Bug #63004 » s3-tests.patch
s3tests_boto3/functional/test_s3.py | ||
---|---|---|
r = requests.post(url, files=payload, verify=get_config_ssl_verify())
|
||
eq(r.status_code, 403)
|
||
@attr(resource='object')
|
||
@attr(method='post')
|
||
@attr(operation='authenticated browser based upload via POST request')
|
||
@attr(assertion='fails with unauthenticated error')
|
||
def test_post_object_wrong_bucket():
|
||
bucket_name = get_new_bucket()
|
||
client = get_client()
|
||
url = _get_post_url(bucket_name)
|
||
utc = pytz.utc
|
||
expires = datetime.datetime.now(utc) + datetime.timedelta(seconds=+6000)
|
||
policy_document = {"expiration": expires.strftime("%Y-%m-%dT%H:%M:%SZ"),\
|
||
"conditions": [\
|
||
{"bucket": bucket_name},\
|
||
["starts-with", "$key", "foo"],\
|
||
{"acl": "private"},\
|
||
["starts-with", "$Content-Type", "text/plain"],\
|
||
["content-length-range", 0, 1024]\
|
||
]\
|
||
}
|
||
json_policy_document = json.JSONEncoder().encode(policy_document)
|
||
bytes_json_policy_document = bytes(json_policy_document, 'utf-8')
|
||
policy = base64.b64encode(bytes_json_policy_document)
|
||
aws_secret_access_key = get_main_aws_secret_key()
|
||
aws_access_key_id = get_main_aws_access_key()
|
||
signature = base64.b64encode(hmac.new(bytes(aws_secret_access_key, 'utf-8'), policy, hashlib.sha1).digest())
|
||
payload = OrderedDict([ ("key" , "${filename}"),("AWSAccessKeyId" , aws_access_key_id),\
|
||
("acl" , "private"),("signature" , signature),("policy" , policy),\
|
||
("Content-Type" , "text/plain"),('file', ('foo.txt', 'bar'))])
|
||
bad_bucket_name = get_new_bucket()
|
||
url = url.replace(bucket_name, bad_bucket_name)
|
||
r = requests.post(url, files=payload, verify=get_config_ssl_verify())
|
||
eq(r.status_code, 403)
|
||
@attr(resource='object')
|
||
@attr(method='post')
|
||
@attr(operation='authenticated browser based upload via POST request')
|