|
|
@ -25,114 +25,98 @@ import ( |
|
|
|
|
|
|
|
|
|
|
|
// TestParseBucketSSEConfig performs basic sanity tests on ParseBucketSSEConfig
|
|
|
|
// TestParseBucketSSEConfig performs basic sanity tests on ParseBucketSSEConfig
|
|
|
|
func TestParseBucketSSEConfig(t *testing.T) { |
|
|
|
func TestParseBucketSSEConfig(t *testing.T) { |
|
|
|
|
|
|
|
actualAES256NoNSConfig := &BucketSSEConfig{ |
|
|
|
|
|
|
|
XMLName: xml.Name{ |
|
|
|
|
|
|
|
Local: "ServerSideEncryptionConfiguration", |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
Rules: []SSERule{ |
|
|
|
|
|
|
|
{ |
|
|
|
|
|
|
|
DefaultEncryptionAction: EncryptionAction{ |
|
|
|
|
|
|
|
Algorithm: AES256, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
actualAES256Config := &BucketSSEConfig{ |
|
|
|
|
|
|
|
XMLNS: xmlNS, |
|
|
|
|
|
|
|
XMLName: xml.Name{ |
|
|
|
|
|
|
|
Local: "ServerSideEncryptionConfiguration", |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
Rules: []SSERule{ |
|
|
|
|
|
|
|
{ |
|
|
|
|
|
|
|
DefaultEncryptionAction: EncryptionAction{ |
|
|
|
|
|
|
|
Algorithm: AES256, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
actualKMSConfig := &BucketSSEConfig{ |
|
|
|
|
|
|
|
XMLNS: xmlNS, |
|
|
|
|
|
|
|
XMLName: xml.Name{ |
|
|
|
|
|
|
|
Local: "ServerSideEncryptionConfiguration", |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
Rules: []SSERule{ |
|
|
|
|
|
|
|
{ |
|
|
|
|
|
|
|
DefaultEncryptionAction: EncryptionAction{ |
|
|
|
|
|
|
|
Algorithm: AWSKms, |
|
|
|
|
|
|
|
MasterKeyID: "arn:aws:kms:us-east-1:1234/5678example", |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
testCases := []struct { |
|
|
|
testCases := []struct { |
|
|
|
inputXML string |
|
|
|
inputXML string |
|
|
|
expectedErr error |
|
|
|
expectedErr error |
|
|
|
shouldPass bool |
|
|
|
shouldPass bool |
|
|
|
|
|
|
|
expectedConfig *BucketSSEConfig |
|
|
|
}{ |
|
|
|
}{ |
|
|
|
// 1. Valid XML SSE-S3
|
|
|
|
// 1. Valid XML SSE-S3
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>AES256</SSEAlgorithm></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>AES256</SSEAlgorithm> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: nil, |
|
|
|
expectedErr: nil, |
|
|
|
shouldPass: true, |
|
|
|
shouldPass: true, |
|
|
|
|
|
|
|
expectedConfig: actualAES256Config, |
|
|
|
}, |
|
|
|
}, |
|
|
|
// 2. Valid XML SSE-KMS
|
|
|
|
// 2. Valid XML SSE-KMS
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>aws:kms</SSEAlgorithm><KMSMasterKeyID>arn:aws:kms:us-east-1:1234/5678example</KMSMasterKeyID></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>aws:kms</SSEAlgorithm> |
|
|
|
|
|
|
|
<KMSMasterKeyID>arn:aws:kms:us-east-1:1234/5678example</KMSMasterKeyID> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: nil, |
|
|
|
expectedErr: nil, |
|
|
|
shouldPass: true, |
|
|
|
shouldPass: true, |
|
|
|
|
|
|
|
expectedConfig: actualKMSConfig, |
|
|
|
}, |
|
|
|
}, |
|
|
|
// 3. Invalid - more than one rule
|
|
|
|
// 3. Invalid - more than one rule
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>AES256</SSEAlgorithm></ApplyServerSideEncryptionByDefault></Rule><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>AES256</SSEAlgorithm></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>AES256</SSEAlgorithm> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>AES256</SSEAlgorithm> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: errors.New("Only one server-side encryption rule is allowed"), |
|
|
|
expectedErr: errors.New("Only one server-side encryption rule is allowed"), |
|
|
|
shouldPass: false, |
|
|
|
shouldPass: false, |
|
|
|
}, |
|
|
|
}, |
|
|
|
// 4. Invalid XML - master key ID present in AES256
|
|
|
|
// 4. Invalid XML - master key ID present along with AES256
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>AES256</SSEAlgorithm><KMSMasterKeyID>arn:aws:kms:us-east-1:1234/5678example</KMSMasterKeyID></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>AES256</SSEAlgorithm> |
|
|
|
|
|
|
|
<KMSMasterKeyID>arn:aws:kms:us-east-1:1234/5678example</KMSMasterKeyID> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: errors.New("MasterKeyID is allowed with aws:kms only"), |
|
|
|
expectedErr: errors.New("MasterKeyID is allowed with aws:kms only"), |
|
|
|
shouldPass: false, |
|
|
|
shouldPass: false, |
|
|
|
}, |
|
|
|
}, |
|
|
|
// 5. Invalid XML - master key ID not found in aws:kms algorithm
|
|
|
|
// 5. Invalid XML - master key ID not provided when algorithm is set to aws:kms algorithm
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>aws:kms</SSEAlgorithm></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>aws:kms</SSEAlgorithm> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: errors.New("MasterKeyID is missing"), |
|
|
|
expectedErr: errors.New("MasterKeyID is missing"), |
|
|
|
shouldPass: false, |
|
|
|
shouldPass: false, |
|
|
|
}, |
|
|
|
}, |
|
|
|
// 6. Invalid Algorithm
|
|
|
|
// 6. Invalid Algorithm
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>InvalidAlgorithm</SSEAlgorithm></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>InvalidAlgorithm</SSEAlgorithm> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: errors.New("Unknown SSE algorithm"), |
|
|
|
expectedErr: errors.New("Unknown SSE algorithm"), |
|
|
|
shouldPass: false, |
|
|
|
shouldPass: false, |
|
|
|
}, |
|
|
|
}, |
|
|
|
// 7. Allow missing namespace
|
|
|
|
// 7. Valid XML without the namespace set
|
|
|
|
{ |
|
|
|
{ |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration> |
|
|
|
inputXML: `<ServerSideEncryptionConfiguration><Rule><ApplyServerSideEncryptionByDefault><SSEAlgorithm>AES256</SSEAlgorithm></ApplyServerSideEncryptionByDefault></Rule></ServerSideEncryptionConfiguration>`, |
|
|
|
<Rule> |
|
|
|
|
|
|
|
<ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
<SSEAlgorithm>AES256</SSEAlgorithm> |
|
|
|
|
|
|
|
</ApplyServerSideEncryptionByDefault> |
|
|
|
|
|
|
|
</Rule> |
|
|
|
|
|
|
|
</ServerSideEncryptionConfiguration>`, |
|
|
|
|
|
|
|
expectedErr: nil, |
|
|
|
expectedErr: nil, |
|
|
|
shouldPass: true, |
|
|
|
shouldPass: true, |
|
|
|
}, |
|
|
|
expectedConfig: actualAES256NoNSConfig, |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
actualConfig := &BucketSSEConfig{ |
|
|
|
|
|
|
|
XMLName: xml.Name{ |
|
|
|
|
|
|
|
Local: "ServerSideEncryptionConfiguration", |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
Rules: []SSERule{ |
|
|
|
|
|
|
|
{ |
|
|
|
|
|
|
|
DefaultEncryptionAction: EncryptionAction{ |
|
|
|
|
|
|
|
Algorithm: AES256, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
|
|
|
|
}, |
|
|
|
}, |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
@ -146,14 +130,11 @@ func TestParseBucketSSEConfig(t *testing.T) { |
|
|
|
if err == nil || err != nil && err.Error() != tc.expectedErr.Error() { |
|
|
|
if err == nil || err != nil && err.Error() != tc.expectedErr.Error() { |
|
|
|
t.Fatalf("Test case %d: Expected %s but got %s", i+1, tc.expectedErr, err) |
|
|
|
t.Fatalf("Test case %d: Expected %s but got %s", i+1, tc.expectedErr, err) |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if !tc.shouldPass { |
|
|
|
|
|
|
|
continue |
|
|
|
continue |
|
|
|
} |
|
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
if actualXML, err := xml.Marshal(actualConfig); err != nil && bytes.Equal(actualXML, []byte(tc.inputXML)) { |
|
|
|
if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) { |
|
|
|
t.Fatalf("Test case %d: Expected config %s but got %s", i+1, string(actualXML), tc.inputXML) |
|
|
|
t.Fatalf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML) |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|
} |
|
|
|