/* * MinIO Cloud Storage, (C) 2020 MinIO, Inc. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package cmd import ( "bytes" "encoding/xml" "errors" "testing" ) // TestParseBucketSSEConfig performs basic sanity tests on ParseBucketSSEConfig func TestParseBucketSSEConfig(t *testing.T) { actualAES256NoNSConfig := &BucketSSEConfig{ XMLName: xml.Name{ Local: "ServerSideEncryptionConfiguration", }, Rules: []SSERule{ { DefaultEncryptionAction: EncryptionAction{ Algorithm: AES256, }, }, }, } actualAES256Config := &BucketSSEConfig{ XMLNS: xmlNS, XMLName: xml.Name{ Local: "ServerSideEncryptionConfiguration", }, Rules: []SSERule{ { DefaultEncryptionAction: EncryptionAction{ Algorithm: AES256, }, }, }, } actualKMSConfig := &BucketSSEConfig{ XMLNS: xmlNS, XMLName: xml.Name{ Local: "ServerSideEncryptionConfiguration", }, Rules: []SSERule{ { DefaultEncryptionAction: EncryptionAction{ Algorithm: AWSKms, MasterKeyID: "arn:aws:kms:us-east-1:1234/5678example", }, }, }, } testCases := []struct { inputXML string expectedErr error shouldPass bool expectedConfig *BucketSSEConfig }{ // 1. Valid XML SSE-S3 { inputXML: `AES256`, expectedErr: nil, shouldPass: true, expectedConfig: actualAES256Config, }, // 2. Valid XML SSE-KMS { inputXML: `aws:kmsarn:aws:kms:us-east-1:1234/5678example`, expectedErr: nil, shouldPass: true, expectedConfig: actualKMSConfig, }, // 3. Invalid - more than one rule { inputXML: `AES256AES256`, expectedErr: errors.New("only one server-side encryption rule is allowed at a time"), shouldPass: false, }, // 4. Invalid XML - master key ID present along with AES256 { inputXML: `AES256arn:aws:kms:us-east-1:1234/5678example`, expectedErr: errors.New("MasterKeyID is allowed with aws:kms only"), shouldPass: false, }, // 5. Invalid XML - master key ID not provided when algorithm is set to aws:kms algorithm { inputXML: `aws:kms`, expectedErr: errors.New("MasterKeyID is missing with aws:kms"), shouldPass: false, }, // 6. Invalid Algorithm { inputXML: `InvalidAlgorithm`, expectedErr: errors.New("Unknown SSE algorithm"), shouldPass: false, }, // 7. Valid XML without the namespace set { inputXML: `AES256`, expectedErr: nil, shouldPass: true, expectedConfig: actualAES256NoNSConfig, }, } for i, tc := range testCases { _, err := ParseBucketSSEConfig(bytes.NewReader([]byte(tc.inputXML))) if tc.shouldPass && err != nil { t.Fatalf("Test case %d: Expected to succeed but got %s", i+1, err) } if !tc.shouldPass { if err == nil || err != nil && err.Error() != tc.expectedErr.Error() { t.Fatalf("Test case %d: Expected %s but got %s", i+1, tc.expectedErr, err) } continue } if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) { t.Fatalf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML) } } }