mirror of
https://github.com/minio/mc.git
synced 2025-04-19 21:02:15 +03:00
182 lines
5.7 KiB
Go
182 lines
5.7 KiB
Go
// Copyright (c) 2015-2024 MinIO, Inc.
|
|
//
|
|
// # This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
)
|
|
|
|
func TestParseEncryptionKeys(t *testing.T) {
|
|
baseAlias := "mintest"
|
|
basePrefix := "two/layer/prefix"
|
|
baseObject := "object_name"
|
|
sseKeyKMS := "my-default-key"
|
|
sseKeyKMSInvalid := "my@default@key"
|
|
sseKey := "MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTIzNDU2Nzg5MDA"
|
|
sseKeyPlain := "01234567890123456789012345678900"
|
|
sseHexKey := "3031323334353637383930313233343536373839303132333435363738393030"
|
|
|
|
// INVALID KEYS
|
|
sseKeyInvalidShort := "MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTIzNDU2"
|
|
sseKeyInvalidSymbols := "MDEyMzQ1Njc4O____jM0N!!!ODkwMTIzNDU2Nzg5MDA"
|
|
sseKeyInvalidSpaces := "MDE yMzQ1Njc4OTAxM jM0NTY3ODkwMTIzNDU2Nzg5MDA"
|
|
sseKeyInvalidPrefixSpace := " MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTIzNDU2Nzg5MDA"
|
|
sseKeyInvalidOneShort := "MDEyMzQ1Njc4OTAxMjM0NTY3ODkwMTIzNDU2Nzg5MD"
|
|
|
|
testCases := []struct {
|
|
encryptionKey string
|
|
keyPlain string
|
|
alias string
|
|
prefix string
|
|
object string
|
|
sseType sseKeyType
|
|
success bool
|
|
}{
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseHexKey),
|
|
keyPlain: sseKeyPlain,
|
|
alias: baseAlias,
|
|
prefix: basePrefix,
|
|
object: baseObject,
|
|
sseType: sseC,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKey),
|
|
keyPlain: sseKeyPlain,
|
|
alias: baseAlias,
|
|
prefix: basePrefix,
|
|
object: baseObject,
|
|
sseType: sseC,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s=/%s=/%s==%s", baseAlias, basePrefix, baseObject, sseKey),
|
|
keyPlain: sseKeyPlain,
|
|
alias: baseAlias + "=",
|
|
prefix: basePrefix + "=",
|
|
object: baseObject + "=",
|
|
sseType: sseC,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s//%s//%s/=%s", baseAlias, basePrefix, baseObject, sseKey),
|
|
keyPlain: sseKeyPlain,
|
|
alias: baseAlias + "/",
|
|
prefix: basePrefix + "/",
|
|
object: baseObject + "/",
|
|
sseType: sseC,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s==%s", baseAlias, basePrefix, baseObject, sseKey),
|
|
keyPlain: sseKeyPlain,
|
|
alias: baseAlias,
|
|
prefix: basePrefix,
|
|
object: baseObject + "=",
|
|
sseType: sseC,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s!@_==_$^&*=%s", baseAlias, basePrefix, baseObject, sseKey),
|
|
keyPlain: sseKeyPlain,
|
|
alias: baseAlias,
|
|
prefix: basePrefix,
|
|
object: baseObject + "!@_==_$^&*",
|
|
sseType: sseC,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%sXXXXX", baseAlias, basePrefix, baseObject, sseKey),
|
|
sseType: sseC,
|
|
success: false,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKeyInvalidShort),
|
|
sseType: sseC,
|
|
success: false,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKeyInvalidSymbols),
|
|
sseType: sseC,
|
|
success: false,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKeyInvalidSpaces),
|
|
sseType: sseC,
|
|
success: false,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKeyInvalidPrefixSpace),
|
|
sseType: sseC,
|
|
success: false,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s==%s", baseAlias, basePrefix, baseObject, sseKeyInvalidOneShort),
|
|
sseType: sseC,
|
|
success: false,
|
|
},
|
|
// sse-type KMS
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKeyKMS),
|
|
keyPlain: sseKeyKMS,
|
|
alias: baseAlias,
|
|
prefix: basePrefix,
|
|
object: baseObject,
|
|
sseType: sseKMS,
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s=%s", baseAlias, basePrefix, baseObject, sseKeyKMSInvalid),
|
|
sseType: sseKMS,
|
|
success: false,
|
|
},
|
|
// sse-type S3
|
|
{
|
|
encryptionKey: fmt.Sprintf("%s/%s/%s", baseAlias, basePrefix, baseObject),
|
|
alias: baseAlias,
|
|
prefix: basePrefix,
|
|
object: baseObject,
|
|
sseType: sseS3,
|
|
success: true,
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
alias, prefix, key, err := parseSSEKey(tc.encryptionKey, tc.sseType)
|
|
if tc.success {
|
|
if err != nil {
|
|
t.Fatalf("Test %d: Expected success, got %s", i+1, err)
|
|
}
|
|
if fmt.Sprintf("%s/%s", alias, prefix) != fmt.Sprintf("%s/%s/%s", tc.alias, tc.prefix, tc.object) {
|
|
t.Fatalf("Test %d: alias and prefix parsing was invalid, expected %s/%s/%s, got %s/%s", i, tc.alias, tc.prefix, tc.object, alias, prefix)
|
|
}
|
|
if key != tc.keyPlain {
|
|
t.Fatalf("Test %d: sse key parsing is invalid, expected %s, got %s", i, tc.keyPlain, key)
|
|
}
|
|
}
|
|
|
|
if !tc.success {
|
|
if err == nil {
|
|
t.Fatalf("Test %d: Expected error, got success", i+1)
|
|
}
|
|
}
|
|
}
|
|
}
|