mirror of
https://github.com/minio/minio.git
synced 2024-12-24 22:25:54 -05:00
Add tests to verify default server policies (#13575)
Check that they are present and that they can be modified by user
This commit is contained in:
parent
ecd54b4cba
commit
bce6864785
@ -91,6 +91,7 @@ func runAllIAMTests(suite *TestSuiteIAM, c *check) {
|
|||||||
suite.SetUpSuite(c)
|
suite.SetUpSuite(c)
|
||||||
suite.TestUserCreate(c)
|
suite.TestUserCreate(c)
|
||||||
suite.TestPolicyCreate(c)
|
suite.TestPolicyCreate(c)
|
||||||
|
suite.TestCannedPolicies(c)
|
||||||
suite.TestGroupAddRemove(c)
|
suite.TestGroupAddRemove(c)
|
||||||
suite.TestServiceAccountOps(c)
|
suite.TestServiceAccountOps(c)
|
||||||
suite.TearDownSuite(c)
|
suite.TearDownSuite(c)
|
||||||
@ -275,6 +276,70 @@ func (s *TestSuiteIAM) TestPolicyCreate(c *check) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *TestSuiteIAM) TestCannedPolicies(c *check) {
|
||||||
|
ctx, cancel := context.WithTimeout(context.Background(), testDefaultTimeout)
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
policies, err := s.adm.ListCannedPolicies(ctx)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("unable to list policies: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
defaultPolicies := []string{
|
||||||
|
"readwrite",
|
||||||
|
"readonly",
|
||||||
|
"writeonly",
|
||||||
|
"diagnostics",
|
||||||
|
"consoleAdmin",
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, v := range defaultPolicies {
|
||||||
|
if _, ok := policies[v]; !ok {
|
||||||
|
c.Fatalf("Failed to find %s in policies list", v)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
bucket := getRandomBucketName()
|
||||||
|
err = s.client.MakeBucket(ctx, bucket, minio.MakeBucketOptions{})
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("bucket creat error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
policyBytes := []byte(fmt.Sprintf(`{
|
||||||
|
"Version": "2012-10-17",
|
||||||
|
"Statement": [
|
||||||
|
{
|
||||||
|
"Effect": "Allow",
|
||||||
|
"Action": [
|
||||||
|
"s3:PutObject",
|
||||||
|
"s3:GetObject",
|
||||||
|
"s3:ListBucket"
|
||||||
|
],
|
||||||
|
"Resource": [
|
||||||
|
"arn:aws:s3:::%s/*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}`, bucket))
|
||||||
|
|
||||||
|
// Check that default policies can be overwritten.
|
||||||
|
err = s.adm.AddCannedPolicy(ctx, "readwrite", policyBytes)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("policy add error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
info, err := s.adm.InfoCannedPolicy(ctx, "readwrite")
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("policy info err: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
infoStr := string(info)
|
||||||
|
if !strings.Contains(infoStr, `"s3:PutObject"`) || !strings.Contains(infoStr, ":"+bucket+"/") {
|
||||||
|
c.Fatalf("policy contains unexpected content!")
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
func (s *TestSuiteIAM) TestGroupAddRemove(c *check) {
|
func (s *TestSuiteIAM) TestGroupAddRemove(c *check) {
|
||||||
ctx, cancel := context.WithTimeout(context.Background(), testDefaultTimeout)
|
ctx, cancel := context.WithTimeout(context.Background(), testDefaultTimeout)
|
||||||
defer cancel()
|
defer cancel()
|
||||||
|
Loading…
Reference in New Issue
Block a user