mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 02:01:05 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			181 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			181 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
 * Minio Cloud Storage, (C) 2016, 2017 Minio, Inc.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/minio/minio/pkg/disk"
 | 
						|
)
 | 
						|
 | 
						|
const invalidToken = "invalidToken"
 | 
						|
 | 
						|
type testStorageRPCServer struct {
 | 
						|
	configDir string
 | 
						|
	token     string
 | 
						|
	diskDirs  []string
 | 
						|
	stServer  *storageServer
 | 
						|
	endpoints EndpointList
 | 
						|
}
 | 
						|
 | 
						|
func createTestStorageServer(t *testing.T) *testStorageRPCServer {
 | 
						|
	testPath, err := newTestConfig(globalMinioDefaultRegion)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unable initialize config file, %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	serverCred := serverConfig.GetCredential()
 | 
						|
	token, err := authenticateNode(serverCred.AccessKey, serverCred.SecretKey)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unable for JWT to generate token, %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	fsDirs, err := getRandomDisks(1)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unable to create FS backend, %s", err)
 | 
						|
	}
 | 
						|
 | 
						|
	endpoints := mustGetNewEndpointList(fsDirs...)
 | 
						|
	storageDisks, err := initStorageDisks(endpoints)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("unable to initialize storage disks, %s", err)
 | 
						|
	}
 | 
						|
	stServer := &storageServer{
 | 
						|
		storage:   storageDisks[0],
 | 
						|
		path:      "/disk1",
 | 
						|
		timestamp: UTCNow(),
 | 
						|
	}
 | 
						|
	return &testStorageRPCServer{
 | 
						|
		token:     token,
 | 
						|
		configDir: testPath,
 | 
						|
		diskDirs:  fsDirs,
 | 
						|
		endpoints: endpoints,
 | 
						|
		stServer:  stServer,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func errorIfInvalidToken(t *testing.T, err error) {
 | 
						|
	realErr := errorCause(err)
 | 
						|
	if realErr != errInvalidToken {
 | 
						|
		t.Errorf("Expected to fail with %s but failed with %s", errInvalidToken, realErr)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestStorageRPCInvalidToken(t *testing.T) {
 | 
						|
	st := createTestStorageServer(t)
 | 
						|
	defer removeRoots(st.diskDirs)
 | 
						|
	defer removeAll(st.configDir)
 | 
						|
 | 
						|
	storageRPC := st.stServer
 | 
						|
 | 
						|
	// Following test cases are meant to exercise the invalid
 | 
						|
	// token code path of the storage RPC methods.
 | 
						|
	var err error
 | 
						|
	badAuthRPCArgs := AuthRPCArgs{AuthToken: "invalidToken"}
 | 
						|
	badGenericVolArgs := GenericVolArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
		Vol:         "myvol",
 | 
						|
	}
 | 
						|
	// 1. DiskInfoHandler
 | 
						|
	diskInfoReply := &disk.Info{}
 | 
						|
	err = storageRPC.DiskInfoHandler(&badAuthRPCArgs, diskInfoReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 2. MakeVolHandler
 | 
						|
	makeVolArgs := &badGenericVolArgs
 | 
						|
	makeVolReply := &AuthRPCReply{}
 | 
						|
	err = storageRPC.MakeVolHandler(makeVolArgs, makeVolReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 3. ListVolsHandler
 | 
						|
	listVolReply := &ListVolsReply{}
 | 
						|
	err = storageRPC.ListVolsHandler(&badAuthRPCArgs, listVolReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 4. StatVolHandler
 | 
						|
	statVolReply := &VolInfo{}
 | 
						|
	statVolArgs := &badGenericVolArgs
 | 
						|
	err = storageRPC.StatVolHandler(statVolArgs, statVolReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 5. DeleteVolHandler
 | 
						|
	deleteVolArgs := &badGenericVolArgs
 | 
						|
	deleteVolReply := &AuthRPCReply{}
 | 
						|
	err = storageRPC.DeleteVolHandler(deleteVolArgs, deleteVolReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 6. StatFileHandler
 | 
						|
	statFileArgs := &StatFileArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	statReply := &FileInfo{}
 | 
						|
	err = storageRPC.StatFileHandler(statFileArgs, statReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 7. ListDirHandler
 | 
						|
	listDirArgs := &ListDirArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	listDirReply := &[]string{}
 | 
						|
	err = storageRPC.ListDirHandler(listDirArgs, listDirReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 8. ReadAllHandler
 | 
						|
	readFileArgs := &ReadFileArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	readFileReply := &[]byte{}
 | 
						|
	err = storageRPC.ReadAllHandler(readFileArgs, readFileReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 9. ReadFileHandler
 | 
						|
	err = storageRPC.ReadFileHandler(readFileArgs, readFileReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 10. PrepareFileHandler
 | 
						|
	prepFileArgs := &PrepareFileArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	prepFileReply := &AuthRPCReply{}
 | 
						|
	err = storageRPC.PrepareFileHandler(prepFileArgs, prepFileReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 11. AppendFileHandler
 | 
						|
	appendArgs := &AppendFileArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	appendReply := &AuthRPCReply{}
 | 
						|
	err = storageRPC.AppendFileHandler(appendArgs, appendReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 12. DeleteFileHandler
 | 
						|
	delFileArgs := &DeleteFileArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	delFileRely := &AuthRPCReply{}
 | 
						|
	err = storageRPC.DeleteFileHandler(delFileArgs, delFileRely)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
 | 
						|
	// 13. RenameFileHandler
 | 
						|
	renameArgs := &RenameFileArgs{
 | 
						|
		AuthRPCArgs: badAuthRPCArgs,
 | 
						|
	}
 | 
						|
	renameReply := &AuthRPCReply{}
 | 
						|
	err = storageRPC.RenameFileHandler(renameArgs, renameReply)
 | 
						|
	errorIfInvalidToken(t, err)
 | 
						|
}
 |