mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-28 13:48:49 +08:00

* MF-1263 - Mv duplicated errors to pkg/errors Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Revert test build flags Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Fix merge Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> * Fix comment Signed-off-by: Manuel Imperiale <manuel.imperiale@gmail.com> Co-authored-by: Dušan Borovčanin <dusan.borovcanin@mainflux.com>
88 lines
2.9 KiB
Go
88 lines
2.9 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package mocks
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/golang/protobuf/ptypes/empty"
|
|
"github.com/mainflux/mainflux"
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
"google.golang.org/grpc"
|
|
)
|
|
|
|
var _ mainflux.AuthServiceClient = (*authServiceMock)(nil)
|
|
|
|
type MockSubjectSet struct {
|
|
Object string
|
|
Relation string
|
|
}
|
|
|
|
type authServiceMock struct {
|
|
users map[string]string
|
|
policies map[string][]MockSubjectSet
|
|
}
|
|
|
|
func (svc authServiceMock) ListPolicies(ctx context.Context, in *mainflux.ListPoliciesReq, opts ...grpc.CallOption) (*mainflux.ListPoliciesRes, error) {
|
|
res := mainflux.ListPoliciesRes{}
|
|
for key := range svc.policies {
|
|
res.Policies = append(res.Policies, key)
|
|
}
|
|
return &res, nil
|
|
}
|
|
|
|
// NewAuthService creates mock of users service.
|
|
func NewAuthService(users map[string]string, policies map[string][]MockSubjectSet) mainflux.AuthServiceClient {
|
|
return &authServiceMock{users, policies}
|
|
}
|
|
|
|
func (svc authServiceMock) Identify(ctx context.Context, in *mainflux.Token, opts ...grpc.CallOption) (*mainflux.UserIdentity, error) {
|
|
if id, ok := svc.users[in.Value]; ok {
|
|
return &mainflux.UserIdentity{Id: id, Email: id}, nil
|
|
}
|
|
return nil, errors.ErrUnauthorizedAccess
|
|
}
|
|
|
|
func (svc authServiceMock) Issue(ctx context.Context, in *mainflux.IssueReq, opts ...grpc.CallOption) (*mainflux.Token, error) {
|
|
if id, ok := svc.users[in.GetEmail()]; ok {
|
|
switch in.Type {
|
|
default:
|
|
return &mainflux.Token{Value: id}, nil
|
|
}
|
|
}
|
|
return nil, errors.ErrUnauthorizedAccess
|
|
}
|
|
|
|
func (svc authServiceMock) Authorize(ctx context.Context, req *mainflux.AuthorizeReq, _ ...grpc.CallOption) (r *mainflux.AuthorizeRes, err error) {
|
|
for _, policy := range svc.policies[req.GetSub()] {
|
|
if policy.Relation == req.GetAct() && policy.Object == req.GetObj() {
|
|
return &mainflux.AuthorizeRes{Authorized: true}, nil
|
|
}
|
|
}
|
|
return nil, errors.ErrAuthorization
|
|
}
|
|
|
|
func (svc authServiceMock) AddPolicy(ctx context.Context, in *mainflux.AddPolicyReq, opts ...grpc.CallOption) (*mainflux.AddPolicyRes, error) {
|
|
if in.GetAct() == "" || in.GetObj() == "" || in.GetSub() == "" {
|
|
return &mainflux.AddPolicyRes{}, errors.ErrMalformedEntity
|
|
}
|
|
|
|
obj := in.GetObj()
|
|
svc.policies[in.GetSub()] = append(svc.policies[in.GetSub()], MockSubjectSet{Object: obj, Relation: in.GetAct()})
|
|
return &mainflux.AddPolicyRes{Authorized: true}, nil
|
|
}
|
|
|
|
func (svc authServiceMock) DeletePolicy(ctx context.Context, in *mainflux.DeletePolicyReq, opts ...grpc.CallOption) (*mainflux.DeletePolicyRes, error) {
|
|
// Not implemented yet
|
|
return &mainflux.DeletePolicyRes{Deleted: true}, nil
|
|
}
|
|
|
|
func (svc authServiceMock) Members(ctx context.Context, req *mainflux.MembersReq, _ ...grpc.CallOption) (r *mainflux.MembersRes, err error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (svc authServiceMock) Assign(ctx context.Context, req *mainflux.Assignment, _ ...grpc.CallOption) (r *empty.Empty, err error) {
|
|
panic("not implemented")
|
|
}
|