mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 10:11:09 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			124 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			124 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
 * Minio Cloud Storage, (C) 2016 Minio, Inc.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"path"
 | 
						|
	"testing"
 | 
						|
)
 | 
						|
 | 
						|
// API suite container common to both FS and XL.
 | 
						|
type TestRPCBrowserPeerSuite struct {
 | 
						|
	serverType   string
 | 
						|
	testServer   TestServer
 | 
						|
	testAuthConf *authConfig
 | 
						|
}
 | 
						|
 | 
						|
// Setting up the test suite and starting the Test server.
 | 
						|
func (s *TestRPCBrowserPeerSuite) SetUpSuite(c *testing.T) {
 | 
						|
	s.testServer = StartTestBrowserPeerRPCServer(c, s.serverType)
 | 
						|
	s.testAuthConf = &authConfig{
 | 
						|
		address:     s.testServer.Server.Listener.Addr().String(),
 | 
						|
		accessKey:   s.testServer.AccessKey,
 | 
						|
		secretKey:   s.testServer.SecretKey,
 | 
						|
		path:        path.Join(reservedBucket, browserPeerPath),
 | 
						|
		loginMethod: "BrowserPeer.LoginHandler",
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// No longer used with gocheck, but used in explicit teardown code in
 | 
						|
// each test function. // Called implicitly by "gopkg.in/check.v1"
 | 
						|
// after all tests are run.
 | 
						|
func (s *TestRPCBrowserPeerSuite) TearDownSuite(c *testing.T) {
 | 
						|
	s.testServer.Stop()
 | 
						|
}
 | 
						|
 | 
						|
func TestBrowserPeerRPC(t *testing.T) {
 | 
						|
	// setup code
 | 
						|
	s := &TestRPCBrowserPeerSuite{serverType: "XL"}
 | 
						|
	s.SetUpSuite(t)
 | 
						|
 | 
						|
	// run test
 | 
						|
	s.testBrowserPeerRPC(t)
 | 
						|
 | 
						|
	// teardown code
 | 
						|
	s.TearDownSuite(t)
 | 
						|
}
 | 
						|
 | 
						|
// Tests for browser peer rpc.
 | 
						|
func (s *TestRPCBrowserPeerSuite) testBrowserPeerRPC(t *testing.T) {
 | 
						|
	// Construct RPC call arguments.
 | 
						|
	creds := credential{
 | 
						|
		AccessKeyID:     "abcd1",
 | 
						|
		SecretAccessKey: "abcd1234",
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for invalid token.
 | 
						|
	args := SetAuthPeerArgs{Creds: creds}
 | 
						|
	args.Token = "garbage"
 | 
						|
	rclient := newClient(s.testAuthConf.address, s.testAuthConf.path, false)
 | 
						|
	defer rclient.Close()
 | 
						|
	err := rclient.Call("BrowserPeer.SetAuthPeer", &args, &GenericReply{})
 | 
						|
	if err != nil {
 | 
						|
		if err.Error() != errInvalidToken.Error() {
 | 
						|
			t.Fatal(err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for successful Peer update.
 | 
						|
	args = SetAuthPeerArgs{Creds: creds}
 | 
						|
	client := newAuthClient(s.testAuthConf)
 | 
						|
	defer client.Close()
 | 
						|
	err = client.Call("BrowserPeer.SetAuthPeer", &args, &GenericReply{})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for failure in login handler with previous credentials.
 | 
						|
	rclient = newClient(s.testAuthConf.address, s.testAuthConf.path, false)
 | 
						|
	defer rclient.Close()
 | 
						|
	rargs := &RPCLoginArgs{
 | 
						|
		Username: s.testAuthConf.accessKey,
 | 
						|
		Password: s.testAuthConf.secretKey,
 | 
						|
	}
 | 
						|
	rreply := &RPCLoginReply{}
 | 
						|
	err = rclient.Call("BrowserPeer.LoginHandler", rargs, rreply)
 | 
						|
	if err != nil {
 | 
						|
		if err.Error() != errInvalidAccessKeyID.Error() {
 | 
						|
			t.Fatal(err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for success in loing handled with valid credetnails.
 | 
						|
	rargs = &RPCLoginArgs{
 | 
						|
		Username: creds.AccessKeyID,
 | 
						|
		Password: creds.SecretAccessKey,
 | 
						|
	}
 | 
						|
	rreply = &RPCLoginReply{}
 | 
						|
	err = rclient.Call("BrowserPeer.LoginHandler", rargs, rreply)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	// Validate all the replied fields after successful login.
 | 
						|
	if rreply.Token == "" {
 | 
						|
		t.Fatalf("Generated token cannot be empty %s", errInvalidToken)
 | 
						|
	}
 | 
						|
	if rreply.Timestamp.IsZero() {
 | 
						|
		t.Fatal("Time stamp returned cannot be zero")
 | 
						|
	}
 | 
						|
}
 |