...
|
...
|
@@ -243,7 +243,6 @@ def test_curl_HEAD(label, src_file, **kwargs):
|
243
|
243
|
return test(label, cmd, **kwargs)
|
244
|
244
|
|
245
|
245
|
bucket_prefix = u"%s-" % getpass.getuser()
|
246
|
|
-print "Using bucket prefix: '%s'" % bucket_prefix
|
247
|
246
|
|
248
|
247
|
argv = sys.argv[1:]
|
249
|
248
|
while argv:
|
...
|
...
|
@@ -282,6 +281,8 @@ while argv:
|
282
|
282
|
else:
|
283
|
283
|
run_tests.append(int(arg))
|
284
|
284
|
|
|
285
|
+print "Using bucket prefix: '%s'" % bucket_prefix
|
|
286
|
+
|
285
|
287
|
cfg = S3.Config.Config(config_file)
|
286
|
288
|
|
287
|
289
|
if not run_tests:
|
...
|
...
|
@@ -335,7 +336,7 @@ test_s3cmd("Sync to S3", ['sync', 'testsuite/', pbucket(1) + '/xyz/', '--exclude
|
335
|
335
|
must_find = [ "ERROR: Upload of 'testsuite/permission-tests/permission-denied.txt' is not possible (Reason: Permission denied)",
|
336
|
336
|
"WARNING: 32 non-printable characters replaced in: crappy-file-name/non-printables",
|
337
|
337
|
],
|
338
|
|
- must_not_find_re = [ "demo/", "\.png$", "permission-denied-dir" ],
|
|
338
|
+ must_not_find_re = [ "demo/", "^(?!WARNING: Skipping).*\.png$", "permission-denied-dir" ],
|
339
|
339
|
retcode = EX_PARTIAL)
|
340
|
340
|
|
341
|
341
|
if have_encoding:
|
...
|
...
|
@@ -592,7 +593,8 @@ test_s3cmd("Sync remote2remote", ['sync', '%s/xyz/' % pbucket(1), '%s/copy/' % p
|
592
|
592
|
## ====== Don't Put symbolic link
|
593
|
593
|
test_s3cmd("Don't put symbolic links", ['put', 'testsuite/etc/linked1.png', 's3://%s/xyz/' % bucket(1),],
|
594
|
594
|
retcode = EX_USAGE,
|
595
|
|
- must_not_find_re = [ "linked1.png"])
|
|
595
|
+ must_find = ["WARNING: Skipping over symbolic link: testsuite/etc/linked1.png"],
|
|
596
|
+ must_not_find_re = ["^(?!WARNING: Skipping).*linked1.png"])
|
596
|
597
|
|
597
|
598
|
## ====== Put symbolic link
|
598
|
599
|
test_s3cmd("Put symbolic links", ['put', 'testsuite/etc/linked1.png', 's3://%s/xyz/' % bucket(1),'--follow-symlinks' ],
|
...
|
...
|
@@ -664,7 +666,7 @@ test_s3cmd("Set requester pays", ['payer', '--requester-pays', pbucket(2)])
|
664
|
664
|
|
665
|
665
|
## ====== get Requester Pays flag
|
666
|
666
|
test_s3cmd("Get requester pays flag", ['info', pbucket(2)],
|
667
|
|
- must_find = [ "Payer: Requester"])
|
|
667
|
+ must_find = [ "Payer: Requester"])
|
668
|
668
|
|
669
|
669
|
## ====== ls using Requester Pays flag
|
670
|
670
|
test_s3cmd("ls using requester pays flag", ['ls', '--requester-pays', pbucket(2)])
|
...
|
...
|
@@ -674,7 +676,7 @@ test_s3cmd("Clear requester pays", ['payer', pbucket(2)])
|
674
|
674
|
|
675
|
675
|
## ====== get Requester Pays flag
|
676
|
676
|
test_s3cmd("Get requester pays flag", ['info', pbucket(2)],
|
677
|
|
- must_find = [ "Payer: BucketOwner"])
|
|
677
|
+ must_find = [ "Payer: BucketOwner"])
|
678
|
678
|
|
679
|
679
|
## ====== Recursive delete maximum exceeed
|
680
|
680
|
test_s3cmd("Recursive delete maximum exceeded", ['del', '--recursive', '--max-delete=1', '--exclude', 'Atomic*', '%s/xyz/etc' % pbucket(1)],
|