def request_cred(self, creds_name): url = self._endpoint + self.iam_security_creds_path + "/" + creds_name res = self._http_client.urlopen('GET', url) if res.status != 200: raise ResponseError(res, 'GET') data = json.loads(res.data) if data['Code'] != 'Success': raise ResponseError(res) return data
def test_presigned_put_object(client, log_output): _http = urllib3.PoolManager(cert_reqs='CERT_REQUIRED', ca_certs=certifi.where()) # Get a unique bucket_name and object_name log_output.args['bucket_name'] = bucket_name = generate_bucket_name() log_output.args['object_name'] = object_name = uuid.uuid4().__str__() try: client.make_bucket(bucket_name) presigned_put_object_url = client.presigned_put_object( bucket_name, object_name) MB_1 = 1024 * 1024 # 1MiB. response = _http.urlopen('PUT', presigned_put_object_url, LimitedRandomReader(MB_1)) if response.status != 200: raise ResponseError(response, 'PUT', bucket_name, object_name).get_exception() client.stat_object(bucket_name, object_name) except Exception as err: raise Exception(err) finally: try: client.remove_object(bucket_name, object_name) client.remove_bucket(bucket_name) except Exception as err: raise Exception(err) # Test passes print(log_output.json_report())
def presigned_get_object_url_test(client, bucket_name, object_name): _log_test() presigned_get_object_url = client.presigned_get_object( bucket_name, object_name) response = _http.urlopen('GET', presigned_get_object_url) if response.status != 200: raise ResponseError(response, 'GET', bucket_name, object_name).get_exception()
def presigned_put_object_url_test(client, bucket_name, object_name): _log_test() presigned_put_object_url = client.presigned_put_object( bucket_name, object_name) value = fake.text().encode('utf-8') data = io.BytesIO(value).getvalue() response = _http.urlopen('PUT', presigned_put_object_url, body=data) if response.status != 200: raise ResponseError(response, 'PUT', bucket_name, object_name).get_exception() object_data = client.get_object(bucket_name, object_name) if object_data.read() != value: logger.error('Bytes not equal')
def files_back_1_fail_initally(mocker): 'Throw a response error - so the bucket doesn not get created right away' response = MagicMock() response.data = '<xml></xml>' mocker.patch( 'minio.api.Minio.list_objects', side_effect=[ ResponseError(response, 'POST', 'Dude'), [ make_minio_file( 'root:::dcache-atlas-xrootd-wan.desy.de:1094::pnfs:desy.de:atlas:dq2:atlaslocalgroupdisk:rucio:mc15_13TeV:8a:f1:DAOD_STDM3.05630052._000001.pool.root.198fbd841d0a28cb0d9dfa6340c890273-1.part.minio' ) ] ]) mocker.patch('minio.api.Minio.fget_object', side_effect=good_copy) return None
def retrieve(self): query = { "Action": "AssumeRole", "Version": "2011-06-15", "RoleArn": self._RoleArn, "RoleSessionName": self._RoleSessionName, } # Add optional elements to the request if self._Policy is not None: query["Policy"] = self._Policy if self._DurationSeconds is not None: query["DurationSeconds"] = str(self._DurationSeconds) url = self._minio_client._endpoint_url + "/" content = urlencode(query) headers = { 'Content-Type': 'application/x-www-form-urlencoded; charset=utf-8', 'User-Agent': self._minio_client._user_agent } # Create signature headers content_sha256_hex = get_sha256_hexdigest(content) signed_headers = sign_v4(self.method, url, self.region, headers, self._minio_client._credentials, content_sha256=content_sha256_hex, request_datetime=datetime.utcnow(), service_name='sts') response = self._minio_client._http.urlopen(self.method, url, body=content, headers=signed_headers, preload_content=True) if response.status != 200: raise ResponseError(response, self.method).get_exception() # Parse the XML Response - getting the credentials as a Values instance. credentials_value, expiry = parse_assume_role(response.data) self._expiry.set_expiration(expiry) return credentials_value
def iter_task_list(self, project, user): self.create_bucket_if_not_exists() objects = self.minio_cli.list_objects_v2(self.bucket_name, prefix='status/{}/{}/'.format( project, user)) for obj in objects: # print( # obj.bucket_name, # obj.object_name.encode('utf-8'), # obj.last_modified, # obj.etag, # obj.size, # obj.content_type # ) rsp = self.minio_cli.get_object(obj.bucket_name, obj.object_name) if rsp.status != 200: raise ResponseError('get_object error {}'.format(rsp.reason)) data = json.loads(rsp.data) yield data
def bad_then_good_minio_listing(mocker): 'Simulate the Minio going offline and then coming back' response1 = mocker.MagicMock() response1.data = '<xml></xml>' response2 = [ make_minio_file( 'root:::dcache-atlas-xrootd-wan.desy.de:1094::pnfs:desy.de:atlas' ':dq2:atlaslocalgroupdisk:rucio:mc15_13TeV:8a:f1:DAOD_STDM3.' '05630052._000001.pool.root.198fbd841d0a28cb0d9dfa6340c890273-1' '.part.minio') ] minio_client = mocker.MagicMock(spec=minio.Minio) minio_client.list_objects.side_effect = [ ResponseError(response1, 'POST', 'Due'), response2 ] mocker.patch('servicex.minio_adaptor.Minio', return_value=minio_client) p_rename = mocker.patch('servicex.minio_adaptor.Path.rename', mocker.MagicMock()) mocker.patch('servicex.minio_adaptor.Path.mkdir', mocker.MagicMock()) return p_rename, minio_client
def main(): """ Functional testing of minio python library. """ fake = Factory.create() client = Minio('play.minio.io:9000', 'Q3AM3UQ867SPQQA43P2F', 'zuf+tfteSlswRu7BJ86wekitnifILbZam1KYY3TG') _http = urllib3.PoolManager( cert_reqs='CERT_REQUIRED', ca_certs=certifi.where() ) # Get unique bucket_name, object_name. bucket_name = uuid.uuid4().__str__() object_name = uuid.uuid4().__str__() # Enable trace # client.trace_on(sys.stderr) # Make a new bucket. bucket_name = 'minio-pytest' client.make_bucket(bucket_name) is_s3 = client._endpoint_url.startswith("s3.amazonaws") if is_s3: client.make_bucket(bucket_name+'.unique', location='us-west-1') ## Check if return codes a valid from server. if is_s3: try: client.make_bucket(bucket_name+'.unique', location='us-west-1') except BucketAlreadyOwnedByYou as err: pass except BucketAlreadyExists as err: pass except ResponseError as err: raise # Check if bucket was created properly. client.bucket_exists(bucket_name) if is_s3: client.bucket_exists(bucket_name+'.unique') # List all buckets. buckets = client.list_buckets() for bucket in buckets: _, _ = bucket.name, bucket.creation_date with open('testfile', 'wb') as file_data: file_data.write(fake.text().encode('utf-8')) file_data.close() # Put a file file_stat = os.stat('testfile') with open('testfile', 'rb') as file_data: client.put_object(bucket_name, object_name, file_data, file_stat.st_size) file_data.close() with open('largefile', 'wb') as file_data: for i in range(0, 104857): file_data.write(fake.text().encode('utf-8')) file_data.close() # Fput a file client.fput_object(bucket_name, object_name+'-f', 'testfile') if is_s3: client.fput_object(bucket_name, object_name+'-f', 'testfile', metadata={'x-amz-storage-class': 'STANDARD_IA'}) # Fput a large file. client.fput_object(bucket_name, object_name+'-large', 'largefile') if is_s3: client.fput_object(bucket_name, object_name+'-large', 'largefile', metadata={'x-amz-storage-class': 'STANDARD_IA'}) # Copy a file client.copy_object(bucket_name, object_name+'-copy', '/'+bucket_name+'/'+object_name+'-f') try: copy_conditions = CopyConditions() copy_conditions.set_match_etag('test-etag') client.copy_object(bucket_name, object_name+'-copy', '/'+bucket_name+'/'+object_name+'-f', copy_conditions) except PreconditionFailed as err: if err.message != 'At least one of the preconditions you specified did not hold.': raise # Fetch stats on your object. client.stat_object(bucket_name, object_name) # Fetch stats on your object. client.stat_object(bucket_name, object_name+'-f') # Fetch stats on your large object. client.stat_object(bucket_name, object_name+'-large') # Fetch stats on your object. client.stat_object(bucket_name, object_name+'-copy') # Get a full object object_data = client.get_object(bucket_name, object_name) with open('newfile', 'wb') as file_data: for data in object_data: file_data.write(data) file_data.close() # Get a full object locally. client.fget_object(bucket_name, object_name, 'newfile-f') client.fput_object(bucket_name, object_name+'-f', 'testfile', metadata={'x-amz-meta-testing': 'value'}) stat = client.fget_object(bucket_name, object_name+'-f', 'newfile-f-custom') if not stat.metadata.has_key('X-Amz-Meta-Testing'): raise ValueError('Metadata key \'x-amz-meta-testing\' not found') value = stat.metadata['X-Amz-Meta-Testing'] if value != 'value': raise ValueError('Metadata key has unexpected' ' value {0}'.format(value)) # List all object paths in bucket. print("Listing using ListObjects") objects = client.list_objects(bucket_name, recursive=True) for obj in objects: _, _, _, _, _, _ = obj.bucket_name, obj.object_name, \ obj.last_modified, \ obj.etag, obj.size, \ obj.content_type # List all object paths in bucket using V2 API. print("Listing using ListObjectsV2") objects = client.list_objects_v2(bucket_name, recursive=True) for obj in objects: _, _, _, _, _, _ = obj.bucket_name, obj.object_name, \ obj.last_modified, \ obj.etag, obj.size, \ obj.content_type presigned_get_object_url = client.presigned_get_object(bucket_name, object_name) response = _http.urlopen('GET', presigned_get_object_url) if response.status != 200: raise ResponseError(response, 'GET', bucket_name, object_name).get_exception() presigned_put_object_url = client.presigned_put_object(bucket_name, object_name) value = fake.text().encode('utf-8') data = io.BytesIO(value).getvalue() response = _http.urlopen('PUT', presigned_put_object_url, body=data) if response.status != 200: raise ResponseError(response, 'PUT', bucket_name, object_name).get_exception() object_data = client.get_object(bucket_name, object_name) if object_data.read() != value: raise ValueError('Bytes not equal') # Post policy. policy = PostPolicy() policy.set_bucket_name(bucket_name) policy.set_key_startswith('objectPrefix/') expires_date = datetime.utcnow()+timedelta(days=10) policy.set_expires(expires_date) client.presigned_post_policy(policy) # Remove all objects. client.remove_object(bucket_name, object_name) client.remove_object(bucket_name, object_name+'-f') client.remove_object(bucket_name, object_name+'-large') client.remove_object(bucket_name, object_name+'-copy') policy_name = client.get_bucket_policy(bucket_name) if policy_name != Policy.NONE: raise ValueError('Policy name is invalid ' + policy_name) # Set read-only policy successfully. client.set_bucket_policy(bucket_name, '1/', Policy.READ_ONLY) # Set read-write policy successfully. client.set_bucket_policy(bucket_name, '1/', Policy.READ_WRITE) # Reset policy to NONE. client.set_bucket_policy(bucket_name, '', Policy.NONE) # Validate if the policy is reverted back to NONE. policy_name = client.get_bucket_policy(bucket_name) if policy_name != Policy.NONE: raise ValueError('Policy name is invalid ' + policy_name) # Upload some new objects to prepare for multi-object delete test. print("Prepare for remove_objects() test.") object_names = [] for i in range(10): curr_object_name = object_name+"-{}".format(i) # print("object-name: {}".format(curr_object_name)) client.fput_object(bucket_name, curr_object_name, "testfile") object_names.append(curr_object_name) # delete the objects in a single library call. print("Performing remove_objects() test.") del_errs = client.remove_objects(bucket_name, object_names) had_errs = False for del_err in del_errs: had_errs = True print("Remove objects err is {}".format(del_err)) if had_errs: print("Removing objects FAILED - it had unexpected errors.") raise else: print("Removing objects worked as expected.") # Remove a bucket. This operation will only work if your bucket is empty. print("Deleting buckets and finishing tests.") client.remove_bucket(bucket_name) if client._endpoint_url.startswith("s3.amazonaws"): client.remove_bucket(bucket_name+'.unique') # Remove temporary files. os.remove('testfile') os.remove('newfile') os.remove('newfile-f') os.remove('largefile') os.remove('newfile-f-custom')
def main(): """ Functional testing of minio python library. """ fake = Factory.create() client = Minio('s3.amazonaws.com', os.getenv('ACCESS_KEY'), os.getenv('SECRET_KEY')) _http = urllib3.PoolManager(cert_reqs='CERT_REQUIRED', ca_certs=certifi.where()) # Get unique bucket_name, object_name. bucket_name = uuid.uuid4().__str__() object_name = uuid.uuid4().__str__() # Enable trace # client.trace_on(sys.stderr) # Make a new bucket. bucket_name = 'minio-pytest' print(client.make_bucket(bucket_name)) print(client.make_bucket(bucket_name + '.unique', location='us-west-1')) ## Check if return codes a valid from server. try: client.make_bucket(bucket_name + '.unique', location='us-west-1') except ResponseError as err: if str(err.code) in ['BucketAlreadyOwnedByYou', 'BucketAlreadyExists']: pass else: raise # Check if bucket was created properly. print(client.bucket_exists(bucket_name)) print(client.bucket_exists(bucket_name + '.unique')) # List all buckets. buckets = client.list_buckets() for bucket in buckets: print(bucket.name, bucket.creation_date) with open('testfile', 'wb') as file_data: file_data.write(fake.text().encode('utf-8')) file_data.close() # Put a file file_stat = os.stat('testfile') with open('testfile', 'rb') as file_data: client.put_object(bucket_name, object_name, file_data, file_stat.st_size) file_data.close() # Fput a file print(client.fput_object(bucket_name, object_name + '-f', 'testfile')) # Copy a file print( client.copy_object(bucket_name, object_name + '-copy', '/' + bucket_name + '/' + object_name + '-f')) try: copy_conditions = CopyConditions() copy_conditions.set_match_etag('test-etag') print( client.copy_object(bucket_name, object_name + '-copy', '/' + bucket_name + '/' + object_name + '-f', copy_conditions)) except ResponseError as err: if err.code != 'PreconditionFailed': raise if err.message != 'At least one of the pre-conditions you specified did not hold': raise # Fetch stats on your object. print(client.stat_object(bucket_name, object_name)) # Fetch stats on your object. print(client.stat_object(bucket_name, object_name + '-f')) # Fetch stats on your object. print(client.stat_object(bucket_name, object_name + '-copy')) # Get a full object object_data = client.get_object(bucket_name, object_name) with open('newfile', 'wb') as file_data: for data in object_data: file_data.write(data) file_data.close() # Get a full object locally. print(client.fget_object(bucket_name, object_name, 'newfile-f')) # List all object paths in bucket. print("Listing using ListObjects API") objects = client.list_objects(bucket_name, recursive=True) for obj in objects: print(obj.bucket_name, obj.object_name, obj.last_modified, \ obj.etag, obj.size, obj.content_type) # List all object paths in bucket using V2 API. print("Listing using ListObjectsV2 API") objects = client.list_objects_v2(bucket_name, recursive=True) for obj in objects: print(obj.bucket_name, obj.object_name, obj.last_modified, \ obj.etag, obj.size, obj.content_type) presigned_get_object_url = client.presigned_get_object( bucket_name, object_name) response = _http.urlopen('GET', presigned_get_object_url) if response.status != 200: response_error = ResponseError(response) raise response_error.get(bucket_name, object_name) presigned_put_object_url = client.presigned_put_object( bucket_name, object_name) value = fake.text().encode('utf-8') data = io.BytesIO(value).getvalue() response = _http.urlopen('PUT', presigned_put_object_url, body=data) if response.status != 200: response_error = ResponseError(response) raise response_error.put(bucket_name, object_name) object_data = client.get_object(bucket_name, object_name) if object_data.read() != value: raise ValueError('Bytes not equal') # Post policy. policy = PostPolicy() policy.set_bucket_name(bucket_name) policy.set_key_startswith('objectPrefix/') expires_date = datetime.utcnow() + timedelta(days=10) policy.set_expires(expires_date) print(client.presigned_post_policy(policy)) # Remove an object. print(client.remove_object(bucket_name, object_name)) print(client.remove_object(bucket_name, object_name + '-f')) print(client.remove_object(bucket_name, object_name + '-copy')) policy_name = client.get_bucket_policy(bucket_name) if policy_name != Policy.NONE: raise ValueError('Policy name is invalid ' + policy_name) # Set read-write policy successfully. client.set_bucket_policy(bucket_name, '', Policy.READ_WRITE) # Reset policy to NONE. client.set_bucket_policy(bucket_name, '', Policy.NONE) # Validate if the policy is reverted back to NONE. policy_name = client.get_bucket_policy(bucket_name) if policy_name != Policy.NONE: raise ValueError('Policy name is invalid ' + policy_name) # Upload some new objects to prepare for multi-object delete test. print("Prepare for remove_objects() test.") object_names = [] for i in range(10): curr_object_name = object_name + "-{}".format(i) print("object-name: {}".format(curr_object_name)) print(client.fput_object(bucket_name, curr_object_name, "testfile")) object_names.append(curr_object_name) # delete the objects in a single library call. print("Performing remove_objects() test.") del_errs = client.remove_objects(bucket_name, object_names) had_errs = False for del_err in del_errs: had_errs = True print("Err is {}".format(del_err)) if had_errs: print("remove_objects() FAILED - it had unexpected errors.") else: print("remove_objects() worked as expected.") # Remove a bucket. This operation will only work if your bucket is empty. print(client.remove_bucket(bucket_name)) print(client.remove_bucket(bucket_name + '.unique')) # Remove temporary files. os.remove('testfile') os.remove('newfile') os.remove('newfile-f')