mirror of https://github.com/minio/minio.git
				
				
				
			
		
			
				
	
	
		
			304 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			304 lines
		
	
	
		
			8.7 KiB
		
	
	
	
		
			Go
		
	
	
	
| // Copyright (c) 2015-2021 MinIO, Inc.
 | |
| //
 | |
| // This file is part of MinIO Object Storage stack
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package cmd
 | |
| 
 | |
| import (
 | |
| 	"reflect"
 | |
| 	"testing"
 | |
| 
 | |
| 	miniogopolicy "github.com/minio/minio-go/v7/pkg/policy"
 | |
| 	"github.com/minio/minio-go/v7/pkg/set"
 | |
| 	"github.com/minio/pkg/bucket/policy"
 | |
| 	"github.com/minio/pkg/bucket/policy/condition"
 | |
| )
 | |
| 
 | |
| func TestPolicySysIsAllowed(t *testing.T) {
 | |
| 	p := &policy.Policy{
 | |
| 		Version: policy.DefaultVersion,
 | |
| 		Statements: []policy.Statement{
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.GetBucketLocationAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.PutObjectAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	anonGetBucketLocationArgs := policy.Args{
 | |
| 		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:          policy.GetBucketLocationAction,
 | |
| 		BucketName:      "mybucket",
 | |
| 		ConditionValues: map[string][]string{},
 | |
| 	}
 | |
| 
 | |
| 	anonPutObjectActionArgs := policy.Args{
 | |
| 		AccountName: "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:      policy.PutObjectAction,
 | |
| 		BucketName:  "mybucket",
 | |
| 		ConditionValues: map[string][]string{
 | |
| 			"x-amz-copy-source": {"mybucket/myobject"},
 | |
| 			"SourceIp":          {"192.168.1.10"},
 | |
| 		},
 | |
| 		ObjectName: "myobject",
 | |
| 	}
 | |
| 
 | |
| 	anonGetObjectActionArgs := policy.Args{
 | |
| 		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:          policy.GetObjectAction,
 | |
| 		BucketName:      "mybucket",
 | |
| 		ConditionValues: map[string][]string{},
 | |
| 		ObjectName:      "myobject",
 | |
| 	}
 | |
| 
 | |
| 	getBucketLocationArgs := policy.Args{
 | |
| 		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:          policy.GetBucketLocationAction,
 | |
| 		BucketName:      "mybucket",
 | |
| 		ConditionValues: map[string][]string{},
 | |
| 		IsOwner:         true,
 | |
| 	}
 | |
| 
 | |
| 	putObjectActionArgs := policy.Args{
 | |
| 		AccountName: "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:      policy.PutObjectAction,
 | |
| 		BucketName:  "mybucket",
 | |
| 		ConditionValues: map[string][]string{
 | |
| 			"x-amz-copy-source": {"mybucket/myobject"},
 | |
| 			"SourceIp":          {"192.168.1.10"},
 | |
| 		},
 | |
| 		IsOwner:    true,
 | |
| 		ObjectName: "myobject",
 | |
| 	}
 | |
| 
 | |
| 	getObjectActionArgs := policy.Args{
 | |
| 		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:          policy.GetObjectAction,
 | |
| 		BucketName:      "mybucket",
 | |
| 		ConditionValues: map[string][]string{},
 | |
| 		IsOwner:         true,
 | |
| 		ObjectName:      "myobject",
 | |
| 	}
 | |
| 
 | |
| 	yourbucketAnonGetObjectActionArgs := policy.Args{
 | |
| 		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:          policy.GetObjectAction,
 | |
| 		BucketName:      "yourbucket",
 | |
| 		ConditionValues: map[string][]string{},
 | |
| 		ObjectName:      "yourobject",
 | |
| 	}
 | |
| 
 | |
| 	yourbucketGetObjectActionArgs := policy.Args{
 | |
| 		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | |
| 		Action:          policy.GetObjectAction,
 | |
| 		BucketName:      "yourbucket",
 | |
| 		ConditionValues: map[string][]string{},
 | |
| 		IsOwner:         true,
 | |
| 		ObjectName:      "yourobject",
 | |
| 	}
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		args           policy.Args
 | |
| 		expectedResult bool
 | |
| 	}{
 | |
| 		{anonGetBucketLocationArgs, true},
 | |
| 		{anonPutObjectActionArgs, true},
 | |
| 		{anonGetObjectActionArgs, false},
 | |
| 		{getBucketLocationArgs, true},
 | |
| 		{putObjectActionArgs, true},
 | |
| 		{getObjectActionArgs, true},
 | |
| 		{yourbucketAnonGetObjectActionArgs, false},
 | |
| 		{yourbucketGetObjectActionArgs, true},
 | |
| 	}
 | |
| 
 | |
| 	for i, testCase := range testCases {
 | |
| 		result := p.IsAllowed(testCase.args)
 | |
| 
 | |
| 		if result != testCase.expectedResult {
 | |
| 			t.Fatalf("case %v: expected: %v, got: %v\n", i+1, testCase.expectedResult, result)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func getReadOnlyStatement(bucketName, prefix string) []miniogopolicy.Statement {
 | |
| 	return []miniogopolicy.Statement{
 | |
| 		{
 | |
| 			Effect:    string(policy.Allow),
 | |
| 			Principal: miniogopolicy.User{AWS: set.CreateStringSet("*")},
 | |
| 			Resources: set.CreateStringSet(policy.NewResource(bucketName, "").String()),
 | |
| 			Actions:   set.CreateStringSet("s3:GetBucketLocation", "s3:ListBucket"),
 | |
| 		},
 | |
| 		{
 | |
| 			Effect:    string(policy.Allow),
 | |
| 			Principal: miniogopolicy.User{AWS: set.CreateStringSet("*")},
 | |
| 			Resources: set.CreateStringSet(policy.NewResource(bucketName, prefix).String()),
 | |
| 			Actions:   set.CreateStringSet("s3:GetObject"),
 | |
| 		},
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestPolicyToBucketAccessPolicy(t *testing.T) {
 | |
| 	case1Policy := &policy.Policy{
 | |
| 		Version: policy.DefaultVersion,
 | |
| 		Statements: []policy.Statement{
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.GetBucketLocationAction, policy.ListBucketAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.GetObjectAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	case1Result := &miniogopolicy.BucketAccessPolicy{
 | |
| 		Version:    policy.DefaultVersion,
 | |
| 		Statements: getReadOnlyStatement("mybucket", "/myobject*"),
 | |
| 	}
 | |
| 
 | |
| 	case2Policy := &policy.Policy{
 | |
| 		Version:    policy.DefaultVersion,
 | |
| 		Statements: []policy.Statement{},
 | |
| 	}
 | |
| 
 | |
| 	case2Result := &miniogopolicy.BucketAccessPolicy{
 | |
| 		Version:    policy.DefaultVersion,
 | |
| 		Statements: []miniogopolicy.Statement{},
 | |
| 	}
 | |
| 
 | |
| 	case3Policy := &policy.Policy{
 | |
| 		Version: "12-10-2012",
 | |
| 		Statements: []policy.Statement{
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.PutObjectAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		bucketPolicy   *policy.Policy
 | |
| 		expectedResult *miniogopolicy.BucketAccessPolicy
 | |
| 		expectErr      bool
 | |
| 	}{
 | |
| 		{case1Policy, case1Result, false},
 | |
| 		{case2Policy, case2Result, false},
 | |
| 		{case3Policy, nil, true},
 | |
| 	}
 | |
| 
 | |
| 	for i, testCase := range testCases {
 | |
| 		result, err := PolicyToBucketAccessPolicy(testCase.bucketPolicy)
 | |
| 		expectErr := (err != nil)
 | |
| 
 | |
| 		if expectErr != testCase.expectErr {
 | |
| 			t.Fatalf("case %v: error: expected: %v, got: %v\n", i+1, testCase.expectErr, expectErr)
 | |
| 		}
 | |
| 
 | |
| 		if !testCase.expectErr {
 | |
| 			if !reflect.DeepEqual(result, testCase.expectedResult) {
 | |
| 				t.Fatalf("case %v: result: expected: %+v, got: %+v\n", i+1, testCase.expectedResult, result)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestBucketAccessPolicyToPolicy(t *testing.T) {
 | |
| 	case1PolicyInfo := &miniogopolicy.BucketAccessPolicy{
 | |
| 		Version:    policy.DefaultVersion,
 | |
| 		Statements: getReadOnlyStatement("mybucket", "/myobject*"),
 | |
| 	}
 | |
| 
 | |
| 	case1Result := &policy.Policy{
 | |
| 		Version: policy.DefaultVersion,
 | |
| 		Statements: []policy.Statement{
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.GetBucketLocationAction, policy.ListBucketAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 			policy.NewStatement(
 | |
| 				policy.Allow,
 | |
| 				policy.NewPrincipal("*"),
 | |
| 				policy.NewActionSet(policy.GetObjectAction),
 | |
| 				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | |
| 				condition.NewFunctions(),
 | |
| 			),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	case2PolicyInfo := &miniogopolicy.BucketAccessPolicy{
 | |
| 		Version:    policy.DefaultVersion,
 | |
| 		Statements: []miniogopolicy.Statement{},
 | |
| 	}
 | |
| 
 | |
| 	case2Result := &policy.Policy{
 | |
| 		Version:    policy.DefaultVersion,
 | |
| 		Statements: []policy.Statement{},
 | |
| 	}
 | |
| 
 | |
| 	case3PolicyInfo := &miniogopolicy.BucketAccessPolicy{
 | |
| 		Version:    "12-10-2012",
 | |
| 		Statements: getReadOnlyStatement("mybucket", "/myobject*"),
 | |
| 	}
 | |
| 
 | |
| 	testCases := []struct {
 | |
| 		policyInfo     *miniogopolicy.BucketAccessPolicy
 | |
| 		expectedResult *policy.Policy
 | |
| 		expectErr      bool
 | |
| 	}{
 | |
| 		{case1PolicyInfo, case1Result, false},
 | |
| 		{case2PolicyInfo, case2Result, false},
 | |
| 		{case3PolicyInfo, nil, true},
 | |
| 	}
 | |
| 
 | |
| 	for i, testCase := range testCases {
 | |
| 		result, err := BucketAccessPolicyToPolicy(testCase.policyInfo)
 | |
| 		expectErr := (err != nil)
 | |
| 
 | |
| 		if expectErr != testCase.expectErr {
 | |
| 			t.Fatalf("case %v: error: expected: %v, got: %v\n", i+1, testCase.expectErr, expectErr)
 | |
| 		}
 | |
| 
 | |
| 		if !testCase.expectErr {
 | |
| 			if !reflect.DeepEqual(result, testCase.expectedResult) {
 | |
| 				t.Fatalf("case %v: result: expected: %+v, got: %+v\n", i+1, testCase.expectedResult, result)
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 |