]> git-server-git.apps.pok.os.sepia.ceph.com Git - ceph.git/commitdiff
rgwfile: common-prefix cp_ref unittest 67828/head
authorMatt Benjamin <mbenjamin@redhat.com>
Fri, 20 Mar 2026 19:21:26 +0000 (15:21 -0400)
committerMatt Benjamin <mbenjamin@redhat.com>
Fri, 20 Mar 2026 19:46:44 +0000 (15:46 -0400)
Signed-off-by: Matt Benjamin <mbenjamin@redhat.com>
qa/workunits/rgw/test_librgw_file.sh
src/test/CMakeLists.txt
src/test/librgw_file_cpref.cc [new file with mode: 0644]

index ab2ce9a818331923864c361cb8192b5b7053eed5..369f2f02ccd70010a0242d82bb6e44b7f361d763 100755 (executable)
@@ -40,6 +40,11 @@ ceph_test_librgw_file_nfsns ${K} --dirs1 --verbose
 echo "phase 1.3"
 ceph_test_librgw_file_nfsns ${K} --hier1 --dirs1 --delete --verbose
 
+# common-prefix anti-regression test
+echo "phase 1.4"
+ceph_test_librgw_file_cpref ${K} --create
+ceph_test_librgw_file_cpref ${K} # crashed w/unfixed cp_ref assignment
+
 # bulk create/delete buckets
 echo "phase 2.1"
 ceph_test_librgw_file_cd ${K} --create --multi --verbose
index fbec0c9ba3fd58bdeadf083251de36237ba6c693..418570ac8effc231f529ddd2e3ac9b0027253d35 100644 (file)
@@ -322,6 +322,7 @@ install(TARGETS ceph_test_librgw_file DESTINATION ${CMAKE_INSTALL_BINDIR})
 add_dependencies(ceph_test_librgw_file
   ceph_test_librgw_file_cd
   ceph_test_librgw_file_gp
+  ceph_test_librgw_file_cpref
   ceph_test_librgw_file_rename
   ceph_test_librgw_file_nfsns
   ceph_test_librgw_file_aw
@@ -355,6 +356,20 @@ target_link_libraries(ceph_test_librgw_file_gp
   )
 install(TARGETS ceph_test_librgw_file_gp DESTINATION ${CMAKE_INSTALL_BINDIR})
 
+# ceph_test_librgw_file_cpref (a special case common-prefix enumeration test)
+add_executable(ceph_test_librgw_file_cpref
+  librgw_file_cpref.cc
+  )
+target_link_libraries(ceph_test_librgw_file_cpref
+  rgw
+  librados
+  ceph-common
+  ${UNITTEST_LIBS}
+  ${EXTRALIBS}
+  ${ALLOC_LIBS}
+  )
+install(TARGETS ceph_test_librgw_file_cpref DESTINATION ${CMAKE_INSTALL_BINDIR})
+
 # ceph_test_librgw_file_nfsns (nfs namespace tests)
 add_executable(ceph_test_librgw_file_nfsns
   librgw_file_nfsns.cc
diff --git a/src/test/librgw_file_cpref.cc b/src/test/librgw_file_cpref.cc
new file mode 100644 (file)
index 0000000..3ca60b0
--- /dev/null
@@ -0,0 +1,256 @@
+// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:nil -*-
+// vim: ts=8 sw=2 sts=2 expandtab
+
+/*
+ * Ceph - scalable distributed file system
+ *
+ * Copyright (C) 2015 Red Hat, Inc.
+ *
+ * This is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public
+ * License version 2.1, as published by the Free Software
+ * Foundation.  See file COPYING.
+ *
+ */
+
+#include <stdint.h>
+#include <tuple>
+#include <iostream>
+#include <vector>
+#include <map>
+#include <random>
+#include "xxhash.h"
+
+#include "include/rados/librgw.h"
+#include "include/rados/rgw_file.h"
+
+#include "gtest/gtest.h"
+#include "common/ceph_argparse.h"
+#include "common/debug.h"
+
+#define dout_context g_ceph_context
+#define dout_subsys ceph_subsys_rgw
+
+using namespace std;
+
+namespace {
+  librgw_t rgw = nullptr;
+  string uid("testuser");
+  string access_key("");
+  string secret_key("");
+  struct rgw_fs *fs = nullptr;
+
+  bool do_create = false;
+
+  uint32_t owner_uid = 867;
+  uint32_t owner_gid = 5309;
+  uint32_t create_mask = RGW_SETATTR_UID | RGW_SETATTR_GID | RGW_SETATTR_MODE;
+
+  string bucket_name = "sdlc-test";
+
+  struct rgw_file_handle *bucket_fh = nullptr;
+  struct rgw_file_handle *object_fh = nullptr;
+
+  std::vector<std::string> obj_names = {
+      ".teste-c134272.txt.20260113110131.c134272",
+      "/catalog/sitip.tiptb001_emitente.ddl.json",
+      "/catalog/sitip.tiptb002_documento.ddl.json",
+      "/catalog/sitip.tiptb004_ocorrencia_documento.ddl.json",
+      "/catalog/sitip.tiptb005_evento.ddl.json",
+      "/catalog/sitip.tiptb006_situacao_evento.ddl.json",
+      "/catalog/sitip.tiptb007_ocorrencia_evento.ddl.json",
+      "/catalog/sitip.tiptb008_lote_evento.ddl.json",
+      "/catalog/sitip.tiptb009_processamento_lote.ddl.json",
+      "/catalog/sitip.tiptb010_tipo_evento.ddl.json",
+      "/catalog/sitip.tiptb011_periodo_movimento.ddl.json",
+      "/catalog/sitip.tiptb013_ocorrencia_lote.ddl.json",
+      "/catalog/sitip.tiptb014_acao_periodo_movto.ddl.json",
+      "file",
+      "my_schema_20260127/",
+      "my_schema_20260127/test_table/data/"
+      "35e9dbf6-10f2-44bf-9034-9c68aaedb54f.parquet",
+      "my_schema_20260127/test_table/metadata/"
+      "00000-6cb10a86-6b9e-446f-a662-38f403961f5d.metadata.json",
+      "my_schema_20260127/test_table/metadata/"
+      "00001-7d0c79e7-990a-4ed5-9650-e6c55d610e36.metadata.json",
+      "my_schema_20260127/test_table/metadata/"
+      "14521311-8384-4bac-acc8-44c653699c43-m0.avro",
+      "my_schema_20260127/test_table/metadata/"
+      "snap-7089720011427558043-1-14521311-8384-4bac-acc8-44c653699c43.avro",
+      "my_schema_3/",
+      "my_schema_3/test_table/data/"
+      "f14e4a46-8d04-4d34-bbb9-298de3bbde7f.parquet",
+      "my_schema_3/test_table/metadata/"
+      "00000-c6fae701-5b4f-4b7c-911e-c7710614bbd1.metadata.json",
+      "my_schema_3/test_table/metadata/"
+      "00001-f8d6e35e-f2a8-42f5-9466-654b3405e8b6.metadata.json",
+      "my_schema_3/test_table/metadata/"
+      "213de0bb-5d74-4d21-98f2-c55ec15e89d8-m0.avro",
+      "my_schema_3/test_table/metadata/"
+      "snap-4490949654564070735-1-213de0bb-5d74-4d21-98f2-c55ec15e89d8.avro",
+      "teste-c134272.txt"
+      };
+
+  typedef std::tuple<string,uint64_t, struct rgw_file_handle*> fid_type;
+  std::vector<fid_type> fids;
+
+  std::uniform_int_distribution<uint8_t> uint_dist;
+  std::mt19937 rng;
+
+  struct {
+    int argc;
+    char **argv;
+  } saved_args;
+}
+
+TEST(LibRGW, INIT1) {
+  int ret = librgw_create(&rgw, saved_args.argc, saved_args.argv);
+  ASSERT_EQ(ret, 0);
+  ASSERT_NE(rgw, nullptr);
+}
+
+TEST(LibRGW, MOUNT1) {
+  int ret = rgw_mount2(rgw, uid.c_str(), access_key.c_str(), secret_key.c_str(),
+                       "/", &fs, RGW_MOUNT_FLAG_NONE);
+  ASSERT_EQ(ret, 0);
+  ASSERT_NE(fs, nullptr);
+}
+
+TEST(LibRGW, CREATE_BUCKET) {
+  if (do_create) {
+    struct stat st;
+    struct rgw_file_handle *fh;
+
+    st.st_uid = owner_uid;
+    st.st_gid = owner_gid;
+    st.st_mode = 755;
+
+    int ret = rgw_mkdir(fs, fs->root_fh, bucket_name.c_str(), &st, create_mask,
+                       &fh, RGW_MKDIR_FLAG_NONE);
+    ASSERT_EQ(ret, 0);
+  }
+}
+
+TEST(LibRGW, LOOKUP_BUCKET) {
+  int ret = rgw_lookup(fs, fs->root_fh, bucket_name.c_str(), &bucket_fh,
+                      nullptr, 0, RGW_LOOKUP_FLAG_NONE);
+  ASSERT_EQ(ret, 0);
+}
+
+TEST(LibRGW, CREATE_OBJECTS) {
+  if (do_create) {
+
+    size_t nbytes;
+    string data = "great justice";
+
+    for (auto& obj_name : obj_names) {
+      int ret = rgw_lookup(fs, bucket_fh, obj_name.c_str(), &object_fh,
+                           nullptr, 0, RGW_LOOKUP_FLAG_CREATE);
+      ASSERT_EQ(ret, 0);
+
+      ret = rgw_open(fs, object_fh, 0 /* posix flags */, 0 /* flags */);
+      ASSERT_EQ(ret, 0);
+
+      ret = rgw_write(fs, object_fh, 0, data.length(), &nbytes,
+                      (void*) data.c_str(), RGW_WRITE_FLAG_NONE);
+      ASSERT_EQ(ret, 0);
+      ASSERT_EQ(nbytes, data.length());
+      /* commit write transaction */
+      ret = rgw_close(fs, object_fh, 0 /* flags */);
+      ASSERT_EQ(ret, 0);
+    }
+  } /* create */
+}
+
+extern "C" {
+  static int r2_cb(const char* name, void *arg, uint64_t offset,
+                   struct stat *st, uint32_t st_mask,
+                   uint32_t flags) {
+    // don't need arg--it would point to fids
+    fids.push_back(fid_type(name, offset, nullptr));
+    return true; /* XXX ? */
+  }
+}
+
+TEST(LibRGW, LIST_OBJECTS) {
+
+  if (! do_create) {
+    /* list objects via readdir, bucketwise */
+    using std::get;
+
+    ldout(g_ceph_context, 0)
+        << __func__ << " readdir on bucket " << bucket_name << dendl;
+    bool eof = false;
+    uint64_t offset = 0;
+    int ret = rgw_readdir(
+        fs, bucket_fh, &offset, r2_cb, &fids, &eof, RGW_READDIR_FLAG_NONE);
+    for (auto& fid : fids) {
+      std::cout << "fname: " << get<0>(fid) << " fid: " << get<1>(fid)
+                << std::endl;
+    }
+    ASSERT_EQ(ret, 0);
+  } /* !create  */
+}
+
+TEST(LibRGW, UMOUNT) {
+  if (! fs)
+    return;
+
+  int ret = rgw_umount(fs, RGW_UMOUNT_FLAG_NONE);
+  ASSERT_EQ(ret, 0);
+}
+
+TEST(LibRGW, SHUTDOWN) {
+  librgw_shutdown(rgw);
+}
+
+int main(int argc, char *argv[])
+{
+  auto args = argv_to_vec(argc, argv);
+  env_to_vec(args);
+
+  char* v = getenv("AWS_ACCESS_KEY_ID");
+  if (v) {
+    access_key = v;
+  }
+
+  v = getenv("AWS_SECRET_ACCESS_KEY");
+  if (v) {
+    secret_key = v;
+  }
+
+  string val;
+  for (auto arg_iter = args.begin(); arg_iter != args.end();) {
+    if (ceph_argparse_witharg(args, arg_iter, &val, "--access",
+                             (char*) nullptr)) {
+      access_key = val;
+    } else if (ceph_argparse_witharg(args, arg_iter, &val, "--secret",
+                                    (char*) nullptr)) {
+      secret_key = val;
+    } else if (ceph_argparse_witharg(args, arg_iter, &val, "--uid",
+                                    (char*) nullptr)) {
+      uid = val;
+    } else if (ceph_argparse_witharg(args, arg_iter, &val, "--bn",
+                                    (char*) nullptr)) {
+      bucket_name = val;
+    } else if (ceph_argparse_flag(args, arg_iter, "--create",
+                                           (char*) nullptr)) {
+      do_create = true;
+    } else {
+      ++arg_iter;
+    }
+  }
+
+  /* don't accidentally run as anonymous */
+  if ((access_key == "") ||
+      (secret_key == "")) {
+    std::cout << argv[0] << " no AWS credentials, exiting" << std::endl;
+    return EPERM;
+  }
+
+  saved_args.argc = argc;
+  saved_args.argv = argv;
+
+  ::testing::InitGoogleTest(&argc, argv);
+  return RUN_ALL_TESTS();
+}