mirror of
				https://github.com/minio/minio.git
				synced 2025-11-04 10:11:09 +01:00 
			
		
		
		
	Make sure to skip reserved bucket names in `ListBuckets()` current code didn't skip this properly and also generalize this behavior for both XL and FS.
		
			
				
	
	
		
			126 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			126 lines
		
	
	
		
			3.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
 * Minio Cloud Storage, (C) 2016 Minio, Inc.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"path"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
)
 | 
						|
 | 
						|
// API suite container common to both FS and XL.
 | 
						|
type TestRPCBrowserPeerSuite struct {
 | 
						|
	serverType   string
 | 
						|
	testServer   TestServer
 | 
						|
	testAuthConf authConfig
 | 
						|
}
 | 
						|
 | 
						|
// Setting up the test suite and starting the Test server.
 | 
						|
func (s *TestRPCBrowserPeerSuite) SetUpSuite(c *testing.T) {
 | 
						|
	s.testServer = StartTestBrowserPeerRPCServer(c, s.serverType)
 | 
						|
	s.testAuthConf = authConfig{
 | 
						|
		serverAddr:      s.testServer.Server.Listener.Addr().String(),
 | 
						|
		accessKey:       s.testServer.AccessKey,
 | 
						|
		secretKey:       s.testServer.SecretKey,
 | 
						|
		serviceEndpoint: path.Join(minioReservedBucketPath, browserPeerPath),
 | 
						|
		serviceName:     "BrowserPeer",
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// No longer used with gocheck, but used in explicit teardown code in
 | 
						|
// each test function. // Called implicitly by "gopkg.in/check.v1"
 | 
						|
// after all tests are run.
 | 
						|
func (s *TestRPCBrowserPeerSuite) TearDownSuite(c *testing.T) {
 | 
						|
	s.testServer.Stop()
 | 
						|
}
 | 
						|
 | 
						|
func TestBrowserPeerRPC(t *testing.T) {
 | 
						|
	// setup code
 | 
						|
	s := &TestRPCBrowserPeerSuite{serverType: "XL"}
 | 
						|
	s.SetUpSuite(t)
 | 
						|
 | 
						|
	// run test
 | 
						|
	s.testBrowserPeerRPC(t)
 | 
						|
 | 
						|
	// teardown code
 | 
						|
	s.TearDownSuite(t)
 | 
						|
}
 | 
						|
 | 
						|
// Tests for browser peer rpc.
 | 
						|
func (s *TestRPCBrowserPeerSuite) testBrowserPeerRPC(t *testing.T) {
 | 
						|
	// Construct RPC call arguments.
 | 
						|
	creds := credential{
 | 
						|
		AccessKey: "abcd1",
 | 
						|
		SecretKey: "abcd1234",
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for invalid token.
 | 
						|
	args := SetAuthPeerArgs{Creds: creds}
 | 
						|
	args.AuthToken = "garbage"
 | 
						|
	rclient := newRPCClient(s.testAuthConf.serverAddr, s.testAuthConf.serviceEndpoint, false)
 | 
						|
	defer rclient.Close()
 | 
						|
	err := rclient.Call("BrowserPeer.SetAuthPeer", &args, &AuthRPCReply{})
 | 
						|
	if err != nil {
 | 
						|
		if err.Error() != errInvalidToken.Error() {
 | 
						|
			t.Fatal(err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for successful Peer update.
 | 
						|
	args = SetAuthPeerArgs{Creds: creds}
 | 
						|
	client := newAuthRPCClient(s.testAuthConf)
 | 
						|
	defer client.Close()
 | 
						|
	err = client.Call("BrowserPeer.SetAuthPeer", &args, &AuthRPCReply{})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for failure in login handler with previous credentials.
 | 
						|
	rclient = newRPCClient(s.testAuthConf.serverAddr, s.testAuthConf.serviceEndpoint, false)
 | 
						|
	defer rclient.Close()
 | 
						|
	rargs := &LoginRPCArgs{
 | 
						|
		Username:    creds.AccessKey,
 | 
						|
		Password:    creds.SecretKey,
 | 
						|
		Version:     Version,
 | 
						|
		RequestTime: time.Now().UTC(),
 | 
						|
	}
 | 
						|
	rreply := &LoginRPCReply{}
 | 
						|
	err = rclient.Call("BrowserPeer"+loginMethodName, rargs, rreply)
 | 
						|
	if err != nil {
 | 
						|
		if err.Error() != errInvalidAccessKeyID.Error() {
 | 
						|
			t.Fatal(err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Validate for success in loing handled with valid credetnails.
 | 
						|
	rargs = &LoginRPCArgs{
 | 
						|
		Username:    creds.AccessKey,
 | 
						|
		Password:    creds.SecretKey,
 | 
						|
		Version:     Version,
 | 
						|
		RequestTime: time.Now().UTC(),
 | 
						|
	}
 | 
						|
	rreply = &LoginRPCReply{}
 | 
						|
	err = rclient.Call("BrowserPeer"+loginMethodName, rargs, rreply)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	// Validate all the replied fields after successful login.
 | 
						|
	if rreply.AuthToken == "" {
 | 
						|
		t.Fatalf("Generated token cannot be empty %s", errInvalidToken)
 | 
						|
	}
 | 
						|
}
 |