mirror of https://github.com/minio/minio.git
				
				
				
			
		
			
				
	
	
		
			868 lines
		
	
	
		
			33 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			868 lines
		
	
	
		
			33 KiB
		
	
	
	
		
			Go
		
	
	
	
| /*
 | ||
|  * Minio Cloud Storage, (C) 2015, 2016 Minio, Inc.
 | ||
|  *
 | ||
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | ||
|  * you may not use this file except in compliance with the License.
 | ||
|  * You may obtain a copy of the License at
 | ||
|  *
 | ||
|  *     http://www.apache.org/licenses/LICENSE-2.0
 | ||
|  *
 | ||
|  * Unless required by applicable law or agreed to in writing, software
 | ||
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | ||
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | ||
|  * See the License for the specific language governing permissions and
 | ||
|  * limitations under the License.
 | ||
|  */
 | ||
| package cmd
 | ||
| 
 | ||
| import (
 | ||
| 	"bytes"
 | ||
| 	"encoding/json"
 | ||
| 	"errors"
 | ||
| 	"fmt"
 | ||
| 	"reflect"
 | ||
| 	"testing"
 | ||
| 
 | ||
| 	"github.com/minio/minio-go/pkg/policy"
 | ||
| 	"github.com/minio/minio-go/pkg/set"
 | ||
| )
 | ||
| 
 | ||
| // Common bucket actions for both read and write policies.
 | ||
| var (
 | ||
| 	readWriteBucketActions = []string{
 | ||
| 		"s3:GetBucketLocation",
 | ||
| 		"s3:ListBucket",
 | ||
| 		"s3:ListBucketMultipartUploads",
 | ||
| 		// Add more bucket level read-write actions here.
 | ||
| 	}
 | ||
| 	readWriteObjectActions = []string{
 | ||
| 		"s3:AbortMultipartUpload",
 | ||
| 		"s3:DeleteObject",
 | ||
| 		"s3:GetObject",
 | ||
| 		"s3:ListMultipartUploadParts",
 | ||
| 		"s3:PutObject",
 | ||
| 		// Add more object level read-write actions here.
 | ||
| 	}
 | ||
| )
 | ||
| 
 | ||
| // Write only actions.
 | ||
| var (
 | ||
| 	writeOnlyBucketActions = []string{
 | ||
| 		"s3:GetBucketLocation",
 | ||
| 		"s3:ListBucketMultipartUploads",
 | ||
| 		// Add more bucket level write actions here.
 | ||
| 	}
 | ||
| 	writeOnlyObjectActions = []string{
 | ||
| 		"s3:AbortMultipartUpload",
 | ||
| 		"s3:DeleteObject",
 | ||
| 		"s3:ListMultipartUploadParts",
 | ||
| 		"s3:PutObject",
 | ||
| 		// Add more object level write actions here.
 | ||
| 	}
 | ||
| )
 | ||
| 
 | ||
| // Read only actions.
 | ||
| var (
 | ||
| 	readOnlyBucketActions = []string{
 | ||
| 		"s3:GetBucketLocation",
 | ||
| 		"s3:ListBucket",
 | ||
| 		// Add more bucket level read actions here.
 | ||
| 	}
 | ||
| 	readOnlyObjectActions = []string{
 | ||
| 		"s3:GetObject",
 | ||
| 		// Add more object level read actions here.
 | ||
| 	}
 | ||
| )
 | ||
| 
 | ||
| // Obtain bucket statement for read-write bucketPolicy.
 | ||
| func getReadWriteObjectStatement(bucketName, objectPrefix string) policy.Statement {
 | ||
| 	objectResourceStatement := policy.Statement{}
 | ||
| 	objectResourceStatement.Effect = "Allow"
 | ||
| 	objectResourceStatement.Principal = policy.User{
 | ||
| 		AWS: set.StringSet{"*": struct{}{}},
 | ||
| 	}
 | ||
| 	objectResourceStatement.Resources = set.CreateStringSet([]string{fmt.Sprintf("%s%s", bucketARNPrefix, bucketName+"/"+objectPrefix+"*")}...)
 | ||
| 	objectResourceStatement.Actions = set.CreateStringSet(readWriteObjectActions...)
 | ||
| 	return objectResourceStatement
 | ||
| }
 | ||
| 
 | ||
| // Obtain object statement for read-write bucketPolicy.
 | ||
| func getReadWriteBucketStatement(bucketName, objectPrefix string) policy.Statement {
 | ||
| 	bucketResourceStatement := policy.Statement{}
 | ||
| 	bucketResourceStatement.Effect = "Allow"
 | ||
| 	bucketResourceStatement.Principal = policy.User{
 | ||
| 		AWS: set.StringSet{"*": struct{}{}},
 | ||
| 	}
 | ||
| 	bucketResourceStatement.Resources = set.CreateStringSet([]string{fmt.Sprintf("%s%s", bucketARNPrefix, bucketName)}...)
 | ||
| 	bucketResourceStatement.Actions = set.CreateStringSet(readWriteBucketActions...)
 | ||
| 	return bucketResourceStatement
 | ||
| }
 | ||
| 
 | ||
| // Obtain statements for read-write bucketPolicy.
 | ||
| func getReadWriteStatement(bucketName, objectPrefix string) []policy.Statement {
 | ||
| 	statements := []policy.Statement{}
 | ||
| 	// Save the read write policy.
 | ||
| 	statements = append(statements, getReadWriteBucketStatement(bucketName, objectPrefix), getReadWriteObjectStatement(bucketName, objectPrefix))
 | ||
| 	return statements
 | ||
| }
 | ||
| 
 | ||
| // Obtain bucket statement for read only bucketPolicy.
 | ||
| func getReadOnlyBucketStatement(bucketName, objectPrefix string) policy.Statement {
 | ||
| 	bucketResourceStatement := policy.Statement{}
 | ||
| 	bucketResourceStatement.Effect = "Allow"
 | ||
| 	bucketResourceStatement.Principal = policy.User{
 | ||
| 		AWS: set.StringSet{"*": struct{}{}},
 | ||
| 	}
 | ||
| 	bucketResourceStatement.Resources = set.CreateStringSet([]string{fmt.Sprintf("%s%s", bucketARNPrefix, bucketName)}...)
 | ||
| 	bucketResourceStatement.Actions = set.CreateStringSet(readOnlyBucketActions...)
 | ||
| 	return bucketResourceStatement
 | ||
| }
 | ||
| 
 | ||
| // Obtain object statement for read only bucketPolicy.
 | ||
| func getReadOnlyObjectStatement(bucketName, objectPrefix string) policy.Statement {
 | ||
| 	objectResourceStatement := policy.Statement{}
 | ||
| 	objectResourceStatement.Effect = "Allow"
 | ||
| 	objectResourceStatement.Principal = policy.User{
 | ||
| 		AWS: set.StringSet{"*": struct{}{}},
 | ||
| 	}
 | ||
| 	objectResourceStatement.Resources = set.CreateStringSet([]string{fmt.Sprintf("%s%s", bucketARNPrefix, bucketName+"/"+objectPrefix+"*")}...)
 | ||
| 	objectResourceStatement.Actions = set.CreateStringSet(readOnlyObjectActions...)
 | ||
| 	return objectResourceStatement
 | ||
| }
 | ||
| 
 | ||
| // Obtain statements for read only bucketPolicy.
 | ||
| func getReadOnlyStatement(bucketName, objectPrefix string) []policy.Statement {
 | ||
| 	statements := []policy.Statement{}
 | ||
| 	// Save the read only policy.
 | ||
| 	statements = append(statements, getReadOnlyBucketStatement(bucketName, objectPrefix), getReadOnlyObjectStatement(bucketName, objectPrefix))
 | ||
| 	return statements
 | ||
| }
 | ||
| 
 | ||
| // Obtain bucket statements for write only bucketPolicy.
 | ||
| func getWriteOnlyBucketStatement(bucketName, objectPrefix string) policy.Statement {
 | ||
| 
 | ||
| 	bucketResourceStatement := policy.Statement{}
 | ||
| 	bucketResourceStatement.Effect = "Allow"
 | ||
| 	bucketResourceStatement.Principal = policy.User{
 | ||
| 		AWS: set.StringSet{"*": struct{}{}},
 | ||
| 	}
 | ||
| 	bucketResourceStatement.Resources = set.CreateStringSet([]string{fmt.Sprintf("%s%s", bucketARNPrefix, bucketName)}...)
 | ||
| 	bucketResourceStatement.Actions = set.CreateStringSet(writeOnlyBucketActions...)
 | ||
| 	return bucketResourceStatement
 | ||
| }
 | ||
| 
 | ||
| // Obtain object statements for write only bucketPolicy.
 | ||
| func getWriteOnlyObjectStatement(bucketName, objectPrefix string) policy.Statement {
 | ||
| 	objectResourceStatement := policy.Statement{}
 | ||
| 	objectResourceStatement.Effect = "Allow"
 | ||
| 	objectResourceStatement.Principal = policy.User{
 | ||
| 		AWS: set.StringSet{"*": struct{}{}},
 | ||
| 	}
 | ||
| 	objectResourceStatement.Resources = set.CreateStringSet([]string{fmt.Sprintf("%s%s", bucketARNPrefix, bucketName+"/"+objectPrefix+"*")}...)
 | ||
| 	objectResourceStatement.Actions = set.CreateStringSet(writeOnlyObjectActions...)
 | ||
| 	return objectResourceStatement
 | ||
| }
 | ||
| 
 | ||
| // Obtain statements for write only bucketPolicy.
 | ||
| func getWriteOnlyStatement(bucketName, objectPrefix string) []policy.Statement {
 | ||
| 	statements := []policy.Statement{}
 | ||
| 	// Write only policy.
 | ||
| 	// Save the write only policy.
 | ||
| 	statements = append(statements, getWriteOnlyBucketStatement(bucketName, objectPrefix), getWriteOnlyBucketStatement(bucketName, objectPrefix))
 | ||
| 	return statements
 | ||
| }
 | ||
| 
 | ||
| // Tests validate Action validator.
 | ||
| func TestIsValidActions(t *testing.T) {
 | ||
| 	testCases := []struct {
 | ||
| 		// input.
 | ||
| 		actions set.StringSet
 | ||
| 		// expected output.
 | ||
| 		err error
 | ||
| 		// flag indicating whether the test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Inputs with unsupported Action.
 | ||
| 		// Test case - 1.
 | ||
| 		// "s3:ListObject" is an invalid Action.
 | ||
| 		{set.CreateStringSet([]string{"s3:GetObject", "s3:ListObject", "s3:RemoveObject"}...),
 | ||
| 			errors.New("Unsupported actions found: ‘set.StringSet{\"s3:RemoveObject\":struct {}{}, \"s3:ListObject\":struct {}{}}’, please validate your policy document"), false},
 | ||
| 		// Test case - 2.
 | ||
| 		// Empty Actions.
 | ||
| 		{set.CreateStringSet([]string{}...), errors.New("Action list cannot be empty"), false},
 | ||
| 		// Test case - 3.
 | ||
| 		// "s3:DeleteEverything"" is an invalid Action.
 | ||
| 		{set.CreateStringSet([]string{"s3:GetObject", "s3:ListBucket", "s3:PutObject", "s3:DeleteEverything"}...),
 | ||
| 			errors.New("Unsupported actions found: ‘set.StringSet{\"s3:DeleteEverything\":struct {}{}}’, please validate your policy document"), false},
 | ||
| 		// Inputs with valid Action.
 | ||
| 		// Test Case - 4.
 | ||
| 		{set.CreateStringSet([]string{
 | ||
| 			"s3:*", "*", "s3:GetObject", "s3:ListBucket",
 | ||
| 			"s3:PutObject", "s3:GetBucketLocation", "s3:DeleteObject",
 | ||
| 			"s3:AbortMultipartUpload", "s3:ListBucketMultipartUploads",
 | ||
| 			"s3:ListMultipartUploadParts"}...), nil, true},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		err := isValidActions(testCase.actions)
 | ||
| 		if err != nil && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
 | ||
| 		}
 | ||
| 		if err == nil && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // Tests validate Effect validator.
 | ||
| func TestIsValidEffect(t *testing.T) {
 | ||
| 	testCases := []struct {
 | ||
| 		// input.
 | ||
| 		effect string
 | ||
| 		// expected output.
 | ||
| 		err error
 | ||
| 		// flag indicating whether the test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Inputs with unsupported Effect.
 | ||
| 		// Test case - 1.
 | ||
| 		{"", errors.New("Policy effect cannot be empty"), false},
 | ||
| 		// Test case - 2.
 | ||
| 		{"DontAllow", errors.New("Unsupported Effect found: ‘DontAllow’, please validate your policy document"), false},
 | ||
| 		// Test case - 3.
 | ||
| 		{"NeverAllow", errors.New("Unsupported Effect found: ‘NeverAllow’, please validate your policy document"), false},
 | ||
| 		// Test case - 4.
 | ||
| 		{"AllowAlways", errors.New("Unsupported Effect found: ‘AllowAlways’, please validate your policy document"), false},
 | ||
| 
 | ||
| 		// Inputs with valid Effect.
 | ||
| 		// Test Case - 5.
 | ||
| 		{"Allow", nil, true},
 | ||
| 		// Test Case - 6.
 | ||
| 		{"Deny", nil, true},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		err := isValidEffect(testCase.effect)
 | ||
| 		if err != nil && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
 | ||
| 		}
 | ||
| 		if err == nil && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
 | ||
| 		}
 | ||
| 		// Failed as expected, but does it fail for the expected reason.
 | ||
| 		if err != nil && !testCase.shouldPass {
 | ||
| 			if err.Error() != testCase.err.Error() {
 | ||
| 				t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\"", i+1, testCase.err.Error(), err.Error())
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // Tests validate Resources validator.
 | ||
| func TestIsValidResources(t *testing.T) {
 | ||
| 	testCases := []struct {
 | ||
| 		// input.
 | ||
| 		resources []string
 | ||
| 		// expected output.
 | ||
| 		err error
 | ||
| 		// flag indicating whether the test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Inputs with unsupported Action.
 | ||
| 		// Test case - 1.
 | ||
| 		// Empty Resources.
 | ||
| 		{[]string{}, errors.New("Resource list cannot be empty"), false},
 | ||
| 		// Test case - 2.
 | ||
| 		// A valid resource should have prefix bucketARNPrefix.
 | ||
| 		{[]string{"my-resource"}, errors.New("Unsupported resource style found: ‘my-resource’, please validate your policy document"), false},
 | ||
| 		// Test case - 3.
 | ||
| 		// A Valid resource should have bucket name followed by bucketARNPrefix.
 | ||
| 		{[]string{bucketARNPrefix}, errors.New("Invalid resource style found: ‘arn:aws:s3:::’, please validate your policy document"), false},
 | ||
| 		// Test Case - 4.
 | ||
| 		// Valid resource shouldn't have slash('/') followed by bucketARNPrefix.
 | ||
| 		{[]string{bucketARNPrefix + "/"}, errors.New("Invalid resource style found: ‘arn:aws:s3:::/’, please validate your policy document"), false},
 | ||
| 
 | ||
| 		// Test cases with valid Resources.
 | ||
| 		{[]string{bucketARNPrefix + "my-bucket"}, nil, true},
 | ||
| 		{[]string{bucketARNPrefix + "my-bucket/Asia/*"}, nil, true},
 | ||
| 		{[]string{bucketARNPrefix + "my-bucket/Asia/India/*"}, nil, true},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		err := isValidResources(set.CreateStringSet(testCase.resources...))
 | ||
| 		if err != nil && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
 | ||
| 		}
 | ||
| 		if err == nil && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
 | ||
| 		}
 | ||
| 		// Failed as expected, but does it fail for the expected reason.
 | ||
| 		if err != nil && !testCase.shouldPass {
 | ||
| 			if err.Error() != testCase.err.Error() {
 | ||
| 				t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\"", i+1, testCase.err.Error(), err.Error())
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // Tests validate principals validator.
 | ||
| func TestIsValidPrincipals(t *testing.T) {
 | ||
| 	testCases := []struct {
 | ||
| 		// input.
 | ||
| 		principals []string
 | ||
| 		// expected output.
 | ||
| 		err error
 | ||
| 		// flag indicating whether the test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Inputs with unsupported Principals.
 | ||
| 		// Test case - 1.
 | ||
| 		// Empty Principals list.
 | ||
| 		{[]string{}, errors.New("Principal cannot be empty"), false},
 | ||
| 		// Test case - 2.
 | ||
| 		// "*" is the only valid principal.
 | ||
| 		{[]string{"my-principal"}, errors.New("Unsupported principals found: ‘set.StringSet{\"my-principal\":struct {}{}}’, please validate your policy document"), false},
 | ||
| 		// Test case - 3.
 | ||
| 		{[]string{"*", "111122233"}, errors.New("Unsupported principals found: ‘set.StringSet{\"111122233\":struct {}{}}’, please validate your policy document"), false},
 | ||
| 		// Test case - 4.
 | ||
| 		// Test case with valid principal value.
 | ||
| 		{[]string{"*"}, nil, true},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		u := policy.User{
 | ||
| 			AWS: set.CreateStringSet(testCase.principals...),
 | ||
| 		}
 | ||
| 		err := isValidPrincipals(u)
 | ||
| 		if err != nil && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
 | ||
| 		}
 | ||
| 		if err == nil && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
 | ||
| 		}
 | ||
| 		// Failed as expected, but does it fail for the expected reason.
 | ||
| 		if err != nil && !testCase.shouldPass {
 | ||
| 			if err.Error() != testCase.err.Error() {
 | ||
| 				t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\"", i+1, testCase.err.Error(), err.Error())
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // getEmptyConditionMap - returns a function that generates a
 | ||
| // condition key map for a given key.
 | ||
| func getEmptyConditionMap(conditionKey string) func() policy.ConditionMap {
 | ||
| 	emptyConditonGenerator := func() policy.ConditionMap {
 | ||
| 		emptyMap := make(policy.ConditionKeyMap)
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions[conditionKey] = emptyMap
 | ||
| 		return conditions
 | ||
| 	}
 | ||
| 	return emptyConditonGenerator
 | ||
| }
 | ||
| 
 | ||
| // Tests validate policy.Statement condition validator.
 | ||
| func TestIsValidConditions(t *testing.T) {
 | ||
| 	// returns empty conditions map.
 | ||
| 	setEmptyConditions := func() policy.ConditionMap {
 | ||
| 		return make(policy.ConditionMap)
 | ||
| 	}
 | ||
| 
 | ||
| 	// returns map with the "StringEquals" set to empty map.
 | ||
| 	setEmptyStringEquals := getEmptyConditionMap("StringEquals")
 | ||
| 
 | ||
| 	// returns map with the "StringNotEquals" set to empty map.
 | ||
| 	setEmptyStringNotEquals := getEmptyConditionMap("StringNotEquals")
 | ||
| 
 | ||
| 	// returns map with the "StringLike" set to empty map.
 | ||
| 	setEmptyStringLike := getEmptyConditionMap("StringLike")
 | ||
| 
 | ||
| 	// returns map with the "StringNotLike" set to empty map.
 | ||
| 	setEmptyStringNotLike := getEmptyConditionMap("StringNotLike")
 | ||
| 
 | ||
| 	// returns map with the "IpAddress" set to empty map.
 | ||
| 	setEmptyIPAddress := getEmptyConditionMap("IpAddress")
 | ||
| 
 | ||
| 	// returns map with "NotIpAddress" set to empty map.
 | ||
| 	setEmptyNotIPAddress := getEmptyConditionMap("NotIpAddress")
 | ||
| 
 | ||
| 	// Generate conditions.
 | ||
| 	generateConditions := func(key1, key2, value string) policy.ConditionMap {
 | ||
| 		innerMap := make(policy.ConditionKeyMap)
 | ||
| 		innerMap[key2] = set.CreateStringSet(value)
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions[key1] = innerMap
 | ||
| 		return conditions
 | ||
| 	}
 | ||
| 
 | ||
| 	// generate ambigious conditions.
 | ||
| 	generateAmbigiousConditions := func() policy.ConditionMap {
 | ||
| 		prefixMap := make(policy.ConditionKeyMap)
 | ||
| 		prefixMap["s3:prefix"] = set.CreateStringSet("Asia/")
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions["StringEquals"] = prefixMap
 | ||
| 		conditions["StringNotEquals"] = prefixMap
 | ||
| 		return conditions
 | ||
| 	}
 | ||
| 
 | ||
| 	// generate valid and non valid type in the condition map.
 | ||
| 	generateValidInvalidConditions := func() policy.ConditionMap {
 | ||
| 		innerMap := make(policy.ConditionKeyMap)
 | ||
| 		innerMap["s3:prefix"] = set.CreateStringSet("Asia/")
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions["StringEquals"] = innerMap
 | ||
| 		conditions["InvalidType"] = innerMap
 | ||
| 		return conditions
 | ||
| 	}
 | ||
| 
 | ||
| 	// generate valid and invalid keys for valid types in the same condition map.
 | ||
| 	generateValidInvalidConditionKeys := func() policy.ConditionMap {
 | ||
| 		innerMapValid := make(policy.ConditionKeyMap)
 | ||
| 		innerMapValid["s3:prefix"] = set.CreateStringSet("Asia/")
 | ||
| 		innerMapInValid := make(map[string]set.StringSet)
 | ||
| 		innerMapInValid["s3:invalid"] = set.CreateStringSet("Asia/")
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions["StringEquals"] = innerMapValid
 | ||
| 		conditions["StringEquals"] = innerMapInValid
 | ||
| 		return conditions
 | ||
| 	}
 | ||
| 
 | ||
| 	// List of Conditions used for test cases.
 | ||
| 	testConditions := []policy.ConditionMap{
 | ||
| 		generateConditions("StringValues", "s3:max-keys", "100"),
 | ||
| 		generateConditions("StringEquals", "s3:Object", "100"),
 | ||
| 		generateAmbigiousConditions(),
 | ||
| 		generateValidInvalidConditions(),
 | ||
| 		generateValidInvalidConditionKeys(),
 | ||
| 		setEmptyConditions(),
 | ||
| 		setEmptyStringEquals(),
 | ||
| 		setEmptyStringNotEquals(),
 | ||
| 		setEmptyStringLike(),
 | ||
| 		setEmptyStringNotLike(),
 | ||
| 		setEmptyIPAddress(),
 | ||
| 		setEmptyNotIPAddress(),
 | ||
| 		generateConditions("StringEquals", "s3:prefix", "Asia/"),
 | ||
| 		generateConditions("StringEquals", "s3:max-keys", "100"),
 | ||
| 		generateConditions("StringNotEquals", "s3:prefix", "Asia/"),
 | ||
| 		generateConditions("StringNotEquals", "s3:max-keys", "100"),
 | ||
| 	}
 | ||
| 
 | ||
| 	getObjectActionSet := set.CreateStringSet("s3:GetObject")
 | ||
| 	roBucketActionSet := set.CreateStringSet(readOnlyBucketActions...)
 | ||
| 	maxKeysConditionErr := fmt.Errorf("Unsupported condition key %s for the given actions %s, "+
 | ||
| 		"please validate your policy document", "s3:max-keys", getObjectActionSet)
 | ||
| 	testCases := []struct {
 | ||
| 		inputActions   set.StringSet
 | ||
| 		inputCondition policy.ConditionMap
 | ||
| 		// expected result.
 | ||
| 		expectedErr error
 | ||
| 		// flag indicating whether test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Malformed conditions.
 | ||
| 		// Test case - 1.
 | ||
| 		// "StringValues" is an invalid type.
 | ||
| 		{roBucketActionSet, testConditions[0], fmt.Errorf("Unsupported condition type 'StringValues', " +
 | ||
| 			"please validate your policy document"), false},
 | ||
| 		// Test case - 2.
 | ||
| 		// "s3:Object" is an invalid key.
 | ||
| 		{roBucketActionSet, testConditions[1], fmt.Errorf("Unsupported condition key " +
 | ||
| 			"'StringEquals', please validate your policy document"), false},
 | ||
| 		// Test case - 3.
 | ||
| 		// Test case with Ambigious conditions set.
 | ||
| 		{roBucketActionSet, testConditions[2], fmt.Errorf("Ambigious condition values for key 's3:prefix', " +
 | ||
| 			"please validate your policy document"), false},
 | ||
| 		// Test case - 4.
 | ||
| 		// Test case with valid and invalid condition types.
 | ||
| 		{roBucketActionSet, testConditions[3], fmt.Errorf("Unsupported condition type 'InvalidType', " +
 | ||
| 			"please validate your policy document"), false},
 | ||
| 		// Test case - 5.
 | ||
| 		// Test case with valid and invalid condition keys.
 | ||
| 		{roBucketActionSet, testConditions[4], fmt.Errorf("Unsupported condition key 'StringEquals', " +
 | ||
| 			"please validate your policy document"), false},
 | ||
| 		// Test cases with valid conditions.
 | ||
| 		// Test case - 6.
 | ||
| 		{roBucketActionSet, testConditions[5], nil, true},
 | ||
| 		// Test case - 7.
 | ||
| 		{roBucketActionSet, testConditions[6], nil, true},
 | ||
| 		// Test case - 8.
 | ||
| 		{roBucketActionSet, testConditions[7], nil, true},
 | ||
| 		// Test case - 9.
 | ||
| 		{roBucketActionSet, testConditions[8], nil, true},
 | ||
| 		// Test case - 10.
 | ||
| 		{roBucketActionSet, testConditions[9], nil, true},
 | ||
| 		// Test case - 11.
 | ||
| 		{roBucketActionSet, testConditions[10], nil, true},
 | ||
| 		// Test case - 12.
 | ||
| 		{roBucketActionSet, testConditions[11], nil, true},
 | ||
| 		// Test case - 13.
 | ||
| 		{roBucketActionSet, testConditions[12], nil, true},
 | ||
| 		// Test case - 11.
 | ||
| 		{roBucketActionSet, testConditions[13], nil, true},
 | ||
| 		// Test case - 12.
 | ||
| 		{roBucketActionSet, testConditions[14], nil, true},
 | ||
| 		// Test case - 13.
 | ||
| 		{getObjectActionSet, testConditions[15], maxKeysConditionErr, false},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		actualErr := isValidConditions(testCase.inputActions, testCase.inputCondition)
 | ||
| 		if actualErr != nil && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, actualErr.Error())
 | ||
| 		}
 | ||
| 		if actualErr == nil && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.expectedErr.Error())
 | ||
| 		}
 | ||
| 		// Failed as expected, but does it fail for the expected reason.
 | ||
| 		if actualErr != nil && !testCase.shouldPass {
 | ||
| 			if actualErr.Error() != testCase.expectedErr.Error() {
 | ||
| 				t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\"", i+1, testCase.expectedErr.Error(), actualErr.Error())
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // Tests validate Policy Action and Resource fields.
 | ||
| func TestCheckbucketPolicyResources(t *testing.T) {
 | ||
| 	// constructing policy statement without invalidPrefixActions (check bucket-policy-parser.go).
 | ||
| 	setValidPrefixActions := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		statements[0].Actions = set.CreateStringSet([]string{"s3:DeleteObject", "s3:PutObject"}...)
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 	// contracting policy statement with recursive resources.
 | ||
| 	// should result in ErrMalformedPolicy
 | ||
| 	setRecurseResource := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		statements[0].Resources = set.CreateStringSet([]string{"arn:aws:s3:::minio-bucket/Asia/*", "arn:aws:s3:::minio-bucket/Asia/India/*"}...)
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 
 | ||
| 	// constructing policy statement with lexically close characters.
 | ||
| 	// should not result in ErrMalformedPolicy
 | ||
| 	setResourceLexical := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		statements[0].Resources = set.CreateStringSet([]string{"arn:aws:s3:::minio-bucket/op*", "arn:aws:s3:::minio-bucket/oo*"}...)
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 
 | ||
| 	// List of bucketPolicy used for tests.
 | ||
| 	bucketAccessPolicies := []policy.BucketAccessPolicy{
 | ||
| 		// bucketPolicy - 1.
 | ||
| 		// Contains valid read only policy statement.
 | ||
| 		{Version: "1.0", Statements: getReadOnlyStatement("minio-bucket", "")},
 | ||
| 		// bucketPolicy - 2.
 | ||
| 		// Contains valid read-write only policy statement.
 | ||
| 		{Version: "1.0", Statements: getReadWriteStatement("minio-bucket", "Asia/")},
 | ||
| 		// bucketPolicy - 3.
 | ||
| 		// Contains valid write only policy statement.
 | ||
| 		{Version: "1.0", Statements: getWriteOnlyStatement("minio-bucket", "Asia/India/")},
 | ||
| 		// bucketPolicy - 4.
 | ||
| 		// Contains invalidPrefixActions.
 | ||
| 		// Since resourcePrefix is not to the bucket-name, it return ErrMalformedPolicy.
 | ||
| 		{Version: "1.0", Statements: getReadOnlyStatement("minio-bucket-fail", "Asia/India/")},
 | ||
| 		// bucketPolicy - 5.
 | ||
| 		// constructing policy statement without invalidPrefixActions (check bucket-policy-parser.go).
 | ||
| 		// but bucket part of the resource is not equal to the bucket name.
 | ||
| 		// this results in return of ErrMalformedPolicy.
 | ||
| 		{Version: "1.0", Statements: setValidPrefixActions(getWriteOnlyStatement("minio-bucket-fail", "Asia/India/"))},
 | ||
| 		// bucketPolicy - 6.
 | ||
| 		// contracting policy statement with recursive resources.
 | ||
| 		// should result in ErrMalformedPolicy
 | ||
| 		{Version: "1.0", Statements: setRecurseResource(setValidPrefixActions(getWriteOnlyStatement("minio-bucket", "")))},
 | ||
| 		// BucketPolciy - 7.
 | ||
| 		// constructing policy statement with non recursive but
 | ||
| 		// lexically close resources.
 | ||
| 		// should result in ErrNone.
 | ||
| 		{Version: "1.0", Statements: setResourceLexical(setValidPrefixActions(getWriteOnlyStatement("minio-bucket", "oo")))},
 | ||
| 	}
 | ||
| 
 | ||
| 	testCases := []struct {
 | ||
| 		inputPolicy policy.BucketAccessPolicy
 | ||
| 		// expected results.
 | ||
| 		apiErrCode APIErrorCode
 | ||
| 		// Flag indicating whether the test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Test case - 1.
 | ||
| 		{bucketAccessPolicies[0], ErrNone, true},
 | ||
| 		// Test case - 2.
 | ||
| 		{bucketAccessPolicies[1], ErrNone, true},
 | ||
| 		// Test case - 3.
 | ||
| 		{bucketAccessPolicies[2], ErrNone, true},
 | ||
| 		// Test case - 4.
 | ||
| 		// contains invalidPrefixActions (check bucket-policy-parser.go).
 | ||
| 		// Resource prefix will not be equal to the bucket name in this case.
 | ||
| 		{bucketAccessPolicies[3], ErrMalformedPolicy, false},
 | ||
| 		// Test case - 5.
 | ||
| 		// actions contain invalidPrefixActions (check bucket-policy-parser.go).
 | ||
| 		// Resource prefix bucket part is not equal to the bucket name in this case.
 | ||
| 		{bucketAccessPolicies[4], ErrMalformedPolicy, false},
 | ||
| 		// Test case - 6.
 | ||
| 		// contracting policy statement with recursive resources.
 | ||
| 		// should result in ErrPolicyNesting.
 | ||
| 		{bucketAccessPolicies[5], ErrPolicyNesting, false},
 | ||
| 		// Test case - 7.
 | ||
| 		// constructing policy statement with lexically close
 | ||
| 		// characters.
 | ||
| 		// should result in ErrNone.
 | ||
| 		{bucketAccessPolicies[6], ErrNone, true},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		apiErrCode := checkBucketPolicyResources("minio-bucket", testCase.inputPolicy)
 | ||
| 		if apiErrCode != ErrNone && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with Errocode %v", i+1, apiErrCode)
 | ||
| 		}
 | ||
| 		if apiErrCode == ErrNone && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with ErrCode %v, but passed instead", i+1, testCase.apiErrCode)
 | ||
| 		}
 | ||
| 		// Failed as expected, but does it fail for the expected reason.
 | ||
| 		if apiErrCode != ErrNone && !testCase.shouldPass {
 | ||
| 			if testCase.apiErrCode != apiErrCode {
 | ||
| 				t.Errorf("Test %d: Expected to fail with error code %v, but instead failed with error code %v", i+1, testCase.apiErrCode, apiErrCode)
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| // Tests validate parsing of BucketAccessPolicy.
 | ||
| func TestParseBucketPolicy(t *testing.T) {
 | ||
| 	// set Unsupported Actions.
 | ||
| 	setUnsupportedActions := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		// "s3:DeleteEverything"" is an Unsupported Action.
 | ||
| 		statements[0].Actions = set.CreateStringSet([]string{"s3:GetObject", "s3:ListBucket", "s3:PutObject", "s3:DeleteEverything"}...)
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 	// set unsupported Effect.
 | ||
| 	setUnsupportedEffect := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		// Effect "Don't allow" is Unsupported.
 | ||
| 		statements[0].Effect = "DontAllow"
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 	// set unsupported principals.
 | ||
| 	setUnsupportedPrincipals := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		// "User1111"" is an Unsupported Principal.
 | ||
| 		statements[0].Principal = policy.User{
 | ||
| 			AWS: set.CreateStringSet([]string{"*", "User1111"}...),
 | ||
| 		}
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 	// set unsupported Resources.
 | ||
| 	setUnsupportedResources := func(statements []policy.Statement) []policy.Statement {
 | ||
| 		// "s3:DeleteEverything"" is an Unsupported Action.
 | ||
| 		statements[0].Resources = set.CreateStringSet([]string{"my-resource"}...)
 | ||
| 		return statements
 | ||
| 	}
 | ||
| 	// List of bucketPolicy used for test cases.
 | ||
| 	bucketAccesPolicies := []policy.BucketAccessPolicy{
 | ||
| 		// bucketPolicy - 0.
 | ||
| 		// bucketPolicy statement empty.
 | ||
| 		{Version: "1.0"},
 | ||
| 		// bucketPolicy - 1.
 | ||
| 		// bucketPolicy version empty.
 | ||
| 		{Version: "", Statements: []policy.Statement{}},
 | ||
| 		// bucketPolicy - 2.
 | ||
| 		// Readonly bucketPolicy.
 | ||
| 		{Version: "1.0", Statements: getReadOnlyStatement("minio-bucket", "")},
 | ||
| 		// bucketPolicy - 3.
 | ||
| 		// Read-Write bucket policy.
 | ||
| 		{Version: "1.0", Statements: getReadWriteStatement("minio-bucket", "Asia/")},
 | ||
| 		// bucketPolicy - 4.
 | ||
| 		// Write only bucket policy.
 | ||
| 		{Version: "1.0", Statements: getWriteOnlyStatement("minio-bucket", "Asia/India/")},
 | ||
| 		// bucketPolicy - 5.
 | ||
| 		// bucketPolicy statement contains unsupported action.
 | ||
| 		{Version: "1.0", Statements: setUnsupportedActions(getReadOnlyStatement("minio-bucket", ""))},
 | ||
| 		// bucketPolicy - 6.
 | ||
| 		// bucketPolicy statement contains unsupported Effect.
 | ||
| 		{Version: "1.0", Statements: setUnsupportedEffect(getReadWriteStatement("minio-bucket", "Asia/"))},
 | ||
| 		// bucketPolicy - 7.
 | ||
| 		// bucketPolicy statement contains unsupported Principal.
 | ||
| 		{Version: "1.0", Statements: setUnsupportedPrincipals(getWriteOnlyStatement("minio-bucket", "Asia/India/"))},
 | ||
| 		// bucketPolicy - 8.
 | ||
| 		// bucketPolicy statement contains unsupported Resource.
 | ||
| 		{Version: "1.0", Statements: setUnsupportedResources(getWriteOnlyStatement("minio-bucket", "Asia/India/"))},
 | ||
| 	}
 | ||
| 
 | ||
| 	testCases := []struct {
 | ||
| 		inputPolicy policy.BucketAccessPolicy
 | ||
| 		// expected results.
 | ||
| 		expectedPolicy policy.BucketAccessPolicy
 | ||
| 		err            error
 | ||
| 		// Flag indicating whether the test should pass.
 | ||
| 		shouldPass bool
 | ||
| 	}{
 | ||
| 		// Test case - 1.
 | ||
| 		// bucketPolicy statement empty.
 | ||
| 		{bucketAccesPolicies[0], policy.BucketAccessPolicy{}, errors.New("Policy statement cannot be empty"), false},
 | ||
| 		// Test case - 2.
 | ||
| 		// bucketPolicy version empty.
 | ||
| 		{bucketAccesPolicies[1], policy.BucketAccessPolicy{}, errors.New("Policy version cannot be empty"), false},
 | ||
| 		// Test case - 3.
 | ||
| 		// Readonly bucketPolicy.
 | ||
| 		{bucketAccesPolicies[2], bucketAccesPolicies[2], nil, true},
 | ||
| 		// Test case - 4.
 | ||
| 		// Read-Write bucket policy.
 | ||
| 		{bucketAccesPolicies[3], bucketAccesPolicies[3], nil, true},
 | ||
| 		// Test case - 5.
 | ||
| 		// Write only bucket policy.
 | ||
| 		{bucketAccesPolicies[4], bucketAccesPolicies[4], nil, true},
 | ||
| 		// Test case - 6.
 | ||
| 		// bucketPolicy statement contains unsupported action.
 | ||
| 		{bucketAccesPolicies[5], bucketAccesPolicies[5], fmt.Errorf("Unsupported actions found: ‘set.StringSet{\"s3:DeleteEverything\":struct {}{}}’, please validate your policy document"), false},
 | ||
| 		// Test case - 7.
 | ||
| 		// bucketPolicy statement contains unsupported Effect.
 | ||
| 		{bucketAccesPolicies[6], bucketAccesPolicies[6], fmt.Errorf("Unsupported Effect found: ‘DontAllow’, please validate your policy document"), false},
 | ||
| 		// Test case - 8.
 | ||
| 		// bucketPolicy statement contains unsupported Principal.
 | ||
| 		{bucketAccesPolicies[7], bucketAccesPolicies[7], fmt.Errorf("Unsupported principals found: ‘set.StringSet{\"User1111\":struct {}{}}’, please validate your policy document"), false},
 | ||
| 		// Test case - 9.
 | ||
| 		// bucketPolicy statement contains unsupported Resource.
 | ||
| 		{bucketAccesPolicies[8], bucketAccesPolicies[8], fmt.Errorf("Unsupported resource style found: ‘my-resource’, please validate your policy document"), false},
 | ||
| 	}
 | ||
| 	for i, testCase := range testCases {
 | ||
| 		var buffer bytes.Buffer
 | ||
| 		encoder := json.NewEncoder(&buffer)
 | ||
| 		err := encoder.Encode(testCase.inputPolicy)
 | ||
| 		if err != nil {
 | ||
| 			t.Fatalf("Test %d: Couldn't Marshal bucket policy %s", i+1, err)
 | ||
| 		}
 | ||
| 
 | ||
| 		var actualAccessPolicy = policy.BucketAccessPolicy{}
 | ||
| 		err = parseBucketPolicy(&buffer, &actualAccessPolicy)
 | ||
| 		if err != nil && testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
 | ||
| 		}
 | ||
| 		if err == nil && !testCase.shouldPass {
 | ||
| 			t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
 | ||
| 		}
 | ||
| 		// Failed as expected, but does it fail for the expected reason.
 | ||
| 		if err != nil && !testCase.shouldPass {
 | ||
| 			if err.Error() != testCase.err.Error() {
 | ||
| 				t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\"", i+1, testCase.err.Error(), err.Error())
 | ||
| 			}
 | ||
| 		}
 | ||
| 		// Test passes as expected, but the output values are verified for correctness here.
 | ||
| 		if err == nil && testCase.shouldPass {
 | ||
| 			if !reflect.DeepEqual(testCase.expectedPolicy, actualAccessPolicy) {
 | ||
| 				t.Errorf("Test %d: The expected statements from resource statement generator doesn't match the actual statements", i+1)
 | ||
| 			}
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| func TestAWSRefererCondition(t *testing.T) {
 | ||
| 	resource := set.CreateStringSet([]string{
 | ||
| 		fmt.Sprintf("%s%s", bucketARNPrefix, "minio-bucket"+"/"+"Asia"+"*"),
 | ||
| 	}...)
 | ||
| 
 | ||
| 	conditionsKeyMap := make(policy.ConditionKeyMap)
 | ||
| 	conditionsKeyMap.Add("aws:Referer",
 | ||
| 		set.CreateStringSet("www.example.com",
 | ||
| 			"http://www.example.com"))
 | ||
| 
 | ||
| 	requestConditionMap := make(policy.ConditionKeyMap)
 | ||
| 	requestConditionMap["referer"] = set.CreateStringSet("www.example.com")
 | ||
| 
 | ||
| 	testCases := []struct {
 | ||
| 		effect       string
 | ||
| 		conditionKey string
 | ||
| 		match        bool
 | ||
| 	}{
 | ||
| 		{
 | ||
| 			effect:       "Allow",
 | ||
| 			conditionKey: "StringLike",
 | ||
| 			match:        true,
 | ||
| 		},
 | ||
| 		{
 | ||
| 			effect:       "Allow",
 | ||
| 			conditionKey: "StringNotLike",
 | ||
| 			match:        false,
 | ||
| 		},
 | ||
| 		{
 | ||
| 			effect:       "Deny",
 | ||
| 			conditionKey: "StringLike",
 | ||
| 			match:        true,
 | ||
| 		},
 | ||
| 		{
 | ||
| 			effect:       "Deny",
 | ||
| 			conditionKey: "StringNotLike",
 | ||
| 			match:        false,
 | ||
| 		},
 | ||
| 	}
 | ||
| 
 | ||
| 	for i, test := range testCases {
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions[test.conditionKey] = conditionsKeyMap
 | ||
| 
 | ||
| 		allowStatement := policy.Statement{
 | ||
| 			Sid:    "Testing AWS referer condition",
 | ||
| 			Effect: test.effect,
 | ||
| 			Principal: policy.User{
 | ||
| 				AWS: set.CreateStringSet("*"),
 | ||
| 			},
 | ||
| 			Resources:  resource,
 | ||
| 			Conditions: conditions,
 | ||
| 		}
 | ||
| 
 | ||
| 		if result := bucketPolicyConditionMatch(requestConditionMap, allowStatement); result != test.match {
 | ||
| 			t.Errorf("Test %d -  Expected conditons to evaluate to %v but got %v",
 | ||
| 				i+1, test.match, result)
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 | ||
| 
 | ||
| func TestAWSSourceIPCondition(t *testing.T) {
 | ||
| 	resource := set.CreateStringSet([]string{
 | ||
| 		fmt.Sprintf("%s%s", bucketARNPrefix, "minio-bucket"+"/"+"Asia"+"*"),
 | ||
| 	}...)
 | ||
| 
 | ||
| 	conditionsKeyMap := make(policy.ConditionKeyMap)
 | ||
| 	// Test both IPv4 and IPv6 addresses.
 | ||
| 	conditionsKeyMap.Add("aws:SourceIp",
 | ||
| 		set.CreateStringSet("54.240.143.0/24",
 | ||
| 			"2001:DB8:1234:5678::/64"))
 | ||
| 
 | ||
| 	requestConditionMap := make(policy.ConditionKeyMap)
 | ||
| 	requestConditionMap["ip"] = set.CreateStringSet("54.240.143.2")
 | ||
| 
 | ||
| 	testCases := []struct {
 | ||
| 		effect       string
 | ||
| 		conditionKey string
 | ||
| 		match        bool
 | ||
| 	}{
 | ||
| 		{
 | ||
| 			effect:       "Allow",
 | ||
| 			conditionKey: "IpAddress",
 | ||
| 			match:        true,
 | ||
| 		},
 | ||
| 		{
 | ||
| 			effect:       "Allow",
 | ||
| 			conditionKey: "NotIpAddress",
 | ||
| 			match:        false,
 | ||
| 		},
 | ||
| 		{
 | ||
| 			effect:       "Deny",
 | ||
| 			conditionKey: "IpAddress",
 | ||
| 			match:        true,
 | ||
| 		},
 | ||
| 		{
 | ||
| 			effect:       "Deny",
 | ||
| 			conditionKey: "NotIpAddress",
 | ||
| 			match:        false,
 | ||
| 		},
 | ||
| 	}
 | ||
| 
 | ||
| 	for i, test := range testCases {
 | ||
| 		conditions := make(policy.ConditionMap)
 | ||
| 		conditions[test.conditionKey] = conditionsKeyMap
 | ||
| 
 | ||
| 		allowStatement := policy.Statement{
 | ||
| 			Sid:    "Testing AWS referer condition",
 | ||
| 			Effect: test.effect,
 | ||
| 			Principal: policy.User{
 | ||
| 				AWS: set.CreateStringSet("*"),
 | ||
| 			},
 | ||
| 			Resources:  resource,
 | ||
| 			Conditions: conditions,
 | ||
| 		}
 | ||
| 
 | ||
| 		if result := bucketPolicyConditionMatch(requestConditionMap, allowStatement); result != test.match {
 | ||
| 			t.Errorf("Test %d -  Expected conditons to evaluate to %v but got %v",
 | ||
| 				i+1, test.match, result)
 | ||
| 		}
 | ||
| 	}
 | ||
| }
 |