mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-26 13:48:53 +08:00

* Move Things and Users to Clients Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Update Add and Delete Policies (#1792) * Remove Policy Action Ranks Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Rebase Issues Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix CI Test Errors Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Adding Check on Subject For Clients Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Check Client Exists Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Check When Sharing Clients Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Only Add User to Group When Sharing Things Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove clientType Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Minor Fix on ShareClient and Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Policies Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Clean Up Things Authorization Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests on RetrieveAll Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Test ShareThing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Merge Conflicts Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Adding Policies. Only Use Ownership Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Check If Subject is same as Object Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Move Back To Union As Sometimes Policy is Empty and Fails to Evaluate on Ownership Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Entity Type For Failing Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix BUG in policy evaluation Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Comments Regarding checkAdmin Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests On Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Combine Authorize For Things and Users Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests On Rebase Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Error on Things SVC `unsupported protocol scheme` Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix Bug on Things Authorization Cache (#1810) Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Use Password instead of username in MQTT handler Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Simplify MQTT authorization Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * Fix MQTT tests Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add More Functions to SDK (#1811) * Add More Functions to SDK Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Examples to GoDoc Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Update Unassign Interface Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Pass Subject as ID and Not Token on List Channels By Thing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Bootstrap Errors For Element Check Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add empty line Before Return Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Reorder URLS in things mux Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Listing Things Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Share Thing Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Examples to CLI Docs Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Update Identity To Update Another User Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Identify an Update Policies on Things Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Update Things Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix GoDocs on Disconnect Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Change Authorize To Use AccessRequest Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * For Evaluate Policy Use AccessRequest (#1814) Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add SDK Tests (#1812) * Add Things Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Channel Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Certs Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Consumer Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Enrich Group Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Tests For Health Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Tests For Tokens Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename SDK for Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Policies Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Linter Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Tests Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Make Variable Defination Inline Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Make Cache Key Duration Configurable (#1815) * Make Cache Key Duration Configurable Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename ENV Var Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Update GoDocs (#1816) * Add GoDocs Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Missing GoDoc Files Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Enable godot Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add License Information Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> * NOISSUE - Add Call Home Client to Mainflux services (#1751) * Move Things and Users to Clients Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> * collect and send data package Signed-off-by: SammyOina <sammyoina@gmail.com> * create telemetry migrations Signed-off-by: SammyOina <sammyoina@gmail.com> * add telemetry endpoints Signed-off-by: SammyOina <sammyoina@gmail.com> * add transport Signed-off-by: SammyOina <sammyoina@gmail.com> * create service Signed-off-by: SammyOina <sammyoina@gmail.com> * remove homing server Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home to adapters Signed-off-by: SammyOina <sammyoina@gmail.com> * add last seen Signed-off-by: SammyOina <sammyoina@gmail.com> * rename logger Signed-off-by: SammyOina <sammyoina@gmail.com> * remove homing client Signed-off-by: SammyOina <sammyoina@gmail.com> * use unmerged repo Signed-off-by: SammyOina <sammyoina@gmail.com> * use renamed module Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home version Signed-off-by: SammyOina <sammyoina@gmail.com> * edit documentation Signed-off-by: SammyOina <sammyoina@gmail.com> * align table Signed-off-by: SammyOina <sammyoina@gmail.com> * use alias for call home client Signed-off-by: SammyOina <sammyoina@gmail.com> * update callhome Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home pkg Signed-off-by: SammyOina <sammyoina@gmail.com> * update call home Signed-off-by: SammyOina <sammyoina@gmail.com> * fix modules Signed-off-by: SammyOina <sammyoina@gmail.com> * use mf build version Signed-off-by: SammyOina <sammyoina@gmail.com> * use mf build version Signed-off-by: SammyOina <sammyoina@gmail.com> * restore default Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home for users and things Signed-off-by: SammyOina <sammyoina@gmail.com> * enable opting on call home Signed-off-by: SammyOina <sammyoina@gmail.com> * remove full stops Signed-off-by: SammyOina <sammyoina@gmail.com> * update callhome client Signed-off-by: SammyOina <sammyoina@gmail.com> * add call home to all services Signed-off-by: SammyOina <sammyoina@gmail.com> * fix build Signed-off-by: SammyOina <sammyoina@gmail.com> * restore sdk tests Signed-off-by: SammyOina <sammyoina@gmail.com> * remove unnecessary changes Signed-off-by: SammyOina <sammyoina@gmail.com> * restore health_test.go Signed-off-by: SammyOina <sammyoina@gmail.com> --------- Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> Co-authored-by: b1ackd0t <blackd0t@protonmail.com> Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> --------- Signed-off-by: dusanb94 <dusan.borovcanin@mainflux.com> Signed-off-by: rodneyosodo <blackd0t@protonmail.com> Signed-off-by: SammyOina <sammyoina@gmail.com> Co-authored-by: b1ackd0t <blackd0t@protonmail.com> Co-authored-by: Sammy Kerata Oina <44265300+SammyOina@users.noreply.github.com>
1115 lines
36 KiB
Go
1115 lines
36 KiB
Go
package sdk_test
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/go-zoo/bone"
|
|
"github.com/mainflux/mainflux/internal/apiutil"
|
|
"github.com/mainflux/mainflux/logger"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
sdk "github.com/mainflux/mainflux/pkg/sdk/go"
|
|
tclients "github.com/mainflux/mainflux/things/clients"
|
|
tmocks "github.com/mainflux/mainflux/things/clients/mocks"
|
|
tgmocks "github.com/mainflux/mainflux/things/groups/mocks"
|
|
"github.com/mainflux/mainflux/things/policies"
|
|
tpolicies "github.com/mainflux/mainflux/things/policies"
|
|
tpmocks "github.com/mainflux/mainflux/things/policies/mocks"
|
|
uclients "github.com/mainflux/mainflux/users/clients"
|
|
umocks "github.com/mainflux/mainflux/users/clients/mocks"
|
|
"github.com/mainflux/mainflux/users/jwt"
|
|
upolicies "github.com/mainflux/mainflux/users/policies"
|
|
uapi "github.com/mainflux/mainflux/users/policies/api/http"
|
|
upmocks "github.com/mainflux/mainflux/users/policies/mocks"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/mock"
|
|
)
|
|
|
|
const addExistingPolicyDesc = "add existing policy"
|
|
|
|
var utadminPolicy = umocks.SubjectSet{Subject: "things", Relation: []string{"g_add"}}
|
|
|
|
func newPolicyServer(svc upolicies.Service) *httptest.Server {
|
|
logger := logger.NewMock()
|
|
mux := bone.New()
|
|
uapi.MakeHandler(svc, mux, logger)
|
|
|
|
return httptest.NewServer(mux)
|
|
}
|
|
|
|
func TestCreatePolicy(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
clientPolicy := sdk.Policy{Object: object, Actions: []string{"m_write", "g_add"}, Subject: subject}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
policy sdk.Policy
|
|
page sdk.PolicyPage
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "add new policy",
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: addExistingPolicyDesc,
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{Policies: []sdk.Policy{clientPolicy}},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: errors.NewSDKErrorWithStatus(sdk.ErrFailedCreation, http.StatusInternalServerError),
|
|
},
|
|
{
|
|
desc: "add a new policy with owner",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
OwnerID: generateUUID(t),
|
|
Object: "objwithowner",
|
|
Actions: []string{"m_read"},
|
|
Subject: "subwithowner",
|
|
},
|
|
err: nil,
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with more actions",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj2",
|
|
Actions: []string{"c_delete", "c_update", "c_list"},
|
|
Subject: "sub2",
|
|
},
|
|
err: nil,
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with wrong action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj3",
|
|
Actions: []string{"wrong"},
|
|
Subject: "sub3",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with empty object",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Subject: "sub4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingPolicyObj, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with empty subject",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Object: "obj4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingPolicySub, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with empty action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Subject: "sub5",
|
|
Object: "obj5",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 := pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(tc.page), nil)
|
|
repoCall2 := pRepo.On("Update", mock.Anything, mock.Anything).Return(tc.err)
|
|
repoCall3 := pRepo.On("Save", mock.Anything, mock.Anything).Return(tc.err)
|
|
err := mfsdk.CreatePolicy(tc.policy, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
if tc.err == nil {
|
|
ok := repoCall.Parent.AssertCalled(t, "RetrieveAll", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("RetrieveAll was not called on %s", tc.desc))
|
|
ok = repoCall2.Parent.AssertCalled(t, "Save", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Save was not called on %s", tc.desc))
|
|
if tc.desc == addExistingPolicyDesc {
|
|
ok = repoCall1.Parent.AssertCalled(t, "Update", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Update was not called on %s", tc.desc))
|
|
}
|
|
}
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
repoCall2.Unset()
|
|
repoCall3.Unset()
|
|
}
|
|
}
|
|
|
|
func TestAuthorize(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
cases := []struct {
|
|
desc string
|
|
policy sdk.AccessRequest
|
|
page sdk.PolicyPage
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "authorize a valid policy with client entity",
|
|
policy: sdk.AccessRequest{
|
|
Subject: subject,
|
|
Object: object,
|
|
Action: "c_list",
|
|
EntityType: "client",
|
|
},
|
|
page: sdk.PolicyPage{},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "authorize a valid policy with group entity",
|
|
policy: sdk.AccessRequest{
|
|
Subject: subject,
|
|
Object: object,
|
|
Action: "g_add",
|
|
EntityType: "group",
|
|
},
|
|
page: sdk.PolicyPage{},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "authorize a policy with wrong action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.AccessRequest{
|
|
Object: "obj3",
|
|
Action: "wrong",
|
|
Subject: "sub3",
|
|
EntityType: "client",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "authorize a policy with empty object",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.AccessRequest{
|
|
Action: "c_delete",
|
|
Subject: "sub4",
|
|
EntityType: "client",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingPolicyObj, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "authorize a policy with empty subject",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.AccessRequest{
|
|
Action: "c_delete",
|
|
Object: "obj4",
|
|
EntityType: "client",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingPolicySub, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "authorize a policy with empty action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.AccessRequest{
|
|
Subject: "sub5",
|
|
Object: "obj5",
|
|
EntityType: "client",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
ok, err := mfsdk.Authorize(tc.policy, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
if tc.err == nil {
|
|
assert.True(t, ok, fmt.Sprintf("%s: expected true, got false", tc.desc))
|
|
ok := repoCall.Parent.AssertCalled(t, "CheckAdmin", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("CheckAdmin was not called on %s", tc.desc))
|
|
}
|
|
repoCall.Unset()
|
|
}
|
|
}
|
|
|
|
func TestAssign(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
clientPolicy := sdk.Policy{Object: object, Actions: []string{"m_write", "g_add"}, Subject: subject}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
policy sdk.Policy
|
|
page sdk.PolicyPage
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "add new policy",
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: addExistingPolicyDesc,
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{Policies: []sdk.Policy{clientPolicy}},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: errors.NewSDKErrorWithStatus(sdk.ErrFailedCreation, http.StatusInternalServerError),
|
|
},
|
|
{
|
|
desc: "add a new policy with owner",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
OwnerID: generateUUID(t),
|
|
Object: "objwithowner",
|
|
Actions: []string{"m_read"},
|
|
Subject: "subwithowner",
|
|
},
|
|
err: nil,
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with more actions",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj2",
|
|
Actions: []string{"c_delete", "c_update", "c_list"},
|
|
Subject: "sub2",
|
|
},
|
|
err: nil,
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with wrong action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj3",
|
|
Actions: []string{"wrong"},
|
|
Subject: "sub3",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with empty object",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Subject: "sub4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingPolicyObj, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with empty subject",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Object: "obj4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingPolicySub, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
{
|
|
desc: "add a new policy with empty action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Subject: "sub5",
|
|
Object: "obj5",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 := pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(tc.page), nil)
|
|
repoCall2 := pRepo.On("Update", mock.Anything, mock.Anything).Return(tc.err)
|
|
repoCall3 := pRepo.On("Save", mock.Anything, mock.Anything).Return(tc.err)
|
|
err := mfsdk.Assign(tc.policy.Actions, tc.policy.Subject, tc.policy.Object, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
if tc.err == nil {
|
|
ok := repoCall.Parent.AssertCalled(t, "RetrieveAll", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("RetrieveAll was not called on %s", tc.desc))
|
|
ok = repoCall2.Parent.AssertCalled(t, "Save", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Save was not called on %s", tc.desc))
|
|
if tc.desc == addExistingPolicyDesc {
|
|
ok = repoCall1.Parent.AssertCalled(t, "Update", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Update was not called on %s", tc.desc))
|
|
}
|
|
}
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
repoCall2.Unset()
|
|
repoCall3.Unset()
|
|
}
|
|
}
|
|
func TestUpdatePolicy(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
policy := sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
action []string
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "update policy actions with valid token",
|
|
action: []string{"m_write", "m_read", "g_add"},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update policy action with invalid token",
|
|
action: []string{"m_write"},
|
|
token: "non-existent",
|
|
err: errors.NewSDKErrorWithStatus(errors.ErrAuthentication, http.StatusUnauthorized),
|
|
},
|
|
{
|
|
desc: "update policy action with wrong policy action",
|
|
action: []string{"wrong"},
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
policy.Actions = tc.action
|
|
policy.CreatedAt = time.Now()
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 := pRepo.On("RetrieveAll", mock.Anything, mock.Anything, mock.Anything, mock.Anything).Return(upolicies.PolicyPage{}, nil)
|
|
repoCall2 := pRepo.On("Update", mock.Anything, mock.Anything).Return(tc.err)
|
|
err := mfsdk.UpdatePolicy(policy, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
ok := repoCall1.Parent.AssertCalled(t, "Update", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Update was not called on %s", tc.desc))
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
repoCall2.Unset()
|
|
}
|
|
}
|
|
|
|
func TestUpdateThingsPolicy(t *testing.T) {
|
|
cRepo := new(tmocks.Repository)
|
|
gRepo := new(tgmocks.Repository)
|
|
uauth := umocks.NewAuthService(users, map[string][]umocks.SubjectSet{adminID: {utadminPolicy}})
|
|
thingCache := tmocks.NewCache()
|
|
policiesCache := tpmocks.NewCache()
|
|
|
|
pRepo := new(tpmocks.Repository)
|
|
psvc := tpolicies.NewService(uauth, pRepo, policiesCache, idProvider)
|
|
|
|
svc := tclients.NewService(uauth, psvc, cRepo, gRepo, thingCache, idProvider)
|
|
ts := newThingsServer(svc, psvc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
ThingsURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
policy := sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
action []string
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "update policy actions with valid token",
|
|
action: []string{"m_write", "m_read"},
|
|
token: adminToken,
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: "update policy action with invalid token",
|
|
action: []string{"m_write"},
|
|
token: "non-existent",
|
|
err: errors.NewSDKErrorWithStatus(errors.ErrAuthorization, http.StatusUnauthorized),
|
|
},
|
|
{
|
|
desc: "update policy action with wrong policy action",
|
|
action: []string{"wrong"},
|
|
token: adminToken,
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
policy.Actions = tc.action
|
|
policy.CreatedAt = time.Now()
|
|
repoCall := pRepo.On("RetrieveAll", mock.Anything, mock.Anything, mock.Anything, mock.Anything).Return(tpolicies.PolicyPage{}, nil)
|
|
repoCall1 := pRepo.On("Update", mock.Anything, mock.Anything).Return(policies.Policy{}, tc.err)
|
|
err := mfsdk.UpdateThingsPolicy(policy, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
ok := repoCall.Parent.AssertCalled(t, "Update", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Update was not called on %s", tc.desc))
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
}
|
|
}
|
|
|
|
func TestListPolicies(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
id := generateUUID(t)
|
|
|
|
var nPolicy = uint64(10)
|
|
var aPolicies = []sdk.Policy{}
|
|
for i := uint64(0); i < nPolicy; i++ {
|
|
pr := sdk.Policy{
|
|
OwnerID: id,
|
|
Actions: []string{"m_read"},
|
|
Subject: fmt.Sprintf("thing_%d", i),
|
|
Object: fmt.Sprintf("client_%d", i),
|
|
}
|
|
if i%3 == 0 {
|
|
pr.Actions = []string{"m_write"}
|
|
}
|
|
aPolicies = append(aPolicies, pr)
|
|
}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
token string
|
|
page sdk.PageMetadata
|
|
response []sdk.Policy
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "list policies with authorized token",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
response: aPolicies,
|
|
},
|
|
{
|
|
desc: "list policies with invalid token",
|
|
token: invalidToken,
|
|
err: errors.NewSDKErrorWithStatus(errors.ErrAuthentication, http.StatusUnauthorized),
|
|
response: []sdk.Policy(nil),
|
|
},
|
|
{
|
|
desc: "list policies with offset and limit",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
page: sdk.PageMetadata{
|
|
Offset: 6,
|
|
Limit: nPolicy,
|
|
},
|
|
response: aPolicies[6:10],
|
|
},
|
|
{
|
|
desc: "list policies with given name",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
page: sdk.PageMetadata{
|
|
Offset: 6,
|
|
Limit: nPolicy,
|
|
},
|
|
response: aPolicies[6:10],
|
|
},
|
|
{
|
|
desc: "list policies with given identifier",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
page: sdk.PageMetadata{
|
|
Offset: 6,
|
|
Limit: nPolicy,
|
|
},
|
|
response: aPolicies[6:10],
|
|
},
|
|
{
|
|
desc: "list policies with given ownerID",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
page: sdk.PageMetadata{
|
|
Offset: 6,
|
|
Limit: nPolicy,
|
|
},
|
|
response: aPolicies[6:10],
|
|
},
|
|
{
|
|
desc: "list policies with given subject",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
page: sdk.PageMetadata{
|
|
Offset: 6,
|
|
Limit: nPolicy,
|
|
},
|
|
response: aPolicies[6:10],
|
|
},
|
|
{
|
|
desc: "list policies with given object",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
err: nil,
|
|
page: sdk.PageMetadata{
|
|
Offset: 6,
|
|
Limit: nPolicy,
|
|
},
|
|
response: aPolicies[6:10],
|
|
},
|
|
{
|
|
desc: "list policies with wrong action",
|
|
token: generateValidToken(t, csvc, cRepo),
|
|
page: sdk.PageMetadata{
|
|
Action: "wrong",
|
|
},
|
|
response: []sdk.Policy(nil),
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 := pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(sdk.PolicyPage{Policies: tc.response}), tc.err)
|
|
pp, err := mfsdk.ListPolicies(tc.page, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
assert.Equal(t, tc.response, pp.Policies, fmt.Sprintf("%s: expected %v, got %v", tc.desc, tc.response, pp))
|
|
ok := repoCall.Parent.AssertCalled(t, "RetrieveAll", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("RetrieveAll was not called on %s", tc.desc))
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
}
|
|
}
|
|
|
|
func TestDeletePolicy(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
sub := generateUUID(t)
|
|
pr := sdk.Policy{Object: authoritiesObj, Actions: []string{"m_read", "g_add", "c_delete"}, Subject: sub}
|
|
cpr := sdk.Policy{Object: authoritiesObj, Actions: []string{"m_read", "g_add", "c_delete"}, Subject: sub}
|
|
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 := pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(sdk.PolicyPage{Policies: []sdk.Policy{cpr}}), nil)
|
|
repoCall2 := pRepo.On("Delete", mock.Anything, mock.Anything).Return(nil)
|
|
err := mfsdk.DeletePolicy(pr, generateValidToken(t, csvc, cRepo))
|
|
assert.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
ok := repoCall1.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on valid policy")
|
|
repoCall2.Unset()
|
|
repoCall1.Unset()
|
|
repoCall.Unset()
|
|
|
|
repoCall = pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 = pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(sdk.PolicyPage{Policies: []sdk.Policy{cpr}}), nil)
|
|
repoCall2 = pRepo.On("Delete", mock.Anything, mock.Anything).Return(sdk.ErrFailedRemoval)
|
|
err = mfsdk.DeletePolicy(pr, invalidToken)
|
|
assert.Equal(t, err, errors.NewSDKErrorWithStatus(errors.ErrAuthentication, http.StatusUnauthorized), fmt.Sprintf("expected %s got %s", pr, err))
|
|
ok = repoCall.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on invalid policy")
|
|
repoCall2.Unset()
|
|
repoCall1.Unset()
|
|
repoCall.Unset()
|
|
}
|
|
|
|
func TestUnassign(t *testing.T) {
|
|
cRepo := new(umocks.Repository)
|
|
pRepo := new(upmocks.Repository)
|
|
tokenizer := jwt.NewRepository([]byte(secret), accessDuration, refreshDuration)
|
|
|
|
csvc := uclients.NewService(cRepo, pRepo, tokenizer, emailer, phasher, idProvider, passRegex)
|
|
svc := upolicies.NewService(pRepo, tokenizer, idProvider)
|
|
ts := newPolicyServer(svc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
UsersURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
sub := generateUUID(t)
|
|
pr := sdk.Policy{Object: authoritiesObj, Actions: []string{"m_read", "g_add", "c_delete"}, Subject: sub}
|
|
cpr := sdk.Policy{Object: authoritiesObj, Actions: []string{"m_read", "g_add", "c_delete"}, Subject: sub}
|
|
|
|
repoCall := pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 := pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(sdk.PolicyPage{Policies: []sdk.Policy{cpr}}), nil)
|
|
repoCall2 := pRepo.On("Delete", mock.Anything, mock.Anything).Return(nil)
|
|
err := mfsdk.Unassign(pr.Subject, pr.Object, generateValidToken(t, csvc, cRepo))
|
|
assert.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
ok := repoCall1.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on valid policy")
|
|
repoCall2.Unset()
|
|
repoCall1.Unset()
|
|
repoCall.Unset()
|
|
|
|
repoCall = pRepo.On("CheckAdmin", mock.Anything, mock.Anything).Return(nil)
|
|
repoCall1 = pRepo.On("RetrieveAll", mock.Anything, mock.Anything).Return(convertUserPolicyPage(sdk.PolicyPage{Policies: []sdk.Policy{cpr}}), nil)
|
|
repoCall2 = pRepo.On("Delete", mock.Anything, mock.Anything).Return(sdk.ErrFailedRemoval)
|
|
err = mfsdk.Unassign(pr.Subject, pr.Object, invalidToken)
|
|
assert.Equal(t, err, errors.NewSDKErrorWithStatus(errors.ErrAuthentication, http.StatusUnauthorized), fmt.Sprintf("expected %s got %s", pr, err))
|
|
ok = repoCall.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on invalid policy")
|
|
repoCall2.Unset()
|
|
repoCall1.Unset()
|
|
repoCall.Unset()
|
|
}
|
|
|
|
func TestConnect(t *testing.T) {
|
|
cRepo := new(tmocks.Repository)
|
|
gRepo := new(tgmocks.Repository)
|
|
uauth := umocks.NewAuthService(users, map[string][]umocks.SubjectSet{adminID: {utadminPolicy}})
|
|
thingCache := tmocks.NewCache()
|
|
policiesCache := tpmocks.NewCache()
|
|
|
|
pRepo := new(tpmocks.Repository)
|
|
psvc := tpolicies.NewService(uauth, pRepo, policiesCache, idProvider)
|
|
|
|
svc := tclients.NewService(uauth, psvc, cRepo, gRepo, thingCache, idProvider)
|
|
ts := newThingsServer(svc, psvc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
ThingsURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
clientPolicy := sdk.Policy{Object: object, Actions: []string{"m_write", "g_add"}, Subject: subject}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
policy sdk.Policy
|
|
page sdk.PolicyPage
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "add new policy",
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{},
|
|
token: adminToken,
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: addExistingPolicyDesc,
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{Policies: []sdk.Policy{clientPolicy}},
|
|
token: adminToken,
|
|
err: errors.NewSDKErrorWithStatus(sdk.ErrFailedCreation, http.StatusInternalServerError),
|
|
},
|
|
{
|
|
desc: "add a new policy with owner",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
OwnerID: generateUUID(t),
|
|
Object: "objwithowner",
|
|
Actions: []string{"m_read"},
|
|
Subject: "subwithowner",
|
|
},
|
|
err: nil,
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with more actions",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj2",
|
|
Actions: []string{"c_delete", "c_update", "c_list"},
|
|
Subject: "sub2",
|
|
},
|
|
err: nil,
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with wrong action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj3",
|
|
Actions: []string{"wrong"},
|
|
Subject: "sub3",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with empty object",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Subject: "sub4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingID, http.StatusBadRequest),
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with empty subject",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Object: "obj4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingID, http.StatusBadRequest),
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with empty action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Subject: "sub5",
|
|
Object: "obj5",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: adminToken,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
repoCall := pRepo.On("Retrieve", mock.Anything, mock.Anything).Return(convertThingPolicyPage(tc.page), nil)
|
|
repoCall1 := pRepo.On("Update", mock.Anything, mock.Anything).Return(convertThingPolicy(tc.policy), tc.err)
|
|
repoCall2 := pRepo.On("Save", mock.Anything, mock.Anything).Return(convertThingPolicy(tc.policy), tc.err)
|
|
conn := sdk.ConnectionIDs{ChannelIDs: []string{tc.policy.Object}, ThingIDs: []string{tc.policy.Subject}, Actions: tc.policy.Actions}
|
|
err := mfsdk.Connect(conn, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
if tc.err == nil {
|
|
ok := repoCall.Parent.AssertCalled(t, "Retrieve", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Retrieve was not called on %s", tc.desc))
|
|
ok = repoCall2.Parent.AssertCalled(t, "Save", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Save was not called on %s", tc.desc))
|
|
if tc.desc == addExistingPolicyDesc {
|
|
ok = repoCall1.Parent.AssertCalled(t, "Update", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Update was not called on %s", tc.desc))
|
|
}
|
|
}
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
repoCall2.Unset()
|
|
}
|
|
}
|
|
|
|
func TestConnectThing(t *testing.T) {
|
|
cRepo := new(tmocks.Repository)
|
|
gRepo := new(tgmocks.Repository)
|
|
uauth := umocks.NewAuthService(users, map[string][]umocks.SubjectSet{adminID: {utadminPolicy}})
|
|
thingCache := tmocks.NewCache()
|
|
policiesCache := tpmocks.NewCache()
|
|
|
|
pRepo := new(tpmocks.Repository)
|
|
psvc := tpolicies.NewService(uauth, pRepo, policiesCache, idProvider)
|
|
|
|
svc := tclients.NewService(uauth, psvc, cRepo, gRepo, thingCache, idProvider)
|
|
ts := newThingsServer(svc, psvc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
ThingsURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
clientPolicy := sdk.Policy{Object: object, Actions: []string{"m_write", "g_add"}, Subject: subject}
|
|
|
|
cases := []struct {
|
|
desc string
|
|
policy sdk.Policy
|
|
page sdk.PolicyPage
|
|
token string
|
|
err errors.SDKError
|
|
}{
|
|
{
|
|
desc: "add new policy",
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{},
|
|
token: adminToken,
|
|
err: nil,
|
|
},
|
|
{
|
|
desc: addExistingPolicyDesc,
|
|
policy: sdk.Policy{
|
|
Subject: subject,
|
|
Object: object,
|
|
Actions: []string{"m_write", "g_add"},
|
|
},
|
|
page: sdk.PolicyPage{Policies: []sdk.Policy{clientPolicy}},
|
|
token: adminToken,
|
|
err: errors.NewSDKErrorWithStatus(sdk.ErrFailedCreation, http.StatusInternalServerError),
|
|
},
|
|
{
|
|
desc: "add a new policy with owner",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
OwnerID: generateUUID(t),
|
|
Object: "objwithowner",
|
|
Actions: []string{"m_read"},
|
|
Subject: "subwithowner",
|
|
},
|
|
err: nil,
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with more actions",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj2",
|
|
Actions: []string{"c_delete", "c_update", "c_list"},
|
|
Subject: "sub2",
|
|
},
|
|
err: nil,
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with wrong action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Object: "obj3",
|
|
Actions: []string{"wrong"},
|
|
Subject: "sub3",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with empty object",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Subject: "sub4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingID, http.StatusBadRequest),
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with empty subject",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Actions: []string{"c_delete"},
|
|
Object: "obj4",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMissingID, http.StatusBadRequest),
|
|
token: adminToken,
|
|
},
|
|
{
|
|
desc: "add a new policy with empty action",
|
|
page: sdk.PolicyPage{},
|
|
policy: sdk.Policy{
|
|
Subject: "sub5",
|
|
Object: "obj5",
|
|
},
|
|
err: errors.NewSDKErrorWithStatus(apiutil.ErrMalformedPolicyAct, http.StatusInternalServerError),
|
|
token: adminToken,
|
|
},
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
repoCall := pRepo.On("Retrieve", mock.Anything, mock.Anything).Return(convertThingPolicyPage(tc.page), nil)
|
|
repoCall1 := pRepo.On("Update", mock.Anything, mock.Anything).Return(convertThingPolicy(tc.policy), tc.err)
|
|
repoCall2 := pRepo.On("Save", mock.Anything, mock.Anything).Return(convertThingPolicy(tc.policy), tc.err)
|
|
err := mfsdk.ConnectThing(tc.policy.Subject, tc.policy.Object, tc.token)
|
|
assert.Equal(t, tc.err, err, fmt.Sprintf("%s: expected error %s, got %s", tc.desc, tc.err, err))
|
|
if tc.err == nil {
|
|
ok := repoCall.Parent.AssertCalled(t, "Retrieve", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Retrieve was not called on %s", tc.desc))
|
|
ok = repoCall2.Parent.AssertCalled(t, "Save", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Save was not called on %s", tc.desc))
|
|
if tc.desc == addExistingPolicyDesc {
|
|
ok = repoCall1.Parent.AssertCalled(t, "Update", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, fmt.Sprintf("Update was not called on %s", tc.desc))
|
|
}
|
|
}
|
|
repoCall.Unset()
|
|
repoCall1.Unset()
|
|
repoCall2.Unset()
|
|
}
|
|
}
|
|
|
|
func TestDisconnectThing(t *testing.T) {
|
|
cRepo := new(tmocks.Repository)
|
|
gRepo := new(tgmocks.Repository)
|
|
uauth := umocks.NewAuthService(users, map[string][]umocks.SubjectSet{adminID: {utadminPolicy}})
|
|
thingCache := tmocks.NewCache()
|
|
policiesCache := tpmocks.NewCache()
|
|
|
|
pRepo := new(tpmocks.Repository)
|
|
psvc := tpolicies.NewService(uauth, pRepo, policiesCache, idProvider)
|
|
|
|
svc := tclients.NewService(uauth, psvc, cRepo, gRepo, thingCache, idProvider)
|
|
ts := newThingsServer(svc, psvc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
ThingsURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
sub := generateUUID(t)
|
|
pr := sdk.Policy{Object: authoritiesObj, Actions: []string{"m_read", "g_add", "c_delete"}, Subject: sub}
|
|
|
|
repoCall := pRepo.On("Delete", mock.Anything, mock.Anything).Return(nil)
|
|
err := mfsdk.DisconnectThing(pr.Subject, pr.Object, adminToken)
|
|
assert.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
ok := repoCall.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on valid policy")
|
|
repoCall.Unset()
|
|
|
|
repoCall = pRepo.On("Delete", mock.Anything, mock.Anything).Return(sdk.ErrFailedRemoval)
|
|
err = mfsdk.DisconnectThing(pr.Subject, pr.Object, invalidToken)
|
|
assert.Equal(t, err, errors.NewSDKErrorWithStatus(errors.ErrAuthorization, http.StatusUnauthorized), fmt.Sprintf("expected %s got %s", pr, err))
|
|
ok = repoCall.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on invalid policy")
|
|
repoCall.Unset()
|
|
}
|
|
|
|
func TestDisconnect(t *testing.T) {
|
|
cRepo := new(tmocks.Repository)
|
|
gRepo := new(tgmocks.Repository)
|
|
uauth := umocks.NewAuthService(users, map[string][]umocks.SubjectSet{adminID: {utadminPolicy}})
|
|
thingCache := tmocks.NewCache()
|
|
policiesCache := tpmocks.NewCache()
|
|
|
|
pRepo := new(tpmocks.Repository)
|
|
psvc := tpolicies.NewService(uauth, pRepo, policiesCache, idProvider)
|
|
|
|
svc := tclients.NewService(uauth, psvc, cRepo, gRepo, thingCache, idProvider)
|
|
ts := newThingsServer(svc, psvc)
|
|
defer ts.Close()
|
|
|
|
conf := sdk.Config{
|
|
ThingsURL: ts.URL,
|
|
}
|
|
mfsdk := sdk.NewSDK(conf)
|
|
|
|
sub := generateUUID(t)
|
|
pr := sdk.Policy{Object: authoritiesObj, Actions: []string{"m_read", "g_add", "c_delete"}, Subject: sub}
|
|
|
|
repoCall := pRepo.On("Delete", mock.Anything, mock.Anything).Return(nil)
|
|
conn := sdk.ConnectionIDs{ChannelIDs: []string{pr.Object}, ThingIDs: []string{pr.Subject}}
|
|
err := mfsdk.Disconnect(conn, adminToken)
|
|
assert.Nil(t, err, fmt.Sprintf("got unexpected error: %s", err))
|
|
ok := repoCall.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on valid policy")
|
|
repoCall.Unset()
|
|
|
|
repoCall = pRepo.On("Delete", mock.Anything, mock.Anything).Return(sdk.ErrFailedRemoval)
|
|
conn = sdk.ConnectionIDs{ChannelIDs: []string{pr.Object}, ThingIDs: []string{pr.Subject}}
|
|
err = mfsdk.Disconnect(conn, invalidToken)
|
|
assert.Equal(t, err, errors.NewSDKErrorWithStatus(errors.ErrAuthorization, http.StatusUnauthorized), fmt.Sprintf("expected %s got %s", pr, err))
|
|
ok = repoCall.Parent.AssertCalled(t, "Delete", mock.Anything, mock.Anything)
|
|
assert.True(t, ok, "Delete was not called on invalid policy")
|
|
repoCall.Unset()
|
|
}
|