mirror of
				https://github.com/minio/minio.git
				synced 2025-11-03 17:51:11 +01:00 
			
		
		
		
	- remove old bucket policy handling - add new policy handling - add new policy handling unit tests This patch brings support to bucket policy to have more control not limiting to anonymous. Bucket owner controls to allow/deny any rest API. For example server side encryption can be controlled by allowing PUT/GET objects with encryptions including bucket owner.
		
			
				
	
	
		
			425 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			425 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
 * Minio Cloud Storage, (C) 2018 Minio, Inc.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
package cmd
 | 
						|
 | 
						|
import (
 | 
						|
	"reflect"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	miniogopolicy "github.com/minio/minio-go/pkg/policy"
 | 
						|
	"github.com/minio/minio-go/pkg/set"
 | 
						|
	"github.com/minio/minio/pkg/policy"
 | 
						|
	"github.com/minio/minio/pkg/policy/condition"
 | 
						|
)
 | 
						|
 | 
						|
func TestPolicySysSet(t *testing.T) {
 | 
						|
	case1PolicySys := NewPolicySys()
 | 
						|
	case1Policy := policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.PutObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	case1Result := NewPolicySys()
 | 
						|
	case1Result.bucketPolicyMap["mybucket"] = case1Policy
 | 
						|
 | 
						|
	case2PolicySys := NewPolicySys()
 | 
						|
	case2PolicySys.bucketPolicyMap["mybucket"] = case1Policy
 | 
						|
	case2Policy := policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	case2Result := NewPolicySys()
 | 
						|
	case2Result.bucketPolicyMap["mybucket"] = case2Policy
 | 
						|
 | 
						|
	case3PolicySys := NewPolicySys()
 | 
						|
	case3PolicySys.bucketPolicyMap["mybucket"] = case2Policy
 | 
						|
	case3Policy := policy.Policy{
 | 
						|
		ID:      "MyPolicyForMyBucket",
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
	}
 | 
						|
	case3Result := NewPolicySys()
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		policySys      *PolicySys
 | 
						|
		bucketName     string
 | 
						|
		bucketPolicy   policy.Policy
 | 
						|
		expectedResult *PolicySys
 | 
						|
	}{
 | 
						|
		{case1PolicySys, "mybucket", case1Policy, case1Result},
 | 
						|
		{case2PolicySys, "mybucket", case2Policy, case2Result},
 | 
						|
		{case3PolicySys, "mybucket", case3Policy, case3Result},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, testCase := range testCases {
 | 
						|
		result := testCase.policySys
 | 
						|
		result.Set(testCase.bucketName, testCase.bucketPolicy)
 | 
						|
 | 
						|
		if !reflect.DeepEqual(result, testCase.expectedResult) {
 | 
						|
			t.Fatalf("case %v: expected: %v, got: %v\n", i+1, testCase.expectedResult, result)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPolicySysRemove(t *testing.T) {
 | 
						|
	case1Policy := policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.PutObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	case1PolicySys := NewPolicySys()
 | 
						|
	case1PolicySys.bucketPolicyMap["mybucket"] = case1Policy
 | 
						|
	case1Result := NewPolicySys()
 | 
						|
 | 
						|
	case2Policy := policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
	case2PolicySys := NewPolicySys()
 | 
						|
	case2PolicySys.bucketPolicyMap["mybucket"] = case2Policy
 | 
						|
	case2Result := NewPolicySys()
 | 
						|
	case2Result.bucketPolicyMap["mybucket"] = case2Policy
 | 
						|
 | 
						|
	case3PolicySys := NewPolicySys()
 | 
						|
	case3Result := NewPolicySys()
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		policySys      *PolicySys
 | 
						|
		bucketName     string
 | 
						|
		expectedResult *PolicySys
 | 
						|
	}{
 | 
						|
		{case1PolicySys, "mybucket", case1Result},
 | 
						|
		{case2PolicySys, "yourbucket", case2Result},
 | 
						|
		{case3PolicySys, "mybucket", case3Result},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, testCase := range testCases {
 | 
						|
		result := testCase.policySys
 | 
						|
		result.Remove(testCase.bucketName)
 | 
						|
 | 
						|
		if !reflect.DeepEqual(result, testCase.expectedResult) {
 | 
						|
			t.Fatalf("case %v: expected: %v, got: %v\n", i+1, testCase.expectedResult, result)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPolicySysIsAllowed(t *testing.T) {
 | 
						|
	policySys := NewPolicySys()
 | 
						|
	policySys.Set("mybucket", policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetBucketLocationAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.PutObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	})
 | 
						|
 | 
						|
	anonGetBucketLocationArgs := policy.Args{
 | 
						|
		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:          policy.GetBucketLocationAction,
 | 
						|
		BucketName:      "mybucket",
 | 
						|
		ConditionValues: map[string][]string{},
 | 
						|
	}
 | 
						|
 | 
						|
	anonPutObjectActionArgs := policy.Args{
 | 
						|
		AccountName: "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:      policy.PutObjectAction,
 | 
						|
		BucketName:  "mybucket",
 | 
						|
		ConditionValues: map[string][]string{
 | 
						|
			"x-amz-copy-source": {"mybucket/myobject"},
 | 
						|
			"SourceIp":          {"192.168.1.10"},
 | 
						|
		},
 | 
						|
		ObjectName: "myobject",
 | 
						|
	}
 | 
						|
 | 
						|
	anonGetObjectActionArgs := policy.Args{
 | 
						|
		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:          policy.GetObjectAction,
 | 
						|
		BucketName:      "mybucket",
 | 
						|
		ConditionValues: map[string][]string{},
 | 
						|
		ObjectName:      "myobject",
 | 
						|
	}
 | 
						|
 | 
						|
	getBucketLocationArgs := policy.Args{
 | 
						|
		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:          policy.GetBucketLocationAction,
 | 
						|
		BucketName:      "mybucket",
 | 
						|
		ConditionValues: map[string][]string{},
 | 
						|
		IsOwner:         true,
 | 
						|
	}
 | 
						|
 | 
						|
	putObjectActionArgs := policy.Args{
 | 
						|
		AccountName: "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:      policy.PutObjectAction,
 | 
						|
		BucketName:  "mybucket",
 | 
						|
		ConditionValues: map[string][]string{
 | 
						|
			"x-amz-copy-source": {"mybucket/myobject"},
 | 
						|
			"SourceIp":          {"192.168.1.10"},
 | 
						|
		},
 | 
						|
		IsOwner:    true,
 | 
						|
		ObjectName: "myobject",
 | 
						|
	}
 | 
						|
 | 
						|
	getObjectActionArgs := policy.Args{
 | 
						|
		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:          policy.GetObjectAction,
 | 
						|
		BucketName:      "mybucket",
 | 
						|
		ConditionValues: map[string][]string{},
 | 
						|
		IsOwner:         true,
 | 
						|
		ObjectName:      "myobject",
 | 
						|
	}
 | 
						|
 | 
						|
	yourbucketAnonGetObjectActionArgs := policy.Args{
 | 
						|
		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:          policy.GetObjectAction,
 | 
						|
		BucketName:      "yourbucket",
 | 
						|
		ConditionValues: map[string][]string{},
 | 
						|
		ObjectName:      "yourobject",
 | 
						|
	}
 | 
						|
 | 
						|
	yourbucketGetObjectActionArgs := policy.Args{
 | 
						|
		AccountName:     "Q3AM3UQ867SPQQA43P2F",
 | 
						|
		Action:          policy.GetObjectAction,
 | 
						|
		BucketName:      "yourbucket",
 | 
						|
		ConditionValues: map[string][]string{},
 | 
						|
		IsOwner:         true,
 | 
						|
		ObjectName:      "yourobject",
 | 
						|
	}
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		policySys      *PolicySys
 | 
						|
		args           policy.Args
 | 
						|
		expectedResult bool
 | 
						|
	}{
 | 
						|
		{policySys, anonGetBucketLocationArgs, true},
 | 
						|
		{policySys, anonPutObjectActionArgs, true},
 | 
						|
		{policySys, anonGetObjectActionArgs, false},
 | 
						|
		{policySys, getBucketLocationArgs, true},
 | 
						|
		{policySys, putObjectActionArgs, true},
 | 
						|
		{policySys, getObjectActionArgs, true},
 | 
						|
		{policySys, yourbucketAnonGetObjectActionArgs, false},
 | 
						|
		{policySys, yourbucketGetObjectActionArgs, true},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, testCase := range testCases {
 | 
						|
		result := testCase.policySys.IsAllowed(testCase.args)
 | 
						|
 | 
						|
		if result != testCase.expectedResult {
 | 
						|
			t.Fatalf("case %v: expected: %v, got: %v\n", i+1, testCase.expectedResult, result)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func getReadOnlyStatement(bucketName, prefix string) []miniogopolicy.Statement {
 | 
						|
	return []miniogopolicy.Statement{
 | 
						|
		{
 | 
						|
			Effect:    string(policy.Allow),
 | 
						|
			Principal: miniogopolicy.User{AWS: set.CreateStringSet("*")},
 | 
						|
			Resources: set.CreateStringSet(policy.NewResource(bucketName, "").String()),
 | 
						|
			Actions:   set.CreateStringSet("s3:GetBucketLocation", "s3:ListBucket"),
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Effect:    string(policy.Allow),
 | 
						|
			Principal: miniogopolicy.User{AWS: set.CreateStringSet("*")},
 | 
						|
			Resources: set.CreateStringSet(policy.NewResource(bucketName, prefix).String()),
 | 
						|
			Actions:   set.CreateStringSet("s3:GetObject"),
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestPolicyToBucketAccessPolicy(t *testing.T) {
 | 
						|
	case1Policy := &policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetBucketLocationAction, policy.ListBucketAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	case1Result := &miniogopolicy.BucketAccessPolicy{
 | 
						|
		Version:    policy.DefaultVersion,
 | 
						|
		Statements: getReadOnlyStatement("mybucket", "/myobject*"),
 | 
						|
	}
 | 
						|
 | 
						|
	case2Policy := &policy.Policy{
 | 
						|
		Version:    policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{},
 | 
						|
	}
 | 
						|
 | 
						|
	case2Result := &miniogopolicy.BucketAccessPolicy{
 | 
						|
		Version:    policy.DefaultVersion,
 | 
						|
		Statements: []miniogopolicy.Statement{},
 | 
						|
	}
 | 
						|
 | 
						|
	case3Policy := &policy.Policy{
 | 
						|
		Version: "12-10-2012",
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.PutObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		bucketPolicy   *policy.Policy
 | 
						|
		expectedResult *miniogopolicy.BucketAccessPolicy
 | 
						|
		expectErr      bool
 | 
						|
	}{
 | 
						|
		{case1Policy, case1Result, false},
 | 
						|
		{case2Policy, case2Result, false},
 | 
						|
		{case3Policy, nil, true},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, testCase := range testCases {
 | 
						|
		result, err := PolicyToBucketAccessPolicy(testCase.bucketPolicy)
 | 
						|
		expectErr := (err != nil)
 | 
						|
 | 
						|
		if expectErr != testCase.expectErr {
 | 
						|
			t.Fatalf("case %v: error: expected: %v, got: %v\n", i+1, testCase.expectErr, expectErr)
 | 
						|
		}
 | 
						|
 | 
						|
		if !testCase.expectErr {
 | 
						|
			if !reflect.DeepEqual(result, testCase.expectedResult) {
 | 
						|
				t.Fatalf("case %v: result: expected: %+v, got: %+v\n", i+1, testCase.expectedResult, result)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestBucketAccessPolicyToPolicy(t *testing.T) {
 | 
						|
	case1PolicyInfo := &miniogopolicy.BucketAccessPolicy{
 | 
						|
		Version:    policy.DefaultVersion,
 | 
						|
		Statements: getReadOnlyStatement("mybucket", "/myobject*"),
 | 
						|
	}
 | 
						|
 | 
						|
	case1Result := &policy.Policy{
 | 
						|
		Version: policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetBucketLocationAction, policy.ListBucketAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
			policy.NewStatement(
 | 
						|
				policy.Allow,
 | 
						|
				policy.NewPrincipal("*"),
 | 
						|
				policy.NewActionSet(policy.GetObjectAction),
 | 
						|
				policy.NewResourceSet(policy.NewResource("mybucket", "/myobject*")),
 | 
						|
				condition.NewFunctions(),
 | 
						|
			),
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	case2PolicyInfo := &miniogopolicy.BucketAccessPolicy{
 | 
						|
		Version:    policy.DefaultVersion,
 | 
						|
		Statements: []miniogopolicy.Statement{},
 | 
						|
	}
 | 
						|
 | 
						|
	case2Result := &policy.Policy{
 | 
						|
		Version:    policy.DefaultVersion,
 | 
						|
		Statements: []policy.Statement{},
 | 
						|
	}
 | 
						|
 | 
						|
	case3PolicyInfo := &miniogopolicy.BucketAccessPolicy{
 | 
						|
		Version:    "12-10-2012",
 | 
						|
		Statements: getReadOnlyStatement("mybucket", "/myobject*"),
 | 
						|
	}
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		policyInfo     *miniogopolicy.BucketAccessPolicy
 | 
						|
		expectedResult *policy.Policy
 | 
						|
		expectErr      bool
 | 
						|
	}{
 | 
						|
		{case1PolicyInfo, case1Result, false},
 | 
						|
		{case2PolicyInfo, case2Result, false},
 | 
						|
		{case3PolicyInfo, nil, true},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, testCase := range testCases {
 | 
						|
		result, err := BucketAccessPolicyToPolicy(testCase.policyInfo)
 | 
						|
		expectErr := (err != nil)
 | 
						|
 | 
						|
		if expectErr != testCase.expectErr {
 | 
						|
			t.Fatalf("case %v: error: expected: %v, got: %v\n", i+1, testCase.expectErr, expectErr)
 | 
						|
		}
 | 
						|
 | 
						|
		if !testCase.expectErr {
 | 
						|
			if !reflect.DeepEqual(result, testCase.expectedResult) {
 | 
						|
				t.Fatalf("case %v: result: expected: %+v, got: %+v\n", i+1, testCase.expectedResult, result)
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |