2020-07-10 14:17:51 +00:00
|
|
|
package object
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"errors"
|
|
|
|
"testing"
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
eacl "github.com/nspcc-dev/neofs-api-go/acl/extended"
|
2020-07-10 14:17:51 +00:00
|
|
|
"github.com/nspcc-dev/neofs-api-go/container"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/object"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/refs"
|
|
|
|
"github.com/nspcc-dev/neofs-api-go/service"
|
|
|
|
crypto "github.com/nspcc-dev/neofs-crypto"
|
2020-07-24 13:54:03 +00:00
|
|
|
libcnr "github.com/nspcc-dev/neofs-node/pkg/core/container"
|
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/core/container/acl/basic"
|
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/core/container/storage"
|
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/core/netmap"
|
|
|
|
testlogger "github.com/nspcc-dev/neofs-node/pkg/util/logger/test"
|
|
|
|
"github.com/nspcc-dev/neofs-node/pkg/util/test"
|
2020-07-10 14:17:51 +00:00
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
|
|
|
type (
|
|
|
|
testACLEntity struct {
|
|
|
|
// Set of interfaces which testCommonEntity must implement, but some methods from those does not call.
|
|
|
|
serviceRequest
|
|
|
|
RequestTargeter
|
2020-07-24 13:54:03 +00:00
|
|
|
eacl.Table
|
|
|
|
storage.Storage
|
|
|
|
containerNodesLister
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
// Argument interceptor. Used for ascertain of correct parameter passage between components.
|
|
|
|
f func(...interface{})
|
|
|
|
// Mocked result of any interface.
|
|
|
|
res interface{}
|
|
|
|
// Mocked error of any interface.
|
|
|
|
err error
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
type testBasicChecker struct {
|
|
|
|
actionErr error
|
|
|
|
action bool
|
|
|
|
|
|
|
|
sticky bool
|
|
|
|
|
|
|
|
extended bool
|
|
|
|
|
|
|
|
bearer bool
|
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
func (t *testACLEntity) Get(cid storage.CID) (*storage.Container, error) {
|
2020-07-10 14:17:51 +00:00
|
|
|
if t.err != nil {
|
|
|
|
return nil, t.err
|
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
return t.res.(*storage.Container), nil
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
func (t *testACLEntity) calculateRequestAction(context.Context, requestActionParams) eacl.Action {
|
|
|
|
return t.res.(eacl.Action)
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
func (t *testACLEntity) GetBasicACL(context.Context, CID) (libcnr.BasicACL, error) {
|
2020-07-10 14:17:51 +00:00
|
|
|
if t.err != nil {
|
|
|
|
return 0, t.err
|
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
return t.res.(libcnr.BasicACL), nil
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
func (t *testACLEntity) Target(context.Context, serviceRequest) requestTarget {
|
|
|
|
return t.res.(requestTarget)
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t *testACLEntity) CID() CID { return CID{} }
|
|
|
|
|
|
|
|
func (t *testACLEntity) Type() object.RequestType { return t.res.(object.RequestType) }
|
|
|
|
|
|
|
|
func (t *testACLEntity) GetBearerToken() service.BearerToken { return nil }
|
|
|
|
|
|
|
|
func (t *testACLEntity) GetOwner() (*ecdsa.PublicKey, error) {
|
|
|
|
if t.err != nil {
|
|
|
|
return nil, t.err
|
|
|
|
}
|
|
|
|
|
|
|
|
return t.res.(*ecdsa.PublicKey), nil
|
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
func (t testACLEntity) InnerRingKeys() ([][]byte, error) {
|
2020-07-10 14:17:51 +00:00
|
|
|
if t.err != nil {
|
|
|
|
return nil, t.err
|
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
return t.res.([][]byte), nil
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
func (t *testACLEntity) ContainerNodesInfo(ctx context.Context, cid CID, prev int) ([]netmap.Info, error) {
|
2020-07-10 14:17:51 +00:00
|
|
|
if t.err != nil {
|
|
|
|
return nil, t.err
|
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
return t.res.([][]netmap.Info)[prev], nil
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (t testACLEntity) GetSignKeyPairs() []service.SignKeyPair {
|
|
|
|
if t.res == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return t.res.([]service.SignKeyPair)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestPreprocessor(t *testing.T) {
|
|
|
|
ctx := context.TODO()
|
|
|
|
|
|
|
|
t.Run("empty request", func(t *testing.T) {
|
|
|
|
require.PanicsWithValue(t, pmEmptyServiceRequest, func() {
|
|
|
|
_ = new(aclPreProcessor).preProcess(ctx, nil)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("everything is okay", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
var rule basic.ACL
|
|
|
|
rule.SetFinal()
|
|
|
|
rule.AllowOthers(requestACLSection(object.RequestGet))
|
2020-07-10 14:17:51 +00:00
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
cnr := new(storage.Container)
|
|
|
|
cnr.SetBasicACL(rule)
|
|
|
|
|
|
|
|
reqTarget := requestTarget{
|
|
|
|
group: eacl.GroupOthers,
|
|
|
|
}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
preprocessor := aclPreProcessor{
|
2020-07-24 13:54:03 +00:00
|
|
|
log: testlogger.NewLogger(false),
|
2020-07-10 14:17:51 +00:00
|
|
|
aclInfoReceiver: aclInfoReceiver{
|
2020-07-24 13:54:03 +00:00
|
|
|
cnrStorage: &testACLEntity{
|
|
|
|
res: cnr,
|
|
|
|
},
|
|
|
|
targetFinder: &testACLEntity{res: reqTarget},
|
2020-07-10 14:17:51 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
require.NoError(t, preprocessor.preProcess(ctx, &testACLEntity{res: object.RequestGet}))
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
reqTarget.group = eacl.GroupSystem
|
|
|
|
preprocessor.aclInfoReceiver.targetFinder = &testACLEntity{res: reqTarget}
|
|
|
|
require.NoError(t, preprocessor.preProcess(ctx, &testACLEntity{res: object.RequestGet}))
|
|
|
|
|
|
|
|
reqTarget.group = eacl.GroupUser
|
|
|
|
preprocessor.aclInfoReceiver.targetFinder = &testACLEntity{res: reqTarget}
|
2020-07-10 14:17:51 +00:00
|
|
|
require.Error(t, preprocessor.preProcess(ctx, &testACLEntity{res: object.RequestGet}))
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("can't fetch container", func(t *testing.T) {
|
|
|
|
preprocessor := aclPreProcessor{
|
2020-07-24 13:54:03 +00:00
|
|
|
log: testlogger.NewLogger(false),
|
2020-07-10 14:17:51 +00:00
|
|
|
aclInfoReceiver: aclInfoReceiver{
|
2020-07-24 13:54:03 +00:00
|
|
|
cnrStorage: &testACLEntity{err: container.ErrNotFound},
|
|
|
|
targetFinder: &testACLEntity{res: requestTarget{
|
|
|
|
group: eacl.GroupOthers,
|
|
|
|
}},
|
2020-07-10 14:17:51 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
require.Error(t, preprocessor.preProcess(ctx, &testACLEntity{res: object.RequestGet}))
|
|
|
|
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("sticky bit", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
var rule basic.ACL
|
|
|
|
rule.SetSticky()
|
|
|
|
rule.SetFinal()
|
|
|
|
for i := uint8(0); i < 7; i++ {
|
|
|
|
rule.AllowUser(i)
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
cnr := new(storage.Container)
|
|
|
|
cnr.SetBasicACL(rule)
|
|
|
|
|
2020-07-10 14:17:51 +00:00
|
|
|
s := &aclPreProcessor{
|
2020-07-24 13:54:03 +00:00
|
|
|
log: testlogger.NewLogger(false),
|
2020-07-10 14:17:51 +00:00
|
|
|
aclInfoReceiver: aclInfoReceiver{
|
2020-07-24 13:54:03 +00:00
|
|
|
cnrStorage: &testACLEntity{
|
|
|
|
res: cnr,
|
2020-07-10 14:17:51 +00:00
|
|
|
},
|
|
|
|
targetFinder: &testACLEntity{
|
2020-07-24 13:54:03 +00:00
|
|
|
res: requestTarget{
|
|
|
|
group: eacl.GroupUser,
|
|
|
|
},
|
2020-07-10 14:17:51 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
ownerKey := &test.DecodeKey(0).PublicKey
|
|
|
|
|
|
|
|
ownerID, err := refs.NewOwnerID(ownerKey)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
okItems := []func() []serviceRequest{
|
|
|
|
// Read requests
|
|
|
|
func() []serviceRequest {
|
|
|
|
return []serviceRequest{
|
|
|
|
new(object.GetRequest),
|
|
|
|
new(object.HeadRequest),
|
|
|
|
new(object.SearchRequest),
|
|
|
|
new(GetRangeRequest),
|
|
|
|
new(object.GetRangeHashRequest),
|
|
|
|
}
|
|
|
|
},
|
|
|
|
// PutRequest / DeleteRequest (w/o token)
|
|
|
|
func() []serviceRequest {
|
|
|
|
req := object.MakePutRequestHeader(&Object{
|
|
|
|
SystemHeader: SystemHeader{
|
|
|
|
OwnerID: ownerID,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
req.AddSignKey(nil, ownerKey)
|
|
|
|
putReq := &putRequest{
|
|
|
|
PutRequest: req,
|
|
|
|
}
|
|
|
|
|
|
|
|
delReq := new(object.DeleteRequest)
|
|
|
|
delReq.OwnerID = ownerID
|
|
|
|
delReq.AddSignKey(nil, ownerKey)
|
|
|
|
|
|
|
|
return []serviceRequest{putReq, delReq}
|
|
|
|
},
|
|
|
|
// PutRequest / DeleteRequest (w/ token)
|
|
|
|
func() []serviceRequest {
|
|
|
|
token := new(service.Token)
|
|
|
|
token.SetOwnerID(ownerID)
|
|
|
|
token.SetOwnerKey(crypto.MarshalPublicKey(ownerKey))
|
|
|
|
|
|
|
|
req := object.MakePutRequestHeader(&Object{
|
|
|
|
SystemHeader: SystemHeader{
|
|
|
|
OwnerID: ownerID,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
req.SetToken(token)
|
|
|
|
putReq := &putRequest{
|
|
|
|
PutRequest: req,
|
|
|
|
}
|
|
|
|
|
|
|
|
delReq := new(object.DeleteRequest)
|
|
|
|
delReq.OwnerID = ownerID
|
|
|
|
delReq.SetToken(token)
|
|
|
|
|
|
|
|
return []serviceRequest{putReq, delReq}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
failItems := []func() []serviceRequest{
|
|
|
|
// PutRequest / DeleteRequest (w/o token and wrong owner)
|
|
|
|
func() []serviceRequest {
|
|
|
|
otherOwner := ownerID
|
|
|
|
otherOwner[0]++
|
|
|
|
|
|
|
|
req := object.MakePutRequestHeader(&Object{
|
|
|
|
SystemHeader: SystemHeader{
|
|
|
|
OwnerID: otherOwner,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
req.AddSignKey(nil, ownerKey)
|
|
|
|
putReq := &putRequest{
|
|
|
|
PutRequest: req,
|
|
|
|
}
|
|
|
|
|
|
|
|
delReq := new(object.DeleteRequest)
|
|
|
|
delReq.OwnerID = otherOwner
|
|
|
|
delReq.AddSignKey(nil, ownerKey)
|
|
|
|
|
|
|
|
return []serviceRequest{putReq, delReq}
|
|
|
|
},
|
|
|
|
// PutRequest / DeleteRequest (w/ token w/ wrong owner)
|
|
|
|
func() []serviceRequest {
|
|
|
|
otherOwner := ownerID
|
|
|
|
otherOwner[0]++
|
|
|
|
|
|
|
|
token := new(service.Token)
|
|
|
|
token.SetOwnerID(ownerID)
|
|
|
|
token.SetOwnerKey(crypto.MarshalPublicKey(ownerKey))
|
|
|
|
|
|
|
|
req := object.MakePutRequestHeader(&Object{
|
|
|
|
SystemHeader: SystemHeader{
|
|
|
|
OwnerID: otherOwner,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
req.SetToken(token)
|
|
|
|
putReq := &putRequest{
|
|
|
|
PutRequest: req,
|
|
|
|
}
|
|
|
|
|
|
|
|
delReq := new(object.DeleteRequest)
|
|
|
|
delReq.OwnerID = otherOwner
|
|
|
|
delReq.SetToken(token)
|
|
|
|
|
|
|
|
return []serviceRequest{putReq, delReq}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ok := range okItems {
|
|
|
|
for _, req := range ok() {
|
|
|
|
require.NoError(t, s.preProcess(ctx, req))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, fail := range failItems {
|
|
|
|
for _, req := range fail() {
|
|
|
|
require.Error(t, s.preProcess(ctx, req))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
t.Run("eacl ACL", func(t *testing.T) {
|
|
|
|
target := requestTarget{
|
|
|
|
group: eacl.GroupOthers,
|
|
|
|
}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req := &testACLEntity{
|
|
|
|
res: object.RequestGet,
|
|
|
|
}
|
|
|
|
|
|
|
|
actCalc := new(testACLEntity)
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
var rule basic.ACL
|
|
|
|
rule.AllowOthers(requestACLSection(object.RequestGet))
|
|
|
|
|
|
|
|
cnr := new(storage.Container)
|
|
|
|
cnr.SetBasicACL(rule)
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
s := &aclPreProcessor{
|
2020-07-24 13:54:03 +00:00
|
|
|
log: testlogger.NewLogger(false),
|
2020-07-10 14:17:51 +00:00
|
|
|
aclInfoReceiver: aclInfoReceiver{
|
2020-07-24 13:54:03 +00:00
|
|
|
cnrStorage: &testACLEntity{
|
|
|
|
res: cnr,
|
2020-07-10 14:17:51 +00:00
|
|
|
},
|
|
|
|
targetFinder: &testACLEntity{
|
|
|
|
res: target,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
reqActionCalc: actCalc,
|
|
|
|
}
|
|
|
|
|
|
|
|
// force to return non-ActionAllow
|
2020-07-24 13:54:03 +00:00
|
|
|
actCalc.res = eacl.ActionAllow + 1
|
2020-07-10 14:17:51 +00:00
|
|
|
require.EqualError(t, s.preProcess(ctx, req), errAccessDenied.Error())
|
|
|
|
|
|
|
|
// force to return ActionAllow
|
2020-07-24 13:54:03 +00:00
|
|
|
actCalc.res = eacl.ActionAllow
|
2020-07-10 14:17:51 +00:00
|
|
|
require.NoError(t, s.preProcess(ctx, req))
|
|
|
|
})
|
2020-07-24 13:54:03 +00:00
|
|
|
|
|
|
|
t.Run("inner ring group", func(t *testing.T) {
|
|
|
|
reqTarget := requestTarget{
|
|
|
|
group: eacl.GroupSystem,
|
|
|
|
ir: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
cnr := new(storage.Container)
|
|
|
|
cnr.SetBasicACL(basic.FromUint32(^uint32(0)))
|
|
|
|
|
|
|
|
preprocessor := aclPreProcessor{
|
|
|
|
log: testlogger.NewLogger(false),
|
|
|
|
aclInfoReceiver: aclInfoReceiver{
|
|
|
|
cnrStorage: &testACLEntity{res: cnr},
|
|
|
|
targetFinder: &testACLEntity{res: reqTarget},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, rt := range []object.RequestType{
|
|
|
|
object.RequestSearch,
|
|
|
|
object.RequestHead,
|
|
|
|
object.RequestRangeHash,
|
|
|
|
} {
|
|
|
|
require.NoError(t,
|
|
|
|
preprocessor.preProcess(ctx, &testACLEntity{
|
|
|
|
res: rt,
|
|
|
|
}),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, rt := range []object.RequestType{
|
|
|
|
object.RequestRange,
|
|
|
|
object.RequestPut,
|
|
|
|
object.RequestDelete,
|
|
|
|
object.RequestGet,
|
|
|
|
} {
|
|
|
|
require.EqualError(t,
|
|
|
|
preprocessor.preProcess(ctx, &testACLEntity{
|
|
|
|
res: rt,
|
|
|
|
}),
|
|
|
|
errAccessDenied.Error(),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
})
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestTargetFinder(t *testing.T) {
|
|
|
|
ctx := context.TODO()
|
|
|
|
irKey := test.DecodeKey(2)
|
|
|
|
containerKey := test.DecodeKey(3)
|
|
|
|
prevContainerKey := test.DecodeKey(4)
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
var infoList1 []netmap.Info
|
|
|
|
info := netmap.Info{}
|
|
|
|
info.SetPublicKey(crypto.MarshalPublicKey(&containerKey.PublicKey))
|
|
|
|
infoList1 = append(infoList1, info)
|
|
|
|
|
|
|
|
var infoList2 []netmap.Info
|
|
|
|
info.SetPublicKey(crypto.MarshalPublicKey(&prevContainerKey.PublicKey))
|
|
|
|
infoList2 = append(infoList2, info)
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
finder := &targetFinder{
|
2020-07-24 13:54:03 +00:00
|
|
|
log: testlogger.NewLogger(false),
|
|
|
|
irKeysRecv: &testACLEntity{
|
|
|
|
res: [][]byte{crypto.MarshalPublicKey(&irKey.PublicKey)},
|
2020-07-10 14:17:51 +00:00
|
|
|
},
|
2020-07-24 13:54:03 +00:00
|
|
|
cnrLister: &testACLEntity{res: [][]netmap.Info{
|
|
|
|
infoList1,
|
|
|
|
infoList2,
|
2020-07-10 14:17:51 +00:00
|
|
|
}},
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("trusted node", func(t *testing.T) {
|
|
|
|
|
|
|
|
pk := &test.DecodeKey(0).PublicKey
|
|
|
|
|
|
|
|
ownerKey := &test.DecodeKey(1).PublicKey
|
|
|
|
owner, err := refs.NewOwnerID(ownerKey)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
token := new(service.Token)
|
|
|
|
token.SetSessionKey(crypto.MarshalPublicKey(pk))
|
|
|
|
token.SetOwnerKey(crypto.MarshalPublicKey(ownerKey))
|
|
|
|
token.SetOwnerID(owner)
|
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
req.ContainerID = CID{1, 2, 3}
|
|
|
|
req.SetToken(token)
|
|
|
|
req.AddSignKey(nil, pk)
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
cnr := new(storage.Container)
|
|
|
|
cnr.SetOwnerID(owner)
|
|
|
|
|
|
|
|
finder.cnrStorage = &testACLEntity{
|
|
|
|
res: cnr,
|
2020-07-10 14:17:51 +00:00
|
|
|
}
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupUser,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("container owner", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
key := &test.DecodeKey(0).PublicKey
|
|
|
|
owner, err := refs.NewOwnerID(key)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
cnr := new(storage.Container)
|
|
|
|
cnr.SetOwnerID(owner)
|
|
|
|
|
|
|
|
finder.cnrStorage = &testACLEntity{res: cnr}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
2020-07-24 13:54:03 +00:00
|
|
|
req.AddSignKey(nil, key)
|
2020-07-10 14:17:51 +00:00
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupUser,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("system owner", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
finder.cnrStorage = &testACLEntity{res: new(storage.Container)}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &irKey.PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupSystem,
|
|
|
|
ir: true,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req = new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &containerKey.PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupSystem,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req = new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &prevContainerKey.PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupSystem,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("other owner", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
finder.cnrStorage = &testACLEntity{res: new(storage.Container)}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &test.DecodeKey(0).PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupOthers,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("can't fetch request owner", func(t *testing.T) {
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupUnknown,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("can't fetch container", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
finder.cnrStorage = &testACLEntity{err: container.ErrNotFound}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &test.DecodeKey(0).PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupUnknown,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("can't fetch ir list", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
finder.cnrStorage = &testACLEntity{res: new(storage.Container)}
|
|
|
|
finder.irKeysRecv = &testACLEntity{err: errors.New("blockchain is busy")}
|
2020-07-10 14:17:51 +00:00
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &test.DecodeKey(0).PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupUnknown,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("can't fetch container list", func(t *testing.T) {
|
2020-07-24 13:54:03 +00:00
|
|
|
finder.cnrStorage = &testACLEntity{res: new(storage.Container)}
|
2020-07-10 14:17:51 +00:00
|
|
|
finder.cnrLister = &testACLEntity{err: container.ErrNotFound}
|
|
|
|
|
|
|
|
req := new(object.SearchRequest)
|
|
|
|
req.AddSignKey(nil, &test.DecodeKey(0).PublicKey)
|
2020-07-24 13:54:03 +00:00
|
|
|
require.Equal(t,
|
|
|
|
requestTarget{
|
|
|
|
group: eacl.GroupUnknown,
|
|
|
|
},
|
|
|
|
finder.Target(ctx, req),
|
|
|
|
)
|
2020-07-10 14:17:51 +00:00
|
|
|
})
|
|
|
|
}
|