2019-12-16 16:22:09 +01:00
|
|
|
// Copyright (c) Mainflux
|
|
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
|
|
|
package mocks
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-11-19 16:32:38 +03:00
|
|
|
|
2020-12-29 23:02:35 +01:00
|
|
|
"github.com/golang/protobuf/ptypes/empty"
|
2019-12-16 16:22:09 +01:00
|
|
|
"github.com/mainflux/mainflux"
|
2022-01-27 17:03:57 +01:00
|
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
2019-12-16 16:22:09 +01:00
|
|
|
"google.golang.org/grpc"
|
|
|
|
)
|
|
|
|
|
2020-12-29 23:02:35 +01:00
|
|
|
var _ mainflux.AuthServiceClient = (*authServiceMock)(nil)
|
2019-12-16 16:22:09 +01:00
|
|
|
|
2021-10-27 00:38:28 +02:00
|
|
|
type MockSubjectSet struct {
|
|
|
|
Object string
|
|
|
|
Relation string
|
|
|
|
}
|
|
|
|
|
2019-12-16 16:22:09 +01:00
|
|
|
type authServiceMock struct {
|
2021-10-27 00:38:28 +02:00
|
|
|
users map[string]string
|
|
|
|
policies map[string][]MockSubjectSet
|
2019-12-16 16:22:09 +01:00
|
|
|
}
|
|
|
|
|
2021-11-19 16:32:38 +03:00
|
|
|
func (svc authServiceMock) ListPolicies(ctx context.Context, in *mainflux.ListPoliciesReq, opts ...grpc.CallOption) (*mainflux.ListPoliciesRes, error) {
|
|
|
|
res := mainflux.ListPoliciesRes{}
|
|
|
|
for key := range svc.policies {
|
|
|
|
res.Policies = append(res.Policies, key)
|
|
|
|
}
|
|
|
|
return &res, nil
|
|
|
|
}
|
|
|
|
|
2019-12-16 16:22:09 +01:00
|
|
|
// NewAuthService creates mock of users service.
|
2021-10-27 00:38:28 +02:00
|
|
|
func NewAuthService(users map[string]string, policies map[string][]MockSubjectSet) mainflux.AuthServiceClient {
|
|
|
|
return &authServiceMock{users, policies}
|
2019-12-16 16:22:09 +01:00
|
|
|
}
|
|
|
|
|
2020-10-27 19:42:53 +01:00
|
|
|
func (svc authServiceMock) Identify(ctx context.Context, in *mainflux.Token, opts ...grpc.CallOption) (*mainflux.UserIdentity, error) {
|
2019-12-16 16:22:09 +01:00
|
|
|
if id, ok := svc.users[in.Value]; ok {
|
2020-10-27 19:42:53 +01:00
|
|
|
return &mainflux.UserIdentity{Id: id, Email: id}, nil
|
2019-12-16 16:22:09 +01:00
|
|
|
}
|
2022-02-01 17:33:23 +01:00
|
|
|
return nil, errors.ErrAuthentication
|
2019-12-16 16:22:09 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (svc authServiceMock) Issue(ctx context.Context, in *mainflux.IssueReq, opts ...grpc.CallOption) (*mainflux.Token, error) {
|
2020-10-27 19:42:53 +01:00
|
|
|
if id, ok := svc.users[in.GetEmail()]; ok {
|
2019-12-16 16:22:09 +01:00
|
|
|
switch in.Type {
|
|
|
|
default:
|
|
|
|
return &mainflux.Token{Value: id}, nil
|
|
|
|
}
|
|
|
|
}
|
2022-02-01 17:33:23 +01:00
|
|
|
return nil, errors.ErrAuthentication
|
2019-12-16 16:22:09 +01:00
|
|
|
}
|
2020-12-29 23:02:35 +01:00
|
|
|
|
|
|
|
func (svc authServiceMock) Authorize(ctx context.Context, req *mainflux.AuthorizeReq, _ ...grpc.CallOption) (r *mainflux.AuthorizeRes, err error) {
|
2021-10-27 00:38:28 +02:00
|
|
|
for _, policy := range svc.policies[req.GetSub()] {
|
|
|
|
if policy.Relation == req.GetAct() && policy.Object == req.GetObj() {
|
|
|
|
return &mainflux.AuthorizeRes{Authorized: true}, nil
|
|
|
|
}
|
|
|
|
}
|
2022-01-27 17:03:57 +01:00
|
|
|
return nil, errors.ErrAuthorization
|
2021-10-27 00:38:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (svc authServiceMock) AddPolicy(ctx context.Context, in *mainflux.AddPolicyReq, opts ...grpc.CallOption) (*mainflux.AddPolicyRes, error) {
|
|
|
|
if in.GetAct() == "" || in.GetObj() == "" || in.GetSub() == "" {
|
2022-01-27 17:03:57 +01:00
|
|
|
return &mainflux.AddPolicyRes{}, errors.ErrMalformedEntity
|
2021-10-27 00:38:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
obj := in.GetObj()
|
|
|
|
svc.policies[in.GetSub()] = append(svc.policies[in.GetSub()], MockSubjectSet{Object: obj, Relation: in.GetAct()})
|
|
|
|
return &mainflux.AddPolicyRes{Authorized: true}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (svc authServiceMock) DeletePolicy(ctx context.Context, in *mainflux.DeletePolicyReq, opts ...grpc.CallOption) (*mainflux.DeletePolicyRes, error) {
|
|
|
|
// Not implemented yet
|
|
|
|
return &mainflux.DeletePolicyRes{Deleted: true}, nil
|
2020-12-29 23:02:35 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func (svc authServiceMock) Members(ctx context.Context, req *mainflux.MembersReq, _ ...grpc.CallOption) (r *mainflux.MembersRes, err error) {
|
|
|
|
panic("not implemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (svc authServiceMock) Assign(ctx context.Context, req *mainflux.Assignment, _ ...grpc.CallOption) (r *empty.Empty, err error) {
|
|
|
|
panic("not implemented")
|
|
|
|
}
|