You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
149 lines
5.8 KiB
149 lines
5.8 KiB
package s3api
|
|
|
|
import (
|
|
"net/http"
|
|
"net/url"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/seaweedfs/seaweedfs/weed/iam/sts"
|
|
"github.com/seaweedfs/seaweedfs/weed/s3api/s3_constants"
|
|
)
|
|
|
|
// TestAuthorizeWithIAMSessionTokenExtraction tests that the authorizeWithIAM function
|
|
// correctly extracts session tokens from multiple sources and prioritizes them appropriately.
|
|
// This is a regression test for the bug where X-Amz-Security-Token was not being checked
|
|
// for V4 signature authentication with STS credentials.
|
|
func TestAuthorizeWithIAMSessionTokenExtraction(t *testing.T) {
|
|
t.Run("Extracts X-SeaweedFS-Session-Token from JWT auth", func(t *testing.T) {
|
|
req := &http.Request{
|
|
Header: http.Header{
|
|
"X-Seaweedfs-Session-Token": {"jwt-token-123"},
|
|
"X-Seaweedfs-Principal": {"arn:aws:iam::user/test"},
|
|
},
|
|
URL: &url.URL{},
|
|
}
|
|
|
|
// Extract tokens the same way authorizeWithIAM does
|
|
sessionToken := req.Header.Get("X-SeaweedFS-Session-Token")
|
|
principal := req.Header.Get("X-SeaweedFS-Principal")
|
|
|
|
assert.Equal(t, "jwt-token-123", sessionToken, "Should extract JWT session token from header")
|
|
assert.Equal(t, "arn:aws:iam::user/test", principal, "Should extract principal from header")
|
|
})
|
|
|
|
t.Run("Extracts X-Amz-Security-Token from V4 STS auth header", func(t *testing.T) {
|
|
req := &http.Request{
|
|
Header: http.Header{
|
|
"X-Amz-Security-Token": {"sts-token-header-456"},
|
|
},
|
|
URL: &url.URL{},
|
|
}
|
|
|
|
// Extract tokens the same way authorizeWithIAM does
|
|
sessionToken := req.Header.Get("X-SeaweedFS-Session-Token")
|
|
principal := req.Header.Get("X-SeaweedFS-Principal")
|
|
|
|
// If JWT token is empty, should fallback to X-Amz-Security-Token
|
|
if sessionToken == "" {
|
|
sessionToken = req.Header.Get("X-Amz-Security-Token")
|
|
}
|
|
|
|
assert.Equal(t, "sts-token-header-456", sessionToken, "Should fallback to X-Amz-Security-Token when JWT token is empty")
|
|
assert.Empty(t, principal, "JWT principal should be empty for V4 auth")
|
|
})
|
|
|
|
t.Run("Extracts X-Amz-Security-Token from query parameter (presigned URL)", func(t *testing.T) {
|
|
req := &http.Request{
|
|
Header: http.Header{},
|
|
URL: &url.URL{RawQuery: "X-Amz-Security-Token=sts-token-query-789"},
|
|
}
|
|
|
|
// Extract tokens the same way authorizeWithIAM does
|
|
sessionToken := req.Header.Get("X-SeaweedFS-Session-Token")
|
|
if sessionToken == "" {
|
|
sessionToken = req.Header.Get("X-Amz-Security-Token")
|
|
if sessionToken == "" {
|
|
sessionToken = req.URL.Query().Get("X-Amz-Security-Token")
|
|
}
|
|
}
|
|
|
|
assert.Equal(t, "sts-token-query-789", sessionToken, "Should extract token from query parameter")
|
|
})
|
|
|
|
t.Run("JWT token takes precedence over X-Amz-Security-Token", func(t *testing.T) {
|
|
req := &http.Request{
|
|
Header: http.Header{
|
|
"X-Seaweedfs-Session-Token": {"jwt-preferred"},
|
|
"X-Seaweedfs-Principal": {"arn:aws:iam::user/jwt-user"},
|
|
"X-Amz-Security-Token": {"sts-fallback"},
|
|
},
|
|
URL: &url.URL{},
|
|
}
|
|
|
|
// Extract tokens the same way authorizeWithIAM does
|
|
sessionToken := req.Header.Get("X-SeaweedFS-Session-Token")
|
|
if sessionToken == "" {
|
|
sessionToken = req.Header.Get("X-Amz-Security-Token")
|
|
}
|
|
|
|
assert.Equal(t, "jwt-preferred", sessionToken, "JWT token should take precedence")
|
|
})
|
|
}
|
|
|
|
// TestSTSSessionTokenIntoCredentials verifies that STS session tokens are properly
|
|
// preserved when converting to credentials for authorization.
|
|
func TestSTSSessionTokenIntoCredentials(t *testing.T) {
|
|
// Create a credential generator and session claims
|
|
credGen := sts.NewCredentialGenerator()
|
|
sessionId := "test-session-123"
|
|
expiresAt := time.Now().Add(time.Hour)
|
|
|
|
// Generate temporary credentials
|
|
creds, err := credGen.GenerateTemporaryCredentials(sessionId, expiresAt)
|
|
require.NoError(t, err, "Should generate credentials successfully")
|
|
require.NotNil(t, creds, "Credentials should not be nil")
|
|
|
|
// Verify all credential fields are present
|
|
assert.NotEmpty(t, creds.AccessKeyId, "AccessKeyId should be present")
|
|
assert.NotEmpty(t, creds.SecretAccessKey, "SecretAccessKey should be present")
|
|
assert.NotEmpty(t, creds.SessionToken, "SessionToken should be present for STS")
|
|
|
|
// Verify deterministic generation (same session ID produces same credentials)
|
|
creds2, err := credGen.GenerateTemporaryCredentials(sessionId, expiresAt)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, creds.AccessKeyId, creds2.AccessKeyId, "AccessKeyId should be deterministic")
|
|
assert.Equal(t, creds.SecretAccessKey, creds2.SecretAccessKey, "SecretAccessKey should be deterministic")
|
|
assert.Equal(t, creds.SessionToken, creds2.SessionToken, "SessionToken should be deterministic for same sessionId")
|
|
|
|
// Verify different session produces different credentials
|
|
creds3, err := credGen.GenerateTemporaryCredentials("different-session", expiresAt)
|
|
require.NoError(t, err)
|
|
|
|
assert.NotEqual(t, creds.AccessKeyId, creds3.AccessKeyId, "Different sessions should produce different access key IDs")
|
|
assert.NotEqual(t, creds.SecretAccessKey, creds3.SecretAccessKey, "Different sessions should produce different secret keys")
|
|
assert.NotEqual(t, creds.SessionToken, creds3.SessionToken, "Different sessions should produce different session tokens")
|
|
}
|
|
|
|
// TestActionConstantsForV4Auth verifies that action constants are properly available
|
|
// for use in authorization checks with V4 signature authentication.
|
|
func TestActionConstantsForV4Auth(t *testing.T) {
|
|
// Verify that S3 action constants are available
|
|
actions := map[string]string{
|
|
"READ": s3_constants.ACTION_READ,
|
|
"WRITE": s3_constants.ACTION_WRITE,
|
|
"READ_ACP": s3_constants.ACTION_READ_ACP,
|
|
"WRITE_ACP": s3_constants.ACTION_WRITE_ACP,
|
|
"LIST": s3_constants.ACTION_LIST,
|
|
"TAGGING": s3_constants.ACTION_TAGGING,
|
|
"ADMIN": s3_constants.ACTION_ADMIN,
|
|
}
|
|
|
|
for name, action := range actions {
|
|
assert.NotEmpty(t, action, "Action %s should not be empty", name)
|
|
}
|
|
}
|