2020-07-08 11:56:37 +00:00
|
|
|
package authz
|
2020-03-23 06:01:59 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
caos_errs "github.com/caos/zitadel/internal/errors"
|
|
|
|
)
|
|
|
|
|
|
|
|
func getTestCtx(userID, orgID string) context.Context {
|
2020-03-30 09:52:08 +00:00
|
|
|
return context.WithValue(context.Background(), dataKey, CtxData{UserID: userID, OrgID: orgID})
|
2020-03-23 06:01:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type testVerifier struct {
|
2020-06-05 05:50:04 +00:00
|
|
|
grant *Grant
|
2020-03-23 06:01:59 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 11:56:37 +00:00
|
|
|
func (v *testVerifier) VerifyAccessToken(ctx context.Context, token, clientID string) (string, string, error) {
|
|
|
|
return "userID", "agentID", nil
|
2020-03-23 06:01:59 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 11:56:37 +00:00
|
|
|
func (v *testVerifier) ResolveGrants(ctx context.Context) (*Grant, error) {
|
2020-06-05 05:50:04 +00:00
|
|
|
return v.grant, nil
|
2020-03-23 06:01:59 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 11:56:37 +00:00
|
|
|
func (v *testVerifier) ProjectIDByClientID(ctx context.Context, clientID string) (string, error) {
|
2020-03-23 06:01:59 +00:00
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
|
2020-07-08 11:56:37 +00:00
|
|
|
func (v *testVerifier) VerifierClientID(ctx context.Context, appName string) (string, error) {
|
|
|
|
return "clientID", nil
|
|
|
|
}
|
|
|
|
|
2020-03-30 08:09:38 +00:00
|
|
|
func equalStringArray(a, b []string) bool {
|
2020-03-23 06:01:59 +00:00
|
|
|
if len(a) != len(b) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for i, v := range a {
|
|
|
|
if v != b[i] {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_GetUserMethodPermissions(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
ctx context.Context
|
2020-07-08 11:56:37 +00:00
|
|
|
verifier *TokenVerifier
|
2020-03-23 06:01:59 +00:00
|
|
|
requiredPerm string
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig Config
|
2020-03-23 06:01:59 +00:00
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
wantErr bool
|
|
|
|
errFunc func(err error) bool
|
|
|
|
result []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "Empty Context",
|
|
|
|
args: args{
|
|
|
|
ctx: getTestCtx("", ""),
|
2020-07-08 11:56:37 +00:00
|
|
|
verifier: Start(&testVerifier{grant: &Grant{
|
|
|
|
Roles: []string{"ORG_OWNER"},
|
|
|
|
}}),
|
2020-03-23 06:01:59 +00:00
|
|
|
requiredPerm: "project.read",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
wantErr: true,
|
2020-03-30 07:28:00 +00:00
|
|
|
errFunc: caos_errs.IsUnauthenticated,
|
|
|
|
result: []string{"project.read"},
|
2020-03-23 06:01:59 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "No Grants",
|
|
|
|
args: args{
|
|
|
|
ctx: getTestCtx("", ""),
|
2020-07-08 11:56:37 +00:00
|
|
|
verifier: Start(&testVerifier{grant: &Grant{}}),
|
2020-03-23 06:01:59 +00:00
|
|
|
requiredPerm: "project.read",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
result: make([]string, 0),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Get Permissions",
|
|
|
|
args: args{
|
|
|
|
ctx: getTestCtx("userID", "orgID"),
|
2020-07-08 11:56:37 +00:00
|
|
|
verifier: Start(&testVerifier{grant: &Grant{
|
|
|
|
Roles: []string{"ORG_OWNER"},
|
|
|
|
}}),
|
2020-03-23 06:01:59 +00:00
|
|
|
requiredPerm: "project.read",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
result: []string{"project.read"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
_, perms, err := getUserMethodPermissions(tt.args.ctx, tt.args.verifier, tt.args.requiredPerm, tt.args.authConfig)
|
|
|
|
|
|
|
|
if tt.wantErr && err == nil {
|
|
|
|
t.Errorf("got wrong result, should get err: actual: %v ", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if tt.wantErr && !tt.errFunc(err) {
|
|
|
|
t.Errorf("got wrong err: %v ", err)
|
|
|
|
}
|
|
|
|
|
2020-03-30 08:09:38 +00:00
|
|
|
if !tt.wantErr && !equalStringArray(perms, tt.result) {
|
2020-03-23 06:01:59 +00:00
|
|
|
t.Errorf("got wrong result, expecting: %v, actual: %v ", tt.result, perms)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_MapGrantsToPermissions(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
requiredPerm string
|
2020-06-05 05:50:04 +00:00
|
|
|
grant *Grant
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig Config
|
2020-03-23 06:01:59 +00:00
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
result []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "One Role existing perm",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
2020-06-05 05:50:04 +00:00
|
|
|
grant: &Grant{Roles: []string{"ORG_OWNER"}},
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
result: []string{"project.read"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "One Role not existing perm",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.write",
|
2020-06-05 05:50:04 +00:00
|
|
|
grant: &Grant{Roles: []string{"ORG_OWNER"}},
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
result: []string{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Multiple Roles one existing",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
2020-06-05 05:50:04 +00:00
|
|
|
grant: &Grant{Roles: []string{"ORG_OWNER", "IAM_OWNER"}},
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
result: []string{"project.read"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Multiple Roles, global and specific",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
2020-06-05 05:50:04 +00:00
|
|
|
grant: &Grant{Roles: []string{"ORG_OWNER", "PROJECT_OWNER:1"}},
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "PROJECT_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
result: []string{"project.read", "project.read:1"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
2020-06-05 05:50:04 +00:00
|
|
|
result := mapGrantToPermissions(tt.args.requiredPerm, tt.args.grant, tt.args.authConfig)
|
2020-03-30 08:09:38 +00:00
|
|
|
if !equalStringArray(result, tt.result) {
|
2020-03-23 06:01:59 +00:00
|
|
|
t.Errorf("got wrong result, expecting: %v, actual: %v ", tt.result, result)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_MapRoleToPerm(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
requiredPerm string
|
|
|
|
actualRole string
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig Config
|
2020-03-23 06:01:59 +00:00
|
|
|
resolvedPermissions []string
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
result []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "first perm without context id",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
|
|
|
actualRole: "ORG_OWNER",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
resolvedPermissions: []string{},
|
|
|
|
},
|
|
|
|
result: []string{"project.read"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "existing perm without context id",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
|
|
|
actualRole: "ORG_OWNER",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "IAM_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
resolvedPermissions: []string{"project.read"},
|
|
|
|
},
|
|
|
|
result: []string{"project.read"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "first perm with context id",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
|
|
|
actualRole: "PROJECT_OWNER:1",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "PROJECT_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
resolvedPermissions: []string{},
|
|
|
|
},
|
|
|
|
result: []string{"project.read:1"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "perm with context id, existing global",
|
|
|
|
args: args{
|
|
|
|
requiredPerm: "project.read",
|
|
|
|
actualRole: "PROJECT_OWNER:1",
|
2020-07-08 11:56:37 +00:00
|
|
|
authConfig: Config{
|
2020-03-23 06:01:59 +00:00
|
|
|
RolePermissionMappings: []RoleMapping{
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "PROJECT_OWNER",
|
|
|
|
Permissions: []string{"project.read"},
|
|
|
|
},
|
2020-07-08 11:56:37 +00:00
|
|
|
{
|
2020-03-23 06:01:59 +00:00
|
|
|
Role: "ORG_OWNER",
|
|
|
|
Permissions: []string{"org.read", "project.read"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
resolvedPermissions: []string{"project.read"},
|
|
|
|
},
|
|
|
|
result: []string{"project.read", "project.read:1"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
result := mapRoleToPerm(tt.args.requiredPerm, tt.args.actualRole, tt.args.authConfig, tt.args.resolvedPermissions)
|
2020-03-30 08:09:38 +00:00
|
|
|
if !equalStringArray(result, tt.result) {
|
2020-03-23 06:01:59 +00:00
|
|
|
t.Errorf("got wrong result, expecting: %v, actual: %v ", tt.result, result)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_AddRoleContextIDToPerm(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
perm string
|
|
|
|
ctxID string
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
result string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "with ctx id",
|
|
|
|
args: args{
|
|
|
|
perm: "perm1",
|
|
|
|
ctxID: "2",
|
|
|
|
},
|
|
|
|
result: "perm1:2",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "with ctx id",
|
|
|
|
args: args{
|
|
|
|
perm: "perm1",
|
|
|
|
ctxID: "",
|
|
|
|
},
|
|
|
|
result: "perm1",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
result := addRoleContextIDToPerm(tt.args.perm, tt.args.ctxID)
|
|
|
|
if result != tt.result {
|
|
|
|
t.Errorf("got wrong result, expecting: %v, actual: %v ", tt.result, result)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func Test_ExistisPerm(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
existing []string
|
|
|
|
perm string
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
result bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "not existing perm",
|
|
|
|
args: args{
|
|
|
|
existing: []string{"perm1", "perm2", "perm3"},
|
|
|
|
perm: "perm4",
|
|
|
|
},
|
|
|
|
result: false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "existing perm",
|
|
|
|
args: args{
|
|
|
|
existing: []string{"perm1", "perm2", "perm3"},
|
|
|
|
perm: "perm2",
|
|
|
|
},
|
|
|
|
result: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
2020-06-05 05:50:04 +00:00
|
|
|
result := ExistsPerm(tt.args.existing, tt.args.perm)
|
2020-03-23 06:01:59 +00:00
|
|
|
if result != tt.result {
|
|
|
|
t.Errorf("got wrong result, expecting: %v, actual: %v ", tt.result, result)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|