Add aws_s3 integration tests for multipart GET operations (#34657)

* Add aws_s3 integration tests for multipart GET operations

* Make multipart test platform-specific

* Use YAML anchors to simplify passing credentials

* Run tests on Linux and MacOSX
This commit is contained in:
Sloane Hertel 2018-01-09 18:05:22 -05:00 committed by Ryan Brown
parent 82b5a6a0c9
commit a0e96efec7

View file

@ -1,13 +1,20 @@
---
# tasks file for test_s3
# ============================================================
- name: set up aws connection info
set_fact:
aws_connection_info: &aws_connection_info
aws_access_key: "{{ aws_access_key }}"
aws_secret_key: "{{ aws_secret_key }}"
security_token: "{{ security_token }}"
region: "{{ aws_region }}"
no_log: yes
# ============================================================
- name: test create bucket
aws_s3:
bucket: "{{ bucket_name }}"
mode: create
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
security_token: "{{security_token}}"
<<: *aws_connection_info
register: result
- name: assert changed is True
assert:
@ -18,9 +25,7 @@
aws_s3:
bucket: "{{ bucket_name }}"
mode: create
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
security_token: "{{security_token}}"
<<: *aws_connection_info
register: result
- name: assert changed is False since the bucket already exists
assert:
@ -50,9 +55,7 @@
mode: put
src: "{{ tmp1.path }}"
object: delete.txt
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
security_token: "{{security_token}}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -71,9 +74,7 @@
mode: get
dest: "{{ tmp2.path }}"
object: delete.txt
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -93,9 +94,7 @@
bucket: "{{ bucket_name }}"
mode: geturl
object: delete.txt
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -111,9 +110,7 @@
bucket: "{{ bucket_name }}"
mode: getstr
object: delete.txt
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -127,9 +124,7 @@
aws_s3:
bucket: "{{ bucket_name }}"
mode: list
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -144,9 +139,7 @@
bucket: "{{ bucket_name }}"
mode: delobj
object: delete.txt
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -166,9 +159,7 @@
bucket: "{{ bucket_name }}"
mode: create
object: foo/bar/baz/
security_token: "{{ security_token }}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
register: result
@ -182,9 +173,7 @@
bucket: "{{ bucket_name }}"
mode: delobj
object: foo/bar/baz/
security_token: "{{ security_token }}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
retries: 3
delay: 3
# ============================================================
@ -192,9 +181,7 @@
aws_s3:
bucket: "{{ bucket_name }}"
mode: delete
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
register: result
retries: 3
delay: 3
@ -217,9 +204,7 @@
aws_s3:
bucket: "{{ bucket_name + '.bucket' }}"
mode: create
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
register: result
- name: assert that changed is True
assert:
@ -230,9 +215,7 @@
aws_s3:
bucket: "{{ bucket_name + '.bucket' }}"
mode: delete
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
register: result
- name: assert that changed is True
assert:
@ -243,12 +226,91 @@
aws_s3:
bucket: "{{ bucket_name + '.bucket' }}"
mode: delete
security_token: "{{security_token}}"
aws_access_key: "{{ ec2_access_key }}"
aws_secret_key: "{{ ec2_secret_key }}"
<<: *aws_connection_info
register: result
- name: assert that changed is False
assert:
that:
- result.changed == False
# ============================================================
- name: create a tempfile for the path
tempfile:
register: tmp1
- name: make tempfile 4 GB for OSX
command:
_raw_params: "dd if=/dev/zero of={{ tmp1.path }} bs=1m count=4096"
when: ansible_distribution == 'MacOSX'
- name: make tempfile 4 GB for linux
command:
_raw_params: "dd if=/dev/zero of={{ tmp1.path }} bs=1M count=4096"
when: ansible_distribution == 'Linux'
- name: test multipart download - platform specific
block:
- name: make a bucket to upload the file
aws_s3:
bucket: "{{ bucket_name }}"
mode: create
<<: *aws_connection_info
- name: upload the file to the bucket
aws_s3:
bucket: "{{ bucket_name }}"
mode: put
src: "{{ tmp1.path }}"
object: multipart.txt
<<: *aws_connection_info
- name: download file once
aws_s3:
bucket: "{{ bucket_name }}"
mode: get
dest: /tmp/multipart_download.txt
object: multipart.txt
overwrite: different
<<: *aws_connection_info
retries: 3
delay: 3
until: "result.msg == 'GET operation complete'"
register: result
- name: assert the file was downloaded once
assert:
that:
- result.changed
- name: download file again
aws_s3:
bucket: "{{ bucket_name }}"
mode: get
dest: /tmp/multipart_download.txt
object: multipart.txt
overwrite: different
<<: *aws_connection_info
register: result
- name: assert the file was not redownloaded
assert:
that:
- not result.changed
- name: delete file used for upload
file:
state: absent
path: "{{ tmp1.path }}"
- name: delete downloaded file
file:
state: absent
path: /tmp/multipart_download.txt
- name: delete the bucket
aws_s3:
bucket: "{{ bucket_name }}"
mode: delete
<<: *aws_connection_info
when: ansible_distribution in ['MacOSX', 'Linux']
# ============================================================