diff --git a/src/restic/backend/s3/s3.go b/src/restic/backend/s3/s3.go index 484bfe733..a06d4a7f5 100644 --- a/src/restic/backend/s3/s3.go +++ b/src/restic/backend/s3/s3.go @@ -27,7 +27,7 @@ type s3 struct { func Open(cfg Config) (backend.Backend, error) { debug.Log("s3.Open", "open, config %#v", cfg) - client, err := minio.New(cfg.Endpoint, cfg.KeyID, cfg.Secret, cfg.UseHTTP) + client, err := minio.New(cfg.Endpoint, cfg.KeyID, cfg.Secret, !cfg.UseHTTP) if err != nil { return nil, err } diff --git a/vendor/manifest b/vendor/manifest index 1b55eeb43..05ee28686 100644 --- a/vendor/manifest +++ b/vendor/manifest @@ -28,7 +28,7 @@ { "importpath": "github.com/minio/minio-go", "repository": "https://github.com/minio/minio-go", - "revision": "867b27701ad16db4a9f4dad40d28187ca8433ec9", + "revision": "a8babf4220d5dd7240d011bdb7be567b439460f9", "branch": "master" }, { diff --git a/vendor/src/github.com/minio/minio-go/API.md b/vendor/src/github.com/minio/minio-go/API.md index 8e1c82dc9..d73a469ae 100644 --- a/vendor/src/github.com/minio/minio-go/API.md +++ b/vendor/src/github.com/minio/minio-go/API.md @@ -12,7 +12,8 @@ import ( ) func main() { - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + secure := true // Make HTTPS requests by default. + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", secure) if err !!= nil { fmt.Println(err) return @@ -446,7 +447,7 @@ if err != nil { ### Presigned operations --------------------------------------- -#### PresignedGetObject(bucketName, objectName string, expiry time.Duration, reqParams url.Values) error +#### PresignedGetObject(bucketName, objectName string, expiry time.Duration, reqParams url.Values) (*url.URL, error) Generate a presigned URL for GET. __Parameters__ @@ -471,7 +472,7 @@ if err != nil { --------------------------------------- -#### PresignedPutObject(bucketName string, objectName string, expiry time.Duration) (string, error) +#### PresignedPutObject(bucketName string, objectName string, expiry time.Duration) (*url.URL, error) Generate a presigned URL for PUT.
NOTE: you can upload to S3 only with specified object name. @@ -494,7 +495,7 @@ if err != nil { --------------------------------------- -#### PresignedPostPolicy(policy PostPolicy) (map[string]string, error) +#### PresignedPostPolicy(policy PostPolicy) (*url.URL, map[string]string, error) PresignedPostPolicy we can provide policies specifying conditions restricting what you want to allow in a POST request, such as bucket name where objects can be uploaded, key name prefixes that you want to allow for the object being created and more. @@ -517,7 +518,7 @@ policy.SetContentLengthRange(1024, 1024*1024) ``` Get the POST form key/value object: ```go -formData, err := s3Client.PresignedPostPolicy(policy) +url, formData, err := s3Client.PresignedPostPolicy(policy) if err != nil { fmt.Println(err) return @@ -531,5 +532,5 @@ for k, v := range m { fmt.Printf("-F %s=%s ", k, v) } fmt.Printf("-F file=@/etc/bash.bashrc ") -fmt.Printf("https://my-bucketname.s3.amazonaws.com\n") +fmt.Printf("%s\n", url) ``` diff --git a/vendor/src/github.com/minio/minio-go/README.md b/vendor/src/github.com/minio/minio-go/README.md index 3db4f7b8f..88b977f69 100644 --- a/vendor/src/github.com/minio/minio-go/README.md +++ b/vendor/src/github.com/minio/minio-go/README.md @@ -40,12 +40,13 @@ import ( ) func main() { - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESS-KEY-HERE", "YOUR-SECRET-KEY-HERE", false) + secure := true // Defaults to HTTPS requests. + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESS-KEY-HERE", "YOUR-SECRET-KEY-HERE", secure) if err != nil { log.Fatalln(err) } @@ -85,9 +86,9 @@ func main() { * [FGetObject(bucketName, objectName, filePath) error](examples/s3/fgetobject.go) ### Presigned Operations. -* [PresignedGetObject(bucketName, objectName, time.Duration, url.Values) (string, error)](examples/s3/presignedgetobject.go) -* [PresignedPutObject(bucketName, objectName, time.Duration) (string, error)](examples/s3/presignedputobject.go) -* [PresignedPostPolicy(NewPostPolicy()) (map[string]string, error)](examples/s3/presignedpostpolicy.go) +* [PresignedGetObject(bucketName, objectName, time.Duration, url.Values) (*url.URL, error)](examples/s3/presignedgetobject.go) +* [PresignedPutObject(bucketName, objectName, time.Duration) (*url.URL, error)](examples/s3/presignedputobject.go) +* [PresignedPostPolicy(NewPostPolicy()) (*url.URL, map[string]string, error)](examples/s3/presignedpostpolicy.go) ### Bucket Policy Operations. * [SetBucketPolicy(bucketName, objectPrefix, BucketPolicy) error](examples/s3/setbucketpolicy.go) diff --git a/vendor/src/github.com/minio/minio-go/api-error-response.go b/vendor/src/github.com/minio/minio-go/api-error-response.go index e6789aff5..3bfff44ed 100644 --- a/vendor/src/github.com/minio/minio-go/api-error-response.go +++ b/vendor/src/github.com/minio/minio-go/api-error-response.go @@ -223,3 +223,13 @@ func ErrInvalidArgument(message string) error { RequestID: "minio", } } + +// ErrNoSuchBucketPolicy - No Such Bucket Policy response +// The specified bucket does not have a bucket policy. +func ErrNoSuchBucketPolicy(message string) error { + return ErrorResponse{ + Code: "NoSuchBucketPolicy", + Message: message, + RequestID: "minio", + } +} diff --git a/vendor/src/github.com/minio/minio-go/api-get-object.go b/vendor/src/github.com/minio/minio-go/api-get-object.go index b5b74ff72..ad3eadaa2 100644 --- a/vendor/src/github.com/minio/minio-go/api-get-object.go +++ b/vendor/src/github.com/minio/minio-go/api-get-object.go @@ -59,6 +59,9 @@ func (c Client) GetObject(bucketName, objectName string) (*Object, error) { select { // When the done channel is closed exit our routine. case <-doneCh: + // Close the http response body before returning. + // This ends the connection with the server. + httpReader.Close() return // Request message. case req := <-reqCh: diff --git a/vendor/src/github.com/minio/minio-go/api-list.go b/vendor/src/github.com/minio/minio-go/api-list.go index e61763db9..ed1a4a6c0 100644 --- a/vendor/src/github.com/minio/minio-go/api-list.go +++ b/vendor/src/github.com/minio/minio-go/api-list.go @@ -77,7 +77,7 @@ func (c Client) ListBuckets() ([]BucketInfo, error) { // func (c Client) ListObjects(bucketName, objectPrefix string, recursive bool, doneCh <-chan struct{}) <-chan ObjectInfo { // Allocate new list objects channel. - objectStatCh := make(chan ObjectInfo) + objectStatCh := make(chan ObjectInfo, 1) // Default listing is delimited at "/" delimiter := "/" if recursive { @@ -254,7 +254,7 @@ func (c Client) ListIncompleteUploads(bucketName, objectPrefix string, recursive // listIncompleteUploads lists all incomplete uploads. func (c Client) listIncompleteUploads(bucketName, objectPrefix string, recursive, aggregateSize bool, doneCh <-chan struct{}) <-chan ObjectMultipartInfo { // Allocate channel for multipart uploads. - objectMultipartStatCh := make(chan ObjectMultipartInfo) + objectMultipartStatCh := make(chan ObjectMultipartInfo, 1) // Delimiter is set to "/" by default. delimiter := "/" if recursive { diff --git a/vendor/src/github.com/minio/minio-go/api-presigned.go b/vendor/src/github.com/minio/minio-go/api-presigned.go index 5d1ab7bb0..83e9cde82 100644 --- a/vendor/src/github.com/minio/minio-go/api-presigned.go +++ b/vendor/src/github.com/minio/minio-go/api-presigned.go @@ -33,19 +33,19 @@ var supportedGetReqParams = map[string]struct{}{ // presignURL - Returns a presigned URL for an input 'method'. // Expires maximum is 7days - ie. 604800 and minimum is 1. -func (c Client) presignURL(method string, bucketName string, objectName string, expires time.Duration, reqParams url.Values) (urlStr string, err error) { +func (c Client) presignURL(method string, bucketName string, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) { // Input validation. if method == "" { - return "", ErrInvalidArgument("method cannot be empty.") + return nil, ErrInvalidArgument("method cannot be empty.") } if err := isValidBucketName(bucketName); err != nil { - return "", err + return nil, err } if err := isValidObjectName(objectName); err != nil { - return "", err + return nil, err } if err := isValidExpiry(expires); err != nil { - return "", err + return nil, err } // Convert expires into seconds. @@ -63,7 +63,7 @@ func (c Client) presignURL(method string, bucketName string, objectName string, // Verify if input map has unsupported params, if yes exit. for k := range reqParams { if _, ok := supportedGetReqParams[k]; !ok { - return "", ErrInvalidArgument(k + " unsupported request parameter for presigned GET.") + return nil, ErrInvalidArgument(k + " unsupported request parameter for presigned GET.") } } // Save the request parameters to be used in presigning for @@ -75,43 +75,48 @@ func (c Client) presignURL(method string, bucketName string, objectName string, // Since expires is set newRequest will presign the request. req, err := c.newRequest(method, reqMetadata) if err != nil { - return "", err + return nil, err } - return req.URL.String(), nil + return req.URL, nil } // PresignedGetObject - Returns a presigned URL to access an object // without credentials. Expires maximum is 7days - ie. 604800 and // minimum is 1. Additionally you can override a set of response // headers using the query parameters. -func (c Client) PresignedGetObject(bucketName string, objectName string, expires time.Duration, reqParams url.Values) (url string, err error) { +func (c Client) PresignedGetObject(bucketName string, objectName string, expires time.Duration, reqParams url.Values) (u *url.URL, err error) { return c.presignURL("GET", bucketName, objectName, expires, reqParams) } // PresignedPutObject - Returns a presigned URL to upload an object without credentials. // Expires maximum is 7days - ie. 604800 and minimum is 1. -func (c Client) PresignedPutObject(bucketName string, objectName string, expires time.Duration) (url string, err error) { +func (c Client) PresignedPutObject(bucketName string, objectName string, expires time.Duration) (u *url.URL, err error) { return c.presignURL("PUT", bucketName, objectName, expires, nil) } -// PresignedPostPolicy - Returns POST form data to upload an object at a location. -func (c Client) PresignedPostPolicy(p *PostPolicy) (map[string]string, error) { +// PresignedPostPolicy - Returns POST urlString, form data to upload an object. +func (c Client) PresignedPostPolicy(p *PostPolicy) (u *url.URL, formData map[string]string, err error) { // Validate input arguments. if p.expiration.IsZero() { - return nil, errors.New("Expiration time must be specified") + return nil, nil, errors.New("Expiration time must be specified") } if _, ok := p.formData["key"]; !ok { - return nil, errors.New("object key must be specified") + return nil, nil, errors.New("object key must be specified") } if _, ok := p.formData["bucket"]; !ok { - return nil, errors.New("bucket name must be specified") + return nil, nil, errors.New("bucket name must be specified") } bucketName := p.formData["bucket"] // Fetch the bucket location. location, err := c.getBucketLocation(bucketName) if err != nil { - return nil, err + return nil, nil, err + } + + u, err = c.makeTargetURL(bucketName, "", location, nil) + if err != nil { + return nil, nil, err } // Keep time. @@ -129,7 +134,7 @@ func (c Client) PresignedPostPolicy(p *PostPolicy) (map[string]string, error) { } // Sign the policy. p.formData["signature"] = postPresignSignatureV2(policyBase64, c.secretAccessKey) - return p.formData, nil + return u, p.formData, nil } // Add date policy. @@ -138,7 +143,7 @@ func (c Client) PresignedPostPolicy(p *PostPolicy) (map[string]string, error) { condition: "$x-amz-date", value: t.Format(iso8601DateFormat), }); err != nil { - return nil, err + return nil, nil, err } // Add algorithm policy. @@ -147,7 +152,7 @@ func (c Client) PresignedPostPolicy(p *PostPolicy) (map[string]string, error) { condition: "$x-amz-algorithm", value: signV4Algorithm, }); err != nil { - return nil, err + return nil, nil, err } // Add a credential policy. @@ -157,7 +162,7 @@ func (c Client) PresignedPostPolicy(p *PostPolicy) (map[string]string, error) { condition: "$x-amz-credential", value: credential, }); err != nil { - return nil, err + return nil, nil, err } // Get base64 encoded policy. @@ -168,5 +173,5 @@ func (c Client) PresignedPostPolicy(p *PostPolicy) (map[string]string, error) { p.formData["x-amz-credential"] = credential p.formData["x-amz-date"] = t.Format(iso8601DateFormat) p.formData["x-amz-signature"] = postPresignSignatureV4(policyBase64, t, c.secretAccessKey, location) - return p.formData, nil + return u, p.formData, nil } diff --git a/vendor/src/github.com/minio/minio-go/api-put-bucket.go b/vendor/src/github.com/minio/minio-go/api-put-bucket.go index 357f8b992..9e025f2cf 100644 --- a/vendor/src/github.com/minio/minio-go/api-put-bucket.go +++ b/vendor/src/github.com/minio/minio-go/api-put-bucket.go @@ -26,6 +26,7 @@ import ( "io/ioutil" "net/http" "net/url" + "reflect" ) /// Bucket operations @@ -166,14 +167,22 @@ func (c Client) SetBucketPolicy(bucketName string, objectPrefix string, bucketPo return nil } // Remove any previous policies at this path. - policy.Statements = removeBucketPolicyStatement(policy.Statements, bucketName, objectPrefix) + statements := removeBucketPolicyStatement(policy.Statements, bucketName, objectPrefix) // generating []Statement for the given bucketPolicy. - statements, err := generatePolicyStatement(bucketPolicy, bucketName, objectPrefix) + generatedStatements, err := generatePolicyStatement(bucketPolicy, bucketName, objectPrefix) if err != nil { return err } - policy.Statements = append(policy.Statements, statements...) + statements = append(statements, generatedStatements...) + + // No change in the statements indicates an attempt of setting 'none' on a prefix + // which doesn't have a pre-existing policy. + if reflect.DeepEqual(policy.Statements, statements) { + return ErrNoSuchBucketPolicy(fmt.Sprintf("No policy exists on %s/%s", bucketName, objectPrefix)) + } + + policy.Statements = statements // Save the updated policies. return c.putBucketPolicy(bucketName, policy) } diff --git a/vendor/src/github.com/minio/minio-go/api-put-object-multipart.go b/vendor/src/github.com/minio/minio-go/api-put-object-multipart.go index be96ad232..1b2b44882 100644 --- a/vendor/src/github.com/minio/minio-go/api-put-object-multipart.go +++ b/vendor/src/github.com/minio/minio-go/api-put-object-multipart.go @@ -42,7 +42,7 @@ import ( // is where each part is re-downloaded, checksummed and verified // before upload. func (c Client) putObjectMultipart(bucketName, objectName string, reader io.Reader, size int64, contentType string, progress io.Reader) (n int64, err error) { - if size > 0 && size >= minPartSize { + if size > 0 && size > minPartSize { // Verify if reader is *os.File, then use file system functionalities. if isFile(reader) { return c.putObjectMultipartFromFile(bucketName, objectName, reader.(*os.File), size, contentType, progress) diff --git a/vendor/src/github.com/minio/minio-go/api-put-object.go b/vendor/src/github.com/minio/minio-go/api-put-object.go index 10390c6c5..39b7931a8 100644 --- a/vendor/src/github.com/minio/minio-go/api-put-object.go +++ b/vendor/src/github.com/minio/minio-go/api-put-object.go @@ -27,78 +27,94 @@ import ( "strings" ) +// toInt - converts go value to its integer representation based +// on the value kind if it is an integer. +func toInt(value reflect.Value) (size int64) { + size = -1 + if value.IsValid() { + switch value.Kind() { + case reflect.Int: + fallthrough + case reflect.Int8: + fallthrough + case reflect.Int16: + fallthrough + case reflect.Int32: + fallthrough + case reflect.Int64: + size = value.Int() + } + } + return size +} + // getReaderSize - Determine the size of Reader if available. func getReaderSize(reader io.Reader) (size int64, err error) { - var result []reflect.Value size = -1 - if reader != nil { - // Verify if there is a method by name 'Size'. - lenFn := reflect.ValueOf(reader).MethodByName("Size") - if lenFn.IsValid() { - if lenFn.Kind() == reflect.Func { - // Call the 'Size' function and save its return value. - result = lenFn.Call([]reflect.Value{}) - if len(result) == 1 { - lenValue := result[0] - if lenValue.IsValid() { - switch lenValue.Kind() { - case reflect.Int: - fallthrough - case reflect.Int8: - fallthrough - case reflect.Int16: - fallthrough - case reflect.Int32: - fallthrough - case reflect.Int64: - size = lenValue.Int() - } + if reader == nil { + return -1, nil + } + // Verify if there is a method by name 'Size'. + sizeFn := reflect.ValueOf(reader).MethodByName("Size") + // Verify if there is a method by name 'Len'. + lenFn := reflect.ValueOf(reader).MethodByName("Len") + if sizeFn.IsValid() { + if sizeFn.Kind() == reflect.Func { + // Call the 'Size' function and save its return value. + result := sizeFn.Call([]reflect.Value{}) + if len(result) == 1 { + size = toInt(result[0]) + } + } + } else if lenFn.IsValid() { + if lenFn.Kind() == reflect.Func { + // Call the 'Len' function and save its return value. + result := lenFn.Call([]reflect.Value{}) + if len(result) == 1 { + size = toInt(result[0]) + } + } + } else { + // Fallback to Stat() method, two possible Stat() structs exist. + switch v := reader.(type) { + case *os.File: + var st os.FileInfo + st, err = v.Stat() + if err != nil { + // Handle this case specially for "windows", + // certain files for example 'Stdin', 'Stdout' and + // 'Stderr' it is not allowed to fetch file information. + if runtime.GOOS == "windows" { + if strings.Contains(err.Error(), "GetFileInformationByHandle") { + return -1, nil } } + return } - } else { - // Fallback to Stat() method, two possible Stat() structs - // exist. - switch v := reader.(type) { - case *os.File: - var st os.FileInfo - st, err = v.Stat() - if err != nil { - // Handle this case specially for "windows", - // certain files for example 'Stdin', 'Stdout' and - // 'Stderr' it is not allowed to fetch file information. - if runtime.GOOS == "windows" { - if strings.Contains(err.Error(), "GetFileInformationByHandle") { - return -1, nil - } - } - return - } - // Ignore if input is a directory, throw an error. - if st.Mode().IsDir() { - return -1, ErrInvalidArgument("Input file cannot be a directory.") - } - // Ignore 'Stdin', 'Stdout' and 'Stderr', since they - // represent *os.File type but internally do not - // implement Seekable calls. Ignore them and treat - // them like a stream with unknown length. - switch st.Name() { - case "stdin": - fallthrough - case "stdout": - fallthrough - case "stderr": - return - } - size = st.Size() - case *Object: - var st ObjectInfo - st, err = v.Stat() - if err != nil { - return - } - size = st.Size + // Ignore if input is a directory, throw an error. + if st.Mode().IsDir() { + return -1, ErrInvalidArgument("Input file cannot be a directory.") } + // Ignore 'Stdin', 'Stdout' and 'Stderr', since they + // represent *os.File type but internally do not + // implement Seekable calls. Ignore them and treat + // them like a stream with unknown length. + switch st.Name() { + case "stdin": + fallthrough + case "stdout": + fallthrough + case "stderr": + return + } + size = st.Size() + case *Object: + var st ObjectInfo + st, err = v.Stat() + if err != nil { + return + } + size = st.Size } } // Returns the size here. diff --git a/vendor/src/github.com/minio/minio-go/api.go b/vendor/src/github.com/minio/minio-go/api.go index 93c0a6d23..2051a68c7 100644 --- a/vendor/src/github.com/minio/minio-go/api.go +++ b/vendor/src/github.com/minio/minio-go/api.go @@ -84,8 +84,8 @@ const ( // NewV2 - instantiate minio client with Amazon S3 signature version // '2' compatibility. -func NewV2(endpoint string, accessKeyID, secretAccessKey string, insecure bool) (*Client, error) { - clnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, insecure) +func NewV2(endpoint string, accessKeyID, secretAccessKey string, secure bool) (*Client, error) { + clnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, secure) if err != nil { return nil, err } @@ -96,8 +96,8 @@ func NewV2(endpoint string, accessKeyID, secretAccessKey string, insecure bool) // NewV4 - instantiate minio client with Amazon S3 signature version // '4' compatibility. -func NewV4(endpoint string, accessKeyID, secretAccessKey string, insecure bool) (*Client, error) { - clnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, insecure) +func NewV4(endpoint string, accessKeyID, secretAccessKey string, secure bool) (*Client, error) { + clnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, secure) if err != nil { return nil, err } @@ -108,8 +108,8 @@ func NewV4(endpoint string, accessKeyID, secretAccessKey string, insecure bool) // New - instantiate minio client Client, adds automatic verification // of signature. -func New(endpoint string, accessKeyID, secretAccessKey string, insecure bool) (*Client, error) { - clnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, insecure) +func New(endpoint string, accessKeyID, secretAccessKey string, secure bool) (*Client, error) { + clnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, secure) if err != nil { return nil, err } @@ -148,9 +148,9 @@ func (r *lockedRandSource) Seed(seed int64) { r.lk.Unlock() } -func privateNew(endpoint, accessKeyID, secretAccessKey string, insecure bool) (*Client, error) { +func privateNew(endpoint, accessKeyID, secretAccessKey string, secure bool) (*Client, error) { // construct endpoint. - endpointURL, err := getEndpointURL(endpoint, insecure) + endpointURL, err := getEndpointURL(endpoint, secure) if err != nil { return nil, err } @@ -168,10 +168,6 @@ func privateNew(endpoint, accessKeyID, secretAccessKey string, insecure bool) (* // Instantiate http client and bucket location cache. clnt.httpClient = &http.Client{ - // Setting a sensible time out of 2minutes to wait for response - // headers. Request is pro-actively cancelled after 2minutes - // if no response was received from server. - Timeout: 2 * time.Minute, Transport: http.DefaultTransport, } @@ -220,13 +216,6 @@ func (c *Client) SetCustomTransport(customHTTPTransport http.RoundTripper) { } } -// SetClientTimeout - set http client timeout. -func (c *Client) SetClientTimeout(timeout time.Duration) { - if c.httpClient != nil { - c.httpClient.Timeout = timeout - } -} - // TraceOn - enable HTTP tracing. func (c *Client) TraceOn(outputStream io.Writer) { // if outputStream is nil then default to os.Stdout. @@ -568,10 +557,15 @@ func (c Client) newRequest(method string, metadata requestMetadata) (req *http.R req.Body = ioutil.NopCloser(metadata.contentBody) } - // set 'Expect' header for the request. - req.Header.Set("Expect", "100-continue") + // FIXEM: Enable this when Google Cloud Storage properly supports 100-continue. + // Skip setting 'expect' header for Google Cloud Storage, there + // are some known issues - https://github.com/restic/restic/issues/520 + if !isGoogleEndpoint(c.endpointURL) { + // Set 'Expect' header for the request. + req.Header.Set("Expect", "100-continue") + } - // set 'User-Agent' header for the request. + // Set 'User-Agent' header for the request. c.setUserAgent(req) // Set all headers. diff --git a/vendor/src/github.com/minio/minio-go/api_functional_v2_test.go b/vendor/src/github.com/minio/minio-go/api_functional_v2_test.go index 7fbd97c31..ff4a1bfc5 100644 --- a/vendor/src/github.com/minio/minio-go/api_functional_v2_test.go +++ b/vendor/src/github.com/minio/minio-go/api_functional_v2_test.go @@ -46,7 +46,7 @@ func TestMakeBucketErrorV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -92,7 +92,7 @@ func TestGetObjectClosedTwiceV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -177,7 +177,7 @@ func TestRemovePartiallyUploadedV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -244,7 +244,7 @@ func TestResumablePutObjectV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -355,7 +355,7 @@ func TestFPutObjectV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -503,7 +503,7 @@ func TestResumableFPutObjectV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -580,7 +580,7 @@ func TestMakeBucketRegionsV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -631,7 +631,7 @@ func TestGetObjectReadSeekFunctionalV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -769,7 +769,7 @@ func TestGetObjectReadAtFunctionalV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -910,7 +910,7 @@ func TestCopyObjectV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -996,10 +996,6 @@ func TestCopyObjectV2(t *testing.T) { t.Fatalf("Error: number of bytes does not match, want %v, got %v\n", objInfo.Size, objInfoCopy.Size) } - if objInfo.ETag != objInfoCopy.ETag { - t.Fatalf("Error: ETags do not match, want %v, got %v\n", - objInfoCopy.ETag, objInfo.ETag) - } // Remove all objects and buckets err = c.RemoveObject(bucketName, objectName) @@ -1036,7 +1032,7 @@ func TestFunctionalV2(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -1184,7 +1180,7 @@ func TestFunctionalV2(t *testing.T) { t.Fatal("Error: ", err) } // Verify if presigned url works. - resp, err := http.Get(presignedGetURL) + resp, err := http.Get(presignedGetURL.String()) if err != nil { t.Fatal("Error: ", err) } @@ -1208,7 +1204,7 @@ func TestFunctionalV2(t *testing.T) { t.Fatal("Error: ", err) } // Verify if presigned url works. - resp, err = http.Get(presignedGetURL) + resp, err = http.Get(presignedGetURL.String()) if err != nil { t.Fatal("Error: ", err) } @@ -1236,7 +1232,7 @@ func TestFunctionalV2(t *testing.T) { if err != nil { t.Fatal("Error: ", err) } - req, err := http.NewRequest("PUT", presignedPutURL, bytes.NewReader(buf)) + req, err := http.NewRequest("PUT", presignedPutURL.String(), bytes.NewReader(buf)) if err != nil { t.Fatal("Error: ", err) } diff --git a/vendor/src/github.com/minio/minio-go/api_functional_v4_test.go b/vendor/src/github.com/minio/minio-go/api_functional_v4_test.go index 7126dd7a9..168833362 100644 --- a/vendor/src/github.com/minio/minio-go/api_functional_v4_test.go +++ b/vendor/src/github.com/minio/minio-go/api_functional_v4_test.go @@ -70,7 +70,7 @@ func TestMakeBucketError(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -116,7 +116,7 @@ func TestMakeBucketRegions(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -167,7 +167,7 @@ func TestGetObjectClosedTwice(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -252,7 +252,7 @@ func TestRemovePartiallyUploaded(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -322,7 +322,7 @@ func TestResumablePutObject(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -432,7 +432,7 @@ func TestResumableFPutObject(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -512,7 +512,7 @@ func TestFPutObject(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -660,7 +660,7 @@ func TestGetObjectReadSeekFunctional(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -798,7 +798,7 @@ func TestGetObjectReadAtFunctional(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -939,7 +939,7 @@ func TestCopyObject(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -1025,10 +1025,6 @@ func TestCopyObject(t *testing.T) { t.Fatalf("Error: number of bytes does not match, want %v, got %v\n", objInfo.Size, objInfoCopy.Size) } - if objInfo.ETag != objInfoCopy.ETag { - t.Fatalf("Error: ETags do not match, want %v, got %v\n", - objInfoCopy.ETag, objInfo.ETag) - } // Remove all objects and buckets err = c.RemoveObject(bucketName, objectName) @@ -1065,7 +1061,7 @@ func TestFunctional(t *testing.T) { "s3.amazonaws.com", os.Getenv("ACCESS_KEY"), os.Getenv("SECRET_KEY"), - false, + true, ) if err != nil { t.Fatal("Error:", err) @@ -1256,7 +1252,7 @@ func TestFunctional(t *testing.T) { } // Verify if presigned url works. - resp, err := http.Get(presignedGetURL) + resp, err := http.Get(presignedGetURL.String()) if err != nil { t.Fatal("Error: ", err) } @@ -1279,7 +1275,7 @@ func TestFunctional(t *testing.T) { t.Fatal("Error: ", err) } // Verify if presigned url works. - resp, err = http.Get(presignedGetURL) + resp, err = http.Get(presignedGetURL.String()) if err != nil { t.Fatal("Error: ", err) } @@ -1306,7 +1302,7 @@ func TestFunctional(t *testing.T) { if err != nil { t.Fatal("Error: ", err) } - req, err := http.NewRequest("PUT", presignedPutURL, bytes.NewReader(buf)) + req, err := http.NewRequest("PUT", presignedPutURL.String(), bytes.NewReader(buf)) if err != nil { t.Fatal("Error: ", err) } diff --git a/vendor/src/github.com/minio/minio-go/bucket-policy.go b/vendor/src/github.com/minio/minio-go/bucket-policy.go index 57e3f2d02..9b756f495 100644 --- a/vendor/src/github.com/minio/minio-go/bucket-policy.go +++ b/vendor/src/github.com/minio/minio-go/bucket-policy.go @@ -20,6 +20,7 @@ import ( "encoding/json" "fmt" "sort" + "strings" ) // maximum supported access policy size. @@ -149,7 +150,7 @@ func isBucketPolicyReadWrite(statements []Statement, bucketName string, objectPr commonActions = true continue } - } else if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { + } else if resourceMatch(resource, awsResourcePrefix+bucketName+"/"+objectPrefix) { if subsetActions(readWriteObjectActions, statement.Actions) { readWrite = true } @@ -171,7 +172,7 @@ func isBucketPolicyWriteOnly(statements []Statement, bucketName string, objectPr commonActions = true continue } - } else if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { + } else if resourceMatch(resource, awsResourcePrefix+bucketName+"/"+objectPrefix) { if subsetActions(writeOnlyObjectActions, statement.Actions) { writeOnly = true } @@ -193,7 +194,7 @@ func isBucketPolicyReadOnly(statements []Statement, bucketName string, objectPre commonActions = true continue } - } else if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { + } else if resourceMatch(resource, awsResourcePrefix+bucketName+"/"+objectPrefix) { if subsetActions(readOnlyObjectActions, statement.Actions) { readOnly = true break @@ -207,9 +208,10 @@ func isBucketPolicyReadOnly(statements []Statement, bucketName string, objectPre // Removes read write bucket policy if found. func removeBucketPolicyStatementReadWrite(statements []Statement, bucketName string, objectPrefix string) []Statement { var newStatements []Statement + var bucketResourceStatementRemoved bool for _, statement := range statements { for _, resource := range statement.Resources { - if resource == awsResourcePrefix+bucketName { + if resource == awsResourcePrefix+bucketName && !bucketResourceStatementRemoved { var newActions []string for _, action := range statement.Actions { switch action { @@ -219,6 +221,7 @@ func removeBucketPolicyStatementReadWrite(statements []Statement, bucketName str newActions = append(newActions, action) } statement.Actions = newActions + bucketResourceStatementRemoved = true } else if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { var newActions []string for _, action := range statement.Actions { @@ -241,9 +244,10 @@ func removeBucketPolicyStatementReadWrite(statements []Statement, bucketName str // Removes write only bucket policy if found. func removeBucketPolicyStatementWriteOnly(statements []Statement, bucketName string, objectPrefix string) []Statement { var newStatements []Statement + var bucketResourceStatementRemoved bool for _, statement := range statements { for _, resource := range statement.Resources { - if resource == awsResourcePrefix+bucketName { + if resource == awsResourcePrefix+bucketName && !bucketResourceStatementRemoved { var newActions []string for _, action := range statement.Actions { switch action { @@ -253,6 +257,7 @@ func removeBucketPolicyStatementWriteOnly(statements []Statement, bucketName str newActions = append(newActions, action) } statement.Actions = newActions + bucketResourceStatementRemoved = true } else if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { var newActions []string for _, action := range statement.Actions { @@ -275,9 +280,10 @@ func removeBucketPolicyStatementWriteOnly(statements []Statement, bucketName str // Removes read only bucket policy if found. func removeBucketPolicyStatementReadOnly(statements []Statement, bucketName string, objectPrefix string) []Statement { var newStatements []Statement + var bucketResourceStatementRemoved bool for _, statement := range statements { for _, resource := range statement.Resources { - if resource == awsResourcePrefix+bucketName { + if resource == awsResourcePrefix+bucketName && !bucketResourceStatementRemoved { var newActions []string for _, action := range statement.Actions { switch action { @@ -287,6 +293,7 @@ func removeBucketPolicyStatementReadOnly(statements []Statement, bucketName stri newActions = append(newActions, action) } statement.Actions = newActions + bucketResourceStatementRemoved = true } else if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { var newActions []string for _, action := range statement.Actions { @@ -307,17 +314,32 @@ func removeBucketPolicyStatementReadOnly(statements []Statement, bucketName stri // Remove bucket policies based on the type. func removeBucketPolicyStatement(statements []Statement, bucketName string, objectPrefix string) []Statement { - // Verify type of policy to be removed. - if isBucketPolicyReadWrite(statements, bucketName, objectPrefix) { - statements = removeBucketPolicyStatementReadWrite(statements, bucketName, objectPrefix) - } else if isBucketPolicyWriteOnly(statements, bucketName, objectPrefix) { - statements = removeBucketPolicyStatementWriteOnly(statements, bucketName, objectPrefix) - } else if isBucketPolicyReadOnly(statements, bucketName, objectPrefix) { - statements = removeBucketPolicyStatementReadOnly(statements, bucketName, objectPrefix) + // Verify that a policy is defined on the object prefix, otherwise do not remove the policy + if isPolicyDefinedForObjectPrefix(statements, bucketName, objectPrefix) { + // Verify type of policy to be removed. + if isBucketPolicyReadWrite(statements, bucketName, objectPrefix) { + statements = removeBucketPolicyStatementReadWrite(statements, bucketName, objectPrefix) + } else if isBucketPolicyWriteOnly(statements, bucketName, objectPrefix) { + statements = removeBucketPolicyStatementWriteOnly(statements, bucketName, objectPrefix) + } else if isBucketPolicyReadOnly(statements, bucketName, objectPrefix) { + statements = removeBucketPolicyStatementReadOnly(statements, bucketName, objectPrefix) + } } return statements } +// Checks if an access policiy is defined for the given object prefix +func isPolicyDefinedForObjectPrefix(statements []Statement, bucketName string, objectPrefix string) bool { + for _, statement := range statements { + for _, resource := range statement.Resources { + if resource == awsResourcePrefix+bucketName+"/"+objectPrefix+"*" { + return true + } + } + } + return false +} + // Unmarshals bucket policy byte array into a structured bucket access policy. func unMarshalBucketPolicy(bucketPolicyBuf []byte) (BucketAccessPolicy, error) { // Untyped lazy JSON struct. @@ -486,3 +508,30 @@ func setWriteOnlyStatement(bucketName, objectPrefix string) []Statement { statements = append(statements, bucketResourceStatement, objectResourceStatement) return statements } + +// Match function matches wild cards in 'pattern' for resource. +func resourceMatch(pattern, resource string) bool { + if pattern == "" { + return resource == pattern + } + if pattern == "*" { + return true + } + parts := strings.Split(pattern, "*") + if len(parts) == 1 { + return resource == pattern + } + tGlob := strings.HasSuffix(pattern, "*") + end := len(parts) - 1 + if !strings.HasPrefix(resource, parts[0]) { + return false + } + for i := 1; i < end; i++ { + if !strings.Contains(resource, parts[i]) { + return false + } + idx := strings.Index(resource, parts[i]) + len(parts[i]) + resource = resource[idx:] + } + return tGlob || strings.HasSuffix(resource, parts[end]) +} diff --git a/vendor/src/github.com/minio/minio-go/bucket-policy_test.go b/vendor/src/github.com/minio/minio-go/bucket-policy_test.go index 483da597a..fdff18e12 100644 --- a/vendor/src/github.com/minio/minio-go/bucket-policy_test.go +++ b/vendor/src/github.com/minio/minio-go/bucket-policy_test.go @@ -361,22 +361,52 @@ func TestUnMarshalBucketPolicyUntyped(t *testing.T) { } } -// Tests validate removal of policy statement from the list of statements. -func TestRemoveBucketPolicyStatement(t *testing.T) { +// Tests validate whether access policy is defined for the given object prefix +func TestIsPolicyDefinedForObjectPrefix(t *testing.T) { testCases := []struct { bucketName string objectPrefix string inputStatements []Statement + expectedResult bool }{ - {"my-bucket", "", []Statement{}}, - {"read-only-bucket", "", setReadOnlyStatement("read-only-bucket", "")}, - {"write-only-bucket", "", setWriteOnlyStatement("write-only-bucket", "")}, - {"read-write-bucket", "", setReadWriteStatement("read-write-bucket", "")}, + {"my-bucket", "abc/", setReadOnlyStatement("my-bucket", "abc/"), true}, + {"my-bucket", "abc/", setReadOnlyStatement("my-bucket", "ab/"), false}, + {"my-bucket", "abc/", setReadOnlyStatement("my-bucket", "abcde"), false}, + {"my-bucket", "abc/", setReadOnlyStatement("my-bucket", "abc/de"), false}, + {"my-bucket", "abc", setReadOnlyStatement("my-bucket", "abc"), true}, + {"bucket", "", setReadOnlyStatement("bucket", "abc/"), false}, + } + for i, testCase := range testCases { + actualResult := isPolicyDefinedForObjectPrefix(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) + if actualResult != testCase.expectedResult { + t.Errorf("Test %d: Expected isPolicyDefinedForObjectPrefix to '%v', but instead found '%v'", i+1, testCase.expectedResult, actualResult) + } + } +} + +// Tests validate removal of policy statement from the list of statements. +func TestRemoveBucketPolicyStatement(t *testing.T) { + var emptyStatement []Statement + testCases := []struct { + bucketName string + objectPrefix string + inputStatements []Statement + expectedStatements []Statement + }{ + {"my-bucket", "", nil, emptyStatement}, + {"read-only-bucket", "", setReadOnlyStatement("read-only-bucket", ""), emptyStatement}, + {"write-only-bucket", "", setWriteOnlyStatement("write-only-bucket", ""), emptyStatement}, + {"read-write-bucket", "", setReadWriteStatement("read-write-bucket", ""), emptyStatement}, + {"my-bucket", "abcd", setReadOnlyStatement("my-bucket", "abc"), setReadOnlyStatement("my-bucket", "abc")}, + {"my-bucket", "abc/de", setReadOnlyStatement("my-bucket", "abc/"), setReadOnlyStatement("my-bucket", "abc/")}, + {"my-bucket", "abcd", setWriteOnlyStatement("my-bucket", "abc"), setWriteOnlyStatement("my-bucket", "abc")}, + {"my-bucket", "abc/de", setWriteOnlyStatement("my-bucket", "abc/"), setWriteOnlyStatement("my-bucket", "abc/")}, + {"my-bucket", "abcd", setReadWriteStatement("my-bucket", "abc"), setReadWriteStatement("my-bucket", "abc")}, + {"my-bucket", "abc/de", setReadWriteStatement("my-bucket", "abc/"), setReadWriteStatement("my-bucket", "abc/")}, } for i, testCase := range testCases { actualStatements := removeBucketPolicyStatement(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). - if len(actualStatements) != 0 { + if !reflect.DeepEqual(testCase.expectedStatements, actualStatements) { t.Errorf("Test %d: The expected statements from resource statement generator doesn't match the actual statements", i+1) } } @@ -393,10 +423,11 @@ func TestRemoveBucketPolicyStatementReadOnly(t *testing.T) { }{ {"my-bucket", "", []Statement{}, emptyStatement}, {"read-only-bucket", "", setReadOnlyStatement("read-only-bucket", ""), emptyStatement}, + {"read-only-bucket", "abc/", setReadOnlyStatement("read-only-bucket", "abc/"), emptyStatement}, + {"my-bucket", "abc/", append(setReadOnlyStatement("my-bucket", "abc/"), setReadOnlyStatement("my-bucket", "def/")...), setReadOnlyStatement("my-bucket", "def/")}, } for i, testCase := range testCases { actualStatements := removeBucketPolicyStatementReadOnly(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). if !reflect.DeepEqual(testCase.expectedStatements, actualStatements) { t.Errorf("Test %d: Expected policy statements doesn't match the actual one", i+1) } @@ -414,10 +445,11 @@ func TestRemoveBucketPolicyStatementWriteOnly(t *testing.T) { }{ {"my-bucket", "", []Statement{}, emptyStatement}, {"write-only-bucket", "", setWriteOnlyStatement("write-only-bucket", ""), emptyStatement}, + {"write-only-bucket", "abc/", setWriteOnlyStatement("write-only-bucket", "abc/"), emptyStatement}, + {"my-bucket", "abc/", append(setWriteOnlyStatement("my-bucket", "abc/"), setWriteOnlyStatement("my-bucket", "def/")...), setWriteOnlyStatement("my-bucket", "def/")}, } for i, testCase := range testCases { actualStatements := removeBucketPolicyStatementWriteOnly(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). if !reflect.DeepEqual(testCase.expectedStatements, actualStatements) { t.Errorf("Test %d: Expected policy statements doesn't match the actual one", i+1) } @@ -435,16 +467,73 @@ func TestRemoveBucketPolicyStatementReadWrite(t *testing.T) { }{ {"my-bucket", "", []Statement{}, emptyStatement}, {"read-write-bucket", "", setReadWriteStatement("read-write-bucket", ""), emptyStatement}, + {"read-write-bucket", "abc/", setReadWriteStatement("read-write-bucket", "abc/"), emptyStatement}, + {"my-bucket", "abc/", append(setReadWriteStatement("my-bucket", "abc/"), setReadWriteStatement("my-bucket", "def/")...), setReadWriteStatement("my-bucket", "def/")}, } for i, testCase := range testCases { actualStatements := removeBucketPolicyStatementReadWrite(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). if !reflect.DeepEqual(testCase.expectedStatements, actualStatements) { t.Errorf("Test %d: Expected policy statements doesn't match the actual one", i+1) } } } +// Tests validate Bucket policy resource matcher. +func TestBucketPolicyResourceMatch(t *testing.T) { + + // generates\ statement with given resource.. + generateStatement := func(resource string) Statement { + statement := Statement{} + statement.Resources = []string{resource} + return statement + } + + // generates resource prefix. + generateResource := func(bucketName, objectName string) string { + return awsResourcePrefix + bucketName + "/" + objectName + } + + testCases := []struct { + resourceToMatch string + statement Statement + expectedResourceMatch bool + }{ + // Test case 1-4. + // Policy with resource ending with bucket/* allows access to all objects inside the given bucket. + {generateResource("minio-bucket", ""), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/*")), true}, + {generateResource("minio-bucket", ""), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/*")), true}, + {generateResource("minio-bucket", ""), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/*")), true}, + {generateResource("minio-bucket", ""), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/*")), true}, + // Test case - 5. + // Policy with resource ending with bucket/oo* should not allow access to bucket/output.txt. + {generateResource("minio-bucket", "output.txt"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/oo*")), false}, + // Test case - 6. + // Policy with resource ending with bucket/oo* should allow access to bucket/ootput.txt. + {generateResource("minio-bucket", "ootput.txt"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/oo*")), true}, + // Test case - 7. + // Policy with resource ending with bucket/oo* allows access to all subfolders starting with "oo" inside given bucket. + {generateResource("minio-bucket", "oop-bucket/my-file"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/oo*")), true}, + // Test case - 8. + {generateResource("minio-bucket", "Asia/India/1.pjg"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/Asia/Japan/*")), false}, + // Test case - 9. + {generateResource("minio-bucket", "Asia/India/1.pjg"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, "minio-bucket"+"/Asia/Japan/*")), false}, + // Test case - 10. + // Proves that the name space is flat. + {generateResource("minio-bucket", "Africa/Bihar/India/design_info.doc/Bihar"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, + "minio-bucket"+"/*/India/*/Bihar")), true}, + // Test case - 11. + // Proves that the name space is flat. + {generateResource("minio-bucket", "Asia/China/India/States/Bihar/output.txt"), generateStatement(fmt.Sprintf("%s%s", awsResourcePrefix, + "minio-bucket"+"/*/India/*/Bihar/*")), true}, + } + for i, testCase := range testCases { + actualResourceMatch := resourceMatch(testCase.statement.Resources[0], testCase.resourceToMatch) + if testCase.expectedResourceMatch != actualResourceMatch { + t.Errorf("Test %d: Expected Resource match to be `%v`, but instead found it to be `%v`", i+1, testCase.expectedResourceMatch, actualResourceMatch) + } + } +} + // Tests validate whether the bucket policy is read only. func TestIsBucketPolicyReadOnly(t *testing.T) { testCases := []struct { @@ -458,10 +547,14 @@ func TestIsBucketPolicyReadOnly(t *testing.T) { {"read-only-bucket", "", setReadOnlyStatement("read-only-bucket", ""), true}, {"write-only-bucket", "", setWriteOnlyStatement("write-only-bucket", ""), false}, {"read-write-bucket", "", setReadWriteStatement("read-write-bucket", ""), true}, + {"my-bucket", "abc", setReadOnlyStatement("my-bucket", ""), true}, + {"my-bucket", "abc", setReadOnlyStatement("my-bucket", "abc"), true}, + {"my-bucket", "abcde", setReadOnlyStatement("my-bucket", "abc"), true}, + {"my-bucket", "abc/d", setReadOnlyStatement("my-bucket", "abc/"), true}, + {"my-bucket", "abc", setWriteOnlyStatement("my-bucket", ""), false}, } for i, testCase := range testCases { actualResult := isBucketPolicyReadOnly(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). if testCase.expectedResult != actualResult { t.Errorf("Test %d: Expected isBucketPolicyReadonly to '%v', but instead found '%v'", i+1, testCase.expectedResult, actualResult) } @@ -481,10 +574,13 @@ func TestIsBucketPolicyReadWrite(t *testing.T) { {"read-only-bucket", "", setReadOnlyStatement("read-only-bucket", ""), false}, {"write-only-bucket", "", setWriteOnlyStatement("write-only-bucket", ""), false}, {"read-write-bucket", "", setReadWriteStatement("read-write-bucket", ""), true}, + {"my-bucket", "abc", setReadWriteStatement("my-bucket", ""), true}, + {"my-bucket", "abc", setReadWriteStatement("my-bucket", "abc"), true}, + {"my-bucket", "abcde", setReadWriteStatement("my-bucket", "abc"), true}, + {"my-bucket", "abc/d", setReadWriteStatement("my-bucket", "abc/"), true}, } for i, testCase := range testCases { actualResult := isBucketPolicyReadWrite(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). if testCase.expectedResult != actualResult { t.Errorf("Test %d: Expected isBucketPolicyReadonly to '%v', but instead found '%v'", i+1, testCase.expectedResult, actualResult) } @@ -504,10 +600,14 @@ func TestIsBucketPolicyWriteOnly(t *testing.T) { {"read-only-bucket", "", setReadOnlyStatement("read-only-bucket", ""), false}, {"write-only-bucket", "", setWriteOnlyStatement("write-only-bucket", ""), true}, {"read-write-bucket", "", setReadWriteStatement("read-write-bucket", ""), true}, + {"my-bucket", "abc", setWriteOnlyStatement("my-bucket", ""), true}, + {"my-bucket", "abc", setWriteOnlyStatement("my-bucket", "abc"), true}, + {"my-bucket", "abcde", setWriteOnlyStatement("my-bucket", "abc"), true}, + {"my-bucket", "abc/d", setWriteOnlyStatement("my-bucket", "abc/"), true}, + {"my-bucket", "abc", setReadOnlyStatement("my-bucket", ""), false}, } for i, testCase := range testCases { actualResult := isBucketPolicyWriteOnly(testCase.inputStatements, testCase.bucketName, testCase.objectPrefix) - // empty statement is expected after the invocation of removeBucketPolicyStatement(). if testCase.expectedResult != actualResult { t.Errorf("Test %d: Expected isBucketPolicyReadonly to '%v', but instead found '%v'", i+1, testCase.expectedResult, actualResult) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/bucketexists.go b/vendor/src/github.com/minio/minio-go/examples/s3/bucketexists.go index 59b205dab..ad388d945 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/bucketexists.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/bucketexists.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY and my-bucketname are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/copyobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/copyobject.go index 5517c2e98..9f9e5bc4f 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/copyobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/copyobject.go @@ -29,12 +29,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-testfile, my-bucketname and // my-objectname are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/fgetobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/fgetobject.go index a936d5a3a..bef756dd6 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/fgetobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/fgetobject.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname, my-objectname // and my-filename.csv are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/fputobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/fputobject.go index f295dd778..f4e60acff 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/fputobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/fputobject.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname, my-objectname // and my-filename.csv are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/getbucketpolicy.go b/vendor/src/github.com/minio/minio-go/examples/s3/getbucketpolicy.go index 843954f49..0344cd2f6 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/getbucketpolicy.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/getbucketpolicy.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY and my-bucketname are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/getobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/getobject.go index f49c71223..96bb85505 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/getobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/getobject.go @@ -30,12 +30,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname, my-objectname and // my-testfile are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESS-KEY-HERE", "YOUR-SECRET-KEY-HERE", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESS-KEY-HERE", "YOUR-SECRET-KEY-HERE", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/listbuckets.go b/vendor/src/github.com/minio/minio-go/examples/s3/listbuckets.go index 1b29ebbcf..81a99e627 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/listbuckets.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/listbuckets.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID and YOUR-SECRETACCESSKEY are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/listincompleteuploads.go b/vendor/src/github.com/minio/minio-go/examples/s3/listincompleteuploads.go index 25ebfcbbb..34771e44b 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/listincompleteuploads.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/listincompleteuploads.go @@ -29,12 +29,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-prefixname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/listobjects-N.go b/vendor/src/github.com/minio/minio-go/examples/s3/listobjects-N.go index 81136f92e..5dde36746 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/listobjects-N.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/listobjects-N.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-prefixname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { fmt.Println(err) return diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/listobjects.go b/vendor/src/github.com/minio/minio-go/examples/s3/listobjects.go index 543e40142..4fd5c069a 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/listobjects.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/listobjects.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-prefixname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { fmt.Println(err) return diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/makebucket.go b/vendor/src/github.com/minio/minio-go/examples/s3/makebucket.go index 02a09e553..ae222a8af 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/makebucket.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/makebucket.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY and my-bucketname are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/presignedgetobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/presignedgetobject.go index 117f2ec23..11be0c0a4 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/presignedgetobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/presignedgetobject.go @@ -30,12 +30,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-objectname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/presignedpostpolicy.go b/vendor/src/github.com/minio/minio-go/examples/s3/presignedpostpolicy.go index eb73e88e8..3f37cef38 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/presignedpostpolicy.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/presignedpostpolicy.go @@ -30,12 +30,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-objectname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } @@ -43,15 +43,17 @@ func main() { policy := minio.NewPostPolicy() policy.SetBucket("my-bucketname") policy.SetKey("my-objectname") - policy.SetExpires(time.Now().UTC().AddDate(0, 0, 10)) // expires in 10 days - m, err := s3Client.PresignedPostPolicy(policy) + // Expires in 10 days. + policy.SetExpires(time.Now().UTC().AddDate(0, 0, 10)) + // Returns form data for POST form request. + url, formData, err := s3Client.PresignedPostPolicy(policy) if err != nil { log.Fatalln(err) } fmt.Printf("curl ") - for k, v := range m { + for k, v := range formData { fmt.Printf("-F %s=%s ", k, v) } fmt.Printf("-F file=@/etc/bash.bashrc ") - fmt.Printf("https://my-bucketname.s3.amazonaws.com\n") + fmt.Printf("%s\n", url) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/presignedputobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/presignedputobject.go index 96d243c7e..3db6f6e7b 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/presignedputobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/presignedputobject.go @@ -29,12 +29,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-objectname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/putobject-progress.go b/vendor/src/github.com/minio/minio-go/examples/s3/putobject-progress.go index 9620461a2..e2da5bdb9 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/putobject-progress.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/putobject-progress.go @@ -29,12 +29,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-testfile, my-bucketname and // my-objectname are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/putobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/putobject.go index 2ba90a697..caa731302 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/putobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/putobject.go @@ -29,12 +29,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-testfile, my-bucketname and // my-objectname are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/removebucket.go b/vendor/src/github.com/minio/minio-go/examples/s3/removebucket.go index d22d18bea..fb013ca24 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/removebucket.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/removebucket.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY and my-bucketname are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/removebucketpolicy.go b/vendor/src/github.com/minio/minio-go/examples/s3/removebucketpolicy.go index 141f3c678..72dc06fde 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/removebucketpolicy.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/removebucketpolicy.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY and my-bucketname are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/removeincompleteupload.go b/vendor/src/github.com/minio/minio-go/examples/s3/removeincompleteupload.go index 0990f662c..d486182af 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/removeincompleteupload.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/removeincompleteupload.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-objectname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/removeobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/removeobject.go index c1b08458f..13b00b41e 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/removeobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/removeobject.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-objectname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/setbucketpolicy.go b/vendor/src/github.com/minio/minio-go/examples/s3/setbucketpolicy.go index 8f29db13c..99823db22 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/setbucketpolicy.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/setbucketpolicy.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY and my-bucketname are // dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/examples/s3/statobject.go b/vendor/src/github.com/minio/minio-go/examples/s3/statobject.go index 1eb6c604f..4c5453a07 100644 --- a/vendor/src/github.com/minio/minio-go/examples/s3/statobject.go +++ b/vendor/src/github.com/minio/minio-go/examples/s3/statobject.go @@ -28,12 +28,12 @@ func main() { // Note: YOUR-ACCESSKEYID, YOUR-SECRETACCESSKEY, my-bucketname and my-objectname // are dummy values, please replace them with original values. - // Requests are always secure (HTTPS) by default. Set insecure=true to enable insecure (HTTP) access. + // Requests are always secure (HTTPS) by default. Set secure=false to enable insecure (HTTP) access. // This boolean value is the last argument for New(). - // New returns an Amazon S3 compatible client object. API copatibality (v2 or v4) is automatically + // New returns an Amazon S3 compatible client object. API compatibility (v2 or v4) is automatically // determined based on the Endpoint value. - s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", false) + s3Client, err := minio.New("s3.amazonaws.com", "YOUR-ACCESSKEYID", "YOUR-SECRETACCESSKEY", true) if err != nil { log.Fatalln(err) } diff --git a/vendor/src/github.com/minio/minio-go/utils.go b/vendor/src/github.com/minio/minio-go/utils.go index 104665849..90c6a95dd 100644 --- a/vendor/src/github.com/minio/minio-go/utils.go +++ b/vendor/src/github.com/minio/minio-go/utils.go @@ -63,7 +63,7 @@ func sumHMAC(key []byte, data []byte) []byte { } // getEndpointURL - construct a new endpoint. -func getEndpointURL(endpoint string, inSecure bool) (*url.URL, error) { +func getEndpointURL(endpoint string, secure bool) (*url.URL, error) { if strings.Contains(endpoint, ":") { host, _, err := net.SplitHostPort(endpoint) if err != nil { @@ -79,9 +79,9 @@ func getEndpointURL(endpoint string, inSecure bool) (*url.URL, error) { return nil, ErrInvalidArgument(msg) } } - // if inSecure is true, use 'http' scheme. + // If secure is false, use 'http' scheme. scheme := "https" - if inSecure { + if !secure { scheme = "http" } diff --git a/vendor/src/github.com/minio/minio-go/utils_test.go b/vendor/src/github.com/minio/minio-go/utils_test.go index 045ec85da..7aaea6453 100644 --- a/vendor/src/github.com/minio/minio-go/utils_test.go +++ b/vendor/src/github.com/minio/minio-go/utils_test.go @@ -27,7 +27,7 @@ func TestGetEndpointURL(t *testing.T) { testCases := []struct { // Inputs. endPoint string - inSecure bool + secure bool // Expected result. result string @@ -35,23 +35,23 @@ func TestGetEndpointURL(t *testing.T) { // Flag indicating whether the test is expected to pass or not. shouldPass bool }{ - {"s3.amazonaws.com", false, "https://s3.amazonaws.com", nil, true}, - {"s3.cn-north-1.amazonaws.com.cn", false, "https://s3.cn-north-1.amazonaws.com.cn", nil, true}, - {"s3.amazonaws.com", true, "http://s3.amazonaws.com", nil, true}, - {"s3.cn-north-1.amazonaws.com.cn", true, "http://s3.cn-north-1.amazonaws.com.cn", nil, true}, - {"192.168.1.1:9000", true, "http://192.168.1.1:9000", nil, true}, - {"192.168.1.1:9000", false, "https://192.168.1.1:9000", nil, true}, + {"s3.amazonaws.com", true, "https://s3.amazonaws.com", nil, true}, + {"s3.cn-north-1.amazonaws.com.cn", true, "https://s3.cn-north-1.amazonaws.com.cn", nil, true}, + {"s3.amazonaws.com", false, "http://s3.amazonaws.com", nil, true}, + {"s3.cn-north-1.amazonaws.com.cn", false, "http://s3.cn-north-1.amazonaws.com.cn", nil, true}, + {"192.168.1.1:9000", false, "http://192.168.1.1:9000", nil, true}, + {"192.168.1.1:9000", true, "https://192.168.1.1:9000", nil, true}, {"192.168.1.1::9000", false, "", fmt.Errorf("too many colons in address %s", "192.168.1.1::9000"), false}, - {"13333.123123.-", false, "", fmt.Errorf("Endpoint: %s does not follow ip address or domain name standards.", "13333.123123.-"), false}, - {"13333.123123.-", false, "", fmt.Errorf("Endpoint: %s does not follow ip address or domain name standards.", "13333.123123.-"), false}, - {"s3.amazonaws.com:443", false, "", fmt.Errorf("Amazon S3 endpoint should be 's3.amazonaws.com'."), false}, - {"storage.googleapis.com:4000", false, "", fmt.Errorf("Google Cloud Storage endpoint should be 'storage.googleapis.com'."), false}, - {"s3.aamzza.-", false, "", fmt.Errorf("Endpoint: %s does not follow ip address or domain name standards.", "s3.aamzza.-"), false}, - {"", false, "", fmt.Errorf("Endpoint: does not follow ip address or domain name standards."), false}, + {"13333.123123.-", true, "", fmt.Errorf("Endpoint: %s does not follow ip address or domain name standards.", "13333.123123.-"), false}, + {"13333.123123.-", true, "", fmt.Errorf("Endpoint: %s does not follow ip address or domain name standards.", "13333.123123.-"), false}, + {"s3.amazonaws.com:443", true, "", fmt.Errorf("Amazon S3 endpoint should be 's3.amazonaws.com'."), false}, + {"storage.googleapis.com:4000", true, "", fmt.Errorf("Google Cloud Storage endpoint should be 'storage.googleapis.com'."), false}, + {"s3.aamzza.-", true, "", fmt.Errorf("Endpoint: %s does not follow ip address or domain name standards.", "s3.aamzza.-"), false}, + {"", true, "", fmt.Errorf("Endpoint: does not follow ip address or domain name standards."), false}, } for i, testCase := range testCases { - result, err := getEndpointURL(testCase.endPoint, testCase.inSecure) + result, err := getEndpointURL(testCase.endPoint, testCase.secure) if err != nil && testCase.shouldPass { t.Errorf("Test %d: Expected to pass, but failed with: %s", i+1, err.Error()) }