mirror of
https://github.com/minio/minio.git
synced 2024-12-27 23:55:56 -05:00
304 lines
8.9 KiB
Go
304 lines
8.9 KiB
Go
// Copyright (c) 2015-2021 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
miniogopolicy "github.com/minio/minio-go/v7/pkg/policy"
|
|
"github.com/minio/minio-go/v7/pkg/set"
|
|
"github.com/minio/pkg/v2/policy"
|
|
"github.com/minio/pkg/v2/policy/condition"
|
|
)
|
|
|
|
func TestPolicySysIsAllowed(t *testing.T) {
|
|
p := &policy.BucketPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []policy.BPStatement{
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.GetBucketLocationAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket")),
|
|
condition.NewFunctions(),
|
|
),
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.PutObjectAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket/myobject*")),
|
|
condition.NewFunctions(),
|
|
),
|
|
},
|
|
}
|
|
|
|
anonGetBucketLocationArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.GetBucketLocationAction,
|
|
BucketName: "mybucket",
|
|
ConditionValues: map[string][]string{},
|
|
}
|
|
|
|
anonPutObjectActionArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.PutObjectAction,
|
|
BucketName: "mybucket",
|
|
ConditionValues: map[string][]string{
|
|
"x-amz-copy-source": {"mybucket/myobject"},
|
|
"SourceIp": {"192.168.1.10"},
|
|
},
|
|
ObjectName: "myobject",
|
|
}
|
|
|
|
anonGetObjectActionArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.GetObjectAction,
|
|
BucketName: "mybucket",
|
|
ConditionValues: map[string][]string{},
|
|
ObjectName: "myobject",
|
|
}
|
|
|
|
getBucketLocationArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.GetBucketLocationAction,
|
|
BucketName: "mybucket",
|
|
ConditionValues: map[string][]string{},
|
|
IsOwner: true,
|
|
}
|
|
|
|
putObjectActionArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.PutObjectAction,
|
|
BucketName: "mybucket",
|
|
ConditionValues: map[string][]string{
|
|
"x-amz-copy-source": {"mybucket/myobject"},
|
|
"SourceIp": {"192.168.1.10"},
|
|
},
|
|
IsOwner: true,
|
|
ObjectName: "myobject",
|
|
}
|
|
|
|
getObjectActionArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.GetObjectAction,
|
|
BucketName: "mybucket",
|
|
ConditionValues: map[string][]string{},
|
|
IsOwner: true,
|
|
ObjectName: "myobject",
|
|
}
|
|
|
|
yourbucketAnonGetObjectActionArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.GetObjectAction,
|
|
BucketName: "yourbucket",
|
|
ConditionValues: map[string][]string{},
|
|
ObjectName: "yourobject",
|
|
}
|
|
|
|
yourbucketGetObjectActionArgs := policy.BucketPolicyArgs{
|
|
AccountName: "Q3AM3UQ867SPQQA43P2F",
|
|
Action: policy.GetObjectAction,
|
|
BucketName: "yourbucket",
|
|
ConditionValues: map[string][]string{},
|
|
IsOwner: true,
|
|
ObjectName: "yourobject",
|
|
}
|
|
|
|
testCases := []struct {
|
|
args policy.BucketPolicyArgs
|
|
expectedResult bool
|
|
}{
|
|
{anonGetBucketLocationArgs, true},
|
|
{anonPutObjectActionArgs, true},
|
|
{anonGetObjectActionArgs, false},
|
|
{getBucketLocationArgs, true},
|
|
{putObjectActionArgs, true},
|
|
{getObjectActionArgs, true},
|
|
{yourbucketAnonGetObjectActionArgs, false},
|
|
{yourbucketGetObjectActionArgs, true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
result := p.IsAllowed(testCase.args)
|
|
|
|
if result != testCase.expectedResult {
|
|
t.Fatalf("case %v: expected: %v, got: %v\n", i+1, testCase.expectedResult, result)
|
|
}
|
|
}
|
|
}
|
|
|
|
func getReadOnlyStatement(bucketName, prefix string) []miniogopolicy.Statement {
|
|
return []miniogopolicy.Statement{
|
|
{
|
|
Effect: string(policy.Allow),
|
|
Principal: miniogopolicy.User{AWS: set.CreateStringSet("*")},
|
|
Resources: set.CreateStringSet(policy.NewResource(bucketName).String()),
|
|
Actions: set.CreateStringSet("s3:GetBucketLocation", "s3:ListBucket"),
|
|
},
|
|
{
|
|
Effect: string(policy.Allow),
|
|
Principal: miniogopolicy.User{AWS: set.CreateStringSet("*")},
|
|
Resources: set.CreateStringSet(policy.NewResource(bucketName + "/" + prefix).String()),
|
|
Actions: set.CreateStringSet("s3:GetObject"),
|
|
},
|
|
}
|
|
}
|
|
|
|
func TestPolicyToBucketAccessPolicy(t *testing.T) {
|
|
case1Policy := &policy.BucketPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []policy.BPStatement{
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.GetBucketLocationAction, policy.ListBucketAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket")),
|
|
condition.NewFunctions(),
|
|
),
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.GetObjectAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket/myobject*")),
|
|
condition.NewFunctions(),
|
|
),
|
|
},
|
|
}
|
|
|
|
case1Result := &miniogopolicy.BucketAccessPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: getReadOnlyStatement("mybucket", "myobject*"),
|
|
}
|
|
|
|
case2Policy := &policy.BucketPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []policy.BPStatement{},
|
|
}
|
|
|
|
case2Result := &miniogopolicy.BucketAccessPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []miniogopolicy.Statement{},
|
|
}
|
|
|
|
case3Policy := &policy.BucketPolicy{
|
|
Version: "12-10-2012",
|
|
Statements: []policy.BPStatement{
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.PutObjectAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket/myobject*")),
|
|
condition.NewFunctions(),
|
|
),
|
|
},
|
|
}
|
|
|
|
testCases := []struct {
|
|
bucketPolicy *policy.BucketPolicy
|
|
expectedResult *miniogopolicy.BucketAccessPolicy
|
|
expectErr bool
|
|
}{
|
|
{case1Policy, case1Result, false},
|
|
{case2Policy, case2Result, false},
|
|
{case3Policy, nil, true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
result, err := PolicyToBucketAccessPolicy(testCase.bucketPolicy)
|
|
expectErr := (err != nil)
|
|
|
|
if expectErr != testCase.expectErr {
|
|
t.Fatalf("case %v: error: expected: %v, got: %v\n", i+1, testCase.expectErr, expectErr)
|
|
}
|
|
|
|
if !testCase.expectErr {
|
|
if !reflect.DeepEqual(result, testCase.expectedResult) {
|
|
t.Fatalf("case %v: result: expected: %+v, got: %+v\n", i+1, testCase.expectedResult, result)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestBucketAccessPolicyToPolicy(t *testing.T) {
|
|
case1PolicyInfo := &miniogopolicy.BucketAccessPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: getReadOnlyStatement("mybucket", "myobject*"),
|
|
}
|
|
|
|
case1Result := &policy.BucketPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []policy.BPStatement{
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.GetBucketLocationAction, policy.ListBucketAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket")),
|
|
condition.NewFunctions(),
|
|
),
|
|
policy.NewBPStatement("",
|
|
policy.Allow,
|
|
policy.NewPrincipal("*"),
|
|
policy.NewActionSet(policy.GetObjectAction),
|
|
policy.NewResourceSet(policy.NewResource("mybucket/myobject*")),
|
|
condition.NewFunctions(),
|
|
),
|
|
},
|
|
}
|
|
|
|
case2PolicyInfo := &miniogopolicy.BucketAccessPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []miniogopolicy.Statement{},
|
|
}
|
|
|
|
case2Result := &policy.BucketPolicy{
|
|
Version: policy.DefaultVersion,
|
|
Statements: []policy.BPStatement{},
|
|
}
|
|
|
|
case3PolicyInfo := &miniogopolicy.BucketAccessPolicy{
|
|
Version: "12-10-2012",
|
|
Statements: getReadOnlyStatement("mybucket", "/myobject*"),
|
|
}
|
|
|
|
testCases := []struct {
|
|
policyInfo *miniogopolicy.BucketAccessPolicy
|
|
expectedResult *policy.BucketPolicy
|
|
expectErr bool
|
|
}{
|
|
{case1PolicyInfo, case1Result, false},
|
|
{case2PolicyInfo, case2Result, false},
|
|
{case3PolicyInfo, nil, true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
result, err := BucketAccessPolicyToPolicy(testCase.policyInfo)
|
|
expectErr := (err != nil)
|
|
|
|
if expectErr != testCase.expectErr {
|
|
t.Fatalf("case %v: error: expected: %v, got: %v\n", i+1, testCase.expectErr, expectErr)
|
|
}
|
|
|
|
if !testCase.expectErr {
|
|
if !reflect.DeepEqual(result, testCase.expectedResult) {
|
|
t.Fatalf("case %v: result: expected: %+v, got: %+v\n", i+1, testCase.expectedResult, result)
|
|
}
|
|
}
|
|
}
|
|
}
|