mirror of
https://github.com/ceph/s3-tests.git
synced 2024-11-21 11:51:06 +00:00
Merge pull request #551 from clwluvw/bucket-public-block
BucketPublicAccessBlock: compatibility issues
This commit is contained in:
commit
12abc78b9b
2 changed files with 42 additions and 8 deletions
|
@ -37,10 +37,10 @@ class Policy(object):
|
|||
|
||||
return json.dumps(policy_dict)
|
||||
|
||||
def make_json_policy(action, resource, principal={"AWS": "*"}, conditions=None):
|
||||
def make_json_policy(action, resource, principal={"AWS": "*"}, effect="Allow", conditions=None):
|
||||
"""
|
||||
Helper function to make single statement policies
|
||||
"""
|
||||
s = Statement(action, resource, principal, condition=conditions)
|
||||
s = Statement(action, resource, principal, effect=effect, condition=conditions)
|
||||
p = Policy()
|
||||
return p.add_statement(s).to_json()
|
||||
|
|
|
@ -12590,16 +12590,50 @@ def test_get_nonpublicpolicy_deny_bucket_policy_status():
|
|||
resp = client.get_bucket_policy_status(Bucket=bucket_name)
|
||||
assert resp['PolicyStatus']['IsPublic'] == True
|
||||
|
||||
def test_get_default_public_block():
|
||||
#client = get_svc_client(svc='s3control', client_config=Config(s3={'addressing_style': 'path'}))
|
||||
def test_get_undefined_public_block():
|
||||
bucket_name = get_new_bucket()
|
||||
client = get_client()
|
||||
|
||||
# delete the existing public access block configuration
|
||||
# as AWS creates a default public access block configuration
|
||||
resp = client.delete_public_access_block(Bucket=bucket_name)
|
||||
assert resp['ResponseMetadata']['HTTPStatusCode'] == 204
|
||||
|
||||
response_code = ""
|
||||
try:
|
||||
resp = client.get_public_access_block(Bucket=bucket_name)
|
||||
except ClientError as e:
|
||||
response_code = e.response['Error']['Code']
|
||||
|
||||
assert response_code == 'NoSuchPublicAccessBlockConfiguration'
|
||||
|
||||
def test_get_public_block_deny_bucket_policy():
|
||||
bucket_name = get_new_bucket()
|
||||
client = get_client()
|
||||
|
||||
access_conf = {'BlockPublicAcls': True,
|
||||
'IgnorePublicAcls': True,
|
||||
'BlockPublicPolicy': True,
|
||||
'RestrictPublicBuckets': False}
|
||||
client.put_public_access_block(Bucket=bucket_name, PublicAccessBlockConfiguration=access_conf)
|
||||
|
||||
# make sure we can get the public access block
|
||||
resp = client.get_public_access_block(Bucket=bucket_name)
|
||||
assert resp['PublicAccessBlockConfiguration']['BlockPublicAcls'] == False
|
||||
assert resp['PublicAccessBlockConfiguration']['BlockPublicPolicy'] == False
|
||||
assert resp['PublicAccessBlockConfiguration']['IgnorePublicAcls'] == False
|
||||
assert resp['PublicAccessBlockConfiguration']['RestrictPublicBuckets'] == False
|
||||
assert resp['PublicAccessBlockConfiguration']['BlockPublicAcls'] == access_conf['BlockPublicAcls']
|
||||
assert resp['PublicAccessBlockConfiguration']['BlockPublicPolicy'] == access_conf['BlockPublicPolicy']
|
||||
assert resp['PublicAccessBlockConfiguration']['IgnorePublicAcls'] == access_conf['IgnorePublicAcls']
|
||||
assert resp['PublicAccessBlockConfiguration']['RestrictPublicBuckets'] == access_conf['RestrictPublicBuckets']
|
||||
|
||||
# make bucket policy to deny access
|
||||
resource = _make_arn_resource(bucket_name)
|
||||
policy_document = make_json_policy("s3:GetBucketPublicAccessBlock",
|
||||
resource, effect="Deny")
|
||||
client.put_bucket_policy(Bucket=bucket_name, Policy=policy_document)
|
||||
|
||||
# check if the access is denied
|
||||
e = assert_raises(ClientError, client.get_public_access_block, Bucket=bucket_name)
|
||||
status, error_code = _get_status_and_error_code(e.response)
|
||||
assert status == 403
|
||||
|
||||
def test_put_public_block():
|
||||
#client = get_svc_client(svc='s3control', client_config=Config(s3={'addressing_style': 'path'}))
|
||||
|
|
Loading…
Reference in a new issue