Browse Source
s3lifecycle: add lifecycle rule evaluator package and extend XML types (#8807)
s3lifecycle: add lifecycle rule evaluator package and extend XML types (#8807)
* s3api: extend lifecycle XML types with NoncurrentVersionExpiration, AbortIncompleteMultipartUpload Add missing S3 lifecycle rule types to the XML data model: - NoncurrentVersionExpiration with NoncurrentDays and NewerNoncurrentVersions - NoncurrentVersionTransition with NoncurrentDays and StorageClass - AbortIncompleteMultipartUpload with DaysAfterInitiation - Filter.ObjectSizeGreaterThan and ObjectSizeLessThan - And.ObjectSizeGreaterThan and ObjectSizeLessThan - Filter.UnmarshalXML to properly parse Tag, And, and size filter elements Each new type follows the existing set-field pattern for conditional XML marshaling. No behavior changes - these types are not yet wired into handlers or the lifecycle worker. * s3lifecycle: add lifecycle rule evaluator package New package weed/s3api/s3lifecycle/ provides a pure-function lifecycle rule evaluation engine. The evaluator accepts flattened Rule structs and ObjectInfo metadata, and returns the appropriate Action. Components: - evaluator.go: Evaluate() for per-object actions with S3 priority ordering (delete marker > noncurrent version > current expiration), ShouldExpireNoncurrentVersion() with NewerNoncurrentVersions support, EvaluateMPUAbort() for multipart upload rules - filter.go: prefix, tag, and size-based filter matching - tags.go: ExtractTags() extracts S3 tags from filer Extended metadata, HasTagRules() for scan-time optimization - version_time.go: GetVersionTimestamp() extracts timestamps from SeaweedFS version IDs (both old and new format) Comprehensive test coverage: 54 tests covering all action types, filter combinations, edge cases, and version ID formats. * s3api: add UnmarshalXML for Expiration, Transition, ExpireDeleteMarker Add UnmarshalXML methods that set the internal 'set' flag during XML parsing. Previously these flags were only set programmatically, causing XML round-trip to drop elements. This ensures lifecycle configurations stored as XML survive unmarshal/marshal cycles correctly. Add comprehensive XML round-trip tests for all lifecycle rule types including NoncurrentVersionExpiration, AbortIncompleteMultipartUpload, Filter with Tag/And/size constraints, and a complete Terraform-style lifecycle configuration. * s3lifecycle: address review feedback - Fix version_time.go overflow: guard timestampPart > MaxInt64 before the inversion subtraction to prevent uint64 wrap - Make all expiry checks inclusive (!now.Before instead of now.After) so actions trigger at the exact scheduled instant - Add NoncurrentIndex to ObjectInfo so Evaluate() can properly handle NewerNoncurrentVersions via ShouldExpireNoncurrentVersion() - Add test for high-bit overflow version ID * s3lifecycle: guard ShouldExpireNoncurrentVersion against zero SuccessorModTime Add early return when obj.IsLatest or obj.SuccessorModTime.IsZero() to prevent premature expiration of versions with uninitialized successor timestamps (zero value would compute to epoch, always expired). --------- Co-authored-by: Copilot <copilot@github.com>pull/8813/head
committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
11 changed files with 1523 additions and 12 deletions
-
213weed/s3api/s3api_policy.go
-
231weed/s3api/s3api_policy_test.go
-
127weed/s3api/s3lifecycle/evaluator.go
-
495weed/s3api/s3lifecycle/evaluator_test.go
-
56weed/s3api/s3lifecycle/filter.go
-
79weed/s3api/s3lifecycle/filter_test.go
-
95weed/s3api/s3lifecycle/rule.go
-
34weed/s3api/s3lifecycle/tags.go
-
89weed/s3api/s3lifecycle/tags_test.go
-
42weed/s3api/s3lifecycle/version_time.go
-
74weed/s3api/s3lifecycle/version_time_test.go
@ -0,0 +1,231 @@ |
|||
package s3api |
|||
|
|||
import ( |
|||
"encoding/xml" |
|||
"strings" |
|||
"testing" |
|||
) |
|||
|
|||
func TestLifecycleXMLRoundTrip_NoncurrentVersionExpiration(t *testing.T) { |
|||
input := `<LifecycleConfiguration> |
|||
<Rule> |
|||
<ID>expire-noncurrent</ID> |
|||
<Status>Enabled</Status> |
|||
<Filter><Prefix></Prefix></Filter> |
|||
<NoncurrentVersionExpiration> |
|||
<NoncurrentDays>30</NoncurrentDays> |
|||
<NewerNoncurrentVersions>2</NewerNoncurrentVersions> |
|||
</NoncurrentVersionExpiration> |
|||
</Rule> |
|||
</LifecycleConfiguration>` |
|||
|
|||
var lc Lifecycle |
|||
if err := xml.Unmarshal([]byte(input), &lc); err != nil { |
|||
t.Fatalf("unmarshal: %v", err) |
|||
} |
|||
|
|||
if len(lc.Rules) != 1 { |
|||
t.Fatalf("expected 1 rule, got %d", len(lc.Rules)) |
|||
} |
|||
rule := lc.Rules[0] |
|||
if rule.ID != "expire-noncurrent" { |
|||
t.Errorf("expected ID 'expire-noncurrent', got %q", rule.ID) |
|||
} |
|||
if rule.NoncurrentVersionExpiration.NoncurrentDays != 30 { |
|||
t.Errorf("expected NoncurrentDays=30, got %d", rule.NoncurrentVersionExpiration.NoncurrentDays) |
|||
} |
|||
if rule.NoncurrentVersionExpiration.NewerNoncurrentVersions != 2 { |
|||
t.Errorf("expected NewerNoncurrentVersions=2, got %d", rule.NoncurrentVersionExpiration.NewerNoncurrentVersions) |
|||
} |
|||
|
|||
// Re-marshal and verify it round-trips.
|
|||
out, err := xml.Marshal(lc) |
|||
if err != nil { |
|||
t.Fatalf("marshal: %v", err) |
|||
} |
|||
s := string(out) |
|||
if !strings.Contains(s, "<NoncurrentDays>30</NoncurrentDays>") { |
|||
t.Errorf("marshaled XML missing NoncurrentDays: %s", s) |
|||
} |
|||
if !strings.Contains(s, "<NewerNoncurrentVersions>2</NewerNoncurrentVersions>") { |
|||
t.Errorf("marshaled XML missing NewerNoncurrentVersions: %s", s) |
|||
} |
|||
} |
|||
|
|||
func TestLifecycleXMLRoundTrip_AbortIncompleteMultipartUpload(t *testing.T) { |
|||
input := `<LifecycleConfiguration> |
|||
<Rule> |
|||
<ID>abort-mpu</ID> |
|||
<Status>Enabled</Status> |
|||
<Filter><Prefix></Prefix></Filter> |
|||
<AbortIncompleteMultipartUpload> |
|||
<DaysAfterInitiation>7</DaysAfterInitiation> |
|||
</AbortIncompleteMultipartUpload> |
|||
</Rule> |
|||
</LifecycleConfiguration>` |
|||
|
|||
var lc Lifecycle |
|||
if err := xml.Unmarshal([]byte(input), &lc); err != nil { |
|||
t.Fatalf("unmarshal: %v", err) |
|||
} |
|||
|
|||
rule := lc.Rules[0] |
|||
if rule.AbortIncompleteMultipartUpload.DaysAfterInitiation != 7 { |
|||
t.Errorf("expected DaysAfterInitiation=7, got %d", rule.AbortIncompleteMultipartUpload.DaysAfterInitiation) |
|||
} |
|||
|
|||
out, err := xml.Marshal(lc) |
|||
if err != nil { |
|||
t.Fatalf("marshal: %v", err) |
|||
} |
|||
if !strings.Contains(string(out), "<DaysAfterInitiation>7</DaysAfterInitiation>") { |
|||
t.Errorf("marshaled XML missing DaysAfterInitiation: %s", string(out)) |
|||
} |
|||
} |
|||
|
|||
func TestLifecycleXMLRoundTrip_FilterWithTag(t *testing.T) { |
|||
input := `<LifecycleConfiguration> |
|||
<Rule> |
|||
<ID>tag-filter</ID> |
|||
<Status>Enabled</Status> |
|||
<Filter> |
|||
<Tag><Key>env</Key><Value>dev</Value></Tag> |
|||
</Filter> |
|||
<Expiration><Days>7</Days></Expiration> |
|||
</Rule> |
|||
</LifecycleConfiguration>` |
|||
|
|||
var lc Lifecycle |
|||
if err := xml.Unmarshal([]byte(input), &lc); err != nil { |
|||
t.Fatalf("unmarshal: %v", err) |
|||
} |
|||
|
|||
rule := lc.Rules[0] |
|||
if !rule.Filter.tagSet { |
|||
t.Error("expected Filter.tagSet to be true") |
|||
} |
|||
if rule.Filter.Tag.Key != "env" || rule.Filter.Tag.Value != "dev" { |
|||
t.Errorf("expected Tag{env:dev}, got Tag{%s:%s}", rule.Filter.Tag.Key, rule.Filter.Tag.Value) |
|||
} |
|||
} |
|||
|
|||
func TestLifecycleXMLRoundTrip_FilterWithAnd(t *testing.T) { |
|||
input := `<LifecycleConfiguration> |
|||
<Rule> |
|||
<ID>and-filter</ID> |
|||
<Status>Enabled</Status> |
|||
<Filter> |
|||
<And> |
|||
<Prefix>logs/</Prefix> |
|||
<Tag><Key>env</Key><Value>dev</Value></Tag> |
|||
<Tag><Key>tier</Key><Value>hot</Value></Tag> |
|||
<ObjectSizeGreaterThan>1024</ObjectSizeGreaterThan> |
|||
<ObjectSizeLessThan>1048576</ObjectSizeLessThan> |
|||
</And> |
|||
</Filter> |
|||
<Expiration><Days>7</Days></Expiration> |
|||
</Rule> |
|||
</LifecycleConfiguration>` |
|||
|
|||
var lc Lifecycle |
|||
if err := xml.Unmarshal([]byte(input), &lc); err != nil { |
|||
t.Fatalf("unmarshal: %v", err) |
|||
} |
|||
|
|||
rule := lc.Rules[0] |
|||
if !rule.Filter.andSet { |
|||
t.Error("expected Filter.andSet to be true") |
|||
} |
|||
if rule.Filter.And.Prefix.String() != "logs/" { |
|||
t.Errorf("expected And.Prefix='logs/', got %q", rule.Filter.And.Prefix.String()) |
|||
} |
|||
if len(rule.Filter.And.Tags) != 2 { |
|||
t.Fatalf("expected 2 And tags, got %d", len(rule.Filter.And.Tags)) |
|||
} |
|||
if rule.Filter.And.ObjectSizeGreaterThan != 1024 { |
|||
t.Errorf("expected ObjectSizeGreaterThan=1024, got %d", rule.Filter.And.ObjectSizeGreaterThan) |
|||
} |
|||
if rule.Filter.And.ObjectSizeLessThan != 1048576 { |
|||
t.Errorf("expected ObjectSizeLessThan=1048576, got %d", rule.Filter.And.ObjectSizeLessThan) |
|||
} |
|||
} |
|||
|
|||
func TestLifecycleXMLRoundTrip_FilterWithSizeOnly(t *testing.T) { |
|||
input := `<LifecycleConfiguration> |
|||
<Rule> |
|||
<ID>size-filter</ID> |
|||
<Status>Enabled</Status> |
|||
<Filter> |
|||
<ObjectSizeGreaterThan>512</ObjectSizeGreaterThan> |
|||
<ObjectSizeLessThan>10485760</ObjectSizeLessThan> |
|||
</Filter> |
|||
<Expiration><Days>30</Days></Expiration> |
|||
</Rule> |
|||
</LifecycleConfiguration>` |
|||
|
|||
var lc Lifecycle |
|||
if err := xml.Unmarshal([]byte(input), &lc); err != nil { |
|||
t.Fatalf("unmarshal: %v", err) |
|||
} |
|||
|
|||
rule := lc.Rules[0] |
|||
if rule.Filter.ObjectSizeGreaterThan != 512 { |
|||
t.Errorf("expected ObjectSizeGreaterThan=512, got %d", rule.Filter.ObjectSizeGreaterThan) |
|||
} |
|||
if rule.Filter.ObjectSizeLessThan != 10485760 { |
|||
t.Errorf("expected ObjectSizeLessThan=10485760, got %d", rule.Filter.ObjectSizeLessThan) |
|||
} |
|||
} |
|||
|
|||
func TestLifecycleXMLRoundTrip_CompleteRule(t *testing.T) { |
|||
// A complete lifecycle config similar to what Terraform sends.
|
|||
input := `<LifecycleConfiguration> |
|||
<Rule> |
|||
<ID>rotation</ID> |
|||
<Filter><Prefix></Prefix></Filter> |
|||
<Status>Enabled</Status> |
|||
<Expiration><Days>30</Days></Expiration> |
|||
<NoncurrentVersionExpiration> |
|||
<NoncurrentDays>1</NoncurrentDays> |
|||
</NoncurrentVersionExpiration> |
|||
<AbortIncompleteMultipartUpload> |
|||
<DaysAfterInitiation>1</DaysAfterInitiation> |
|||
</AbortIncompleteMultipartUpload> |
|||
</Rule> |
|||
</LifecycleConfiguration>` |
|||
|
|||
var lc Lifecycle |
|||
if err := xml.Unmarshal([]byte(input), &lc); err != nil { |
|||
t.Fatalf("unmarshal: %v", err) |
|||
} |
|||
|
|||
rule := lc.Rules[0] |
|||
if rule.ID != "rotation" { |
|||
t.Errorf("expected ID 'rotation', got %q", rule.ID) |
|||
} |
|||
if rule.Expiration.Days != 30 { |
|||
t.Errorf("expected Expiration.Days=30, got %d", rule.Expiration.Days) |
|||
} |
|||
if rule.NoncurrentVersionExpiration.NoncurrentDays != 1 { |
|||
t.Errorf("expected NoncurrentDays=1, got %d", rule.NoncurrentVersionExpiration.NoncurrentDays) |
|||
} |
|||
if rule.AbortIncompleteMultipartUpload.DaysAfterInitiation != 1 { |
|||
t.Errorf("expected DaysAfterInitiation=1, got %d", rule.AbortIncompleteMultipartUpload.DaysAfterInitiation) |
|||
} |
|||
|
|||
// Re-marshal and verify all fields survive.
|
|||
out, err := xml.Marshal(lc) |
|||
if err != nil { |
|||
t.Fatalf("marshal: %v", err) |
|||
} |
|||
s := string(out) |
|||
for _, expected := range []string{ |
|||
"<Days>30</Days>", |
|||
"<NoncurrentDays>1</NoncurrentDays>", |
|||
"<DaysAfterInitiation>1</DaysAfterInitiation>", |
|||
} { |
|||
if !strings.Contains(s, expected) { |
|||
t.Errorf("marshaled XML missing %q: %s", expected, s) |
|||
} |
|||
} |
|||
} |
|||
@ -0,0 +1,127 @@ |
|||
package s3lifecycle |
|||
|
|||
import "time" |
|||
|
|||
// Evaluate checks the given lifecycle rules against an object and returns
|
|||
// the highest-priority action that applies. The evaluation follows S3's
|
|||
// action priority:
|
|||
// 1. ExpiredObjectDeleteMarker (delete marker is sole version)
|
|||
// 2. NoncurrentVersionExpiration (non-current version age/count)
|
|||
// 3. Current version Expiration (Days or Date)
|
|||
//
|
|||
// AbortIncompleteMultipartUpload is evaluated separately since it applies
|
|||
// to uploads, not objects. Use EvaluateMPUAbort for that.
|
|||
func Evaluate(rules []Rule, obj ObjectInfo, now time.Time) EvalResult { |
|||
// Phase 1: ExpiredObjectDeleteMarker
|
|||
if obj.IsDeleteMarker && obj.IsLatest && obj.NumVersions == 1 { |
|||
for _, rule := range rules { |
|||
if rule.Status != "Enabled" { |
|||
continue |
|||
} |
|||
if !matchesFilter(rule, obj) { |
|||
continue |
|||
} |
|||
if rule.ExpiredObjectDeleteMarker { |
|||
return EvalResult{Action: ActionExpireDeleteMarker, RuleID: rule.ID} |
|||
} |
|||
} |
|||
} |
|||
|
|||
// Phase 2: NoncurrentVersionExpiration
|
|||
if !obj.IsLatest && !obj.SuccessorModTime.IsZero() { |
|||
for _, rule := range rules { |
|||
if ShouldExpireNoncurrentVersion(rule, obj, obj.NoncurrentIndex, now) { |
|||
return EvalResult{Action: ActionDeleteVersion, RuleID: rule.ID} |
|||
} |
|||
} |
|||
} |
|||
|
|||
// Phase 3: Current version Expiration
|
|||
if obj.IsLatest && !obj.IsDeleteMarker { |
|||
for _, rule := range rules { |
|||
if rule.Status != "Enabled" { |
|||
continue |
|||
} |
|||
if !matchesFilter(rule, obj) { |
|||
continue |
|||
} |
|||
// Date-based expiration
|
|||
if !rule.ExpirationDate.IsZero() && !now.Before(rule.ExpirationDate) { |
|||
return EvalResult{Action: ActionDeleteObject, RuleID: rule.ID} |
|||
} |
|||
// Days-based expiration
|
|||
if rule.ExpirationDays > 0 { |
|||
expiryTime := expectedExpiryTime(obj.ModTime, rule.ExpirationDays) |
|||
if !now.Before(expiryTime) { |
|||
return EvalResult{Action: ActionDeleteObject, RuleID: rule.ID} |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
return EvalResult{Action: ActionNone} |
|||
} |
|||
|
|||
// ShouldExpireNoncurrentVersion checks whether a non-current version should
|
|||
// be expired considering both NoncurrentDays and NewerNoncurrentVersions.
|
|||
// noncurrentIndex is the 0-based position among non-current versions sorted
|
|||
// newest-first (0 = newest non-current version).
|
|||
func ShouldExpireNoncurrentVersion(rule Rule, obj ObjectInfo, noncurrentIndex int, now time.Time) bool { |
|||
if rule.Status != "Enabled" { |
|||
return false |
|||
} |
|||
if rule.NoncurrentVersionExpirationDays <= 0 { |
|||
return false |
|||
} |
|||
if obj.IsLatest || obj.SuccessorModTime.IsZero() { |
|||
return false |
|||
} |
|||
if !matchesFilter(rule, obj) { |
|||
return false |
|||
} |
|||
|
|||
// Check age threshold.
|
|||
expiryTime := expectedExpiryTime(obj.SuccessorModTime, rule.NoncurrentVersionExpirationDays) |
|||
if now.Before(expiryTime) { |
|||
return false |
|||
} |
|||
|
|||
// Check NewerNoncurrentVersions count threshold.
|
|||
if rule.NewerNoncurrentVersions > 0 && noncurrentIndex < rule.NewerNoncurrentVersions { |
|||
return false |
|||
} |
|||
|
|||
return true |
|||
} |
|||
|
|||
// EvaluateMPUAbort finds the applicable AbortIncompleteMultipartUpload rule
|
|||
// for a multipart upload with the given key prefix and creation time.
|
|||
func EvaluateMPUAbort(rules []Rule, uploadKey string, createdAt time.Time, now time.Time) EvalResult { |
|||
for _, rule := range rules { |
|||
if rule.Status != "Enabled" { |
|||
continue |
|||
} |
|||
if rule.AbortMPUDaysAfterInitiation <= 0 { |
|||
continue |
|||
} |
|||
if !matchesPrefix(rule.Prefix, uploadKey) { |
|||
continue |
|||
} |
|||
cutoff := createdAt.Add(time.Duration(rule.AbortMPUDaysAfterInitiation) * 24 * time.Hour) |
|||
if !now.Before(cutoff) { |
|||
return EvalResult{Action: ActionAbortMultipartUpload, RuleID: rule.ID} |
|||
} |
|||
} |
|||
return EvalResult{Action: ActionNone} |
|||
} |
|||
|
|||
// expectedExpiryTime computes the expiration time given a reference time and
|
|||
// a number of days. Following S3 semantics, expiration happens at midnight UTC
|
|||
// of the day after the specified number of days.
|
|||
func expectedExpiryTime(refTime time.Time, days int) time.Time { |
|||
if days == 0 { |
|||
return refTime |
|||
} |
|||
t := refTime.UTC().Add(time.Duration(days+1) * 24 * time.Hour) |
|||
return t.Truncate(24 * time.Hour) |
|||
} |
|||
@ -0,0 +1,495 @@ |
|||
package s3lifecycle |
|||
|
|||
import ( |
|||
"testing" |
|||
"time" |
|||
) |
|||
|
|||
var now = time.Date(2026, 3, 27, 12, 0, 0, 0, time.UTC) |
|||
|
|||
func TestEvaluate_ExpirationDays(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "expire-30d", Status: "Enabled", |
|||
ExpirationDays: 30, |
|||
}} |
|||
|
|||
t.Run("object_older_than_days_is_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "data/file.txt", IsLatest: true, |
|||
ModTime: now.Add(-31 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
assertEqual(t, "expire-30d", result.RuleID) |
|||
}) |
|||
|
|||
t.Run("object_younger_than_days_is_not_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "data/file.txt", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("non_latest_version_not_affected_by_expiration_days", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "data/file.txt", IsLatest: false, |
|||
ModTime: now.Add(-60 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("delete_marker_not_affected_by_expiration_days", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "data/file.txt", IsLatest: true, IsDeleteMarker: true, |
|||
ModTime: now.Add(-60 * 24 * time.Hour), NumVersions: 3, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_ExpirationDate(t *testing.T) { |
|||
expirationDate := time.Date(2026, 3, 15, 0, 0, 0, 0, time.UTC) |
|||
rules := []Rule{{ |
|||
ID: "expire-date", Status: "Enabled", |
|||
ExpirationDate: expirationDate, |
|||
}} |
|||
|
|||
t.Run("object_expired_after_date", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-60 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
}) |
|||
|
|||
t.Run("object_not_expired_before_date", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-1 * time.Hour), |
|||
} |
|||
beforeDate := time.Date(2026, 3, 10, 0, 0, 0, 0, time.UTC) |
|||
result := Evaluate(rules, obj, beforeDate) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_ExpiredObjectDeleteMarker(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "cleanup-markers", Status: "Enabled", |
|||
ExpiredObjectDeleteMarker: true, |
|||
}} |
|||
|
|||
t.Run("sole_delete_marker_is_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, IsDeleteMarker: true, |
|||
NumVersions: 1, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionExpireDeleteMarker, result.Action) |
|||
}) |
|||
|
|||
t.Run("delete_marker_with_other_versions_not_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, IsDeleteMarker: true, |
|||
NumVersions: 3, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("non_latest_delete_marker_not_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, IsDeleteMarker: true, |
|||
NumVersions: 1, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("non_delete_marker_not_affected", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, IsDeleteMarker: false, |
|||
NumVersions: 1, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_NoncurrentVersionExpiration(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "expire-noncurrent", Status: "Enabled", |
|||
NoncurrentVersionExpirationDays: 30, |
|||
}} |
|||
|
|||
t.Run("old_noncurrent_version_is_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, |
|||
SuccessorModTime: now.Add(-45 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteVersion, result.Action) |
|||
}) |
|||
|
|||
t.Run("recent_noncurrent_version_is_not_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, |
|||
SuccessorModTime: now.Add(-10 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("latest_version_not_affected", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-60 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestShouldExpireNoncurrentVersion(t *testing.T) { |
|||
rule := Rule{ |
|||
ID: "noncurrent-rule", Status: "Enabled", |
|||
NoncurrentVersionExpirationDays: 30, |
|||
NewerNoncurrentVersions: 2, |
|||
} |
|||
|
|||
t.Run("old_version_beyond_count_is_expired", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, |
|||
SuccessorModTime: now.Add(-45 * 24 * time.Hour), |
|||
} |
|||
// noncurrentIndex=2 means this is the 3rd noncurrent version (0-indexed)
|
|||
// With NewerNoncurrentVersions=2, indices 0 and 1 are kept.
|
|||
if !ShouldExpireNoncurrentVersion(rule, obj, 2, now) { |
|||
t.Error("expected version at index 2 to be expired") |
|||
} |
|||
}) |
|||
|
|||
t.Run("old_version_within_count_is_kept", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, |
|||
SuccessorModTime: now.Add(-45 * 24 * time.Hour), |
|||
} |
|||
// noncurrentIndex=1 is within the keep threshold (NewerNoncurrentVersions=2).
|
|||
if ShouldExpireNoncurrentVersion(rule, obj, 1, now) { |
|||
t.Error("expected version at index 1 to be kept") |
|||
} |
|||
}) |
|||
|
|||
t.Run("recent_version_beyond_count_is_kept", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, |
|||
SuccessorModTime: now.Add(-5 * 24 * time.Hour), |
|||
} |
|||
// Even at index 5 (beyond count), if too young, it's kept.
|
|||
if ShouldExpireNoncurrentVersion(rule, obj, 5, now) { |
|||
t.Error("expected recent version to be kept regardless of index") |
|||
} |
|||
}) |
|||
|
|||
t.Run("disabled_rule_never_expires", func(t *testing.T) { |
|||
disabled := Rule{ |
|||
ID: "disabled", Status: "Disabled", |
|||
NoncurrentVersionExpirationDays: 1, |
|||
} |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: false, |
|||
SuccessorModTime: now.Add(-365 * 24 * time.Hour), |
|||
} |
|||
if ShouldExpireNoncurrentVersion(disabled, obj, 10, now) { |
|||
t.Error("disabled rule should never expire") |
|||
} |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_PrefixFilter(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "logs-only", Status: "Enabled", |
|||
Prefix: "logs/", |
|||
ExpirationDays: 7, |
|||
}} |
|||
|
|||
t.Run("matching_prefix", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "logs/app.log", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
}) |
|||
|
|||
t.Run("non_matching_prefix", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "data/file.txt", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_TagFilter(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "temp-only", Status: "Enabled", |
|||
ExpirationDays: 1, |
|||
FilterTags: map[string]string{"env": "temp"}, |
|||
}} |
|||
|
|||
t.Run("matching_tags", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-5 * 24 * time.Hour), |
|||
Tags: map[string]string{"env": "temp", "project": "foo"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
}) |
|||
|
|||
t.Run("missing_tag", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-5 * 24 * time.Hour), |
|||
Tags: map[string]string{"project": "foo"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("wrong_tag_value", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-5 * 24 * time.Hour), |
|||
Tags: map[string]string{"env": "prod"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("nil_object_tags", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-5 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_SizeFilter(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "large-files", Status: "Enabled", |
|||
ExpirationDays: 7, |
|||
FilterSizeGreaterThan: 1024 * 1024, // > 1 MB
|
|||
FilterSizeLessThan: 100 * 1024 * 1024, // < 100 MB
|
|||
}} |
|||
|
|||
t.Run("matching_size", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.bin", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 10 * 1024 * 1024, // 10 MB
|
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
}) |
|||
|
|||
t.Run("too_small", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.bin", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 512, // 512 bytes
|
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("too_large", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "file.bin", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 200 * 1024 * 1024, // 200 MB
|
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_CombinedFilters(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "combined", Status: "Enabled", |
|||
Prefix: "logs/", |
|||
ExpirationDays: 7, |
|||
FilterTags: map[string]string{"env": "dev"}, |
|||
FilterSizeGreaterThan: 100, |
|||
}} |
|||
|
|||
t.Run("all_filters_match", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "logs/app.log", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 1024, |
|||
Tags: map[string]string{"env": "dev"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
}) |
|||
|
|||
t.Run("prefix_doesnt_match", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "data/app.log", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 1024, |
|||
Tags: map[string]string{"env": "dev"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("tag_doesnt_match", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "logs/app.log", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 1024, |
|||
Tags: map[string]string{"env": "prod"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("size_doesnt_match", func(t *testing.T) { |
|||
obj := ObjectInfo{ |
|||
Key: "logs/app.log", IsLatest: true, |
|||
ModTime: now.Add(-10 * 24 * time.Hour), |
|||
Size: 50, // too small
|
|||
Tags: map[string]string{"env": "dev"}, |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_DisabledRule(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "disabled", Status: "Disabled", |
|||
ExpirationDays: 1, |
|||
}} |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, |
|||
ModTime: now.Add(-365 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
} |
|||
|
|||
func TestEvaluate_MultipleRules_Priority(t *testing.T) { |
|||
t.Run("delete_marker_takes_priority_over_expiration", func(t *testing.T) { |
|||
rules := []Rule{ |
|||
{ID: "expire", Status: "Enabled", ExpirationDays: 1}, |
|||
{ID: "marker", Status: "Enabled", ExpiredObjectDeleteMarker: true}, |
|||
} |
|||
obj := ObjectInfo{ |
|||
Key: "file.txt", IsLatest: true, IsDeleteMarker: true, |
|||
NumVersions: 1, ModTime: now.Add(-10 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionExpireDeleteMarker, result.Action) |
|||
assertEqual(t, "marker", result.RuleID) |
|||
}) |
|||
|
|||
t.Run("first_matching_expiration_rule_wins", func(t *testing.T) { |
|||
rules := []Rule{ |
|||
{ID: "rule1", Status: "Enabled", ExpirationDays: 30, Prefix: "logs/"}, |
|||
{ID: "rule2", Status: "Enabled", ExpirationDays: 7}, |
|||
} |
|||
obj := ObjectInfo{ |
|||
Key: "logs/app.log", IsLatest: true, |
|||
ModTime: now.Add(-31 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
assertEqual(t, "rule1", result.RuleID) |
|||
}) |
|||
} |
|||
|
|||
func TestEvaluate_EmptyPrefix(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "all", Status: "Enabled", |
|||
ExpirationDays: 30, |
|||
}} |
|||
obj := ObjectInfo{ |
|||
Key: "any/path/file.txt", IsLatest: true, |
|||
ModTime: now.Add(-31 * 24 * time.Hour), |
|||
} |
|||
result := Evaluate(rules, obj, now) |
|||
assertAction(t, ActionDeleteObject, result.Action) |
|||
} |
|||
|
|||
func TestEvaluateMPUAbort(t *testing.T) { |
|||
rules := []Rule{{ |
|||
ID: "abort-mpu", Status: "Enabled", |
|||
AbortMPUDaysAfterInitiation: 7, |
|||
}} |
|||
|
|||
t.Run("old_upload_is_aborted", func(t *testing.T) { |
|||
result := EvaluateMPUAbort(rules, "uploads/file.bin", now.Add(-10*24*time.Hour), now) |
|||
assertAction(t, ActionAbortMultipartUpload, result.Action) |
|||
}) |
|||
|
|||
t.Run("recent_upload_is_not_aborted", func(t *testing.T) { |
|||
result := EvaluateMPUAbort(rules, "uploads/file.bin", now.Add(-3*24*time.Hour), now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
|
|||
t.Run("prefix_scoped_abort", func(t *testing.T) { |
|||
prefixRules := []Rule{{ |
|||
ID: "abort-logs", Status: "Enabled", |
|||
Prefix: "logs/", |
|||
AbortMPUDaysAfterInitiation: 1, |
|||
}} |
|||
result := EvaluateMPUAbort(prefixRules, "data/file.bin", now.Add(-5*24*time.Hour), now) |
|||
assertAction(t, ActionNone, result.Action) |
|||
}) |
|||
} |
|||
|
|||
func TestExpectedExpiryTime(t *testing.T) { |
|||
ref := time.Date(2026, 3, 1, 15, 30, 0, 0, time.UTC) |
|||
|
|||
t.Run("30_days", func(t *testing.T) { |
|||
// S3 spec: expires at midnight UTC of day 32 (ref + 31 days, truncated).
|
|||
expiry := expectedExpiryTime(ref, 30) |
|||
expected := time.Date(2026, 4, 1, 0, 0, 0, 0, time.UTC) |
|||
if !expiry.Equal(expected) { |
|||
t.Errorf("expected %v, got %v", expected, expiry) |
|||
} |
|||
}) |
|||
|
|||
t.Run("zero_days_returns_ref", func(t *testing.T) { |
|||
expiry := expectedExpiryTime(ref, 0) |
|||
if !expiry.Equal(ref) { |
|||
t.Errorf("expected %v, got %v", ref, expiry) |
|||
} |
|||
}) |
|||
} |
|||
|
|||
func assertAction(t *testing.T, expected, actual Action) { |
|||
t.Helper() |
|||
if expected != actual { |
|||
t.Errorf("expected action %d, got %d", expected, actual) |
|||
} |
|||
} |
|||
|
|||
func assertEqual(t *testing.T, expected, actual string) { |
|||
t.Helper() |
|||
if expected != actual { |
|||
t.Errorf("expected %q, got %q", expected, actual) |
|||
} |
|||
} |
|||
@ -0,0 +1,56 @@ |
|||
package s3lifecycle |
|||
|
|||
import "strings" |
|||
|
|||
// matchesFilter checks if an object matches the rule's filter criteria
|
|||
// (prefix, tags, and size constraints).
|
|||
func matchesFilter(rule Rule, obj ObjectInfo) bool { |
|||
if !matchesPrefix(rule.Prefix, obj.Key) { |
|||
return false |
|||
} |
|||
if !matchesTags(rule.FilterTags, obj.Tags) { |
|||
return false |
|||
} |
|||
if !matchesSize(rule.FilterSizeGreaterThan, rule.FilterSizeLessThan, obj.Size) { |
|||
return false |
|||
} |
|||
return true |
|||
} |
|||
|
|||
// matchesPrefix returns true if the object key starts with the given prefix.
|
|||
// An empty prefix matches all keys.
|
|||
func matchesPrefix(prefix, key string) bool { |
|||
if prefix == "" { |
|||
return true |
|||
} |
|||
return strings.HasPrefix(key, prefix) |
|||
} |
|||
|
|||
// matchesTags returns true if all rule tags are present in the object's tags
|
|||
// with matching values. An empty or nil rule tag set matches all objects.
|
|||
func matchesTags(ruleTags, objTags map[string]string) bool { |
|||
if len(ruleTags) == 0 { |
|||
return true |
|||
} |
|||
if len(objTags) == 0 { |
|||
return false |
|||
} |
|||
for k, v := range ruleTags { |
|||
if objVal, ok := objTags[k]; !ok || objVal != v { |
|||
return false |
|||
} |
|||
} |
|||
return true |
|||
} |
|||
|
|||
// matchesSize returns true if the object's size falls within the specified
|
|||
// bounds. Zero values mean no constraint on that side.
|
|||
func matchesSize(greaterThan, lessThan, objSize int64) bool { |
|||
if greaterThan > 0 && objSize <= greaterThan { |
|||
return false |
|||
} |
|||
if lessThan > 0 && objSize >= lessThan { |
|||
return false |
|||
} |
|||
return true |
|||
} |
|||
@ -0,0 +1,79 @@ |
|||
package s3lifecycle |
|||
|
|||
import "testing" |
|||
|
|||
func TestMatchesPrefix(t *testing.T) { |
|||
tests := []struct { |
|||
name string |
|||
prefix string |
|||
key string |
|||
want bool |
|||
}{ |
|||
{"empty_prefix_matches_all", "", "any/key.txt", true}, |
|||
{"exact_prefix_match", "logs/", "logs/app.log", true}, |
|||
{"prefix_mismatch", "logs/", "data/file.txt", false}, |
|||
{"key_shorter_than_prefix", "very/long/prefix/", "short", false}, |
|||
{"prefix_equals_key", "exact", "exact", true}, |
|||
} |
|||
for _, tt := range tests { |
|||
t.Run(tt.name, func(t *testing.T) { |
|||
if got := matchesPrefix(tt.prefix, tt.key); got != tt.want { |
|||
t.Errorf("matchesPrefix(%q, %q) = %v, want %v", tt.prefix, tt.key, got, tt.want) |
|||
} |
|||
}) |
|||
} |
|||
} |
|||
|
|||
func TestMatchesTags(t *testing.T) { |
|||
tests := []struct { |
|||
name string |
|||
ruleTags map[string]string |
|||
objTags map[string]string |
|||
want bool |
|||
}{ |
|||
{"nil_rule_tags_match_all", nil, map[string]string{"a": "1"}, true}, |
|||
{"empty_rule_tags_match_all", map[string]string{}, map[string]string{"a": "1"}, true}, |
|||
{"nil_obj_tags_no_match", map[string]string{"a": "1"}, nil, false}, |
|||
{"single_tag_match", map[string]string{"env": "dev"}, map[string]string{"env": "dev", "foo": "bar"}, true}, |
|||
{"single_tag_value_mismatch", map[string]string{"env": "dev"}, map[string]string{"env": "prod"}, false}, |
|||
{"single_tag_key_missing", map[string]string{"env": "dev"}, map[string]string{"foo": "bar"}, false}, |
|||
{"multi_tag_all_match", map[string]string{"env": "dev", "tier": "hot"}, map[string]string{"env": "dev", "tier": "hot", "extra": "x"}, true}, |
|||
{"multi_tag_partial_match", map[string]string{"env": "dev", "tier": "hot"}, map[string]string{"env": "dev"}, false}, |
|||
} |
|||
for _, tt := range tests { |
|||
t.Run(tt.name, func(t *testing.T) { |
|||
if got := matchesTags(tt.ruleTags, tt.objTags); got != tt.want { |
|||
t.Errorf("matchesTags() = %v, want %v", got, tt.want) |
|||
} |
|||
}) |
|||
} |
|||
} |
|||
|
|||
func TestMatchesSize(t *testing.T) { |
|||
tests := []struct { |
|||
name string |
|||
greaterThan int64 |
|||
lessThan int64 |
|||
objSize int64 |
|||
want bool |
|||
}{ |
|||
{"no_constraints", 0, 0, 1000, true}, |
|||
{"only_greater_than_pass", 100, 0, 200, true}, |
|||
{"only_greater_than_fail", 100, 0, 50, false}, |
|||
{"only_greater_than_equal_fail", 100, 0, 100, false}, |
|||
{"only_less_than_pass", 0, 1000, 500, true}, |
|||
{"only_less_than_fail", 0, 1000, 2000, false}, |
|||
{"only_less_than_equal_fail", 0, 1000, 1000, false}, |
|||
{"both_constraints_pass", 100, 1000, 500, true}, |
|||
{"both_constraints_too_small", 100, 1000, 50, false}, |
|||
{"both_constraints_too_large", 100, 1000, 2000, false}, |
|||
} |
|||
for _, tt := range tests { |
|||
t.Run(tt.name, func(t *testing.T) { |
|||
if got := matchesSize(tt.greaterThan, tt.lessThan, tt.objSize); got != tt.want { |
|||
t.Errorf("matchesSize(%d, %d, %d) = %v, want %v", |
|||
tt.greaterThan, tt.lessThan, tt.objSize, got, tt.want) |
|||
} |
|||
}) |
|||
} |
|||
} |
|||
@ -0,0 +1,95 @@ |
|||
package s3lifecycle |
|||
|
|||
import "time" |
|||
|
|||
// Rule is a flattened, evaluator-friendly representation of an S3 lifecycle rule.
|
|||
// Callers convert from the XML-parsed s3api.Rule (which has nested structs with
|
|||
// set-flags for conditional XML marshaling) to this type.
|
|||
type Rule struct { |
|||
ID string |
|||
Status string // "Enabled" or "Disabled"
|
|||
|
|||
// Prefix filter (from Rule.Prefix or Rule.Filter.Prefix or Rule.Filter.And.Prefix).
|
|||
Prefix string |
|||
|
|||
// Expiration for current versions.
|
|||
ExpirationDays int |
|||
ExpirationDate time.Time |
|||
ExpiredObjectDeleteMarker bool |
|||
|
|||
// Expiration for non-current versions.
|
|||
NoncurrentVersionExpirationDays int |
|||
NewerNoncurrentVersions int |
|||
|
|||
// Abort incomplete multipart uploads.
|
|||
AbortMPUDaysAfterInitiation int |
|||
|
|||
// Tag filter (from Rule.Filter.Tag or Rule.Filter.And.Tags).
|
|||
FilterTags map[string]string |
|||
|
|||
// Size filters.
|
|||
FilterSizeGreaterThan int64 |
|||
FilterSizeLessThan int64 |
|||
} |
|||
|
|||
// ObjectInfo is the metadata about an object that the evaluator uses to
|
|||
// determine which lifecycle action applies. Callers build this from filer
|
|||
// entry attributes and extended metadata.
|
|||
type ObjectInfo struct { |
|||
// Key is the object key relative to the bucket root.
|
|||
Key string |
|||
|
|||
// ModTime is the object's modification time (entry.Attributes.Mtime).
|
|||
ModTime time.Time |
|||
|
|||
// Size is the object size in bytes (entry.Attributes.FileSize).
|
|||
Size int64 |
|||
|
|||
// IsLatest is true if this is the current version of the object.
|
|||
IsLatest bool |
|||
|
|||
// IsDeleteMarker is true if this entry is an S3 delete marker.
|
|||
IsDeleteMarker bool |
|||
|
|||
// NumVersions is the total number of versions for this object key,
|
|||
// including delete markers. Used for ExpiredObjectDeleteMarker evaluation.
|
|||
NumVersions int |
|||
|
|||
// SuccessorModTime is the creation time of the version that replaced
|
|||
// this one (making it non-current). Derived from the successor's version
|
|||
// ID timestamp. Zero value for the latest version.
|
|||
SuccessorModTime time.Time |
|||
|
|||
// NoncurrentIndex is the 0-based position among non-current versions
|
|||
// sorted newest-first (0 = newest non-current version). Used by
|
|||
// NewerNoncurrentVersions evaluation. -1 or unset for current versions.
|
|||
NoncurrentIndex int |
|||
|
|||
// Tags are the object's user-defined tags, extracted from the entry's
|
|||
// Extended metadata (keys prefixed with "X-Amz-Tagging-").
|
|||
Tags map[string]string |
|||
} |
|||
|
|||
// Action represents the lifecycle action to take on an object.
|
|||
type Action int |
|||
|
|||
const ( |
|||
// ActionNone means no lifecycle rule applies.
|
|||
ActionNone Action = iota |
|||
// ActionDeleteObject deletes the current version of the object.
|
|||
ActionDeleteObject |
|||
// ActionDeleteVersion deletes a specific non-current version.
|
|||
ActionDeleteVersion |
|||
// ActionExpireDeleteMarker removes a delete marker that is the sole remaining version.
|
|||
ActionExpireDeleteMarker |
|||
// ActionAbortMultipartUpload aborts an incomplete multipart upload.
|
|||
ActionAbortMultipartUpload |
|||
) |
|||
|
|||
// EvalResult is the output of lifecycle rule evaluation.
|
|||
type EvalResult struct { |
|||
// Action is the lifecycle action to take.
|
|||
Action Action |
|||
// RuleID is the ID of the rule that triggered this action.
|
|||
RuleID string |
|||
} |
|||
@ -0,0 +1,34 @@ |
|||
package s3lifecycle |
|||
|
|||
import "strings" |
|||
|
|||
const tagPrefix = "X-Amz-Tagging-" |
|||
|
|||
// ExtractTags extracts S3 object tags from a filer entry's Extended metadata.
|
|||
// Tags are stored with the key prefix "X-Amz-Tagging-" followed by the tag key.
|
|||
func ExtractTags(extended map[string][]byte) map[string]string { |
|||
if len(extended) == 0 { |
|||
return nil |
|||
} |
|||
var tags map[string]string |
|||
for k, v := range extended { |
|||
if strings.HasPrefix(k, tagPrefix) { |
|||
if tags == nil { |
|||
tags = make(map[string]string) |
|||
} |
|||
tags[k[len(tagPrefix):]] = string(v) |
|||
} |
|||
} |
|||
return tags |
|||
} |
|||
|
|||
// HasTagRules returns true if any enabled rule in the set uses tag-based filtering.
|
|||
// This is used as an optimization to skip tag extraction when no rules need it.
|
|||
func HasTagRules(rules []Rule) bool { |
|||
for _, r := range rules { |
|||
if r.Status == "Enabled" && len(r.FilterTags) > 0 { |
|||
return true |
|||
} |
|||
} |
|||
return false |
|||
} |
|||
@ -0,0 +1,89 @@ |
|||
package s3lifecycle |
|||
|
|||
import "testing" |
|||
|
|||
func TestExtractTags(t *testing.T) { |
|||
t.Run("extracts_tags_with_prefix", func(t *testing.T) { |
|||
extended := map[string][]byte{ |
|||
"X-Amz-Tagging-env": []byte("prod"), |
|||
"X-Amz-Tagging-project": []byte("foo"), |
|||
"Content-Type": []byte("text/plain"), |
|||
"X-Amz-Meta-Custom": []byte("value"), |
|||
} |
|||
tags := ExtractTags(extended) |
|||
if len(tags) != 2 { |
|||
t.Fatalf("expected 2 tags, got %d", len(tags)) |
|||
} |
|||
if tags["env"] != "prod" { |
|||
t.Errorf("expected env=prod, got %q", tags["env"]) |
|||
} |
|||
if tags["project"] != "foo" { |
|||
t.Errorf("expected project=foo, got %q", tags["project"]) |
|||
} |
|||
}) |
|||
|
|||
t.Run("nil_extended_returns_nil", func(t *testing.T) { |
|||
tags := ExtractTags(nil) |
|||
if tags != nil { |
|||
t.Errorf("expected nil, got %v", tags) |
|||
} |
|||
}) |
|||
|
|||
t.Run("no_tags_returns_nil", func(t *testing.T) { |
|||
extended := map[string][]byte{ |
|||
"Content-Type": []byte("text/plain"), |
|||
} |
|||
tags := ExtractTags(extended) |
|||
if tags != nil { |
|||
t.Errorf("expected nil, got %v", tags) |
|||
} |
|||
}) |
|||
|
|||
t.Run("empty_tag_value", func(t *testing.T) { |
|||
extended := map[string][]byte{ |
|||
"X-Amz-Tagging-empty": []byte(""), |
|||
} |
|||
tags := ExtractTags(extended) |
|||
if len(tags) != 1 { |
|||
t.Fatalf("expected 1 tag, got %d", len(tags)) |
|||
} |
|||
if tags["empty"] != "" { |
|||
t.Errorf("expected empty value, got %q", tags["empty"]) |
|||
} |
|||
}) |
|||
} |
|||
|
|||
func TestHasTagRules(t *testing.T) { |
|||
t.Run("has_tag_rules", func(t *testing.T) { |
|||
rules := []Rule{ |
|||
{Status: "Enabled", FilterTags: map[string]string{"env": "dev"}}, |
|||
} |
|||
if !HasTagRules(rules) { |
|||
t.Error("expected true") |
|||
} |
|||
}) |
|||
|
|||
t.Run("no_tag_rules", func(t *testing.T) { |
|||
rules := []Rule{ |
|||
{Status: "Enabled", ExpirationDays: 30}, |
|||
} |
|||
if HasTagRules(rules) { |
|||
t.Error("expected false") |
|||
} |
|||
}) |
|||
|
|||
t.Run("disabled_tag_rule", func(t *testing.T) { |
|||
rules := []Rule{ |
|||
{Status: "Disabled", FilterTags: map[string]string{"env": "dev"}}, |
|||
} |
|||
if HasTagRules(rules) { |
|||
t.Error("expected false for disabled rule") |
|||
} |
|||
}) |
|||
|
|||
t.Run("empty_rules", func(t *testing.T) { |
|||
if HasTagRules(nil) { |
|||
t.Error("expected false for nil rules") |
|||
} |
|||
}) |
|||
} |
|||
@ -0,0 +1,42 @@ |
|||
package s3lifecycle |
|||
|
|||
import ( |
|||
"math" |
|||
"strconv" |
|||
"time" |
|||
) |
|||
|
|||
// versionIdFormatThreshold distinguishes old vs new format version IDs.
|
|||
// New format (inverted timestamps) produces values above this threshold;
|
|||
// old format (raw timestamps) produces values below it.
|
|||
const versionIdFormatThreshold = 0x4000000000000000 |
|||
|
|||
// GetVersionTimestamp extracts the actual timestamp from a SeaweedFS version ID,
|
|||
// handling both old (raw nanosecond) and new (inverted nanosecond) formats.
|
|||
// Returns zero time if the version ID is invalid or "null".
|
|||
func GetVersionTimestamp(versionId string) time.Time { |
|||
ns := getVersionTimestampNanos(versionId) |
|||
if ns == 0 { |
|||
return time.Time{} |
|||
} |
|||
return time.Unix(0, ns) |
|||
} |
|||
|
|||
// getVersionTimestampNanos extracts the raw nanosecond timestamp from a version ID.
|
|||
func getVersionTimestampNanos(versionId string) int64 { |
|||
if len(versionId) < 16 || versionId == "null" { |
|||
return 0 |
|||
} |
|||
timestampPart, err := strconv.ParseUint(versionId[:16], 16, 64) |
|||
if err != nil { |
|||
return 0 |
|||
} |
|||
if timestampPart > math.MaxInt64 { |
|||
return 0 |
|||
} |
|||
if timestampPart > versionIdFormatThreshold { |
|||
// New format: inverted timestamp, convert back.
|
|||
return int64(math.MaxInt64 - timestampPart) |
|||
} |
|||
return int64(timestampPart) |
|||
} |
|||
@ -0,0 +1,74 @@ |
|||
package s3lifecycle |
|||
|
|||
import ( |
|||
"fmt" |
|||
"math" |
|||
"testing" |
|||
"time" |
|||
) |
|||
|
|||
func TestGetVersionTimestamp(t *testing.T) { |
|||
t.Run("new_format_inverted_timestamp", func(t *testing.T) { |
|||
// Simulate a new-format version ID (inverted timestamp above threshold).
|
|||
now := time.Now() |
|||
inverted := math.MaxInt64 - now.UnixNano() |
|||
versionId := fmt.Sprintf("%016x", inverted) + "0000000000000000" |
|||
|
|||
got := GetVersionTimestamp(versionId) |
|||
// Should recover the original timestamp within 1 second.
|
|||
diff := got.Sub(now) |
|||
if diff < -time.Second || diff > time.Second { |
|||
t.Errorf("timestamp diff too large: %v (got %v, want ~%v)", diff, got, now) |
|||
} |
|||
}) |
|||
|
|||
t.Run("old_format_raw_timestamp", func(t *testing.T) { |
|||
// Simulate an old-format version ID (raw nanosecond timestamp below threshold).
|
|||
// Use a timestamp from 2023 which would be below threshold.
|
|||
ts := time.Date(2023, 6, 15, 12, 0, 0, 0, time.UTC) |
|||
versionId := fmt.Sprintf("%016x", ts.UnixNano()) + "abcdef0123456789" |
|||
|
|||
got := GetVersionTimestamp(versionId) |
|||
if !got.Equal(ts) { |
|||
t.Errorf("expected %v, got %v", ts, got) |
|||
} |
|||
}) |
|||
|
|||
t.Run("null_version_id", func(t *testing.T) { |
|||
got := GetVersionTimestamp("null") |
|||
if !got.IsZero() { |
|||
t.Errorf("expected zero time for null version, got %v", got) |
|||
} |
|||
}) |
|||
|
|||
t.Run("empty_version_id", func(t *testing.T) { |
|||
got := GetVersionTimestamp("") |
|||
if !got.IsZero() { |
|||
t.Errorf("expected zero time for empty version, got %v", got) |
|||
} |
|||
}) |
|||
|
|||
t.Run("short_version_id", func(t *testing.T) { |
|||
got := GetVersionTimestamp("abc") |
|||
if !got.IsZero() { |
|||
t.Errorf("expected zero time for short version, got %v", got) |
|||
} |
|||
}) |
|||
|
|||
t.Run("high_bit_overflow_returns_zero", func(t *testing.T) { |
|||
// Version ID with first 16 hex chars > math.MaxInt64 should return zero,
|
|||
// not a wrapped negative timestamp.
|
|||
versionId := "80000000000000000000000000000000" |
|||
got := GetVersionTimestamp(versionId) |
|||
if !got.IsZero() { |
|||
t.Errorf("expected zero time for overflow version ID, got %v", got) |
|||
} |
|||
}) |
|||
|
|||
t.Run("invalid_hex", func(t *testing.T) { |
|||
got := GetVersionTimestamp("zzzzzzzzzzzzzzzz0000000000000000") |
|||
if !got.IsZero() { |
|||
t.Errorf("expected zero time for invalid hex, got %v", got) |
|||
} |
|||
}) |
|||
} |
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue