add tests for server side encryption, file backend encryption only#2369
add tests for server side encryption, file backend encryption only#2369SylvainSenechal wants to merge 1 commit intodevelopment/2.14from
Conversation
Hello sylvainsenechal,My role is to assist you with the merge of this Available options
Available commands
Status report is not available. |
Waiting for approvalThe following approvals are needed before I can proceed with the merge:
|
ac52225 to
7914467
Compare
| And bucket encryption is set to "<bucketAlgo>" with key "<bucketKeyId>" | ||
| Then the bucket encryption is verified for algorithm "<bucketAlgo>" and key "<bucketKeyId>" | ||
| When an object "<objectName>" is uploaded with SSE algorithm "<objectAlgo>" and key "<objectKeyId>" | ||
| # TODO: uncomment when CloudServer returns SSE headers in PutObject response https://github.com/scality/cloudserver/pull/6122 |
There was a problem hiding this comment.
I have other pr coming later, I can wait now, or uncomment later in another pr, because we need to wait for a cloudserver release
There was a problem hiding this comment.
should this PR before before cloudserver PR, or does it need to be updated?
There was a problem hiding this comment.
the cloudserver pr is merged, but cloudserver is not bumped yet, we need a new version of cloudserver
There was a problem hiding this comment.
cloudserver is released, no need to comment this anymore
There was a problem hiding this comment.
then you need to rebase on top of https://github.com/scality/Zenko/tree/refs/heads/w/2.14/improvement/ZENKO-5242, otherwise you don't have the bump yet...
| @PreMerge | ||
| @ServerSideEncryption | ||
| @ServerSideEncryptionFileBackend | ||
| Scenario Outline: PutObject with invalid SSE parameters returns an error: <objectName> |
There was a problem hiding this comment.
These last 3 scenarios are maybe not so relevant for functional tests, test in cloudserver would probably be enough but I guess its fine
There was a problem hiding this comment.
Can you double check we have the tests in Cloudserver, though?
There was a problem hiding this comment.
half of them are covered, so yeah it's very moderately useful
There was a problem hiding this comment.
so half are not covered : can you create a ticket in cloudserver?
| import Zenko from 'world/Zenko'; | ||
| import assert from 'assert'; | ||
|
|
||
| // We use the AWS SDK directly instead of cli-testing for PutObject and GetObject |
There was a problem hiding this comment.
This is more annoying than I thought, even later if we wanna parallelize coldStorage test, one of the test is using getObject..
| And bucket encryption is set to "<bucketAlgo>" with key "<bucketKeyId>" | ||
| Then the bucket encryption is verified for algorithm "<bucketAlgo>" and key "<bucketKeyId>" | ||
| When an object "<objectName>" is uploaded with SSE algorithm "<objectAlgo>" and key "<objectKeyId>" | ||
| # TODO: uncomment when CloudServer returns SSE headers in PutObject response https://github.com/scality/cloudserver/pull/6122 |
There was a problem hiding this comment.
should this PR before before cloudserver PR, or does it need to be updated?
| @PreMerge | ||
| @ServerSideEncryption | ||
| @ServerSideEncryptionFileBackend | ||
| Scenario Outline: PutObject with invalid SSE parameters returns an error: <objectName> |
There was a problem hiding this comment.
Can you double check we have the tests in Cloudserver, though?
| // TODO: uncomment when merged and released : https://github.com/scality/cloudserver/pull/6122 | ||
| // => CloudServer will return SSE headers in PutObject response | ||
| // if (expectedAlgo) { | ||
| // assert.strictEqual(result.serverSideEncryption, expectedAlgo, | ||
| // `PutObject SSE: expected "${expectedAlgo}", got "${result.serverSideEncryption}"`); | ||
| // } else { | ||
| // assert.strictEqual(result.serverSideEncryption, undefined, | ||
| // `PutObject SSE: expected absent, got "${result.serverSideEncryption}"`); | ||
| // } | ||
| // if (expectedKey === 'present') { | ||
| // assert.ok(result.sseKmsKeyId, 'PutObject: SSEKMSKeyId should be present'); | ||
| // } else { | ||
| // assert.strictEqual(result.sseKmsKeyId, undefined, | ||
| // `PutObject: SSEKMSKeyId should be absent, got "${result.sseKmsKeyId}"`); | ||
| // } |
There was a problem hiding this comment.
Opening a review thread so we remember to uncomment before merging.
7914467 to
df467f1
Compare
df467f1 to
149e9ef
Compare
149e9ef to
0311923
Compare
|
/after_pull_request=2370 |
Waiting for other pull request(s)The current pull request is locked by the after_pull_request option. In order for me to merge this pull request, run the following actions first: ➡️ Merge the
Alternatively, delete all the after_pull_request comments from this pull request. The following options are set: after_pull_request |
Issue: ZENKO-5239