Files
versitygw/tests/drivers/user.sh

173 lines
5.0 KiB
Bash

#!/usr/bin/env bash
# Copyright 2024 Versity Software
# This file is licensed under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http:#www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
source ./tests/drivers/delete_object/delete_object_rest.sh
source ./tests/drivers/get_object_lock_config/get_object_lock_config_rest.sh
source ./tests/drivers/put_bucket_acl/put_bucket_acl_rest.sh
source ./tests/drivers/file.sh
source ./tests/util/util_multipart_abort.sh
source ./tests/util/util_policy.sh
source ./tests/util/util_retention.sh
source ./tests/util/util_users.sh
create_versitygw_acl_user_or_get_direct_user() {
if [ $# -ne 2 ]; then
log 2 "'create_versitygw_acl_user_or_get_direct_user' requires username, password"
return 1
fi
if [ "$DIRECT" == "true" ]; then
if [ -z "$AWS_CANONICAL_ID" ] || [ -z "$ACL_AWS_CANONICAL_ID" ] || [ -z "$ACL_AWS_ACCESS_KEY_ID" ] || [ -z "$ACL_AWS_SECRET_ACCESS_KEY" ]; then
log 2 "direct ACL calls require the following env vars: AWS_CANONICAL_ID, ACL_AWS_CANONICAL_ID, ACL_AWS_ACCESS_KEY_ID, ACL_AWS_SECRET_ACCESS_KEY"
return 1
fi
owner_canonical_id="$AWS_CANONICAL_ID"
user_canonical_id="$ACL_AWS_CANONICAL_ID"
username="$ACL_AWS_ACCESS_KEY_ID"
password="$ACL_AWS_SECRET_ACCESS_KEY"
else
owner_canonical_id="$AWS_ACCESS_KEY_ID"
if ! create_user_versitygw "$1" "$2" "user"; then
log 2 "error creating versitygw user"
return 1
fi
# shellcheck disable=SC2154
user_canonical_id="$1"
username="$1"
# shellcheck disable=SC2154
password="$2"
fi
echo "$owner_canonical_id"
echo "$user_canonical_id"
echo "$username"
echo "$password"
}
setup_bucket_and_user() {
if ! check_param_count_v2 "bucket or prefix, username, password, user type" 4 $#; then
return 1
fi
if ! setup_bucket_v2 "$1"; then
log 2 "error setting up bucket"
return 1
fi
if ! result=$(setup_user_versitygw_or_direct "$2" "$3" "$4" "$1"); then
log 2 "error setting up user"
return 1
fi
echo "$result"
return 0
}
setup_bucket_and_acl_user() {
if ! check_param_count_v2 "bucket, username, password" 3 $#; then
return 1
fi
if ! setup_bucket_v2 "$1"; then
log 2 "error setting up bucket"
return 1
fi
if ! result=$(create_versitygw_acl_user_or_get_direct_user "$2" "$3"); then
log 2 "error creating or getting user"
return 1
fi
echo "$result"
return 0
}
setup_bucket_file_and_user() {
if ! check_param_count "setup_bucket_file_and_user" "bucket, file, username, password, user type" 5 $#; then
return 1
fi
if ! setup_bucket_and_files "$1" "$2"; then
log 2 "error setting up bucket and file"
return 1
fi
if ! result=$(setup_user_versitygw_or_direct "$3" "$4" "$5" "$1"); then
log 2 "error setting up user"
return 1
fi
echo "$result"
return 0
}
setup_bucket_file_and_user_v2() {
if ! check_param_count_v2 "bucket name or prefix, file, username, password, user type" 5 $#; then
return 1
fi
if ! setup_bucket_and_files_v2 "$1" "$2"; then
log 2 "error setting up bucket and file"
return 1
fi
if ! result=$(setup_user_versitygw_or_direct "$3" "$4" "$5" "$1"); then
log 2 "error setting up user"
return 1
fi
echo "$result"
return 0
}
reset_bucket() {
if ! check_param_count "reset_bucket" "bucket" 1 $#; then
return 1
fi
log 6 "reset bucket '$1'"
if [[ $LOG_LEVEL_INT -ge 5 ]] && ! log_bucket_policy "$1"; then
log 3 "error logging bucket policy"
fi
if ! check_object_lock_config "$1"; then
log 2 "error checking object lock config"
return 1
fi
if [[ "$DIRECT" != "true" ]] && ! add_governance_bypass_policy "$1"; then
log 2 "error adding governance bypass policy"
return 1
fi
if ! list_and_delete_objects "$1"; then
log 2 "error listing and deleting objects"
return 1
fi
if ! abort_all_multipart_uploads_rest "$1"; then
log 2 "error aborting all multipart uploads"
return 1
fi
if [ "$SKIP_ACL_TESTING" != "true" ] && ! check_ownership_rule_and_reset_acl "$1"; then
log 2 "error checking ownership rule and resetting acl"
return 1
fi
if ! delete_bucket_policy_rest "$1"; then
log 2 "error deleting bucket policy"
return 1
fi
# shellcheck disable=SC2154
if [[ $lock_config_exists == true ]] && ! remove_retention_policy_rest "$1"; then
log 2 "error removing bucket retention policy"
return 1
fi
if [ "$RUN_USERS" == "true" ] && [ "$DIRECT" != "true" ] && ! change_bucket_owner "$AWS_ACCESS_KEY_ID" "$AWS_SECRET_ACCESS_KEY" "$1" "$AWS_ACCESS_KEY_ID"; then
log 2 "error changing bucket owner back to root"
return 1
fi
}