized := file2
|
|
|
|
file2Capitalized.Path = "sub/File2"
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err = operations.MoveFile(ctx, r.Fremote, r.Fremote, file2Capitalized.Path, file2.Path)
|
2019-06-10 12:01:13 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
|
|
|
r.CheckRemoteItems(t, file2Capitalized)
|
2019-06-10 12:01:13 +02:00
|
|
|
}
|
|
|
|
|
2023-10-10 13:21:56 +02:00
|
|
|
func TestCaseInsensitiveMoveFileDryRun(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
if !r.Fremote.Features().CaseInsensitive {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
file1 := r.WriteObject(ctx, "hello", "world", t1)
|
|
|
|
r.CheckRemoteItems(t, file1)
|
|
|
|
|
2024-01-23 22:51:07 +01:00
|
|
|
ci.DryRun = true
|
2023-10-10 13:21:56 +02:00
|
|
|
err := operations.MoveFile(ctx, r.Fremote, r.Fremote, "HELLO", file1.Path)
|
|
|
|
require.NoError(t, err)
|
|
|
|
r.CheckRemoteItems(t, file1)
|
|
|
|
}
|
|
|
|
|
2019-05-23 14:17:16 +02:00
|
|
|
func TestMoveFileBackupDir(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
2019-05-23 14:17:16 +02:00
|
|
|
r := fstest.NewRun(t)
|
2019-07-02 13:22:29 +02:00
|
|
|
if !operations.CanServerSideMove(r.Fremote) {
|
2020-10-13 23:43:40 +02:00
|
|
|
t.Skip("Skipping test as remote does not support server-side move or copy")
|
2019-07-02 11:46:49 +02:00
|
|
|
}
|
2019-05-23 14:17:16 +02:00
|
|
|
|
2020-11-05 12:33:32 +01:00
|
|
|
ci.BackupDir = r.FremoteName + "/backup"
|
2019-05-23 14:17:16 +02:00
|
|
|
|
|
|
|
file1 := r.WriteFile("dst/file1", "file1 contents", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t, file1)
|
2019-05-23 14:17:16 +02:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
file1old := r.WriteObject(ctx, "dst/file1", "file1 contents old", t1)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1old)
|
2019-05-23 14:17:16 +02:00
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
err := operations.MoveFile(ctx, r.Fremote, r.Flocal, file1.Path, file1.Path)
|
2019-05-23 14:17:16 +02:00
|
|
|
require.NoError(t, err)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckLocalItems(t)
|
2019-05-23 14:17:16 +02:00
|
|
|
file1old.Path = "backup/dst/file1"
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1old, file1)
|
2019-05-23 14:17:16 +02:00
|
|
|
}
|
|
|
|
|
2017-01-11 15:59:53 +01:00
|
|
|
// testFsInfo is for unit testing fs.Info
|
|
|
|
type testFsInfo struct {
|
|
|
|
name string
|
|
|
|
root string
|
|
|
|
stringVal string
|
|
|
|
precision time.Duration
|
2018-01-12 17:30:54 +01:00
|
|
|
hashes hash.Set
|
2017-01-13 18:21:47 +01:00
|
|
|
features fs.Features
|
2017-01-11 15:59:53 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Name of the remote (as passed into NewFs)
|
|
|
|
func (i *testFsInfo) Name() string { return i.name }
|
|
|
|
|
|
|
|
// Root of the remote (as passed into NewFs)
|
|
|
|
func (i *testFsInfo) Root() string { return i.root }
|
|
|
|
|
|
|
|
// String returns a description of the FS
|
|
|
|
func (i *testFsInfo) String() string { return i.stringVal }
|
|
|
|
|
|
|
|
// Precision of the ModTimes in this Fs
|
|
|
|
func (i *testFsInfo) Precision() time.Duration { return i.precision }
|
|
|
|
|
|
|
|
// Returns the supported hash types of the filesystem
|
2018-01-12 17:30:54 +01:00
|
|
|
func (i *testFsInfo) Hashes() hash.Set { return i.hashes }
|
2017-01-11 15:59:53 +01:00
|
|
|
|
2017-01-13 18:21:47 +01:00
|
|
|
// Returns the supported hash types of the filesystem
|
|
|
|
func (i *testFsInfo) Features() *fs.Features { return &i.features }
|
|
|
|
|
2017-01-11 15:59:53 +01:00
|
|
|
func TestSameConfig(t *testing.T) {
|
|
|
|
a := &testFsInfo{name: "name", root: "root"}
|
|
|
|
for _, test := range []struct {
|
|
|
|
name string
|
|
|
|
root string
|
|
|
|
expected bool
|
|
|
|
}{
|
|
|
|
{"name", "root", true},
|
|
|
|
{"name", "rooty", true},
|
|
|
|
{"namey", "root", false},
|
|
|
|
{"namey", "roott", false},
|
|
|
|
} {
|
|
|
|
b := &testFsInfo{name: test.name, root: test.root}
|
2018-01-12 17:30:54 +01:00
|
|
|
actual := operations.SameConfig(a, b)
|
2017-01-11 15:59:53 +01:00
|
|
|
assert.Equal(t, test.expected, actual)
|
2018-01-12 17:30:54 +01:00
|
|
|
actual = operations.SameConfig(b, a)
|
2017-01-11 15:59:53 +01:00
|
|
|
assert.Equal(t, test.expected, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSame(t *testing.T) {
|
|
|
|
a := &testFsInfo{name: "name", root: "root"}
|
|
|
|
for _, test := range []struct {
|
|
|
|
name string
|
|
|
|
root string
|
|
|
|
expected bool
|
|
|
|
}{
|
|
|
|
{"name", "root", true},
|
|
|
|
{"name", "rooty", false},
|
|
|
|
{"namey", "root", false},
|
|
|
|
{"namey", "roott", false},
|
|
|
|
} {
|
|
|
|
b := &testFsInfo{name: test.name, root: test.root}
|
2018-01-12 17:30:54 +01:00
|
|
|
actual := operations.Same(a, b)
|
2017-01-11 15:59:53 +01:00
|
|
|
assert.Equal(t, test.expected, actual)
|
2018-01-12 17:30:54 +01:00
|
|
|
actual = operations.Same(b, a)
|
2017-01-11 15:59:53 +01:00
|
|
|
assert.Equal(t, test.expected, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-01 19:24:54 +02:00
|
|
|
// testFs is for unit testing fs.Fs
|
|
|
|
type testFs struct {
|
|
|
|
testFsInfo
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testFs) List(ctx context.Context, dir string) (entries fs.DirEntries, err error) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testFs) NewObject(ctx context.Context, remote string) (fs.Object, error) { return nil, nil }
|
|
|
|
|
|
|
|
func (i *testFs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testFs) Mkdir(ctx context.Context, dir string) error { return nil }
|
|
|
|
|
|
|
|
func (i *testFs) Rmdir(ctx context.Context, dir string) error { return nil }
|
|
|
|
|
|
|
|
// copied from TestOverlapping because the behavior of OverlappingFilterCheck should be identical to Overlapping
|
|
|
|
// when no filters are set
|
|
|
|
func TestOverlappingFilterCheckWithoutFilter(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
src := &testFs{testFsInfo{name: "name", root: "root"}}
|
|
|
|
slash := string(os.PathSeparator) // native path separator
|
|
|
|
for _, test := range []struct {
|
|
|
|
name string
|
|
|
|
root string
|
|
|
|
expected bool
|
|
|
|
}{
|
|
|
|
{"name", "root", true},
|
2022-06-09 14:19:11 +02:00
|
|
|
{"name", "/root", true},
|
2022-06-01 19:24:54 +02:00
|
|
|
{"namey", "root", false},
|
|
|
|
{"name", "rooty", false},
|
|
|
|
{"namey", "rooty", false},
|
|
|
|
{"name", "roo", false},
|
|
|
|
{"name", "root/toot", true},
|
|
|
|
{"name", "root/toot/", true},
|
|
|
|
{"name", "root" + slash + "toot", true},
|
|
|
|
{"name", "root" + slash + "toot" + slash, true},
|
|
|
|
{"name", "", true},
|
|
|
|
{"name", "/", true},
|
|
|
|
} {
|
|
|
|
dst := &testFs{testFsInfo{name: test.name, root: test.root}}
|
|
|
|
what := fmt.Sprintf("(%q,%q) vs (%q,%q)", src.name, src.root, dst.name, dst.root)
|
|
|
|
actual := operations.OverlappingFilterCheck(ctx, src, dst)
|
|
|
|
assert.Equal(t, test.expected, actual, what)
|
|
|
|
actual = operations.OverlappingFilterCheck(ctx, dst, src)
|
|
|
|
assert.Equal(t, test.expected, actual, what)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestOverlappingFilterCheckWithFilter(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
fi, err := filter.NewFilter(nil)
|
|
|
|
require.NoError(t, err)
|
2023-07-15 10:10:26 +02:00
|
|
|
require.NoError(t, fi.Add(false, "/exclude/"))
|
|
|
|
require.NoError(t, fi.Add(false, "/Exclude2/"))
|
|
|
|
require.NoError(t, fi.Add(true, "*"))
|
2022-06-01 19:24:54 +02:00
|
|
|
ctx = filter.ReplaceConfig(ctx, fi)
|
|
|
|
|
|
|
|
src := &testFs{testFsInfo{name: "name", root: "root"}}
|
2023-07-15 10:10:26 +02:00
|
|
|
src.features.CaseInsensitive = true
|
2022-06-01 19:24:54 +02:00
|
|
|
slash := string(os.PathSeparator) // native path separator
|
|
|
|
for _, test := range []struct {
|
|
|
|
name string
|
|
|
|
root string
|
|
|
|
expected bool
|
|
|
|
}{
|
|
|
|
{"name", "root", true},
|
2023-07-15 10:10:26 +02:00
|
|
|
{"name", "ROOT", true}, // case insensitive is set
|
2022-06-09 14:19:11 +02:00
|
|
|
{"name", "/root", true},
|
2022-06-01 19:24:54 +02:00
|
|
|
{"name", "root/", true},
|
|
|
|
{"name", "root" + slash, true},
|
|
|
|
{"name", "root/exclude", false},
|
2023-07-15 10:10:26 +02:00
|
|
|
{"name", "root/Exclude2", false},
|
|
|
|
{"name", "root/include", true},
|
2022-06-01 19:24:54 +02:00
|
|
|
{"name", "root/exclude/", false},
|
2023-07-15 10:10:26 +02:00
|
|
|
{"name", "root/Exclude2/", false},
|
|
|
|
{"name", "root/exclude/sub", false},
|
|
|
|
{"name", "root/Exclude2/sub", false},
|
2022-06-09 14:19:11 +02:00
|
|
|
{"name", "/root/exclude/", false},
|
2022-06-01 19:24:54 +02:00
|
|
|
{"name", "root" + slash + "exclude", false},
|
|
|
|
{"name", "root" + slash + "exclude" + slash, false},
|
|
|
|
{"namey", "root/include", false},
|
|
|
|
{"namey", "root/include/", false},
|
|
|
|
{"namey", "root" + slash + "include", false},
|
|
|
|
{"namey", "root" + slash + "include" + slash, false},
|
|
|
|
} {
|
|
|
|
dst := &testFs{testFsInfo{name: test.name, root: test.root}}
|
2023-07-15 10:10:26 +02:00
|
|
|
dst.features.CaseInsensitive = true
|
2022-06-01 19:24:54 +02:00
|
|
|
what := fmt.Sprintf("(%q,%q) vs (%q,%q)", src.name, src.root, dst.name, dst.root)
|
|
|
|
actual := operations.OverlappingFilterCheck(ctx, dst, src)
|
|
|
|
assert.Equal(t, test.expected, actual, what)
|
2023-07-15 10:10:26 +02:00
|
|
|
actual = operations.OverlappingFilterCheck(ctx, src, dst)
|
|
|
|
assert.Equal(t, test.expected, actual, what)
|
2022-06-01 19:24:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-06 15:39:31 +01:00
|
|
|
func TestListFormat(t *testing.T) {
|
2019-02-14 09:45:03 +01:00
|
|
|
item0 := &operations.ListJSONItem{
|
|
|
|
Path: "a",
|
|
|
|
Name: "a",
|
|
|
|
Encrypted: "encryptedFileName",
|
|
|
|
Size: 1,
|
|
|
|
MimeType: "application/octet-stream",
|
|
|
|
ModTime: operations.Timestamp{
|
|
|
|
When: t1,
|
|
|
|
Format: "2006-01-02T15:04:05.000000000Z07:00"},
|
|
|
|
IsDir: false,
|
|
|
|
Hashes: map[string]string{
|
2021-05-21 16:32:33 +02:00
|
|
|
"md5": "0cc175b9c0f1b6a831c399e269772661",
|
|
|
|
"sha1": "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8",
|
|
|
|
"dropbox": "bf5d3affb73efd2ec6c36ad3112dd933efed63c4e1cbffcfa88e2759c144f2d8",
|
|
|
|
"quickxor": "6100000000000000000000000100000000000000"},
|
2019-02-14 09:45:03 +01:00
|
|
|
ID: "fileID",
|
|
|
|
OrigID: "fileOrigID",
|
|
|
|
}
|
2018-01-06 15:39:31 +01:00
|
|
|
|
2019-02-14 09:45:03 +01:00
|
|
|
item1 := &operations.ListJSONItem{
|
|
|
|
Path: "subdir",
|
|
|
|
Name: "subdir",
|
|
|
|
Encrypted: "encryptedDirName",
|
|
|
|
Size: -1,
|
|
|
|
MimeType: "inode/directory",
|
|
|
|
ModTime: operations.Timestamp{
|
|
|
|
When: t2,
|
|
|
|
Format: "2006-01-02T15:04:05.000000000Z07:00"},
|
|
|
|
IsDir: true,
|
|
|
|
Hashes: map[string]string(nil),
|
|
|
|
ID: "dirID",
|
|
|
|
OrigID: "dirOrigID",
|
|
|
|
}
|
2018-01-06 15:39:31 +01:00
|
|
|
|
2018-01-12 17:30:54 +01:00
|
|
|
var list operations.ListFormat
|
2018-01-06 15:39:31 +01:00
|
|
|
list.AddPath()
|
|
|
|
list.SetDirSlash(false)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "subdir", list.Format(item1))
|
2018-01-06 15:39:31 +01:00
|
|
|
|
|
|
|
list.SetDirSlash(true)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "subdir/", list.Format(item1))
|
2018-01-06 15:39:31 +01:00
|
|
|
|
|
|
|
list.SetOutput(nil)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "", list.Format(item1))
|
2018-01-06 15:39:31 +01:00
|
|
|
|
2019-02-14 09:45:03 +01:00
|
|
|
list.AppendOutput(func(item *operations.ListJSONItem) string { return "a" })
|
|
|
|
list.AppendOutput(func(item *operations.ListJSONItem) string { return "b" })
|
|
|
|
assert.Equal(t, "ab", list.Format(item1))
|
2018-01-06 15:39:31 +01:00
|
|
|
list.SetSeparator(":::")
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "a:::b", list.Format(item1))
|
2018-01-06 15:39:31 +01:00
|
|
|
|
|
|
|
list.SetOutput(nil)
|
2023-12-08 01:29:55 +01:00
|
|
|
list.AddModTime("")
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, t1.Local().Format("2006-01-02 15:04:05"), list.Format(item0))
|
2018-01-06 15:39:31 +01:00
|
|
|
|
2018-05-13 10:18:08 +02:00
|
|
|
list.SetOutput(nil)
|
2019-02-14 09:45:03 +01:00
|
|
|
list.SetSeparator("|")
|
2018-05-13 10:18:08 +02:00
|
|
|
list.AddID()
|
2019-02-14 09:45:03 +01:00
|
|
|
list.AddOrigID()
|
|
|
|
assert.Equal(t, "fileID|fileOrigID", list.Format(item0))
|
|
|
|
assert.Equal(t, "dirID|dirOrigID", list.Format(item1))
|
2018-05-13 10:18:08 +02:00
|
|
|
|
2018-05-13 11:37:25 +02:00
|
|
|
list.SetOutput(nil)
|
|
|
|
list.AddMimeType()
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Contains(t, list.Format(item0), "/")
|
|
|
|
assert.Equal(t, "inode/directory", list.Format(item1))
|
2018-05-13 11:37:25 +02:00
|
|
|
|
2022-05-24 12:31:48 +02:00
|
|
|
list.SetOutput(nil)
|
|
|
|
list.AddMetadata()
|
|
|
|
assert.Equal(t, "{}", list.Format(item0))
|
|
|
|
assert.Equal(t, "{}", list.Format(item1))
|
|
|
|
|
2018-06-03 11:42:34 +02:00
|
|
|
list.SetOutput(nil)
|
|
|
|
list.AddPath()
|
|
|
|
list.SetAbsolute(true)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "/a", list.Format(item0))
|
2018-06-03 11:42:34 +02:00
|
|
|
list.SetAbsolute(false)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "a", list.Format(item0))
|
2018-06-03 11:42:34 +02:00
|
|
|
|
2018-01-06 15:39:31 +01:00
|
|
|
list.SetOutput(nil)
|
|
|
|
list.AddSize()
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "1", list.Format(item0))
|
2018-01-06 15:39:31 +01:00
|
|
|
|
|
|
|
list.AddPath()
|
2023-12-08 01:29:55 +01:00
|
|
|
list.AddModTime("")
|
2018-01-06 15:39:31 +01:00
|
|
|
list.SetDirSlash(true)
|
|
|
|
list.SetSeparator("__SEP__")
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "1__SEP__a__SEP__"+t1.Local().Format("2006-01-02 15:04:05"), list.Format(item0))
|
|
|
|
assert.Equal(t, "-1__SEP__subdir/__SEP__"+t2.Local().Format("2006-01-02 15:04:05"), list.Format(item1))
|
2018-01-06 18:53:37 +01:00
|
|
|
|
|
|
|
for _, test := range []struct {
|
2018-01-12 17:30:54 +01:00
|
|
|
ht hash.Type
|
2018-01-06 18:53:37 +01:00
|
|
|
want string
|
|
|
|
}{
|
2018-01-18 21:27:52 +01:00
|
|
|
{hash.MD5, "0cc175b9c0f1b6a831c399e269772661"},
|
|
|
|
{hash.SHA1, "86f7e437faa5a7fce15d1ddcb9eaeaea377667b8"},
|
2018-01-06 18:53:37 +01:00
|
|
|
} {
|
|
|
|
list.SetOutput(nil)
|
|
|
|
list.AddHash(test.ht)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, test.want, list.Format(item0))
|
2018-01-06 18:53:37 +01:00
|
|
|
}
|
2018-05-13 13:15:05 +02:00
|
|
|
|
|
|
|
list.SetOutput(nil)
|
|
|
|
list.SetSeparator("|")
|
|
|
|
list.SetCSV(true)
|
|
|
|
list.AddSize()
|
|
|
|
list.AddPath()
|
2023-12-08 01:29:55 +01:00
|
|
|
list.AddModTime("")
|
2018-05-13 13:15:05 +02:00
|
|
|
list.SetDirSlash(true)
|
2019-02-14 09:45:03 +01:00
|
|
|
assert.Equal(t, "1|a|"+t1.Local().Format("2006-01-02 15:04:05"), list.Format(item0))
|
|
|
|
assert.Equal(t, "-1|subdir/|"+t2.Local().Format("2006-01-02 15:04:05"), list.Format(item1))
|
|
|
|
|
|
|
|
list.SetOutput(nil)
|
|
|
|
list.SetSeparator("|")
|
|
|
|
list.AddPath()
|
|
|
|
list.AddEncrypted()
|
|
|
|
assert.Equal(t, "a|encryptedFileName", list.Format(item0))
|
|
|
|
assert.Equal(t, "subdir/|encryptedDirName/", list.Format(item1))
|
2018-05-13 13:15:05 +02:00
|
|
|
|
2018-01-06 15:39:31 +01:00
|
|
|
}
|
2019-01-15 17:43:55 +01:00
|
|
|
|
|
|
|
func TestDirMove(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2019-01-15 17:43:55 +01:00
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
r.Mkdir(ctx, r.Fremote)
|
2019-01-15 17:43:55 +01:00
|
|
|
|
|
|
|
// Make some files and dirs
|
2020-11-05 17:27:01 +01:00
|
|
|
r.ForceMkdir(ctx, r.Fremote)
|
2019-01-15 17:43:55 +01:00
|
|
|
files := []fstest.Item{
|
2020-11-05 17:27:01 +01:00
|
|
|
r.WriteObject(ctx, "A1/one", "one", t1),
|
|
|
|
r.WriteObject(ctx, "A1/two", "two", t2),
|
|
|
|
r.WriteObject(ctx, "A1/B1/three", "three", t3),
|
|
|
|
r.WriteObject(ctx, "A1/B1/C1/four", "four", t1),
|
|
|
|
r.WriteObject(ctx, "A1/B1/C2/five", "five", t2),
|
2019-01-15 17:43:55 +01:00
|
|
|
}
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B2"))
|
|
|
|
require.NoError(t, operations.Mkdir(ctx, r.Fremote, "A1/B1/C3"))
|
2019-01-15 17:43:55 +01:00
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
files,
|
|
|
|
[]string{
|
|
|
|
"A1",
|
|
|
|
"A1/B1",
|
|
|
|
"A1/B2",
|
|
|
|
"A1/B1/C1",
|
|
|
|
"A1/B1/C2",
|
|
|
|
"A1/B1/C3",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2019-01-15 17:43:55 +01:00
|
|
|
)
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.DirMove(ctx, r.Fremote, "A1", "A2"))
|
2019-01-15 17:43:55 +01:00
|
|
|
|
|
|
|
for i := range files {
|
2022-05-16 18:11:45 +02:00
|
|
|
files[i].Path = strings.ReplaceAll(files[i].Path, "A1/", "A2/")
|
2019-01-15 17:43:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
files,
|
|
|
|
[]string{
|
|
|
|
"A2",
|
|
|
|
"A2/B1",
|
|
|
|
"A2/B2",
|
|
|
|
"A2/B1/C1",
|
|
|
|
"A2/B1/C2",
|
|
|
|
"A2/B1/C3",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2019-01-15 17:43:55 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Disable DirMove
|
|
|
|
features := r.Fremote.Features()
|
|
|
|
features.DirMove = nil
|
|
|
|
|
2020-11-05 17:27:01 +01:00
|
|
|
require.NoError(t, operations.DirMove(ctx, r.Fremote, "A2", "A3"))
|
2019-01-15 17:43:55 +01:00
|
|
|
|
|
|
|
for i := range files {
|
2022-05-16 18:11:45 +02:00
|
|
|
files[i].Path = strings.ReplaceAll(files[i].Path, "A2/", "A3/")
|
2019-01-15 17:43:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
files,
|
|
|
|
[]string{
|
|
|
|
"A3",
|
|
|
|
"A3/B1",
|
|
|
|
"A3/B2",
|
|
|
|
"A3/B1/C1",
|
|
|
|
"A3/B1/C2",
|
|
|
|
"A3/B1/C3",
|
|
|
|
},
|
2020-11-05 17:27:01 +01:00
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
2019-01-15 17:43:55 +01:00
|
|
|
)
|
|
|
|
|
2024-03-06 19:26:50 +01:00
|
|
|
// Try with a DirMove method that exists but returns fs.ErrorCantDirMove (ex. combine moving across upstreams)
|
|
|
|
// Should fall back to manual move (copy + delete)
|
|
|
|
|
|
|
|
features.DirMove = func(ctx context.Context, src fs.Fs, srcRemote string, dstRemote string) error {
|
|
|
|
return fs.ErrorCantDirMove
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.NoError(t, operations.DirMove(ctx, r.Fremote, "A3", "A4"))
|
|
|
|
|
|
|
|
for i := range files {
|
|
|
|
files[i].Path = strings.ReplaceAll(files[i].Path, "A3/", "A4/")
|
|
|
|
}
|
|
|
|
|
|
|
|
fstest.CheckListingWithPrecision(
|
|
|
|
t,
|
|
|
|
r.Fremote,
|
|
|
|
files,
|
|
|
|
[]string{
|
|
|
|
"A4",
|
|
|
|
"A4/B1",
|
|
|
|
"A4/B2",
|
|
|
|
"A4/B1/C1",
|
|
|
|
"A4/B1/C2",
|
|
|
|
"A4/B1/C3",
|
|
|
|
},
|
|
|
|
fs.GetModifyWindow(ctx, r.Fremote),
|
|
|
|
)
|
2019-01-15 17:43:55 +01:00
|
|
|
}
|
2019-06-08 10:19:07 +02:00
|
|
|
|
|
|
|
func TestGetFsInfo(t *testing.T) {
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
|
|
|
f := r.Fremote
|
|
|
|
info := operations.GetFsInfo(f)
|
|
|
|
assert.Equal(t, f.Name(), info.Name)
|
|
|
|
assert.Equal(t, f.Root(), info.Root)
|
|
|
|
assert.Equal(t, f.String(), info.String)
|
|
|
|
assert.Equal(t, f.Precision(), info.Precision)
|
|
|
|
hashSet := hash.NewHashSet()
|
|
|
|
for _, hashName := range info.Hashes {
|
|
|
|
var ht hash.Type
|
|
|
|
require.NoError(t, ht.Set(hashName))
|
|
|
|
hashSet.Add(ht)
|
|
|
|
}
|
|
|
|
assert.Equal(t, f.Hashes(), hashSet)
|
|
|
|
assert.Equal(t, f.Features().Enabled(), info.Features)
|
|
|
|
}
|
2020-02-14 13:26:52 +01:00
|
|
|
|
|
|
|
func TestRcat(t *testing.T) {
|
2020-11-05 12:33:32 +01:00
|
|
|
ctx := context.Background()
|
2021-02-17 21:21:09 +01:00
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
2022-12-08 13:43:53 +01:00
|
|
|
check := func(t *testing.T, withChecksum, ignoreChecksum bool) {
|
2020-11-05 12:33:32 +01:00
|
|
|
ci.CheckSum, ci.IgnoreChecksum = withChecksum, ignoreChecksum
|
2020-02-14 13:26:52 +01:00
|
|
|
|
2020-02-14 13:47:11 +01:00
|
|
|
var prefix string
|
2020-02-14 13:26:52 +01:00
|
|
|
if withChecksum {
|
|
|
|
prefix = "with_checksum_"
|
2020-02-14 13:47:11 +01:00
|
|
|
} else {
|
|
|
|
prefix = "no_checksum_"
|
|
|
|
}
|
|
|
|
if ignoreChecksum {
|
|
|
|
prefix = "ignore_checksum_"
|
2020-02-14 13:26:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
2020-11-05 12:33:32 +01:00
|
|
|
if *fstest.SizeLimit > 0 && int64(ci.StreamingUploadCutoff) > *fstest.SizeLimit {
|
|
|
|
savedCutoff := ci.StreamingUploadCutoff
|
|
|
|
ci.StreamingUploadCutoff = fs.SizeSuffix(*fstest.SizeLimit)
|
|
|
|
t.Logf("Adjust StreamingUploadCutoff to size limit %s (was %s)", ci.StreamingUploadCutoff, savedCutoff)
|
2020-02-14 13:26:52 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
fstest.CheckListing(t, r.Fremote, []fstest.Item{})
|
|
|
|
|
|
|
|
data1 := "this is some really nice test data"
|
|
|
|
path1 := prefix + "small_file_from_pipe"
|
|
|
|
|
2020-11-05 12:33:32 +01:00
|
|
|
data2 := string(make([]byte, ci.StreamingUploadCutoff+1))
|
2020-02-14 13:26:52 +01:00
|
|
|
path2 := prefix + "big_file_from_pipe"
|
|
|
|
|
2022-08-20 16:38:02 +02:00
|
|
|
in := io.NopCloser(strings.NewReader(data1))
|
2022-11-08 18:42:18 +01:00
|
|
|
_, err := operations.Rcat(ctx, r.Fremote, path1, in, t1, nil)
|
2020-02-14 13:26:52 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2022-08-20 16:38:02 +02:00
|
|
|
in = io.NopCloser(strings.NewReader(data2))
|
2022-11-08 18:42:18 +01:00
|
|
|
_, err = operations.Rcat(ctx, r.Fremote, path2, in, t2, nil)
|
2020-02-14 13:26:52 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
file1 := fstest.NewItem(path1, data1, t1)
|
|
|
|
file2 := fstest.NewItem(path2, data2, t2)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2020-02-14 13:26:52 +01:00
|
|
|
}
|
|
|
|
|
2020-02-14 13:47:11 +01:00
|
|
|
for i := 0; i < 4; i++ {
|
|
|
|
withChecksum := (i & 1) != 0
|
|
|
|
ignoreChecksum := (i & 2) != 0
|
|
|
|
t.Run(fmt.Sprintf("withChecksum=%v,ignoreChecksum=%v", withChecksum, ignoreChecksum), func(t *testing.T) {
|
2022-12-08 13:43:53 +01:00
|
|
|
check(t, withChecksum, ignoreChecksum)
|
2020-02-14 13:47:11 +01:00
|
|
|
})
|
|
|
|
}
|
2020-02-14 13:26:52 +01:00
|
|
|
}
|
|
|
|
|
2022-11-08 18:42:18 +01:00
|
|
|
func TestRcatMetadata(t *testing.T) {
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
|
|
|
if !r.Fremote.Features().UserMetadata {
|
|
|
|
t.Skip("Skipping as destination doesn't support user metadata")
|
|
|
|
}
|
|
|
|
|
|
|
|
test := func(disableUploadCutoff bool) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
ci.Metadata = true
|
|
|
|
data := "this is some really nice test data with metadata"
|
|
|
|
path := "rcat_metadata"
|
|
|
|
|
|
|
|
meta := fs.Metadata{
|
|
|
|
"key": "value",
|
|
|
|
"sausage": "potato",
|
|
|
|
}
|
|
|
|
|
|
|
|
if disableUploadCutoff {
|
|
|
|
ci.StreamingUploadCutoff = 0
|
|
|
|
data += " uploadCutoff=0"
|
|
|
|
path += "_uploadcutoff0"
|
|
|
|
}
|
|
|
|
|
|
|
|
fstest.CheckListing(t, r.Fremote, []fstest.Item{})
|
|
|
|
|
|
|
|
in := io.NopCloser(strings.NewReader(data))
|
|
|
|
_, err := operations.Rcat(ctx, r.Fremote, path, in, t1, meta)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
file := fstest.NewItem(path, data, t1)
|
|
|
|
r.CheckRemoteItems(t, file)
|
|
|
|
|
|
|
|
o, err := r.Fremote.NewObject(ctx, path)
|
|
|
|
require.NoError(t, err)
|
|
|
|
gotMeta, err := fs.GetMetadata(ctx, o)
|
|
|
|
require.NoError(t, err)
|
|
|
|
// Check the specific user data we set is set
|
2023-03-25 08:20:46 +01:00
|
|
|
// Likely there will be other values
|
2022-11-08 18:42:18 +01:00
|
|
|
assert.Equal(t, "value", gotMeta["key"])
|
|
|
|
assert.Equal(t, "potato", gotMeta["sausage"])
|
|
|
|
|
|
|
|
// Delete the test file
|
|
|
|
require.NoError(t, o.Remove(ctx))
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("Normal", func(t *testing.T) {
|
|
|
|
test(false)
|
|
|
|
})
|
|
|
|
t.Run("ViaDisk", func(t *testing.T) {
|
|
|
|
test(true)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2020-02-14 13:26:52 +01:00
|
|
|
func TestRcatSize(t *testing.T) {
|
2020-11-05 17:27:01 +01:00
|
|
|
ctx := context.Background()
|
2020-02-14 13:26:52 +01:00
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
|
|
|
const body = "------------------------------------------------------------"
|
|
|
|
file1 := r.WriteFile("potato1", body, t1)
|
|
|
|
file2 := r.WriteFile("potato2", body, t2)
|
|
|
|
// Test with known length
|
2022-08-20 16:38:02 +02:00
|
|
|
bodyReader := io.NopCloser(strings.NewReader(body))
|
2022-11-08 18:42:18 +01:00
|
|
|
obj, err := operations.RcatSize(ctx, r.Fremote, file1.Path, bodyReader, int64(len(body)), file1.ModTime, nil)
|
2020-02-14 13:26:52 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(body)), obj.Size())
|
|
|
|
assert.Equal(t, file1.Path, obj.Remote())
|
|
|
|
|
|
|
|
// Test with unknown length
|
2022-08-20 16:38:02 +02:00
|
|
|
bodyReader = io.NopCloser(strings.NewReader(body)) // reset Reader
|
|
|
|
io.NopCloser(strings.NewReader(body))
|
2022-11-08 18:42:18 +01:00
|
|
|
obj, err = operations.RcatSize(ctx, r.Fremote, file2.Path, bodyReader, -1, file2.ModTime, nil)
|
2020-02-14 13:26:52 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(body)), obj.Size())
|
|
|
|
assert.Equal(t, file2.Path, obj.Remote())
|
|
|
|
|
|
|
|
// Check files exist
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
2020-02-14 13:26:52 +01:00
|
|
|
}
|
2019-10-30 20:23:17 +01:00
|
|
|
|
2022-11-08 18:42:18 +01:00
|
|
|
func TestRcatSizeMetadata(t *testing.T) {
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
|
|
|
if !r.Fremote.Features().UserMetadata {
|
|
|
|
t.Skip("Skipping as destination doesn't support user metadata")
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
ci.Metadata = true
|
|
|
|
|
|
|
|
meta := fs.Metadata{
|
|
|
|
"key": "value",
|
|
|
|
"sausage": "potato",
|
|
|
|
}
|
|
|
|
|
|
|
|
const body = "------------------------------------------------------------"
|
|
|
|
file1 := r.WriteFile("potato1", body, t1)
|
|
|
|
file2 := r.WriteFile("potato2", body, t2)
|
|
|
|
|
|
|
|
// Test with known length
|
|
|
|
bodyReader := io.NopCloser(strings.NewReader(body))
|
|
|
|
obj, err := operations.RcatSize(ctx, r.Fremote, file1.Path, bodyReader, int64(len(body)), file1.ModTime, meta)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(body)), obj.Size())
|
|
|
|
assert.Equal(t, file1.Path, obj.Remote())
|
|
|
|
|
|
|
|
// Test with unknown length
|
|
|
|
bodyReader = io.NopCloser(strings.NewReader(body)) // reset Reader
|
|
|
|
io.NopCloser(strings.NewReader(body))
|
|
|
|
obj, err = operations.RcatSize(ctx, r.Fremote, file2.Path, bodyReader, -1, file2.ModTime, meta)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, int64(len(body)), obj.Size())
|
|
|
|
assert.Equal(t, file2.Path, obj.Remote())
|
|
|
|
|
|
|
|
// Check files exist
|
|
|
|
r.CheckRemoteItems(t, file1, file2)
|
|
|
|
|
|
|
|
// Check metadata OK
|
|
|
|
for _, path := range []string{file1.Path, file2.Path} {
|
|
|
|
o, err := r.Fremote.NewObject(ctx, path)
|
|
|
|
require.NoError(t, err)
|
|
|
|
gotMeta, err := fs.GetMetadata(ctx, o)
|
|
|
|
require.NoError(t, err)
|
|
|
|
// Check the specific user data we set is set
|
2023-03-25 08:20:46 +01:00
|
|
|
// Likely there will be other values
|
2022-11-08 18:42:18 +01:00
|
|
|
assert.Equal(t, "value", gotMeta["key"])
|
|
|
|
assert.Equal(t, "potato", gotMeta["sausage"])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-22 21:06:24 +02:00
|
|
|
func TestTouchDir(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
|
2021-10-21 16:57:18 +02:00
|
|
|
if r.Fremote.Precision() == fs.ModTimeNotSupported {
|
|
|
|
t.Skip("Skipping test as remote does not support modtime")
|
|
|
|
}
|
|
|
|
|
2021-05-22 21:06:24 +02:00
|
|
|
file1 := r.WriteBoth(ctx, "potato2", "------------------------------------------------------------", t1)
|
|
|
|
file2 := r.WriteBoth(ctx, "empty space", "-", t2)
|
|
|
|
file3 := r.WriteBoth(ctx, "sub dir/potato3", "hello", t2)
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
2021-05-22 21:06:24 +02:00
|
|
|
|
2023-10-12 21:28:27 +02:00
|
|
|
accounting.GlobalStats().ResetCounters()
|
2021-05-22 21:06:24 +02:00
|
|
|
timeValue := time.Date(2010, 9, 8, 7, 6, 5, 4, time.UTC)
|
2022-01-27 19:46:53 +01:00
|
|
|
err := operations.TouchDir(ctx, r.Fremote, "", timeValue, true)
|
2021-05-22 21:06:24 +02:00
|
|
|
require.NoError(t, err)
|
2021-10-21 16:57:18 +02:00
|
|
|
if accounting.Stats(ctx).GetErrors() != 0 {
|
2021-11-04 11:12:57 +01:00
|
|
|
err = accounting.Stats(ctx).GetLastError()
|
|
|
|
require.True(t, errors.Is(err, fs.ErrorCantSetModTime) || errors.Is(err, fs.ErrorCantSetModTimeWithoutDelete))
|
2021-10-21 16:57:18 +02:00
|
|
|
} else {
|
|
|
|
file1.ModTime = timeValue
|
|
|
|
file2.ModTime = timeValue
|
|
|
|
file3.ModTime = timeValue
|
2021-11-09 12:43:36 +01:00
|
|
|
r.CheckRemoteItems(t, file1, file2, file3)
|
2021-10-21 16:57:18 +02:00
|
|
|
}
|
2021-05-22 21:06:24 +02:00
|
|
|
}
|
2024-02-22 12:13:32 +01:00
|
|
|
|
|
|
|
var testMetadata = fs.Metadata{
|
|
|
|
// System metadata supported by all backends
|
|
|
|
"mtime": t1.Format(time.RFC3339Nano),
|
|
|
|
// User metadata
|
|
|
|
"potato": "jersey",
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMkdirMetadata(t *testing.T) {
|
|
|
|
const name = "dir with metadata"
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
ci.Metadata = true
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
features := r.Fremote.Features()
|
|
|
|
if features.MkdirMetadata == nil {
|
|
|
|
t.Skip("Skipping test as remote does not support MkdirMetadata")
|
|
|
|
}
|
|
|
|
|
|
|
|
newDst, err := operations.MkdirMetadata(ctx, r.Fremote, name, testMetadata)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, newDst)
|
|
|
|
|
|
|
|
require.True(t, features.ReadDirMetadata, "Expecting ReadDirMetadata to be supported if MkdirMetadata is supported")
|
|
|
|
|
|
|
|
// Check the returned directory and one read from the listing
|
|
|
|
fstest.CheckEntryMetadata(ctx, t, r.Fremote, newDst, testMetadata)
|
|
|
|
fstest.CheckEntryMetadata(ctx, t, r.Fremote, fstest.NewDirectory(ctx, t, r.Fremote, name), testMetadata)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMkdirModTime(t *testing.T) {
|
|
|
|
const name = "directory with modtime"
|
|
|
|
ctx := context.Background()
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
if r.Fremote.Features().DirSetModTime == nil && r.Fremote.Features().MkdirMetadata == nil {
|
|
|
|
t.Skip("Skipping test as remote does not support DirSetModTime or MkdirMetadata")
|
|
|
|
}
|
|
|
|
newDst, err := operations.MkdirModTime(ctx, r.Fremote, name, t2)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// Check the returned directory and one read from the listing
|
2024-03-01 12:18:24 +01:00
|
|
|
// newDst may be nil here depending on how the modtime was set
|
|
|
|
if newDst != nil {
|
|
|
|
fstest.CheckDirModTime(ctx, t, r.Fremote, newDst, t2)
|
|
|
|
}
|
2024-02-22 12:13:32 +01:00
|
|
|
fstest.CheckDirModTime(ctx, t, r.Fremote, fstest.NewDirectory(ctx, t, r.Fremote, name), t2)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCopyDirMetadata(t *testing.T) {
|
|
|
|
const nameNonExistent = "non existent directory"
|
|
|
|
const nameExistent = "existing directory"
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
ci.Metadata = true
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
if !r.Fremote.Features().WriteDirMetadata && r.Fremote.Features().MkdirMetadata == nil {
|
|
|
|
t.Skip("Skipping test as remote does not support WriteDirMetadata or MkdirMetadata")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a source local directory with metadata
|
|
|
|
newSrc, err := operations.MkdirMetadata(ctx, r.Flocal, "dir with metadata to be copied", testMetadata)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, newSrc)
|
|
|
|
|
|
|
|
// First try with the directory not existing
|
|
|
|
newDst, err := operations.CopyDirMetadata(ctx, r.Fremote, nil, nameNonExistent, newSrc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, newDst)
|
|
|
|
|
|
|
|
// Check the returned directory and one read from the listing
|
|
|
|
fstest.CheckEntryMetadata(ctx, t, r.Fremote, newDst, testMetadata)
|
|
|
|
fstest.CheckEntryMetadata(ctx, t, r.Fremote, fstest.NewDirectory(ctx, t, r.Fremote, nameNonExistent), testMetadata)
|
|
|
|
|
|
|
|
// Then try with the directory existing
|
|
|
|
require.NoError(t, r.Fremote.Rmdir(ctx, nameNonExistent))
|
|
|
|
require.NoError(t, r.Fremote.Mkdir(ctx, nameExistent))
|
|
|
|
existingDir := fstest.NewDirectory(ctx, t, r.Fremote, nameExistent)
|
|
|
|
|
|
|
|
newDst, err = operations.CopyDirMetadata(ctx, r.Fremote, existingDir, "SHOULD BE IGNORED", newSrc)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, newDst)
|
|
|
|
|
|
|
|
// Check the returned directory and one read from the listing
|
|
|
|
fstest.CheckEntryMetadata(ctx, t, r.Fremote, newDst, testMetadata)
|
|
|
|
fstest.CheckEntryMetadata(ctx, t, r.Fremote, fstest.NewDirectory(ctx, t, r.Fremote, nameExistent), testMetadata)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSetDirModTime(t *testing.T) {
|
|
|
|
const name = "set modtime on existing directory"
|
2024-03-07 17:13:36 +01:00
|
|
|
ctx, ci := fs.AddConfig(context.Background())
|
2024-02-22 12:13:32 +01:00
|
|
|
r := fstest.NewRun(t)
|
|
|
|
if r.Fremote.Features().DirSetModTime == nil && !r.Fremote.Features().WriteDirSetModTime {
|
|
|
|
t.Skip("Skipping test as remote does not support DirSetModTime or WriteDirSetModTime")
|
|
|
|
}
|
|
|
|
|
2024-03-07 17:13:36 +01:00
|
|
|
// Check that we obey --no-update-dir-modtime - this should return nil, nil
|
|
|
|
ci.NoUpdateDirModTime = true
|
2024-02-22 12:13:32 +01:00
|
|
|
newDst, err := operations.SetDirModTime(ctx, r.Fremote, nil, "set modtime on non existent directory", t2)
|
2024-03-07 17:13:36 +01:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.Nil(t, newDst)
|
|
|
|
ci.NoUpdateDirModTime = false
|
|
|
|
|
|
|
|
// First try with the directory not existing - should return an error
|
|
|
|
newDst, err = operations.SetDirModTime(ctx, r.Fremote, nil, "set modtime on non existent directory", t2)
|
2024-02-22 12:13:32 +01:00
|
|
|
require.Error(t, err)
|
|
|
|
require.Nil(t, newDst)
|
|
|
|
|
|
|
|
// Then try with the directory existing
|
|
|
|
require.NoError(t, r.Fremote.Mkdir(ctx, name))
|
|
|
|
existingDir := fstest.NewDirectory(ctx, t, r.Fremote, name)
|
|
|
|
|
|
|
|
newDst, err = operations.SetDirModTime(ctx, r.Fremote, existingDir, "SHOULD BE IGNORED", t2)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, newDst)
|
|
|
|
|
|
|
|
// Check the returned directory and one read from the listing
|
2024-03-01 12:39:21 +01:00
|
|
|
// The modtime will only be correct on newDst if it had a SetModTime method
|
|
|
|
if _, ok := newDst.(fs.SetModTimer); ok {
|
|
|
|
fstest.CheckDirModTime(ctx, t, r.Fremote, newDst, t2)
|
|
|
|
}
|
2024-02-22 12:13:32 +01:00
|
|
|
fstest.CheckDirModTime(ctx, t, r.Fremote, fstest.NewDirectory(ctx, t, r.Fremote, name), t2)
|
|
|
|
}
|
2024-02-29 01:29:38 +01:00
|
|
|
|
|
|
|
func TestDirsEqual(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
ctx, ci := fs.AddConfig(ctx)
|
|
|
|
ci.Metadata = true
|
|
|
|
r := fstest.NewRun(t)
|
|
|
|
if !r.Fremote.Features().WriteDirMetadata && r.Fremote.Features().MkdirMetadata == nil {
|
|
|
|
t.Skip("Skipping test as remote does not support WriteDirMetadata or MkdirMetadata")
|
|
|
|
}
|
|
|
|
|
|
|
|
opt := operations.DirsEqualOpt{
|
|
|
|
ModifyWindow: fs.GetModifyWindow(ctx, r.Flocal, r.Fremote),
|
|
|
|
SetDirModtime: true,
|
|
|
|
SetDirMetadata: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a source local directory with metadata
|
|
|
|
src, err := operations.MkdirMetadata(ctx, r.Flocal, "dir with metadata to be copied", testMetadata)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, src)
|
|
|
|
|
|
|
|
// try with nil dst -- should be false
|
|
|
|
equal := operations.DirsEqual(ctx, src, nil, opt)
|
|
|
|
assert.False(t, equal)
|
|
|
|
|
|
|
|
// make a dest with an equal modtime
|
|
|
|
dst, err := operations.MkdirModTime(ctx, r.Fremote, "dst", src.ModTime(ctx))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// try with equal modtimes -- should be true
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.True(t, equal)
|
|
|
|
|
|
|
|
// try with unequal modtimes -- should be false
|
|
|
|
dst, err = operations.SetDirModTime(ctx, r.Fremote, dst, "", t2)
|
|
|
|
require.NoError(t, err)
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.False(t, equal)
|
|
|
|
|
|
|
|
// try with unequal modtimes that are within modify window -- should be true
|
|
|
|
halfWindow := opt.ModifyWindow / 2
|
|
|
|
dst, err = operations.SetDirModTime(ctx, r.Fremote, dst, "", src.ModTime(ctx).Add(halfWindow))
|
|
|
|
require.NoError(t, err)
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.True(t, equal)
|
|
|
|
|
|
|
|
// test ignoretimes -- should be false
|
|
|
|
ci.IgnoreTimes = true
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.False(t, equal)
|
|
|
|
|
|
|
|
// test immutable -- should be true
|
|
|
|
ci.IgnoreTimes = false
|
|
|
|
ci.Immutable = true
|
|
|
|
dst, err = operations.SetDirModTime(ctx, r.Fremote, dst, "", t3)
|
|
|
|
require.NoError(t, err)
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.True(t, equal)
|
|
|
|
|
|
|
|
// test dst newer than src with --update -- should be true
|
|
|
|
ci.Immutable = false
|
|
|
|
ci.UpdateOlder = true
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.True(t, equal)
|
|
|
|
|
|
|
|
// test no SetDirModtime or SetDirMetadata -- should be true
|
|
|
|
ci.UpdateOlder = false
|
|
|
|
opt.SetDirMetadata, opt.SetDirModtime = false, false
|
|
|
|
equal = operations.DirsEqual(ctx, src, dst, opt)
|
|
|
|
assert.True(t, equal)
|
|
|
|
}
|