mirror of https://github.com/minio/minio.git

committed by
GitHub

7 changed files with 173 additions and 23 deletions
-
20cmd/browser-peer-rpc.go
-
123cmd/browser-peer-rpc_test.go
-
17cmd/browser-rpc-router.go
-
2cmd/routers.go
-
30cmd/test-utils_test.go
-
3cmd/web-handlers.go
-
1cmd/web-handlers_test.go
@ -0,0 +1,123 @@ |
|||
/* |
|||
* Minio Cloud Storage, (C) 2016 Minio, Inc. |
|||
* |
|||
* Licensed under the Apache License, Version 2.0 (the "License"); |
|||
* you may not use this file except in compliance with the License. |
|||
* You may obtain a copy of the License at |
|||
* |
|||
* http://www.apache.org/licenses/LICENSE-2.0
|
|||
* |
|||
* Unless required by applicable law or agreed to in writing, software |
|||
* distributed under the License is distributed on an "AS IS" BASIS, |
|||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|||
* See the License for the specific language governing permissions and |
|||
* limitations under the License. |
|||
*/ |
|||
|
|||
package cmd |
|||
|
|||
import ( |
|||
"path" |
|||
"testing" |
|||
) |
|||
|
|||
// API suite container common to both FS and XL.
|
|||
type TestRPCBrowserPeerSuite struct { |
|||
serverType string |
|||
testServer TestServer |
|||
testAuthConf *authConfig |
|||
} |
|||
|
|||
// Setting up the test suite and starting the Test server.
|
|||
func (s *TestRPCBrowserPeerSuite) SetUpSuite(c *testing.T) { |
|||
s.testServer = StartTestBrowserPeerRPCServer(c, s.serverType) |
|||
s.testAuthConf = &authConfig{ |
|||
address: s.testServer.Server.Listener.Addr().String(), |
|||
accessKey: s.testServer.AccessKey, |
|||
secretKey: s.testServer.SecretKey, |
|||
path: path.Join(reservedBucket, browserPeerPath), |
|||
loginMethod: "BrowserPeer.LoginHandler", |
|||
} |
|||
} |
|||
|
|||
// No longer used with gocheck, but used in explicit teardown code in
|
|||
// each test function. // Called implicitly by "gopkg.in/check.v1"
|
|||
// after all tests are run.
|
|||
func (s *TestRPCBrowserPeerSuite) TearDownSuite(c *testing.T) { |
|||
s.testServer.Stop() |
|||
} |
|||
|
|||
func TestBrowserPeerRPC(t *testing.T) { |
|||
// setup code
|
|||
s := &TestRPCBrowserPeerSuite{serverType: "XL"} |
|||
s.SetUpSuite(t) |
|||
|
|||
// run test
|
|||
s.testBrowserPeerRPC(t) |
|||
|
|||
// teardown code
|
|||
s.TearDownSuite(t) |
|||
} |
|||
|
|||
// Tests for browser peer rpc.
|
|||
func (s *TestRPCBrowserPeerSuite) testBrowserPeerRPC(t *testing.T) { |
|||
// Construct RPC call arguments.
|
|||
creds := credential{ |
|||
AccessKeyID: "abcd1", |
|||
SecretAccessKey: "abcd1234", |
|||
} |
|||
|
|||
// Validate for invalid token.
|
|||
args := SetAuthPeerArgs{Creds: creds} |
|||
args.Token = "garbage" |
|||
rclient := newClient(s.testAuthConf.address, s.testAuthConf.path, false) |
|||
defer rclient.Close() |
|||
err := rclient.Call("BrowserPeer.SetAuthPeer", &args, &GenericReply{}) |
|||
if err != nil { |
|||
if err.Error() != errInvalidToken.Error() { |
|||
t.Fatal(err) |
|||
} |
|||
} |
|||
|
|||
// Validate for successful Peer update.
|
|||
args = SetAuthPeerArgs{Creds: creds} |
|||
client := newAuthClient(s.testAuthConf) |
|||
defer client.Close() |
|||
err = client.Call("BrowserPeer.SetAuthPeer", &args, &GenericReply{}) |
|||
if err != nil { |
|||
t.Fatal(err) |
|||
} |
|||
|
|||
// Validate for failure in login handler with previous credentials.
|
|||
rclient = newClient(s.testAuthConf.address, s.testAuthConf.path, false) |
|||
defer rclient.Close() |
|||
rargs := &RPCLoginArgs{ |
|||
Username: s.testAuthConf.accessKey, |
|||
Password: s.testAuthConf.secretKey, |
|||
} |
|||
rreply := &RPCLoginReply{} |
|||
err = rclient.Call("BrowserPeer.LoginHandler", rargs, rreply) |
|||
if err != nil { |
|||
if err.Error() != errInvalidAccessKeyID.Error() { |
|||
t.Fatal(err) |
|||
} |
|||
} |
|||
|
|||
// Validate for success in loing handled with valid credetnails.
|
|||
rargs = &RPCLoginArgs{ |
|||
Username: creds.AccessKeyID, |
|||
Password: creds.SecretAccessKey, |
|||
} |
|||
rreply = &RPCLoginReply{} |
|||
err = rclient.Call("BrowserPeer.LoginHandler", rargs, rreply) |
|||
if err != nil { |
|||
t.Fatal(err) |
|||
} |
|||
// Validate all the replied fields after successful login.
|
|||
if rreply.Token == "" { |
|||
t.Fatalf("Generated token cannot be empty %s", errInvalidToken) |
|||
} |
|||
if rreply.Timestamp.IsZero() { |
|||
t.Fatal("Time stamp returned cannot be zero") |
|||
} |
|||
} |
Write
Preview
Loading…
Cancel
Save
Reference in new issue