|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
import contextlib |
|
import os |
|
|
|
import pytest |
|
|
|
from google.api_core import exceptions |
|
from google.cloud import kms |
|
from google.cloud.storage._helpers import _base64_md5hash |
|
from google.cloud.storage.retry import DEFAULT_RETRY |
|
from . import _helpers |
|
|
|
|
|
dirname = os.path.realpath(os.path.dirname(__file__)) |
|
data_dirname = os.path.abspath(os.path.join(dirname, "..", "data")) |
|
_filenames = [ |
|
("logo", "CloudPlatform_128px_Retina.png"), |
|
("big", "five-point-one-mb-file.zip"), |
|
("simple", "simple.txt"), |
|
] |
|
_file_data = { |
|
key: {"path": os.path.join(data_dirname, file_name)} |
|
for key, file_name in _filenames |
|
} |
|
|
|
_listable_filenames = ["CloudLogo1", "CloudLogo2", "CloudLogo3", "CloudLogo4"] |
|
_hierarchy_filenames = [ |
|
"file01.txt", |
|
"parent/", |
|
"parent/file11.txt", |
|
"parent/child/file21.txt", |
|
"parent/child/file22.txt", |
|
"parent/child/grand/file31.txt", |
|
"parent/child/other/file32.txt", |
|
] |
|
|
|
ebh_bucket_iteration = 0 |
|
|
|
_key_name_format = "projects/{}/locations/{}/keyRings/{}/cryptoKeys/{}" |
|
|
|
keyring_name = "gcs-test" |
|
default_key_name = "gcs-test" |
|
alt_key_name = "gcs-test-alternate" |
|
|
|
|
|
def _kms_key_name(client, bucket, key_name): |
|
return _key_name_format.format( |
|
client.project, |
|
bucket.location.lower(), |
|
keyring_name, |
|
key_name, |
|
) |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def storage_client(): |
|
from google.cloud.storage import Client |
|
|
|
client = Client() |
|
with contextlib.closing(client): |
|
yield client |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def user_project(): |
|
if _helpers.user_project is None: |
|
pytest.skip("USER_PROJECT not set in environment.") |
|
return _helpers.user_project |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def no_mtls(): |
|
if _helpers.testing_mtls: |
|
pytest.skip("Test incompatible with mTLS.") |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def service_account(storage_client): |
|
from google.oauth2.service_account import Credentials |
|
|
|
if not isinstance(storage_client._credentials, Credentials): |
|
pytest.skip("These tests require a service account credential") |
|
return storage_client._credentials |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def shared_bucket_name(): |
|
return _helpers.unique_name("gcp-systest") |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def shared_bucket(storage_client, shared_bucket_name): |
|
bucket = storage_client.bucket(shared_bucket_name) |
|
bucket.versioning_enabled = True |
|
|
|
try: |
|
storage_client.get_bucket(bucket) |
|
except exceptions.NotFound: |
|
_helpers.retry_429_503(bucket.create)() |
|
|
|
yield bucket |
|
|
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def listable_bucket_name(): |
|
return _helpers.unique_name("gcp-systest-listable") |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def listable_bucket(storage_client, listable_bucket_name, file_data): |
|
bucket = storage_client.bucket(listable_bucket_name) |
|
|
|
try: |
|
storage_client.get_bucket(bucket) |
|
except exceptions.NotFound: |
|
_helpers.retry_429_503(bucket.create)() |
|
|
|
info = file_data["logo"] |
|
source_blob = bucket.blob(_listable_filenames[0]) |
|
source_blob.upload_from_filename(info["path"], retry=DEFAULT_RETRY) |
|
|
|
for filename in _listable_filenames[1:]: |
|
_helpers.retry_bad_copy(bucket.copy_blob)( |
|
source_blob, |
|
bucket, |
|
filename, |
|
) |
|
|
|
yield bucket |
|
|
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def listable_filenames(): |
|
return _listable_filenames |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def hierarchy_bucket_name(): |
|
return _helpers.unique_name("gcp-systest-hierarchy") |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def hierarchy_bucket(storage_client, hierarchy_bucket_name, file_data): |
|
bucket = storage_client.bucket(hierarchy_bucket_name) |
|
|
|
try: |
|
storage_client.get_bucket(bucket) |
|
except exceptions.NotFound: |
|
_helpers.retry_429_503(bucket.create)() |
|
|
|
simple_path = _file_data["simple"]["path"] |
|
for filename in _hierarchy_filenames: |
|
blob = bucket.blob(filename) |
|
blob.upload_from_filename(simple_path, retry=DEFAULT_RETRY) |
|
|
|
yield bucket |
|
|
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def hierarchy_filenames(): |
|
return _hierarchy_filenames |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def signing_bucket_name(): |
|
return _helpers.unique_name("gcp-systest-signing") |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def signing_bucket(storage_client, signing_bucket_name): |
|
bucket = storage_client.bucket(signing_bucket_name) |
|
|
|
try: |
|
storage_client.get_bucket(bucket) |
|
except exceptions.NotFound: |
|
_helpers.retry_429_503(bucket.create)() |
|
|
|
blob = bucket.blob("README.txt") |
|
blob.upload_from_string(_helpers.signing_blob_content) |
|
|
|
yield bucket |
|
|
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def default_ebh_bucket_name(): |
|
|
|
|
|
|
|
global ebh_bucket_iteration |
|
ebh_bucket_iteration += 1 |
|
return _helpers.unique_name("gcp-systest-default-ebh") + "-{}".format( |
|
ebh_bucket_iteration |
|
) |
|
|
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def default_ebh_bucket(storage_client, default_ebh_bucket_name): |
|
bucket = storage_client.bucket(default_ebh_bucket_name) |
|
bucket.default_event_based_hold = True |
|
|
|
try: |
|
storage_client.get_bucket(bucket) |
|
except exceptions.NotFound: |
|
_helpers.retry_429_503(bucket.create)() |
|
|
|
yield bucket |
|
|
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def buckets_to_delete(): |
|
buckets_to_delete = [] |
|
|
|
yield buckets_to_delete |
|
|
|
for bucket in buckets_to_delete: |
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def blobs_to_delete(): |
|
blobs_to_delete = [] |
|
|
|
yield blobs_to_delete |
|
|
|
for blob in blobs_to_delete: |
|
_helpers.delete_blob(blob) |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def file_data(): |
|
for file_data in _file_data.values(): |
|
with open(file_data["path"], "rb") as file_obj: |
|
file_data["hash"] = _base64_md5hash(file_obj) |
|
|
|
return _file_data |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def kms_bucket_name(): |
|
return _helpers.unique_name("gcp-systest-kms") |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def kms_bucket(storage_client, kms_bucket_name, no_mtls): |
|
bucket = _helpers.retry_429_503(storage_client.create_bucket)(kms_bucket_name) |
|
|
|
yield bucket |
|
|
|
_helpers.delete_bucket(bucket) |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def kms_key_name(storage_client, kms_bucket): |
|
return _kms_key_name(storage_client, kms_bucket, default_key_name) |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def alt_kms_key_name(storage_client, kms_bucket): |
|
return _kms_key_name(storage_client, kms_bucket, alt_key_name) |
|
|
|
|
|
@pytest.fixture(scope="session") |
|
def kms_client(): |
|
return kms.KeyManagementServiceClient() |
|
|
|
|
|
@pytest.fixture(scope="function") |
|
def keyring(storage_client, kms_bucket, kms_client): |
|
project = storage_client.project |
|
location = kms_bucket.location.lower() |
|
purpose = kms.enums.CryptoKey.CryptoKeyPurpose.ENCRYPT_DECRYPT |
|
|
|
|
|
keyring_path = kms_client.key_ring_path(project, location, keyring_name) |
|
|
|
try: |
|
kms_client.get_key_ring(keyring_path) |
|
except exceptions.NotFound: |
|
parent = kms_client.location_path(project, location) |
|
kms_client.create_key_ring(parent, keyring_name, {}) |
|
|
|
|
|
service_account_email = storage_client.get_service_account_email() |
|
policy = { |
|
"bindings": [ |
|
{ |
|
"role": "roles/cloudkms.cryptoKeyEncrypterDecrypter", |
|
"members": ["serviceAccount:" + service_account_email], |
|
} |
|
] |
|
} |
|
kms_client.set_iam_policy(keyring_path, policy) |
|
|
|
|
|
key_names = [ |
|
"gcs-test", |
|
"gcs-test-alternate", |
|
"explicit-kms-key-name", |
|
"default-kms-key-name", |
|
"override-default-kms-key-name", |
|
"alt-default-kms-key-name", |
|
] |
|
for key_name in key_names: |
|
key_path = kms_client.crypto_key_path(project, location, keyring_name, key_name) |
|
try: |
|
kms_client.get_crypto_key(key_path) |
|
except exceptions.NotFound: |
|
key = {"purpose": purpose} |
|
kms_client.create_crypto_key(keyring_path, key_name, key) |
|
|