mirror of
https://github.com/minio/minio-rs.git
synced 2026-03-10 13:42:50 +08:00
- Replaced raw string parameters with validated wrapper types (BucketName, ObjectName, Region, VersionId, etc.) following the "parse, don't validate" pattern - Bucket and object names are now validated at construction time, ensuring compile-time correctness - Added both relaxed (MinIO-compatible) and strict (AWS S3-compliant) validation modes for bucket names
79 lines
2.6 KiB
Rust
79 lines
2.6 KiB
Rust
// MinIO Rust Library for Amazon S3 Compatible Cloud Storage
|
|
// Copyright 2025 MinIO, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
use minio::s3::client::DEFAULT_REGION;
|
|
use minio::s3::response::{
|
|
DeleteBucketPolicyResponse, GetBucketPolicyResponse, PutBucketPolicyResponse,
|
|
};
|
|
use minio::s3::response_traits::{HasBucket, HasRegion};
|
|
use minio::s3::types::{BucketName, S3Api};
|
|
use minio_common::example::create_bucket_policy_config_example;
|
|
use minio_common::test_context::TestContext;
|
|
|
|
#[minio_macros::test]
|
|
async fn bucket_policy(ctx: TestContext, bucket: BucketName) {
|
|
let config: String = create_bucket_policy_config_example(&bucket);
|
|
|
|
let resp: PutBucketPolicyResponse = ctx
|
|
.client
|
|
.put_bucket_policy(&bucket)
|
|
.unwrap()
|
|
.config(config.clone())
|
|
.build()
|
|
.send()
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(resp.bucket(), Some(&bucket));
|
|
assert_eq!(resp.region(), &*DEFAULT_REGION);
|
|
|
|
let resp: GetBucketPolicyResponse = ctx
|
|
.client
|
|
.get_bucket_policy(&bucket)
|
|
.unwrap()
|
|
.build()
|
|
.send()
|
|
.await
|
|
.unwrap();
|
|
// TODO create a proper comparison of the retrieved config and the provided config
|
|
// println!("response of getting policy: resp.config={:?}", resp.config);
|
|
// assert_eq!(&resp.config, &config);
|
|
assert!(!resp.config().unwrap().is_empty());
|
|
assert_eq!(resp.bucket(), Some(&bucket));
|
|
assert_eq!(resp.region(), &*DEFAULT_REGION);
|
|
|
|
let resp: DeleteBucketPolicyResponse = ctx
|
|
.client
|
|
.delete_bucket_policy(&bucket)
|
|
.unwrap()
|
|
.build()
|
|
.send()
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(resp.bucket(), Some(&bucket));
|
|
assert_eq!(resp.region(), &*DEFAULT_REGION);
|
|
|
|
let resp: GetBucketPolicyResponse = ctx
|
|
.client
|
|
.get_bucket_policy(&bucket)
|
|
.unwrap()
|
|
.build()
|
|
.send()
|
|
.await
|
|
.unwrap();
|
|
assert_eq!(resp.config().unwrap(), "{}");
|
|
assert_eq!(resp.bucket(), Some(&bucket));
|
|
assert_eq!(resp.region(), &*DEFAULT_REGION);
|
|
}
|