mirror of
https://github.com/minio/minio.git
synced 2024-12-26 23:25:54 -05:00
d864e00e24
Since go1.8 os.RemoveAll and os.MkdirAll both support long path names i.e UNC path on windows. The code we are carrying was directly borrowed from `pkg/os` package and doesn't need to be in our repo anymore. As a side affect this also addresses our codecoverage issue. Refer #4658
182 lines
4.8 KiB
Go
182 lines
4.8 KiB
Go
/*
|
|
* Minio Cloud Storage, (C) 2016, 2017 Minio, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/minio/minio/pkg/disk"
|
|
)
|
|
|
|
const invalidToken = "invalidToken"
|
|
|
|
type testStorageRPCServer struct {
|
|
configDir string
|
|
token string
|
|
diskDirs []string
|
|
stServer *storageServer
|
|
endpoints EndpointList
|
|
}
|
|
|
|
func createTestStorageServer(t *testing.T) *testStorageRPCServer {
|
|
testPath, err := newTestConfig(globalMinioDefaultRegion)
|
|
if err != nil {
|
|
t.Fatalf("unable initialize config file, %s", err)
|
|
}
|
|
|
|
serverCred := serverConfig.GetCredential()
|
|
token, err := authenticateNode(serverCred.AccessKey, serverCred.SecretKey)
|
|
if err != nil {
|
|
t.Fatalf("unable for JWT to generate token, %s", err)
|
|
}
|
|
|
|
fsDirs, err := getRandomDisks(1)
|
|
if err != nil {
|
|
t.Fatalf("unable to create FS backend, %s", err)
|
|
}
|
|
|
|
endpoints := mustGetNewEndpointList(fsDirs...)
|
|
storageDisks, err := initStorageDisks(endpoints)
|
|
if err != nil {
|
|
t.Fatalf("unable to initialize storage disks, %s", err)
|
|
}
|
|
stServer := &storageServer{
|
|
storage: storageDisks[0],
|
|
path: "/disk1",
|
|
timestamp: UTCNow(),
|
|
}
|
|
return &testStorageRPCServer{
|
|
token: token,
|
|
configDir: testPath,
|
|
diskDirs: fsDirs,
|
|
endpoints: endpoints,
|
|
stServer: stServer,
|
|
}
|
|
}
|
|
|
|
func errorIfInvalidToken(t *testing.T, err error) {
|
|
realErr := errorCause(err)
|
|
if realErr != errInvalidToken {
|
|
t.Errorf("Expected to fail with %s but failed with %s", errInvalidToken, realErr)
|
|
}
|
|
}
|
|
|
|
func TestStorageRPCInvalidToken(t *testing.T) {
|
|
st := createTestStorageServer(t)
|
|
defer removeRoots(st.diskDirs)
|
|
defer os.RemoveAll(st.configDir)
|
|
|
|
storageRPC := st.stServer
|
|
|
|
// Following test cases are meant to exercise the invalid
|
|
// token code path of the storage RPC methods.
|
|
var err error
|
|
badAuthRPCArgs := AuthRPCArgs{AuthToken: "invalidToken"}
|
|
badGenericVolArgs := GenericVolArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
Vol: "myvol",
|
|
}
|
|
// 1. DiskInfoHandler
|
|
diskInfoReply := &disk.Info{}
|
|
err = storageRPC.DiskInfoHandler(&badAuthRPCArgs, diskInfoReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 2. MakeVolHandler
|
|
makeVolArgs := &badGenericVolArgs
|
|
makeVolReply := &AuthRPCReply{}
|
|
err = storageRPC.MakeVolHandler(makeVolArgs, makeVolReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 3. ListVolsHandler
|
|
listVolReply := &ListVolsReply{}
|
|
err = storageRPC.ListVolsHandler(&badAuthRPCArgs, listVolReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 4. StatVolHandler
|
|
statVolReply := &VolInfo{}
|
|
statVolArgs := &badGenericVolArgs
|
|
err = storageRPC.StatVolHandler(statVolArgs, statVolReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 5. DeleteVolHandler
|
|
deleteVolArgs := &badGenericVolArgs
|
|
deleteVolReply := &AuthRPCReply{}
|
|
err = storageRPC.DeleteVolHandler(deleteVolArgs, deleteVolReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 6. StatFileHandler
|
|
statFileArgs := &StatFileArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
statReply := &FileInfo{}
|
|
err = storageRPC.StatFileHandler(statFileArgs, statReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 7. ListDirHandler
|
|
listDirArgs := &ListDirArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
listDirReply := &[]string{}
|
|
err = storageRPC.ListDirHandler(listDirArgs, listDirReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 8. ReadAllHandler
|
|
readFileArgs := &ReadFileArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
readFileReply := &[]byte{}
|
|
err = storageRPC.ReadAllHandler(readFileArgs, readFileReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 9. ReadFileHandler
|
|
err = storageRPC.ReadFileHandler(readFileArgs, readFileReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 10. PrepareFileHandler
|
|
prepFileArgs := &PrepareFileArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
prepFileReply := &AuthRPCReply{}
|
|
err = storageRPC.PrepareFileHandler(prepFileArgs, prepFileReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 11. AppendFileHandler
|
|
appendArgs := &AppendFileArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
appendReply := &AuthRPCReply{}
|
|
err = storageRPC.AppendFileHandler(appendArgs, appendReply)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 12. DeleteFileHandler
|
|
delFileArgs := &DeleteFileArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
delFileRely := &AuthRPCReply{}
|
|
err = storageRPC.DeleteFileHandler(delFileArgs, delFileRely)
|
|
errorIfInvalidToken(t, err)
|
|
|
|
// 13. RenameFileHandler
|
|
renameArgs := &RenameFileArgs{
|
|
AuthRPCArgs: badAuthRPCArgs,
|
|
}
|
|
renameReply := &AuthRPCReply{}
|
|
err = storageRPC.RenameFileHandler(renameArgs, renameReply)
|
|
errorIfInvalidToken(t, err)
|
|
}
|