Compare commits

...

4 Commits

Author SHA1 Message Date
Dora Korpar 030916b1ce [drop] skip azure complete mpu tests 2021-02-02 03:59:39 +01:00
Dora Korpar aa07e2006a [squash] unstring int 2021-02-02 03:59:39 +01:00
Dora Korpar 34979420f2 [squash] rm other .only 2021-02-02 03:59:39 +01:00
Dora Korpar 4a304edc7a bf: ZENKO 2153 run all functional tests 2021-02-02 03:59:39 +01:00
4 changed files with 5 additions and 4 deletions

View File

@ -101,7 +101,7 @@ function mpuSetup(key, location, cb) {
}); });
} }
describeSkipIfNotMultipleOrCeph('Complete MPU API for Azure data backend', describe.skip('Complete MPU API for Azure data backend',
function testSuite() { function testSuite() {
this.timeout(150000); this.timeout(150000);
withV4(sigCfg => { withV4(sigCfg => {

View File

@ -11,7 +11,7 @@ const bucket = `completempugcp${genUniqID()}`;
const smallBody = Buffer.from('I am a body', 'utf8'); const smallBody = Buffer.from('I am a body', 'utf8');
const bigBody = Buffer.alloc(10485760); const bigBody = Buffer.alloc(10485760);
const s3MD5 = 'bfb875032e51cbe2a60c5b6b99a2153f-2'; const s3MD5 = 'bfb875032e51cbe2a60c5b6b99a2153f-2';
const expectedContentLength = '10485771'; const expectedContentLength = 10485771;
const gcpTimeout = 5000; const gcpTimeout = 5000;
let s3; let s3;

View File

@ -74,7 +74,7 @@ function awsGetCheck(objectKey, s3MD5, awsMD5, location, cb) {
}); });
} }
describe.only('MultipleBackend put object', function testSuite() { describe('MultipleBackend put object', function testSuite() {
this.timeout(250000); this.timeout(250000);
withV4(sigCfg => { withV4(sigCfg => {
beforeEach(() => { beforeEach(() => {

View File

@ -154,7 +154,8 @@ describeSkipIfE2E('PUT public object with 100-continue header', () => {
it('should wait for continue event before sending body', done => it('should wait for continue event before sending body', done =>
continueRequest.sendsBodyOnContinue(done)); continueRequest.sendsBodyOnContinue(done));
it('should not send continue if denied for a public user', done =>
it('should continue if a public user', done =>
continueRequest.setRequestPath(invalidSignedURL) continueRequest.setRequestPath(invalidSignedURL)
.shouldNotGetContinue(done)); .shouldNotGetContinue(done));
}); });