-
Notifications
You must be signed in to change notification settings - Fork 53
/
authz_test.go
93 lines (79 loc) · 3.57 KB
/
authz_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
// Copyright 2014 Manu Martinez-Almeida. All rights reserved.
// Use of this source code is governed by a MIT style
// license that can be found in the LICENSE file.
package authz
import (
"context"
"net/http"
"net/http/httptest"
"testing"
"github.com/casbin/casbin/v2"
"github.com/gin-gonic/gin"
)
func testAuthzRequest(t *testing.T, router *gin.Engine, user string, path string, method string, code int) {
r, _ := http.NewRequestWithContext(context.Background(), method, path, nil)
r.SetBasicAuth(user, "123")
w := httptest.NewRecorder()
router.ServeHTTP(w, r)
if w.Code != code {
t.Errorf("%s, %s, %s: %d, supposed to be %d", user, path, method, w.Code, code)
}
}
func TestBasic(t *testing.T) {
router := gin.New()
e, _ := casbin.NewEnforcer("authz_model.conf", "authz_policy.csv")
router.Use(NewAuthorizer(e))
router.Any("/*anypath", func(c *gin.Context) {
c.Status(200)
})
testAuthzRequest(t, router, "alice", "/dataset1/resource1", "GET", 200)
testAuthzRequest(t, router, "alice", "/dataset1/resource1", "POST", 200)
testAuthzRequest(t, router, "alice", "/dataset1/resource2", "GET", 200)
testAuthzRequest(t, router, "alice", "/dataset1/resource2", "POST", 403)
}
func TestPathWildcard(t *testing.T) {
router := gin.New()
e, _ := casbin.NewEnforcer("authz_model.conf", "authz_policy.csv")
router.Use(NewAuthorizer(e))
router.Any("/*anypath", func(c *gin.Context) {
c.Status(200)
})
testAuthzRequest(t, router, "bob", "/dataset2/resource1", "GET", 200)
testAuthzRequest(t, router, "bob", "/dataset2/resource1", "POST", 200)
testAuthzRequest(t, router, "bob", "/dataset2/resource1", "DELETE", 200)
testAuthzRequest(t, router, "bob", "/dataset2/resource2", "GET", 200)
testAuthzRequest(t, router, "bob", "/dataset2/resource2", "POST", 403)
testAuthzRequest(t, router, "bob", "/dataset2/resource2", "DELETE", 403)
testAuthzRequest(t, router, "bob", "/dataset2/folder1/item1", "GET", 403)
testAuthzRequest(t, router, "bob", "/dataset2/folder1/item1", "POST", 200)
testAuthzRequest(t, router, "bob", "/dataset2/folder1/item1", "DELETE", 403)
testAuthzRequest(t, router, "bob", "/dataset2/folder1/item2", "GET", 403)
testAuthzRequest(t, router, "bob", "/dataset2/folder1/item2", "POST", 200)
testAuthzRequest(t, router, "bob", "/dataset2/folder1/item2", "DELETE", 403)
}
func TestRBAC(t *testing.T) {
router := gin.New()
e, _ := casbin.NewEnforcer("authz_model.conf", "authz_policy.csv")
router.Use(NewAuthorizer(e))
router.Any("/*anypath", func(c *gin.Context) {
c.Status(200)
})
// cathy can access all /dataset1/* resources via all methods because it has the dataset1_admin role.
testAuthzRequest(t, router, "cathy", "/dataset1/item", "GET", 200)
testAuthzRequest(t, router, "cathy", "/dataset1/item", "POST", 200)
testAuthzRequest(t, router, "cathy", "/dataset1/item", "DELETE", 200)
testAuthzRequest(t, router, "cathy", "/dataset2/item", "GET", 403)
testAuthzRequest(t, router, "cathy", "/dataset2/item", "POST", 403)
testAuthzRequest(t, router, "cathy", "/dataset2/item", "DELETE", 403)
// delete all roles on user cathy, so cathy cannot access any resources now.
_, err := e.DeleteRolesForUser("cathy")
if err != nil {
t.Errorf("got error %v", err)
}
testAuthzRequest(t, router, "cathy", "/dataset1/item", "GET", 403)
testAuthzRequest(t, router, "cathy", "/dataset1/item", "POST", 403)
testAuthzRequest(t, router, "cathy", "/dataset1/item", "DELETE", 403)
testAuthzRequest(t, router, "cathy", "/dataset2/item", "GET", 403)
testAuthzRequest(t, router, "cathy", "/dataset2/item", "POST", 403)
testAuthzRequest(t, router, "cathy", "/dataset2/item", "DELETE", 403)
}