mirror of
https://github.com/minio/mc.git
synced 2025-11-09 02:22:18 +03:00
159 lines
4.6 KiB
Go
159 lines
4.6 KiB
Go
/*
|
|
* MinIO Client (C) 2017 MinIO, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/minio/minio-go/v7/pkg/encrypt"
|
|
)
|
|
|
|
func TestParseEncryptionKeys(t *testing.T) {
|
|
sseKey1, err := encrypt.NewSSEC([]byte("32byteslongsecretkeymustbegiven2"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
sseKey2, err := encrypt.NewSSEC([]byte("32byteslongsecretkeymustbegiven1"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
sseSpaceKey1, err := encrypt.NewSSEC([]byte("32byteslongsecret mustbegiven1"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
sseCommaKey1, err := encrypt.NewSSEC([]byte("32byteslongsecretkey,ustbegiven1"))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
testCases := []struct {
|
|
encryptionKey string
|
|
expectedEncMap map[string][]prefixSSEPair
|
|
success bool
|
|
}{
|
|
{
|
|
encryptionKey: "myminio1/test2=32byteslongsecretkeymustbegiven2",
|
|
expectedEncMap: map[string][]prefixSSEPair{"myminio1": {{
|
|
Prefix: "myminio1/test2",
|
|
SSE: sseKey1,
|
|
}}},
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: "myminio1/test2=32byteslongsecretkeymustbegiven",
|
|
expectedEncMap: nil,
|
|
success: false,
|
|
},
|
|
{
|
|
encryptionKey: "myminio1/test2=32byteslongsecretkey,ustbegiven1",
|
|
expectedEncMap: map[string][]prefixSSEPair{"myminio1": {{
|
|
Prefix: "myminio1/test2",
|
|
SSE: sseCommaKey1,
|
|
}}},
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: "myminio1/test2=32byteslongsecret mustbegiven1",
|
|
expectedEncMap: map[string][]prefixSSEPair{"myminio1": {{
|
|
Prefix: "myminio1/test2",
|
|
SSE: sseSpaceKey1,
|
|
}}},
|
|
success: true,
|
|
},
|
|
{
|
|
encryptionKey: "myminio1/test2=32byteslongsecretkeymustbegiven2,myminio1/test1/a=32byteslongsecretkeymustbegiven1",
|
|
expectedEncMap: map[string][]prefixSSEPair{"myminio1": {{
|
|
Prefix: "myminio1/test1/a",
|
|
SSE: sseKey2,
|
|
}, {
|
|
Prefix: "myminio1/test2",
|
|
SSE: sseKey1,
|
|
}}},
|
|
success: true,
|
|
},
|
|
}
|
|
for i, testCase := range testCases {
|
|
encMap, err := parseEncryptionKeys(testCase.encryptionKey)
|
|
if err != nil && testCase.success {
|
|
t.Fatalf("Test %d: Expected success, got %s", i+1, err)
|
|
}
|
|
if err == nil && !testCase.success {
|
|
t.Fatalf("Test %d: Expected error, got success", i+1)
|
|
}
|
|
if testCase.success && !reflect.DeepEqual(encMap, testCase.expectedEncMap) {
|
|
t.Errorf("Test %d: Expected %s, got %s", i+1, testCase.expectedEncMap, encMap)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestParseAttribute(t *testing.T) {
|
|
metaDataCases := []struct {
|
|
input string
|
|
output map[string]string
|
|
err error
|
|
status bool
|
|
}{
|
|
// // When blank value is passed.
|
|
{"", map[string]string{}, ErrInvalidFileSystemAttribute, false},
|
|
// When space is passed.
|
|
{" ", map[string]string{}, ErrInvalidFileSystemAttribute, false},
|
|
// When / is passed.
|
|
{"/", map[string]string{}, ErrInvalidFileSystemAttribute, false},
|
|
// When "atime:" is passed.
|
|
{"atime:/", map[string]string{"atime": ""}, ErrInvalidFileSystemAttribute, false},
|
|
// When "atime:" is passed.
|
|
{"atime", map[string]string{"atime": ""}, nil, true},
|
|
// When "atime:" is passed.
|
|
{"atime:", map[string]string{"atime": ""}, nil, true},
|
|
// Passing a valid value
|
|
{"atime:1/gid:1/gname:a/md:/mode:3/mtime:1/uid:1/uname:a",
|
|
map[string]string{
|
|
"atime": "1",
|
|
"gid": "1",
|
|
"gname": "a",
|
|
"md": "",
|
|
"mode": "3",
|
|
"mtime": "1",
|
|
"uid": "1",
|
|
"uname": "a",
|
|
}, nil, true},
|
|
}
|
|
|
|
for idx, testCase := range metaDataCases {
|
|
meta, err := parseAttribute(map[string]string{
|
|
metadataKey: testCase.input,
|
|
})
|
|
if testCase.status == true {
|
|
if err != nil {
|
|
t.Fatalf("Test %d: generated error not matching, expected = `%s`, found = `%s`", idx+1, testCase.err, err)
|
|
}
|
|
if !reflect.DeepEqual(meta, testCase.output) {
|
|
t.Fatalf("Test %d: generated Map not matching, expected = `%s`, found = `%s`", idx+1, testCase.input, meta)
|
|
}
|
|
}
|
|
if testCase.status == false {
|
|
if !reflect.DeepEqual(meta, testCase.output) {
|
|
t.Fatalf("Test %d: generated Map not matching, expected = `%s`, found = `%s`", idx+1, testCase.input, meta)
|
|
}
|
|
if err != testCase.err {
|
|
t.Fatalf("Test %d: generated error not matching, expected = `%s`, found = `%s`", idx+1, testCase.err, err)
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|