You can not select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
					
					
						
							106 lines
						
					
					
						
							5.5 KiB
						
					
					
				
			
		
		
		
			
			
			
		
		
	
	
							106 lines
						
					
					
						
							5.5 KiB
						
					
					
				
								package policy
							 | 
						|
								
							 | 
						|
								/*
							 | 
						|
								 * MinIO Cloud Storage, (C) 2016 MinIO, Inc.
							 | 
						|
								 *
							 | 
						|
								 * Licensed under the Apache License, Version 2.0 (the "License");
							 | 
						|
								 * you may not use this file except in compliance with the License.
							 | 
						|
								 * You may obtain a copy of the License at
							 | 
						|
								 *
							 | 
						|
								 *     http://www.apache.org/licenses/LICENSE-2.0
							 | 
						|
								 *
							 | 
						|
								 * Unless required by applicable law or agreed to in writing, software
							 | 
						|
								 * distributed under the License is distributed on an "AS IS" BASIS,
							 | 
						|
								 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
							 | 
						|
								 * See the License for the specific language governing permissions and
							 | 
						|
								 * limitations under the License.
							 | 
						|
								 */
							 | 
						|
								
							 | 
						|
								import (
							 | 
						|
									"encoding/base64"
							 | 
						|
									"fmt"
							 | 
						|
									"net/http"
							 | 
						|
									"testing"
							 | 
						|
									"time"
							 | 
						|
								)
							 | 
						|
								
							 | 
						|
								// Test Post Policy parsing and checking conditions
							 | 
						|
								func TestPostPolicyForm(t *testing.T) {
							 | 
						|
									pp := NewPostPolicy()
							 | 
						|
									pp.SetBucket("testbucket")
							 | 
						|
									pp.SetContentType("image/jpeg")
							 | 
						|
									pp.SetUserMetadata("uuid", "14365123651274")
							 | 
						|
									pp.SetKeyStartsWith("user/user1/filename")
							 | 
						|
									pp.SetContentLengthRange(1048579, 10485760)
							 | 
						|
									pp.SetSuccessStatusAction("201")
							 | 
						|
								
							 | 
						|
									type testCase struct {
							 | 
						|
										Bucket              string
							 | 
						|
										Key                 string
							 | 
						|
										XAmzDate            string
							 | 
						|
										XAmzAlgorithm       string
							 | 
						|
										XAmzCredential      string
							 | 
						|
										XAmzMetaUUID        string
							 | 
						|
										ContentType         string
							 | 
						|
										SuccessActionStatus string
							 | 
						|
										Policy              string
							 | 
						|
										Expired             bool
							 | 
						|
										expectedErr         error
							 | 
						|
									}
							 | 
						|
								
							 | 
						|
									testCases := []testCase{
							 | 
						|
										// Everything is fine with this test
							 | 
						|
										{Bucket: "testbucket", Key: "user/user1/filename/${filename}/myfile.txt", XAmzMetaUUID: "14365123651274", SuccessActionStatus: "201", XAmzCredential: "KVGKMDUQ23TCZXTLTHLP/20160727/us-east-1/s3/aws4_request", XAmzDate: "20160727T000000Z", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: nil},
							 | 
						|
										// Expired policy document
							 | 
						|
										{Bucket: "testbucket", Key: "user/user1/filename/${filename}/myfile.txt", XAmzMetaUUID: "14365123651274", SuccessActionStatus: "201", XAmzCredential: "KVGKMDUQ23TCZXTLTHLP/20160727/us-east-1/s3/aws4_request", XAmzDate: "20160727T000000Z", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", Expired: true, expectedErr: fmt.Errorf("Invalid according to Policy: Policy expired")},
							 | 
						|
										// Different AMZ date
							 | 
						|
										{Bucket: "testbucket", Key: "user/user1/filename/${filename}/myfile.txt", XAmzMetaUUID: "14365123651274", XAmzDate: "2017T000000Z", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed")},
							 | 
						|
										// Key which doesn't start with user/user1/filename
							 | 
						|
										{Bucket: "testbucket", Key: "myfile.txt", XAmzDate: "20160727T000000Z", XAmzMetaUUID: "14365123651274", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed")},
							 | 
						|
										// Incorrect bucket name.
							 | 
						|
										{Bucket: "incorrect", Key: "user/user1/filename/myfile.txt", XAmzMetaUUID: "14365123651274", XAmzDate: "20160727T000000Z", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed")},
							 | 
						|
										// Incorrect key name
							 | 
						|
										{Bucket: "testbucket", Key: "incorrect", XAmzDate: "20160727T000000Z", XAmzMetaUUID: "14365123651274", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed")},
							 | 
						|
										// Incorrect date
							 | 
						|
										{Bucket: "testbucket", Key: "user/user1/filename/${filename}/myfile.txt", XAmzMetaUUID: "14365123651274", XAmzDate: "incorrect", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed")},
							 | 
						|
										// Incorrect ContentType
							 | 
						|
										{Bucket: "testbucket", Key: "user/user1/filename/${filename}/myfile.txt", XAmzMetaUUID: "14365123651274", XAmzDate: "20160727T000000Z", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "incorrect", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed")},
							 | 
						|
										// Incorrect Metadata
							 | 
						|
										{Bucket: "testbucket", Key: "user/user1/filename/${filename}/myfile.txt", XAmzMetaUUID: "151274", SuccessActionStatus: "201", XAmzCredential: "KVGKMDUQ23TCZXTLTHLP/20160727/us-east-1/s3/aws4_request", XAmzDate: "20160727T000000Z", XAmzAlgorithm: "AWS4-HMAC-SHA256", ContentType: "image/jpeg", expectedErr: fmt.Errorf("Invalid according to Policy: Policy Condition failed: [eq, $x-amz-meta-uuid, 14365123651274]")},
							 | 
						|
									}
							 | 
						|
									// Validate all the test cases.
							 | 
						|
									for i, tt := range testCases {
							 | 
						|
										formValues := make(http.Header)
							 | 
						|
										formValues.Set("Bucket", tt.Bucket)
							 | 
						|
										formValues.Set("Key", tt.Key)
							 | 
						|
										formValues.Set("Content-Type", tt.ContentType)
							 | 
						|
										formValues.Set("X-Amz-Date", tt.XAmzDate)
							 | 
						|
										formValues.Set("X-Amz-Meta-Uuid", tt.XAmzMetaUUID)
							 | 
						|
										formValues.Set("X-Amz-Algorithm", tt.XAmzAlgorithm)
							 | 
						|
										formValues.Set("X-Amz-Credential", tt.XAmzCredential)
							 | 
						|
										if tt.Expired {
							 | 
						|
											// Expired already.
							 | 
						|
											pp.SetExpires(time.Now().UTC().AddDate(0, 0, -10))
							 | 
						|
										} else {
							 | 
						|
											// Expires in 10 days.
							 | 
						|
											pp.SetExpires(time.Now().UTC().AddDate(0, 0, 10))
							 | 
						|
										}
							 | 
						|
								
							 | 
						|
										formValues.Set("Policy", base64.StdEncoding.EncodeToString([]byte(pp.String())))
							 | 
						|
										formValues.Set("Success_action_status", tt.SuccessActionStatus)
							 | 
						|
										policyBytes, err := base64.StdEncoding.DecodeString(base64.StdEncoding.EncodeToString([]byte(pp.String())))
							 | 
						|
										if err != nil {
							 | 
						|
											t.Fatal(err)
							 | 
						|
										}
							 | 
						|
								
							 | 
						|
										postPolicyForm, err := ParsePostPolicyForm(string(policyBytes))
							 | 
						|
										if err != nil {
							 | 
						|
											t.Fatal(err)
							 | 
						|
										}
							 | 
						|
								
							 | 
						|
										err = CheckPostPolicy(formValues, postPolicyForm)
							 | 
						|
										if err != nil && tt.expectedErr != nil && err.Error() != tt.expectedErr.Error() {
							 | 
						|
											t.Fatalf("Test %d:, Expected %s, got %s", i+1, tt.expectedErr.Error(), err.Error())
							 | 
						|
										}
							 | 
						|
									}
							 | 
						|
								}
							 |