191 lines
5.6 KiB
Go
191 lines
5.6 KiB
Go
/*
|
|
Copyright 2021 The Dapr Authors
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package s3
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/dapr/components-contrib/bindings"
|
|
"github.com/dapr/kit/logger"
|
|
)
|
|
|
|
func TestParseMetadata(t *testing.T) {
|
|
t.Run("Has correct metadata", func(t *testing.T) {
|
|
m := bindings.Metadata{}
|
|
m.Properties = map[string]string{
|
|
"AccessKey": "key",
|
|
"Region": "region",
|
|
"SecretKey": "secret",
|
|
"Bucket": "test",
|
|
"Endpoint": "endpoint",
|
|
"SessionToken": "token",
|
|
"ForcePathStyle": "yes",
|
|
"DisableSSL": "true",
|
|
"InsecureSSL": "1",
|
|
}
|
|
s3 := AWSS3{}
|
|
meta, err := s3.parseMetadata(m)
|
|
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "key", meta.AccessKey)
|
|
assert.Equal(t, "region", meta.Region)
|
|
assert.Equal(t, "secret", meta.SecretKey)
|
|
assert.Equal(t, "test", meta.Bucket)
|
|
assert.Equal(t, "endpoint", meta.Endpoint)
|
|
assert.Equal(t, "token", meta.SessionToken)
|
|
assert.Equal(t, true, meta.ForcePathStyle)
|
|
assert.Equal(t, true, meta.DisableSSL)
|
|
assert.Equal(t, true, meta.InsecureSSL)
|
|
})
|
|
}
|
|
|
|
func TestMergeWithRequestMetadata(t *testing.T) {
|
|
t.Run("Has merged metadata", func(t *testing.T) {
|
|
m := bindings.Metadata{}
|
|
m.Properties = map[string]string{
|
|
"AccessKey": "key",
|
|
"Region": "region",
|
|
"SecretKey": "secret",
|
|
"Bucket": "test",
|
|
"Endpoint": "endpoint",
|
|
"SessionToken": "token",
|
|
"ForcePathStyle": "YES",
|
|
}
|
|
s3 := AWSS3{}
|
|
meta, err := s3.parseMetadata(m)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "key", meta.AccessKey)
|
|
assert.Equal(t, "region", meta.Region)
|
|
assert.Equal(t, "secret", meta.SecretKey)
|
|
assert.Equal(t, "test", meta.Bucket)
|
|
assert.Equal(t, "endpoint", meta.Endpoint)
|
|
assert.Equal(t, "token", meta.SessionToken)
|
|
assert.Equal(t, true, meta.ForcePathStyle)
|
|
|
|
request := bindings.InvokeRequest{}
|
|
request.Metadata = map[string]string{
|
|
"decodeBase64": "yes",
|
|
"encodeBase64": "false",
|
|
"filePath": "/usr/vader.darth",
|
|
"presignTTL": "15s",
|
|
}
|
|
|
|
mergedMeta, err := meta.mergeWithRequestMetadata(&request)
|
|
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "key", mergedMeta.AccessKey)
|
|
assert.Equal(t, "region", mergedMeta.Region)
|
|
assert.Equal(t, "secret", mergedMeta.SecretKey)
|
|
assert.Equal(t, "test", mergedMeta.Bucket)
|
|
assert.Equal(t, "endpoint", mergedMeta.Endpoint)
|
|
assert.Equal(t, "token", mergedMeta.SessionToken)
|
|
assert.Equal(t, true, meta.ForcePathStyle)
|
|
assert.Equal(t, true, mergedMeta.DecodeBase64)
|
|
assert.Equal(t, false, mergedMeta.EncodeBase64)
|
|
assert.Equal(t, "/usr/vader.darth", mergedMeta.FilePath)
|
|
assert.Equal(t, "15s", mergedMeta.PresignTTL)
|
|
})
|
|
|
|
t.Run("Has invalid merged metadata decodeBase64", func(t *testing.T) {
|
|
m := bindings.Metadata{}
|
|
m.Properties = map[string]string{
|
|
"AccessKey": "key",
|
|
"Region": "region",
|
|
"SecretKey": "secret",
|
|
"Bucket": "test",
|
|
"Endpoint": "endpoint",
|
|
"SessionToken": "token",
|
|
"ForcePathStyle": "true",
|
|
}
|
|
s3 := AWSS3{}
|
|
meta, err := s3.parseMetadata(m)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "key", meta.AccessKey)
|
|
assert.Equal(t, "region", meta.Region)
|
|
assert.Equal(t, "secret", meta.SecretKey)
|
|
assert.Equal(t, "test", meta.Bucket)
|
|
assert.Equal(t, "endpoint", meta.Endpoint)
|
|
assert.Equal(t, "token", meta.SessionToken)
|
|
assert.Equal(t, true, meta.ForcePathStyle)
|
|
|
|
request := bindings.InvokeRequest{}
|
|
request.Metadata = map[string]string{
|
|
"decodeBase64": "hello",
|
|
}
|
|
|
|
mergedMeta, err := meta.mergeWithRequestMetadata(&request)
|
|
|
|
assert.NoError(t, err)
|
|
assert.False(t, mergedMeta.DecodeBase64)
|
|
})
|
|
|
|
t.Run("Has invalid merged metadata encodeBase64", func(t *testing.T) {
|
|
m := bindings.Metadata{}
|
|
m.Properties = map[string]string{
|
|
"AccessKey": "key",
|
|
"Region": "region",
|
|
"SecretKey": "secret",
|
|
"Bucket": "test",
|
|
"Endpoint": "endpoint",
|
|
"SessionToken": "token",
|
|
"ForcePathStyle": "true",
|
|
}
|
|
s3 := AWSS3{}
|
|
meta, err := s3.parseMetadata(m)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, "key", meta.AccessKey)
|
|
assert.Equal(t, "region", meta.Region)
|
|
assert.Equal(t, "secret", meta.SecretKey)
|
|
assert.Equal(t, "test", meta.Bucket)
|
|
assert.Equal(t, "endpoint", meta.Endpoint)
|
|
assert.Equal(t, "token", meta.SessionToken)
|
|
assert.Equal(t, true, meta.ForcePathStyle)
|
|
|
|
request := bindings.InvokeRequest{}
|
|
request.Metadata = map[string]string{
|
|
"encodeBase64": "bye",
|
|
}
|
|
|
|
mergedMeta, err := meta.mergeWithRequestMetadata(&request)
|
|
|
|
assert.NoError(t, err)
|
|
assert.False(t, mergedMeta.EncodeBase64)
|
|
})
|
|
}
|
|
|
|
func TestGetOption(t *testing.T) {
|
|
s3 := NewAWSS3(logger.NewLogger("s3")).(*AWSS3)
|
|
s3.metadata = &s3Metadata{}
|
|
|
|
t.Run("return error if key is missing", func(t *testing.T) {
|
|
r := bindings.InvokeRequest{}
|
|
_, err := s3.get(context.Background(), &r)
|
|
assert.Error(t, err)
|
|
})
|
|
}
|
|
|
|
func TestDeleteOption(t *testing.T) {
|
|
s3 := NewAWSS3(logger.NewLogger("s3")).(*AWSS3)
|
|
s3.metadata = &s3Metadata{}
|
|
|
|
t.Run("return error if key is missing", func(t *testing.T) {
|
|
r := bindings.InvokeRequest{}
|
|
_, err := s3.delete(context.Background(), &r)
|
|
assert.Error(t, err)
|
|
})
|
|
}
|