mirror of
https://github.com/mainflux/mainflux.git
synced 2025-05-01 13:48:56 +08:00

* allow admin to fetch all things Signed-off-by: Burak Sekili <buraksekili@gmail.com> * enable users to fetch their own things via owner field in db Signed-off-by: Burak Sekili <buraksekili@gmail.com> * add listpolicies RPC Signed-off-by: Burak Sekili <buraksekili@gmail.com> * add listPolicies gRPC methods for client and server, and update keto initialization Signed-off-by: Burak Sekili <buraksekili@gmail.com> * update fetching things method Signed-off-by: Burak Sekili <buraksekili@gmail.com> * remove log Signed-off-by: Burak Sekili <buraksekili@gmail.com> * update retrieving policies Signed-off-by: Burak Sekili <buraksekili@gmail.com> * fix linter error Signed-off-by: Burak Sekili <buraksekili@gmail.com> * update mock Signed-off-by: Burak Sekili <buraksekili@gmail.com> * remove checking subject set while parsing subject sets Signed-off-by: Burak Sekili <buraksekili@gmail.com> * move subject declaration to constant value Signed-off-by: Burak Sekili <buraksekili@gmail.com>
66 lines
2.0 KiB
Go
66 lines
2.0 KiB
Go
// Copyright (c) Mainflux
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package mocks
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/golang/protobuf/ptypes/empty"
|
|
"github.com/mainflux/mainflux"
|
|
"github.com/mainflux/mainflux/users"
|
|
"google.golang.org/grpc"
|
|
)
|
|
|
|
var _ mainflux.AuthServiceClient = (*serviceMock)(nil)
|
|
|
|
type serviceMock struct {
|
|
users map[string]string
|
|
}
|
|
|
|
// NewAuthClient creates mock of users service.
|
|
func NewAuthClient(users map[string]string) mainflux.AuthServiceClient {
|
|
return &serviceMock{users}
|
|
}
|
|
|
|
func (svc serviceMock) Identify(ctx context.Context, in *mainflux.Token, opts ...grpc.CallOption) (*mainflux.UserIdentity, error) {
|
|
if id, ok := svc.users[in.Value]; ok {
|
|
return &mainflux.UserIdentity{Email: id, Id: id}, nil
|
|
}
|
|
return nil, users.ErrUnauthorizedAccess
|
|
}
|
|
|
|
func (svc serviceMock) Issue(ctx context.Context, in *mainflux.IssueReq, opts ...grpc.CallOption) (*mainflux.Token, error) {
|
|
if id, ok := svc.users[in.GetEmail()]; ok {
|
|
switch in.Type {
|
|
default:
|
|
return &mainflux.Token{Value: id}, nil
|
|
}
|
|
}
|
|
return nil, users.ErrUnauthorizedAccess
|
|
}
|
|
|
|
func (svc serviceMock) Authorize(ctx context.Context, req *mainflux.AuthorizeReq, _ ...grpc.CallOption) (r *mainflux.AuthorizeRes, err error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (svc serviceMock) AddPolicy(ctx context.Context, in *mainflux.AddPolicyReq, opts ...grpc.CallOption) (*mainflux.AddPolicyRes, error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (svc serviceMock) DeletePolicy(ctx context.Context, in *mainflux.DeletePolicyReq, opts ...grpc.CallOption) (*mainflux.DeletePolicyRes, error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (svc serviceMock) ListPolicies(ctx context.Context, in *mainflux.ListPoliciesReq, opts ...grpc.CallOption) (*mainflux.ListPoliciesRes, error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (svc serviceMock) Members(ctx context.Context, req *mainflux.MembersReq, _ ...grpc.CallOption) (r *mainflux.MembersRes, err error) {
|
|
panic("not implemented")
|
|
}
|
|
|
|
func (svc serviceMock) Assign(ctx context.Context, req *mainflux.Assignment, _ ...grpc.CallOption) (r *empty.Empty, err error) {
|
|
panic("not implemented")
|
|
}
|