Add more tests for ARN and its format (#19408)

Original work from #17566 modified to fit the new requirements
This commit is contained in:
Harshavardhana 2024-04-04 01:31:34 -07:00 committed by GitHub
parent 5f07eb2d17
commit 2228eb61cb
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 227 additions and 79 deletions

View File

@ -18,6 +18,7 @@
package arn package arn
import ( import (
"errors"
"fmt" "fmt"
"regexp" "regexp"
"strings" "strings"
@ -31,30 +32,19 @@ import (
// //
// Reference: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html // Reference: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html
type arnPartition string
const ( const (
arnPartitionMinio arnPartition = "minio" arnPrefixArn = "arn"
) arnPartitionMinio = "minio"
arnServiceIAM = "iam"
type arnService string arnResourceTypeRole = "role"
const (
arnServiceIAM arnService = "iam"
)
type arnResourceType string
const (
arnResourceTypeRole arnResourceType = "role"
) )
// ARN - representation of resources based on AWS ARNs. // ARN - representation of resources based on AWS ARNs.
type ARN struct { type ARN struct {
Partition arnPartition Partition string
Service arnService Service string
Region string Region string
ResourceType arnResourceType ResourceType string
ResourceID string ResourceID string
} }
@ -65,7 +55,7 @@ var validResourceIDRegex = regexp.MustCompile(`[A-Za-z0-9_/\.-]+$`)
// NewIAMRoleARN - returns an ARN for a role in MinIO. // NewIAMRoleARN - returns an ARN for a role in MinIO.
func NewIAMRoleARN(resourceID, serverRegion string) (ARN, error) { func NewIAMRoleARN(resourceID, serverRegion string) (ARN, error) {
if !validResourceIDRegex.MatchString(resourceID) { if !validResourceIDRegex.MatchString(resourceID) {
return ARN{}, fmt.Errorf("Invalid resource ID: %s", resourceID) return ARN{}, fmt.Errorf("invalid resource ID: %s", resourceID)
} }
return ARN{ return ARN{
Partition: arnPartitionMinio, Partition: arnPartitionMinio,
@ -80,12 +70,12 @@ func NewIAMRoleARN(resourceID, serverRegion string) (ARN, error) {
func (arn ARN) String() string { func (arn ARN) String() string {
return strings.Join( return strings.Join(
[]string{ []string{
"arn", arnPrefixArn,
string(arn.Partition), arn.Partition,
string(arn.Service), arn.Service,
arn.Region, arn.Region,
"", // account-id is always empty in this implementation "", // account-id is always empty in this implementation
string(arn.ResourceType) + "/" + arn.ResourceID, arn.ResourceType + "/" + arn.ResourceID,
}, },
":", ":",
) )
@ -94,43 +84,41 @@ func (arn ARN) String() string {
// Parse - parses an ARN string into a type. // Parse - parses an ARN string into a type.
func Parse(arnStr string) (arn ARN, err error) { func Parse(arnStr string) (arn ARN, err error) {
ps := strings.Split(arnStr, ":") ps := strings.Split(arnStr, ":")
if len(ps) != 6 || if len(ps) != 6 || ps[0] != string(arnPrefixArn) {
ps[0] != "arn" { err = errors.New("invalid ARN string format")
err = fmt.Errorf("Invalid ARN string format")
return return
} }
if ps[1] != string(arnPartitionMinio) { if ps[1] != string(arnPartitionMinio) {
err = fmt.Errorf("Invalid ARN - bad partition field") err = errors.New("invalid ARN - bad partition field")
return return
} }
if ps[2] != string(arnServiceIAM) { if ps[2] != string(arnServiceIAM) {
err = fmt.Errorf("Invalid ARN - bad service field") err = errors.New("invalid ARN - bad service field")
return return
} }
// ps[3] is region and is not validated here. If the region is invalid, // ps[3] is region and is not validated here. If the region is invalid,
// the ARN would not match any configured ARNs in the server. // the ARN would not match any configured ARNs in the server.
if ps[4] != "" { if ps[4] != "" {
err = fmt.Errorf("Invalid ARN - unsupported account-id field") err = errors.New("invalid ARN - unsupported account-id field")
return return
} }
res := strings.SplitN(ps[5], "/", 2) res := strings.SplitN(ps[5], "/", 2)
if len(res) != 2 { if len(res) != 2 {
err = fmt.Errorf("Invalid ARN - resource does not contain a \"/\"") err = errors.New("invalid ARN - resource does not contain a \"/\"")
return return
} }
if res[0] != string(arnResourceTypeRole) { if res[0] != string(arnResourceTypeRole) {
err = fmt.Errorf("Invalid ARN: resource type is invalid.") err = errors.New("invalid ARN: resource type is invalid")
return return
} }
if !validResourceIDRegex.MatchString(res[1]) { if !validResourceIDRegex.MatchString(res[1]) {
err = fmt.Errorf("Invalid resource ID: %s", res[1]) err = fmt.Errorf("invalid resource ID: %s", res[1])
return return
} }

View File

@ -1,6 +1,6 @@
// Copyright (c) 2015-2023 MinIO, Inc. // Copyright (c) 2015-2024 MinIO, Inc.
// //
// # This file is part of MinIO Object Storage stack // This file is part of MinIO Object Storage stack
// //
// This program is free software: you can redistribute it and/or modify // This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by // it under the terms of the GNU Affero General Public License as published by
@ -18,59 +18,219 @@
package arn package arn
import ( import (
"fmt" "reflect"
"testing" "testing"
) )
func TestNewIAMRoleARN(t *testing.T) { func TestARN_String(t *testing.T) {
testCases := []struct { tests := []struct {
resourceID string arn ARN
serverRegion string want string
expectedARN string
isErrExpected bool
}{ }{
{ {
resourceID: "myrole", arn: ARN{
serverRegion: "us-east-1", Partition: "minio",
expectedARN: "arn:minio:iam:us-east-1::role/myrole", Service: "iam",
isErrExpected: false, Region: "us-east-1",
ResourceType: "role",
ResourceID: "my-role",
},
want: "arn:minio:iam:us-east-1::role/my-role",
}, },
{ {
resourceID: "myrole", arn: ARN{
serverRegion: "", Partition: "minio",
expectedARN: "arn:minio:iam:::role/myrole", Service: "",
isErrExpected: false, Region: "us-east-1",
}, ResourceType: "role",
{ ResourceID: "my-role",
// Resource ID can start with a hyphen },
resourceID: "-myrole", want: "arn:minio::us-east-1::role/my-role",
serverRegion: "",
expectedARN: "arn:minio:iam:::role/-myrole",
isErrExpected: false,
},
{
resourceID: "",
serverRegion: "",
expectedARN: "",
isErrExpected: true,
}, },
} }
for i, testCase := range testCases { for _, tt := range tests {
arn, err := NewIAMRoleARN(testCase.resourceID, testCase.serverRegion) t.Run(tt.want, func(t *testing.T) {
fmt.Println(arn, err) if got := tt.arn.String(); got != tt.want {
if err != nil { t.Errorf("ARN.String() = %v, want %v", got, tt.want)
if !testCase.isErrExpected {
t.Errorf("Test %d: Unexpected error: %v", i+1, err)
} }
continue })
} }
}
if testCase.isErrExpected {
t.Errorf("Test %d: Expected error but got none", i+1) func TestNewIAMRoleARN(t *testing.T) {
} type args struct {
if arn.String() != testCase.expectedARN { resourceID string
t.Errorf("Test %d: Expected ARN %s but got %s", i+1, testCase.expectedARN, arn.String()) serverRegion string
} }
tests := []struct {
name string
args args
want ARN
wantErr bool
}{
{
name: "valid resource ID must succeed",
args: args{
resourceID: "my-role",
serverRegion: "us-east-1",
},
want: ARN{
Partition: "minio",
Service: "iam",
Region: "us-east-1",
ResourceType: "role",
ResourceID: "my-role",
},
wantErr: false,
},
{
name: "valid resource ID must succeed",
args: args{
resourceID: "-my-role",
serverRegion: "us-east-1",
},
want: ARN{
Partition: "minio",
Service: "iam",
Region: "us-east-1",
ResourceType: "role",
ResourceID: "-my-role",
},
wantErr: false,
},
{
name: "empty server region must succeed",
args: args{
resourceID: "my-role",
serverRegion: "",
},
want: ARN{
Partition: "minio",
Service: "iam",
Region: "",
ResourceType: "role",
ResourceID: "my-role",
},
wantErr: false,
},
{
name: "empty resource ID must fail",
args: args{
resourceID: "",
serverRegion: "us-east-1",
},
want: ARN{},
wantErr: true,
},
{
name: "resource ID starting with '=' must fail",
args: args{
resourceID: "=",
serverRegion: "us-east-1",
},
want: ARN{},
wantErr: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := NewIAMRoleARN(tt.args.resourceID, tt.args.serverRegion)
if (err != nil) != tt.wantErr {
t.Errorf("NewIAMRoleARN() error = %v, wantErr %v", err, tt.wantErr)
return
}
if !reflect.DeepEqual(got, tt.want) {
t.Errorf("NewIAMRoleARN() got = %v, want %v", got, tt.want)
}
})
}
}
func TestParse(t *testing.T) {
type args struct {
arnStr string
}
tests := []struct {
name string
args args
wantArn ARN
wantErr bool
}{
{
name: "valid ARN must succeed",
args: args{
arnStr: "arn:minio:iam:us-east-1::role/my-role",
},
wantArn: ARN{
Partition: "minio",
Service: "iam",
Region: "us-east-1",
ResourceType: "role",
ResourceID: "my-role",
},
wantErr: false,
},
{
name: "valid ARN must succeed",
args: args{
arnStr: "arn:minio:iam:us-east-1::role/-my-role",
},
wantArn: ARN{
Partition: "minio",
Service: "iam",
Region: "us-east-1",
ResourceType: "role",
ResourceID: "-my-role",
},
wantErr: false,
},
{
name: "invalid ARN length must fail",
args: args{
arnStr: "arn:minio:",
},
wantArn: ARN{},
wantErr: true,
},
{
name: "invalid ARN partition must fail",
args: args{
arnStr: "arn:invalid:iam:us-east-1::role/my-role",
},
wantArn: ARN{},
wantErr: true,
},
{
name: "invalid ARN service must fail",
args: args{
arnStr: "arn:minio:invalid:us-east-1::role/my-role",
},
wantArn: ARN{},
wantErr: true,
},
{
name: "invalid ARN resource type must fail",
args: args{
arnStr: "arn:minio:iam:us-east-1::invalid",
},
wantArn: ARN{},
wantErr: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
gotArn, err := Parse(tt.args.arnStr)
if err == nil && tt.wantErr {
t.Errorf("Parse() error = %v, wantErr %v", err, tt.wantErr)
}
if err != nil && !tt.wantErr {
t.Errorf("Parse() error = %v, wantErr %v", err, tt.wantErr)
}
if err == nil {
if !reflect.DeepEqual(gotArn, tt.wantArn) {
t.Errorf("Parse() gotArn = %v, want %v", gotArn, tt.wantArn)
}
}
})
} }
} }