mirror of
https://github.com/minio/minio.git
synced 2024-12-24 06:05:55 -05:00
tests: Add GetBucketLocation, HeadBucket tests. (#2644)
This commit is contained in:
parent
8bd78fbdfb
commit
eae0281c64
201
cmd/bucket-handlers_test.go
Normal file
201
cmd/bucket-handlers_test.go
Normal file
@ -0,0 +1,201 @@
|
|||||||
|
/*
|
||||||
|
* Minio Cloud Storage, (C) 2016 Minio, Inc.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/xml"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Wrapper for calling GetBucketPolicy HTTP handler tests for both XL multiple disks and single node setup.
|
||||||
|
func TestGetBucketLocationHandler(t *testing.T) {
|
||||||
|
ExecObjectLayerTest(t, testGetBucketLocationHandler)
|
||||||
|
}
|
||||||
|
|
||||||
|
func testGetBucketLocationHandler(obj ObjectLayer, instanceType string, t TestErrHandler) {
|
||||||
|
initBucketPolicies(obj)
|
||||||
|
|
||||||
|
// get random bucket name.
|
||||||
|
bucketName := getRandomBucketName()
|
||||||
|
// Create bucket.
|
||||||
|
err := obj.MakeBucket(bucketName)
|
||||||
|
if err != nil {
|
||||||
|
// failed to create newbucket, abort.
|
||||||
|
t.Fatalf("%s : %s", instanceType, err)
|
||||||
|
}
|
||||||
|
// Register the API end points with XL/FS object layer.
|
||||||
|
apiRouter := initTestAPIEndPoints(obj, []string{"GetBucketLocation"})
|
||||||
|
// initialize the server and obtain the credentials and root.
|
||||||
|
// credentials are necessary to sign the HTTP request.
|
||||||
|
rootPath, err := newTestConfig("us-east-1")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Init Test config failed")
|
||||||
|
}
|
||||||
|
// remove the root folder after the test ends.
|
||||||
|
defer removeAll(rootPath)
|
||||||
|
|
||||||
|
credentials := serverConfig.GetCredential()
|
||||||
|
// test cases with sample input and expected output.
|
||||||
|
testCases := []struct {
|
||||||
|
bucketName string
|
||||||
|
accessKey string
|
||||||
|
secretKey string
|
||||||
|
// expected Response.
|
||||||
|
expectedRespStatus int
|
||||||
|
locationResponse []byte
|
||||||
|
errorResponse APIErrorResponse
|
||||||
|
shouldPass bool
|
||||||
|
}{
|
||||||
|
// Tests for authenticated request and proper response.
|
||||||
|
{
|
||||||
|
bucketName,
|
||||||
|
credentials.AccessKeyID,
|
||||||
|
credentials.SecretAccessKey,
|
||||||
|
http.StatusOK,
|
||||||
|
[]byte(`<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<LocationConstraint xmlns="http://s3.amazonaws.com/doc/2006-03-01/"></LocationConstraint>`),
|
||||||
|
APIErrorResponse{},
|
||||||
|
true,
|
||||||
|
},
|
||||||
|
// Tests for anonymous requests.
|
||||||
|
{
|
||||||
|
bucketName,
|
||||||
|
"",
|
||||||
|
"",
|
||||||
|
http.StatusForbidden,
|
||||||
|
[]byte(""),
|
||||||
|
APIErrorResponse{
|
||||||
|
Resource: "/" + bucketName + "/",
|
||||||
|
Code: "AccessDenied",
|
||||||
|
Message: "Access Denied.",
|
||||||
|
},
|
||||||
|
false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, testCase := range testCases {
|
||||||
|
// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
// construct HTTP request for PUT bucket policy endpoint.
|
||||||
|
req, err := newTestSignedRequest("GET", getBucketLocationURL("", testCase.bucketName), 0, nil, testCase.accessKey, testCase.secretKey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Test %d: %s: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v", i+1, instanceType, err)
|
||||||
|
}
|
||||||
|
// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic ofthe handler.
|
||||||
|
// Call the ServeHTTP to execute the handler.
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
if rec.Code != testCase.expectedRespStatus {
|
||||||
|
t.Errorf("Test %d: %s: Expected the response status to be `%d`, but instead found `%d`", i+1, instanceType, testCase.expectedRespStatus, rec.Code)
|
||||||
|
}
|
||||||
|
if !bytes.Equal(testCase.locationResponse, rec.Body.Bytes()) && testCase.shouldPass {
|
||||||
|
t.Errorf("Test %d: %s: Expected the response to be `%s`, but instead found `%s`", i+1, instanceType, string(testCase.locationResponse), string(rec.Body.Bytes()))
|
||||||
|
}
|
||||||
|
errorResponse := APIErrorResponse{}
|
||||||
|
err = xml.Unmarshal(rec.Body.Bytes(), &errorResponse)
|
||||||
|
if err != nil && !testCase.shouldPass {
|
||||||
|
t.Fatalf("Test %d: %s: Unable to marshal response body %s", i+1, instanceType, string(rec.Body.Bytes()))
|
||||||
|
}
|
||||||
|
if errorResponse.Resource != testCase.errorResponse.Resource {
|
||||||
|
t.Errorf("Test %d: %s: Expected the error resource to be `%s`, but instead found `%s`", i+1, instanceType, testCase.errorResponse.Resource, errorResponse.Resource)
|
||||||
|
}
|
||||||
|
if errorResponse.Message != testCase.errorResponse.Message {
|
||||||
|
t.Errorf("Test %d: %s: Expected the error message to be `%s`, but instead found `%s`", i+1, instanceType, testCase.errorResponse.Message, errorResponse.Message)
|
||||||
|
}
|
||||||
|
if errorResponse.Code != testCase.errorResponse.Code {
|
||||||
|
t.Errorf("Test %d: %s: Expected the error code to be `%s`, but instead found `%s`", i+1, instanceType, testCase.errorResponse.Code, errorResponse.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wrapper for calling HeadBucket HTTP handler tests for both XL multiple disks and single node setup.
|
||||||
|
func TestHeadBucketHandler(t *testing.T) {
|
||||||
|
ExecObjectLayerTest(t, testHeadBucketHandler)
|
||||||
|
}
|
||||||
|
|
||||||
|
func testHeadBucketHandler(obj ObjectLayer, instanceType string, t TestErrHandler) {
|
||||||
|
initBucketPolicies(obj)
|
||||||
|
|
||||||
|
// get random bucket name.
|
||||||
|
bucketName := getRandomBucketName()
|
||||||
|
// Create bucket.
|
||||||
|
err := obj.MakeBucket(bucketName)
|
||||||
|
if err != nil {
|
||||||
|
// failed to create newbucket, abort.
|
||||||
|
t.Fatalf("%s : %s", instanceType, err)
|
||||||
|
}
|
||||||
|
// Register the API end points with XL/FS object layer.
|
||||||
|
apiRouter := initTestAPIEndPoints(obj, []string{"HeadBucket"})
|
||||||
|
// initialize the server and obtain the credentials and root.
|
||||||
|
// credentials are necessary to sign the HTTP request.
|
||||||
|
rootPath, err := newTestConfig("us-east-1")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Init Test config failed")
|
||||||
|
}
|
||||||
|
// remove the root folder after the test ends.
|
||||||
|
defer removeAll(rootPath)
|
||||||
|
|
||||||
|
credentials := serverConfig.GetCredential()
|
||||||
|
// test cases with sample input and expected output.
|
||||||
|
testCases := []struct {
|
||||||
|
bucketName string
|
||||||
|
accessKey string
|
||||||
|
secretKey string
|
||||||
|
// expected Response.
|
||||||
|
expectedRespStatus int
|
||||||
|
}{
|
||||||
|
// Bucket exists.
|
||||||
|
{
|
||||||
|
bucketName: bucketName,
|
||||||
|
accessKey: credentials.AccessKeyID,
|
||||||
|
secretKey: credentials.SecretAccessKey,
|
||||||
|
expectedRespStatus: http.StatusOK,
|
||||||
|
},
|
||||||
|
// Non-existent bucket name.
|
||||||
|
{
|
||||||
|
bucketName: "2333",
|
||||||
|
accessKey: credentials.AccessKeyID,
|
||||||
|
secretKey: credentials.SecretAccessKey,
|
||||||
|
expectedRespStatus: http.StatusNotFound,
|
||||||
|
},
|
||||||
|
// Un-authenticated request.
|
||||||
|
{
|
||||||
|
bucketName: bucketName,
|
||||||
|
accessKey: "",
|
||||||
|
secretKey: "",
|
||||||
|
expectedRespStatus: http.StatusForbidden,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, testCase := range testCases {
|
||||||
|
// initialize HTTP NewRecorder, this records any mutations to response writer inside the handler.
|
||||||
|
rec := httptest.NewRecorder()
|
||||||
|
// construct HTTP request for PUT bucket policy endpoint.
|
||||||
|
req, err := newTestSignedRequest("HEAD", getHEADBucketURL("", testCase.bucketName), 0, nil, testCase.accessKey, testCase.secretKey)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Test %d: %s: Failed to create HTTP request for PutBucketPolicyHandler: <ERROR> %v", i+1, instanceType, err)
|
||||||
|
}
|
||||||
|
// Since `apiRouter` satisfies `http.Handler` it has a ServeHTTP to execute the logic ofthe handler.
|
||||||
|
// Call the ServeHTTP to execute the handler.
|
||||||
|
apiRouter.ServeHTTP(rec, req)
|
||||||
|
if rec.Code != testCase.expectedRespStatus {
|
||||||
|
t.Errorf("Test %d: %s: Expected the response status to be `%d`, but instead found `%d`", i+1, instanceType, testCase.expectedRespStatus, rec.Code)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Minio Cloud Storage, (C) 2015, 2016 Minio, Inc.
|
* Minio Cloud Storage, (C) 2016 Minio, Inc.
|
||||||
*
|
*
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
* you may not use this file except in compliance with the License.
|
* you may not use this file except in compliance with the License.
|
||||||
|
@ -628,6 +628,11 @@ func newTestSignedRequest(method, urlStr string, contentLength int64, body io.Re
|
|||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Anonymous request return quickly.
|
||||||
|
if accessKey == "" || secretKey == "" {
|
||||||
|
return req, nil
|
||||||
|
}
|
||||||
|
|
||||||
err = signRequest(req, accessKey, secretKey)
|
err = signRequest(req, accessKey, secretKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -988,7 +993,13 @@ func getHEADBucketURL(endPoint, bucketName string) string {
|
|||||||
// return URL for deleting the bucket.
|
// return URL for deleting the bucket.
|
||||||
func getDeleteBucketURL(endPoint, bucketName string) string {
|
func getDeleteBucketURL(endPoint, bucketName string) string {
|
||||||
return makeTestTargetURL(endPoint, bucketName, "", url.Values{})
|
return makeTestTargetURL(endPoint, bucketName, "", url.Values{})
|
||||||
|
}
|
||||||
|
|
||||||
|
// return URL For fetching location of the bucket.
|
||||||
|
func getBucketLocationURL(endPoint, bucketName string) string {
|
||||||
|
queryValue := url.Values{}
|
||||||
|
queryValue.Set("location", "")
|
||||||
|
return makeTestTargetURL(endPoint, bucketName, "", queryValue)
|
||||||
}
|
}
|
||||||
|
|
||||||
// return URL for listing objects in the bucket with V1 legacy API.
|
// return URL for listing objects in the bucket with V1 legacy API.
|
||||||
@ -1206,24 +1217,21 @@ func initTestAPIEndPoints(objLayer ObjectLayer, apiFunctions []string) http.Hand
|
|||||||
// Register GetObject handler.
|
// Register GetObject handler.
|
||||||
case "CopyObject`":
|
case "CopyObject`":
|
||||||
bucket.Methods("PUT").Path("/{object:.+}").HeadersRegexp("X-Amz-Copy-Source", ".*?(\\/|%2F).*?").HandlerFunc(api.CopyObjectHandler)
|
bucket.Methods("PUT").Path("/{object:.+}").HeadersRegexp("X-Amz-Copy-Source", ".*?(\\/|%2F).*?").HandlerFunc(api.CopyObjectHandler)
|
||||||
|
|
||||||
// Register PutBucket Policy handler.
|
// Register PutBucket Policy handler.
|
||||||
case "PutBucketPolicy":
|
case "PutBucketPolicy":
|
||||||
bucket.Methods("PUT").HandlerFunc(api.PutBucketPolicyHandler).Queries("policy", "")
|
bucket.Methods("PUT").HandlerFunc(api.PutBucketPolicyHandler).Queries("policy", "")
|
||||||
|
|
||||||
// Register Delete bucket HTTP policy handler.
|
// Register Delete bucket HTTP policy handler.
|
||||||
case "DeleteBucketPolicy":
|
case "DeleteBucketPolicy":
|
||||||
bucket.Methods("DELETE").HandlerFunc(api.DeleteBucketPolicyHandler).Queries("policy", "")
|
bucket.Methods("DELETE").HandlerFunc(api.DeleteBucketPolicyHandler).Queries("policy", "")
|
||||||
|
// Register Get Bucket policy HTTP Handler.
|
||||||
// Register Get Bucket policy HTTP Handler.
|
|
||||||
case "GetBucketPolicy":
|
case "GetBucketPolicy":
|
||||||
bucket.Methods("GET").HandlerFunc(api.GetBucketPolicyHandler).Queries("policy", "")
|
bucket.Methods("GET").HandlerFunc(api.GetBucketPolicyHandler).Queries("policy", "")
|
||||||
|
// Register GetBucketLocation handler.
|
||||||
// Register Post Bucket policy function.
|
case "GetBucketLocation":
|
||||||
case "PostBucketPolicy":
|
bucket.Methods("GET").HandlerFunc(api.GetBucketLocationHandler).Queries("location", "")
|
||||||
bucket.Methods("POST").HeadersRegexp("Content-Type", "multipart/form-data*").HandlerFunc(api.PostPolicyBucketHandler)
|
case "HeadBucket":
|
||||||
|
bucket.Methods("HEAD").HandlerFunc(api.HeadBucketHandler)
|
||||||
// Register all api endpoints by default.
|
// Register all api endpoints by default.
|
||||||
default:
|
default:
|
||||||
registerAPIRouter(muxRouter, api)
|
registerAPIRouter(muxRouter, api)
|
||||||
// No need to register any more end points, all the end points are registered.
|
// No need to register any more end points, all the end points are registered.
|
||||||
|
Loading…
Reference in New Issue
Block a user