forked from TrueCloudLab/restic
2b39f9f4b2
Among others, this updates minio-go, so that the new "eu-west-3" zone for AWS is supported.
408 lines
12 KiB
Go
408 lines
12 KiB
Go
/*
|
|
* Minio Go Library for Amazon S3 Compatible Cloud Storage
|
|
* Copyright 2015-2017 Minio, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package s3utils
|
|
|
|
import (
|
|
"errors"
|
|
"net/url"
|
|
"testing"
|
|
)
|
|
|
|
// Tests get region from host URL.
|
|
func TestGetRegionFromURL(t *testing.T) {
|
|
testCases := []struct {
|
|
u url.URL
|
|
expectedRegion string
|
|
}{
|
|
{
|
|
u: url.URL{Host: "storage.googleapis.com"},
|
|
expectedRegion: "",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3.cn-north-1.amazonaws.com.cn"},
|
|
expectedRegion: "cn-north-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3.cn-northwest-1.amazonaws.com.cn"},
|
|
expectedRegion: "cn-northwest-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3-fips-us-gov-west-1.amazonaws.com"},
|
|
expectedRegion: "us-gov-west-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3-us-gov-west-1.amazonaws.com"},
|
|
expectedRegion: "us-gov-west-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "192.168.1.1"},
|
|
expectedRegion: "",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3-eu-west-1.amazonaws.com"},
|
|
expectedRegion: "eu-west-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3.eu-west-1.amazonaws.com"},
|
|
expectedRegion: "eu-west-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3.dualstack.eu-west-1.amazonaws.com"},
|
|
expectedRegion: "eu-west-1",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3.amazonaws.com"},
|
|
expectedRegion: "",
|
|
},
|
|
{
|
|
u: url.URL{Host: "s3-external-1.amazonaws.com"},
|
|
expectedRegion: "",
|
|
},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
region := GetRegionFromURL(testCase.u)
|
|
if testCase.expectedRegion != region {
|
|
t.Errorf("Test %d: Expected region %s, got %s", i+1, testCase.expectedRegion, region)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tests for 'isValidDomain(host string) bool'.
|
|
func TestIsValidDomain(t *testing.T) {
|
|
testCases := []struct {
|
|
// Input.
|
|
host string
|
|
// Expected result.
|
|
result bool
|
|
}{
|
|
{"s3.amazonaws.com", true},
|
|
{"s3.cn-north-1.amazonaws.com.cn", true},
|
|
{"s3.cn-northwest-1.amazonaws.com.cn", true},
|
|
{"s3.amazonaws.com_", false},
|
|
{"%$$$", false},
|
|
{"s3.amz.test.com", true},
|
|
{"s3.%%", false},
|
|
{"localhost", true},
|
|
{"-localhost", false},
|
|
{"", false},
|
|
{"\n \t", false},
|
|
{" ", false},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
result := IsValidDomain(testCase.host)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected isValidDomain test to be '%v', but found '%v' instead", i+1, testCase.result, result)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tests validate IP address validator.
|
|
func TestIsValidIP(t *testing.T) {
|
|
testCases := []struct {
|
|
// Input.
|
|
ip string
|
|
// Expected result.
|
|
result bool
|
|
}{
|
|
{"192.168.1.1", true},
|
|
{"192.168.1", false},
|
|
{"192.168.1.1.1", false},
|
|
{"-192.168.1.1", false},
|
|
{"260.192.1.1", false},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
result := IsValidIP(testCase.ip)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected isValidIP to be '%v' for input \"%s\", but found it to be '%v' instead", i+1, testCase.result, testCase.ip, result)
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
// Tests validate virtual host validator.
|
|
func TestIsVirtualHostSupported(t *testing.T) {
|
|
testCases := []struct {
|
|
url string
|
|
bucket string
|
|
// Expeceted result.
|
|
result bool
|
|
}{
|
|
{"https://s3.amazonaws.com", "my-bucket", true},
|
|
{"https://s3.cn-north-1.amazonaws.com.cn", "my-bucket", true},
|
|
{"https://s3.amazonaws.com", "my-bucket.", false},
|
|
{"https://amazons3.amazonaws.com", "my-bucket.", false},
|
|
{"https://storage.googleapis.com/", "my-bucket", true},
|
|
{"https://mystorage.googleapis.com/", "my-bucket", false},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
u, err := url.Parse(testCase.url)
|
|
if err != nil {
|
|
t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err)
|
|
}
|
|
result := IsVirtualHostSupported(*u, testCase.bucket)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected isVirtualHostSupported to be '%v' for input url \"%s\" and bucket \"%s\", but found it to be '%v' instead", i+1, testCase.result, testCase.url, testCase.bucket, result)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tests validate Amazon endpoint validator.
|
|
func TestIsAmazonEndpoint(t *testing.T) {
|
|
testCases := []struct {
|
|
url string
|
|
// Expected result.
|
|
result bool
|
|
}{
|
|
{"https://192.168.1.1", false},
|
|
{"192.168.1.1", false},
|
|
{"http://storage.googleapis.com", false},
|
|
{"https://storage.googleapis.com", false},
|
|
{"storage.googleapis.com", false},
|
|
{"s3.amazonaws.com", false},
|
|
{"https://amazons3.amazonaws.com", false},
|
|
{"-192.168.1.1", false},
|
|
{"260.192.1.1", false},
|
|
{"https://s3-.amazonaws.com", false},
|
|
{"https://s3..amazonaws.com", false},
|
|
{"https://s3.dualstack.us-west-1.amazonaws.com.cn", false},
|
|
{"https://s3..us-west-1.amazonaws.com.cn", false},
|
|
// valid inputs.
|
|
{"https://s3.amazonaws.com", true},
|
|
{"https://s3-external-1.amazonaws.com", true},
|
|
{"https://s3.cn-north-1.amazonaws.com.cn", true},
|
|
{"https://s3-us-west-1.amazonaws.com", true},
|
|
{"https://s3.us-west-1.amazonaws.com", true},
|
|
{"https://s3.dualstack.us-west-1.amazonaws.com", true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
u, err := url.Parse(testCase.url)
|
|
if err != nil {
|
|
t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err)
|
|
}
|
|
result := IsAmazonEndpoint(*u)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected isAmazonEndpoint to be '%v' for input \"%s\", but found it to be '%v' instead", i+1, testCase.result, testCase.url, result)
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
// Tests validate Google Cloud end point validator.
|
|
func TestIsGoogleEndpoint(t *testing.T) {
|
|
testCases := []struct {
|
|
url string
|
|
// Expected result.
|
|
result bool
|
|
}{
|
|
{"192.168.1.1", false},
|
|
{"https://192.168.1.1", false},
|
|
{"s3.amazonaws.com", false},
|
|
{"http://s3.amazonaws.com", false},
|
|
{"https://s3.amazonaws.com", false},
|
|
{"https://s3.cn-north-1.amazonaws.com.cn", false},
|
|
{"-192.168.1.1", false},
|
|
{"260.192.1.1", false},
|
|
// valid inputs.
|
|
{"http://storage.googleapis.com", true},
|
|
{"https://storage.googleapis.com", true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
u, err := url.Parse(testCase.url)
|
|
if err != nil {
|
|
t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err)
|
|
}
|
|
result := IsGoogleEndpoint(*u)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected isGoogleEndpoint to be '%v' for input \"%s\", but found it to be '%v' instead", i+1, testCase.result, testCase.url, result)
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func TestPercentEncodeSlash(t *testing.T) {
|
|
testCases := []struct {
|
|
input string
|
|
output string
|
|
}{
|
|
{"test123", "test123"},
|
|
{"abc,+_1", "abc,+_1"},
|
|
{"%40prefix=test%40123", "%40prefix=test%40123"},
|
|
{"key1=val1/val2", "key1=val1%2Fval2"},
|
|
{"%40prefix=test%40123/", "%40prefix=test%40123%2F"},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
receivedOutput := percentEncodeSlash(testCase.input)
|
|
if testCase.output != receivedOutput {
|
|
t.Errorf(
|
|
"Test %d: Input: \"%s\" --> Expected percentEncodeSlash to return \"%s\", but it returned \"%s\" instead!",
|
|
i+1, testCase.input, testCase.output,
|
|
receivedOutput,
|
|
)
|
|
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tests validate the query encoder.
|
|
func TestQueryEncode(t *testing.T) {
|
|
testCases := []struct {
|
|
queryKey string
|
|
valueToEncode []string
|
|
// Expected result.
|
|
result string
|
|
}{
|
|
{"prefix", []string{"test@123", "test@456"}, "prefix=test%40123&prefix=test%40456"},
|
|
{"@prefix", []string{"test@123"}, "%40prefix=test%40123"},
|
|
{"@prefix", []string{"a/b/c/"}, "%40prefix=a%2Fb%2Fc%2F"},
|
|
{"prefix", []string{"test#123"}, "prefix=test%23123"},
|
|
{"prefix#", []string{"test#123"}, "prefix%23=test%23123"},
|
|
{"prefix", []string{"test123"}, "prefix=test123"},
|
|
{"prefix", []string{"test本語123", "test123"}, "prefix=test%E6%9C%AC%E8%AA%9E123&prefix=test123"},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
urlValues := make(url.Values)
|
|
for _, valueToEncode := range testCase.valueToEncode {
|
|
urlValues.Add(testCase.queryKey, valueToEncode)
|
|
}
|
|
result := QueryEncode(urlValues)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected queryEncode result to be \"%s\", but found it to be \"%s\" instead", i+1, testCase.result, result)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tests validate the URL path encoder.
|
|
func TestEncodePath(t *testing.T) {
|
|
testCases := []struct {
|
|
// Input.
|
|
inputStr string
|
|
// Expected result.
|
|
result string
|
|
}{
|
|
{"thisisthe%url", "thisisthe%25url"},
|
|
{"本語", "%E6%9C%AC%E8%AA%9E"},
|
|
{"本語.1", "%E6%9C%AC%E8%AA%9E.1"},
|
|
{">123", "%3E123"},
|
|
{"myurl#link", "myurl%23link"},
|
|
{"space in url", "space%20in%20url"},
|
|
{"url+path", "url%2Bpath"},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
result := EncodePath(testCase.inputStr)
|
|
if testCase.result != result {
|
|
t.Errorf("Test %d: Expected queryEncode result to be \"%s\", but found it to be \"%s\" instead", i+1, testCase.result, result)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tests validate the bucket name validator.
|
|
func TestIsValidBucketName(t *testing.T) {
|
|
testCases := []struct {
|
|
// Input.
|
|
bucketName string
|
|
// Expected result.
|
|
err error
|
|
// Flag to indicate whether test should Pass.
|
|
shouldPass bool
|
|
}{
|
|
{".mybucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"$mybucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"mybucket-", errors.New("Bucket name contains invalid characters"), false},
|
|
{"my", errors.New("Bucket name cannot be smaller than 3 characters"), false},
|
|
{"", errors.New("Bucket name cannot be empty"), false},
|
|
{"my..bucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"192.168.1.168", errors.New("Bucket name cannot be an ip address"), false},
|
|
{":bucketname", errors.New("Bucket name contains invalid characters"), false},
|
|
{"_bucketName", errors.New("Bucket name contains invalid characters"), false},
|
|
{"my.bucket.com", nil, true},
|
|
{"my-bucket", nil, true},
|
|
{"123my-bucket", nil, true},
|
|
{"Mybucket", nil, true},
|
|
{"My_bucket", nil, true},
|
|
{"My:bucket", nil, true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
err := CheckValidBucketName(testCase.bucketName)
|
|
if err != nil && testCase.shouldPass {
|
|
t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
|
|
}
|
|
if err == nil && !testCase.shouldPass {
|
|
t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
|
|
}
|
|
// Failed as expected, but does it fail for the expected reason.
|
|
if err != nil && !testCase.shouldPass {
|
|
if err.Error() != testCase.err.Error() {
|
|
t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\" instead", i+1, testCase.err.Error(), err.Error())
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Tests validate the bucket name validator stricter.
|
|
func TestIsValidBucketNameStrict(t *testing.T) {
|
|
testCases := []struct {
|
|
// Input.
|
|
bucketName string
|
|
// Expected result.
|
|
err error
|
|
// Flag to indicate whether test should Pass.
|
|
shouldPass bool
|
|
}{
|
|
{".mybucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"$mybucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"mybucket-", errors.New("Bucket name contains invalid characters"), false},
|
|
{"my", errors.New("Bucket name cannot be smaller than 3 characters"), false},
|
|
{"", errors.New("Bucket name cannot be empty"), false},
|
|
{"my..bucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"192.168.1.168", errors.New("Bucket name cannot be an ip address"), false},
|
|
{"Mybucket", errors.New("Bucket name contains invalid characters"), false},
|
|
{"my.bucket.com", nil, true},
|
|
{"my-bucket", nil, true},
|
|
{"123my-bucket", nil, true},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
err := CheckValidBucketNameStrict(testCase.bucketName)
|
|
if err != nil && testCase.shouldPass {
|
|
t.Errorf("Test %d: Expected to pass, but failed with: <ERROR> %s", i+1, err.Error())
|
|
}
|
|
if err == nil && !testCase.shouldPass {
|
|
t.Errorf("Test %d: Expected to fail with <ERROR> \"%s\", but passed instead", i+1, testCase.err.Error())
|
|
}
|
|
// Failed as expected, but does it fail for the expected reason.
|
|
if err != nil && !testCase.shouldPass {
|
|
if err.Error() != testCase.err.Error() {
|
|
t.Errorf("Test %d: Expected to fail with error \"%s\", but instead failed with error \"%s\" instead", i+1, testCase.err.Error(), err.Error())
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
}
|