3
0
Files
corteza/tests/system/role_test.go
2022-02-21 12:08:09 +01:00

555 lines
13 KiB
Go

package system
import (
"context"
"fmt"
"net/http"
"net/url"
"testing"
"time"
"github.com/cortezaproject/corteza-server/pkg/id"
"github.com/cortezaproject/corteza-server/store"
"github.com/cortezaproject/corteza-server/system/service"
"github.com/cortezaproject/corteza-server/system/types"
"github.com/cortezaproject/corteza-server/tests/helpers"
"github.com/steinfletcher/apitest-jsonpath"
"github.com/stretchr/testify/require"
)
func (h helper) clearRoles() {
h.noError(store.TruncateRoles(context.Background(), service.DefaultStore))
}
func (h helper) clearRoleMembers() {
h.noError(store.TruncateRoleMembers(context.Background(), service.DefaultStore))
}
func (h helper) createRole(res *types.Role) *types.Role {
if res.ID == 0 {
res.ID = id.Next()
}
if res.CreatedAt.IsZero() {
res.CreatedAt = time.Now()
}
h.a.NoError(service.DefaultStore.CreateRole(context.Background(), res))
return res
}
func (h helper) repoMakeRole(ss ...string) *types.Role {
var r = &types.Role{
ID: id.Next(),
CreatedAt: time.Now(),
}
if len(ss) > 1 {
r.Handle = ss[1]
} else {
r.Handle = "h_" + rs()
}
if len(ss) > 0 {
r.Name = ss[0]
} else {
r.Name = "n_" + rs()
}
h.a.NoError(store.CreateRole(context.Background(), service.DefaultStore, r))
return r
}
func (h helper) lookupRoleByID(ID uint64) *types.Role {
res, err := store.LookupRoleByID(context.Background(), service.DefaultStore, ID)
h.noError(err)
return res
}
func (h helper) createRoleMember(userID, roleID uint64) *types.RoleMember {
var r = &types.RoleMember{
RoleID: roleID,
UserID: userID,
}
h.a.NoError(store.CreateRoleMember(context.Background(), service.DefaultStore, r))
return r
}
func TestRoleRead(t *testing.T) {
h := newHelper(t)
u := h.repoMakeRole()
h.apiInit().
Get(fmt.Sprintf("/roles/%d", u.ID)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
Assert(jsonpath.Equal(`$.response.name`, u.Name)).
Assert(jsonpath.Equal(`$.response.roleID`, fmt.Sprintf("%d", u.ID))).
End()
}
func TestRoleList(t *testing.T) {
h := newHelper(t)
h.repoMakeRole(h.randEmail())
h.repoMakeRole(h.randEmail())
helpers.AllowMe(h, types.ComponentRbacResource(), "roles.search")
h.apiInit().
Get("/roles/").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
}
func TestRoleList_filterForbidden(t *testing.T) {
h := newHelper(t)
// @todo this can be a problematic test because it leaves
// behind roles that are not denied this context
// db purge might be needed
h.repoMakeRole("role")
f := h.repoMakeRole()
helpers.AllowMe(h, types.ComponentRbacResource(), "roles.search")
helpers.DenyMe(h, f.RbacResource(), "read")
h.apiInit().
Get("/roles/").
Query("handle", f.Handle).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
Assert(jsonpath.NotPresent(fmt.Sprintf(`$.response.set[? @.handle=="%s"]`, f.Handle))).
End()
}
func TestRoleCreateForbidden(t *testing.T) {
h := newHelper(t)
h.apiInit().
Post("/roles/").
Header("Accept", "application/json").
FormData("name", rs()).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.notAllowedToCreate")).
End()
}
func TestRoleCreateNotUnique(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.ComponentRbacResource(), "role.create")
role := h.repoMakeRole()
h.apiInit().
Post("/roles/").
Header("Accept", "application/json").
FormData("name", rs()).
FormData("handle", role.Handle).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.handleNotUnique")).
End()
h.apiInit().
Post("/roles/").
Header("Accept", "application/json").
FormData("name", role.Name).
FormData("handle", "handle_"+rs()).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.nameNotUnique")).
End()
}
func TestRoleCreate(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.ComponentRbacResource(), "role.create")
h.apiInit().
Post("/roles/").
FormData("name", rs()).
FormData("handle", "handle_"+rs()).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
}
func TestRoleCreateWithJSON(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.ComponentRbacResource(), "role.create")
h.clearRoles()
h.apiInit().
Post("/roles/").
Header("Accept", "application/json").
JSON(fmt.Sprintf(`{
"name": "fake role",
"handle": "fakeRoleFromJSON",
"meta": {
"description": "this is my description",
"context": {
"resourceTypes": ["corteza::compose:record"],
"expr": "userID == resource.ownedBy"
}
}
}`)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
r, err := store.LookupRoleByHandle(context.Background(), service.DefaultStore, "fakeRoleFromJSON")
h.a.NoError(err)
h.a.NotNil(r.Meta)
h.a.NotNil(r.Meta.Context)
h.a.NotEmpty(r.Meta.Context.Resource)
h.a.Equal("corteza::compose:record", r.Meta.Context.Resource[0])
h.a.Equal("userID == resource.ownedBy", r.Meta.Context.Expr)
}
func TestRoleUpdateWithJSON(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.ComponentRbacResource(), "role.create")
h.clearRoles()
h.noError(store.CreateRole(context.Background(), service.DefaultStore, &types.Role{
ID: 42,
Name: "fix",
Handle: "fix",
Meta: &types.RoleMeta{
Description: "fix",
Context: &types.RoleContext{
Resource: []string{"corteza::compose:module"},
Expr: "1!=2",
},
},
}))
h.apiInit().
Post("/roles/").
Header("Accept", "application/json").
JSON(fmt.Sprintf(`{
"name": "fake role",
"handle": "fakeRoleFromJSON",
"meta": {
"description": "this is my description",
"context": {
"resourceTypes": ["corteza::compose:record"],
"expr": "userID == resource.ownedBy"
}
}
}`)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
r, err := store.LookupRoleByHandle(context.Background(), service.DefaultStore, "fakeRoleFromJSON")
h.a.NoError(err)
h.a.NotNil(r.Meta)
h.a.NotNil(r.Meta.Context)
h.a.NotEmpty(r.Meta.Context.Resource)
h.a.Equal("corteza::compose:record", r.Meta.Context.Resource[0])
h.a.Equal("userID == resource.ownedBy", r.Meta.Context.Expr)
}
func TestRoleUpdateForbidden(t *testing.T) {
h := newHelper(t)
u := h.repoMakeRole()
h.apiInit().
Put(fmt.Sprintf("/roles/%d", u.ID)).
Header("Accept", "application/json").
FormData("email", h.randEmail()).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.notAllowedToUpdate")).
End()
}
func TestRoleUpdate(t *testing.T) {
h := newHelper(t)
res := h.repoMakeRole()
helpers.AllowMe(h, types.RoleRbacResource(0), "update")
newName := "updated-" + rs()
newHandle := "updated-" + rs()
h.apiInit().
Put(fmt.Sprintf("/roles/%d", res.ID)).
FormData("name", newName).
FormData("handle", newHandle).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
res = h.lookupRoleByID(res.ID)
h.a.NotNil(res)
h.a.Equal(newName, res.Name)
h.a.Equal(newHandle, res.Handle)
}
func TestRoleDeleteForbidden(t *testing.T) {
h := newHelper(t)
u := h.repoMakeRole()
h.apiInit().
Delete(fmt.Sprintf("/roles/%d", u.ID)).
Header("Accept", "application/json").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.notAllowedToDelete")).
End()
}
func TestRoleDelete(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.RoleRbacResource(0), "delete")
res := h.repoMakeRole()
h.apiInit().
Delete(fmt.Sprintf("/roles/%d", res.ID)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
res = h.lookupRoleByID(res.ID)
h.a.NotNil(res)
h.a.NotNil(res.DeletedAt)
}
func TestRoleUndelete(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.RoleRbacResource(0), "delete")
res := h.repoMakeRole()
h.apiInit().
Post(fmt.Sprintf("/roles/%d/undelete", res.ID)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
res = h.lookupRoleByID(res.ID)
h.a.NotNil(res)
h.a.Nil(res.DeletedAt)
}
func TestRoleArchive(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.RoleRbacResource(0), "update")
res := h.repoMakeRole()
h.apiInit().
Post(fmt.Sprintf("/roles/%d/archive", res.ID)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
res = h.lookupRoleByID(res.ID)
h.a.NotNil(res)
h.a.NotNil(res.ArchivedAt)
}
func TestRoleUnarchive(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.RoleRbacResource(0), "delete")
res := h.repoMakeRole()
h.apiInit().
Post(fmt.Sprintf("/roles/%d/unarchive", res.ID)).
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
res = h.lookupRoleByID(res.ID)
h.a.NotNil(res)
h.a.Nil(res.ArchivedAt)
}
func TestRoleLabels(t *testing.T) {
h := newHelper(t)
h.clearRoles()
helpers.AllowMe(h, types.ComponentRbacResource(), "roles.search")
helpers.AllowMe(h, types.ComponentRbacResource(), "role.create")
helpers.AllowMe(h, types.RoleRbacResource(0), "read", "update", "delete")
var (
ID uint64
)
t.Run("create", func(t *testing.T) {
var (
req = require.New(t)
payload = &types.Role{}
)
helpers.SetLabelsViaAPI(h.apiInit(), t,
"/roles/",
types.Role{Labels: map[string]string{"foo": "bar", "bar": "42"}},
payload,
)
req.NotZero(payload.ID)
h.a.Equal(payload.Labels["foo"], "bar",
"labels must contain foo with value bar")
h.a.Equal(payload.Labels["bar"], "42",
"labels must contain bar with value 42")
req.Equal(payload.Labels, helpers.LoadLabelsFromStore(t, service.DefaultStore, payload.LabelResourceKind(), payload.ID),
"response must match stored labels")
ID = payload.ID
})
t.Run("update", func(t *testing.T) {
if ID == 0 {
t.Skip("label/create test not ran")
}
var (
req = require.New(t)
payload = &types.Role{}
)
helpers.SetLabelsViaAPI(h.apiInit(), t,
fmt.Sprintf("PUT /roles/%d", ID),
&types.Role{Labels: map[string]string{"foo": "baz", "baz": "123"}},
payload,
)
req.NotZero(payload.ID)
//req.Nil(payload.UpdatedAt, "updatedAt must not change after changing labels")
req.Equal(payload.Labels["foo"], "baz",
"labels must contain foo with value baz")
req.NotContains(payload.Labels, "bar",
"labels must not contain bar")
req.Equal(payload.Labels["baz"], "123",
"labels must contain baz with value 123")
req.Equal(payload.Labels, helpers.LoadLabelsFromStore(t, service.DefaultStore, payload.LabelResourceKind(), payload.ID),
"response must match stored labels")
})
t.Run("search", func(t *testing.T) {
if ID == 0 {
t.Skip("label/create test not ran")
}
var (
req = require.New(t)
set = types.RoleSet{}
)
helpers.SearchWithLabelsViaAPI(h.apiInit(), t, "/roles/", &set, url.Values{"labels": []string{"baz=123"}})
req.NotEmpty(set)
req.NotNil(set.FindByID(ID))
req.NotNil(set.FindByID(ID).Labels)
})
}
func TestMemberList(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.RoleRbacResource(0), "read")
r := h.repoMakeRole(h.randEmail())
h.createRoleMember(id.Next(), r.ID)
h.createRoleMember(id.Next(), r.ID)
h.apiInit().
Get(fmt.Sprintf("/roles/%d/members", r.ID)).
Header("Accept", "application/json").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
Assert(jsonpath.Len(`$.response`, 2)).
End()
}
func TestMemberAdd(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.UserRbacResource(0), "read")
helpers.AllowMe(h, types.RoleRbacResource(0), "members.manage")
r := h.repoMakeRole(h.randEmail())
u := h.createUserWithEmail(h.randEmail())
h.apiInit().
Post(fmt.Sprintf("/roles/%d/member/%d", r.ID, u.ID)).
Header("Accept", "application/json").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
}
func TestMemberAdd_denied(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.UserRbacResource(0), "read")
r := h.repoMakeRole(h.randEmail())
u := h.createUserWithEmail(h.randEmail())
h.apiInit().
Post(fmt.Sprintf("/roles/%d/member/%d", r.ID, u.ID)).
Header("Accept", "application/json").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.notAllowedToManageMembers")).
End()
}
func TestMemberRemove(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.UserRbacResource(0), "read")
helpers.AllowMe(h, types.RoleRbacResource(0), "members.manage")
r := h.repoMakeRole(h.randEmail())
u := h.createUserWithEmail(h.randEmail())
h.apiInit().
Post(fmt.Sprintf("/roles/%d/member/%d", r.ID, u.ID)).
Header("Accept", "application/json").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertNoErrors).
End()
}
func TestMemberRemove_denied(t *testing.T) {
h := newHelper(t)
helpers.AllowMe(h, types.UserRbacResource(0), "read")
r := h.repoMakeRole(h.randEmail())
u := h.createUserWithEmail(h.randEmail())
h.apiInit().
Post(fmt.Sprintf("/roles/%d/member/%d", r.ID, u.ID)).
Header("Accept", "application/json").
Expect(t).
Status(http.StatusOK).
Assert(helpers.AssertError("role.errors.notAllowedToManageMembers")).
End()
}