mirror of
https://github.com/mainflux/mainflux.git
synced 2025-04-26 13:48:53 +08:00

* Reformat Policies Enpoint to Take Sub Obj Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Redirect to `policies` Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Make Delete Endpoint not to Contain Body Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove gRPC unused functions Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Redirect Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Update CLI Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Use Switch Statement Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Uncomment Commented Parts Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Empty Line Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Remove Unused gRPC Req and Resp Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Fix Listing of Policies Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Rename Authorize Functions For Users and Things Service Signed-off-by: rodneyosodo <blackd0t@protonmail.com> * Add Authorize To CLI Signed-off-by: rodneyosodo <blackd0t@protonmail.com> --------- Signed-off-by: rodneyosodo <blackd0t@protonmail.com>
48 lines
1.3 KiB
Go
48 lines
1.3 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package mocks
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/mainflux/mainflux/pkg/errors"
|
|
"github.com/mainflux/mainflux/users/policies"
|
|
"google.golang.org/grpc"
|
|
)
|
|
|
|
var _ policies.AuthServiceClient = (*authServiceMock)(nil)
|
|
|
|
type SubjectSet struct {
|
|
Subject string
|
|
Relation []string
|
|
}
|
|
|
|
type authServiceMock struct {
|
|
users map[string]string
|
|
authz map[string][]SubjectSet
|
|
}
|
|
|
|
// NewAuthService creates mock of users service.
|
|
func NewAuthService(users map[string]string, authzDB map[string][]SubjectSet) policies.AuthServiceClient {
|
|
return &authServiceMock{users, authzDB}
|
|
}
|
|
|
|
func (svc authServiceMock) Identify(ctx context.Context, req *policies.IdentifyReq, opts ...grpc.CallOption) (*policies.IdentifyRes, error) {
|
|
if id, ok := svc.users[req.GetToken()]; ok {
|
|
return &policies.IdentifyRes{Id: id}, nil
|
|
}
|
|
return nil, errors.ErrAuthentication
|
|
}
|
|
|
|
func (svc authServiceMock) Authorize(ctx context.Context, req *policies.AuthorizeReq, _ ...grpc.CallOption) (r *policies.AuthorizeRes, err error) {
|
|
for _, policy := range svc.authz[req.GetSubject()] {
|
|
for _, r := range policy.Relation {
|
|
if r == req.GetAction() && policy.Subject == req.GetObject() {
|
|
return &policies.AuthorizeRes{Authorized: true}, nil
|
|
}
|
|
}
|
|
}
|
|
return &policies.AuthorizeRes{Authorized: false}, nil
|
|
}
|