mirror of https://github.com/hashicorp/consul
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
689 lines
16 KiB
689 lines
16 KiB
package acl |
|
|
|
import ( |
|
"fmt" |
|
"testing" |
|
|
|
"github.com/stretchr/testify/mock" |
|
"github.com/stretchr/testify/require" |
|
) |
|
|
|
type mockAuthorizer struct { |
|
mock.Mock |
|
} |
|
|
|
var _ Authorizer = (*mockAuthorizer)(nil) |
|
|
|
// ACLRead checks for permission to list all the ACLs |
|
func (m *mockAuthorizer) ACLRead(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// ACLWrite checks for permission to manipulate ACLs |
|
func (m *mockAuthorizer) ACLWrite(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// AgentRead checks for permission to read from agent endpoints for a |
|
// given node. |
|
func (m *mockAuthorizer) AgentRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// AgentWrite checks for permission to make changes via agent endpoints |
|
// for a given node. |
|
func (m *mockAuthorizer) AgentWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// EventRead determines if a specific event can be queried. |
|
func (m *mockAuthorizer) EventRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// EventWrite determines if a specific event may be fired. |
|
func (m *mockAuthorizer) EventWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// IntentionDefaultAllow determines the default authorized behavior |
|
// when no intentions match a Connect request. |
|
func (m *mockAuthorizer) IntentionDefaultAllow(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// IntentionRead determines if a specific intention can be read. |
|
func (m *mockAuthorizer) IntentionRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// IntentionWrite determines if a specific intention can be |
|
// created, modified, or deleted. |
|
func (m *mockAuthorizer) IntentionWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// KeyList checks for permission to list keys under a prefix |
|
func (m *mockAuthorizer) KeyList(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// KeyRead checks for permission to read a given key |
|
func (m *mockAuthorizer) KeyRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// KeyWrite checks for permission to write a given key |
|
func (m *mockAuthorizer) KeyWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// KeyWritePrefix checks for permission to write to an |
|
// entire key prefix. This means there must be no sub-policies |
|
// that deny a write. |
|
func (m *mockAuthorizer) KeyWritePrefix(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// KeyringRead determines if the encryption keyring used in |
|
// the gossip layer can be read. |
|
func (m *mockAuthorizer) KeyringRead(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// KeyringWrite determines if the keyring can be manipulated |
|
func (m *mockAuthorizer) KeyringWrite(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// NodeRead checks for permission to read (discover) a given node. |
|
func (m *mockAuthorizer) NodeRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
func (m *mockAuthorizer) NodeReadAll(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// NodeWrite checks for permission to create or update (register) a |
|
// given node. |
|
func (m *mockAuthorizer) NodeWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
func (m *mockAuthorizer) MeshRead(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
func (m *mockAuthorizer) MeshWrite(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// PeeringRead determines if the read-only Consul peering functions |
|
// can be used. |
|
func (m *mockAuthorizer) PeeringRead(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// PeeringWrite determines if the state-changing Consul peering |
|
// functions can be used. |
|
func (m *mockAuthorizer) PeeringWrite(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// OperatorRead determines if the read-only Consul operator functions |
|
// can be used. ret := m.Called(segment, ctx) |
|
func (m *mockAuthorizer) OperatorRead(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// OperatorWrite determines if the state-changing Consul operator |
|
// functions can be used. |
|
func (m *mockAuthorizer) OperatorWrite(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// PreparedQueryRead determines if a specific prepared query can be read |
|
// to show its contents (this is not used for execution). |
|
func (m *mockAuthorizer) PreparedQueryRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// PreparedQueryWrite determines if a specific prepared query can be |
|
// created, modified, or deleted. |
|
func (m *mockAuthorizer) PreparedQueryWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// ServiceRead checks for permission to read a given service |
|
func (m *mockAuthorizer) ServiceRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
func (m *mockAuthorizer) ServiceReadAll(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// ServiceWrite checks for permission to create or update a given |
|
// service |
|
func (m *mockAuthorizer) ServiceWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// ServiceWriteAny checks for service:write on any service |
|
func (m *mockAuthorizer) ServiceWriteAny(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// SessionRead checks for permission to read sessions for a given node. |
|
func (m *mockAuthorizer) SessionRead(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// SessionWrite checks for permission to create sessions for a given |
|
// node. |
|
func (m *mockAuthorizer) SessionWrite(segment string, ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(segment, ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
// Snapshot checks for permission to take and restore snapshots. |
|
func (m *mockAuthorizer) Snapshot(ctx *AuthorizerContext) EnforcementDecision { |
|
ret := m.Called(ctx) |
|
return ret.Get(0).(EnforcementDecision) |
|
} |
|
|
|
func (p *mockAuthorizer) ToAllowAuthorizer() AllowAuthorizer { |
|
return AllowAuthorizer{Authorizer: p} |
|
} |
|
|
|
func TestACL_Enforce(t *testing.T) { |
|
type testCase struct { |
|
method string |
|
resource Resource |
|
segment string |
|
access string |
|
ret EnforcementDecision |
|
err string |
|
} |
|
|
|
testName := func(t testCase) string { |
|
if t.segment != "" { |
|
return fmt.Sprintf("%s/%s/%s/%s", t.resource, t.segment, t.access, t.ret.String()) |
|
} |
|
return fmt.Sprintf("%s/%s/%s", t.resource, t.access, t.ret.String()) |
|
} |
|
|
|
cases := []testCase{ |
|
{ |
|
method: "ACLRead", |
|
resource: ResourceACL, |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "ACLRead", |
|
resource: ResourceACL, |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "ACLWrite", |
|
resource: ResourceACL, |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "ACLWrite", |
|
resource: ResourceACL, |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceACL, |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "OperatorRead", |
|
resource: ResourceOperator, |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "OperatorRead", |
|
resource: ResourceOperator, |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "OperatorWrite", |
|
resource: ResourceOperator, |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "OperatorWrite", |
|
resource: ResourceOperator, |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceOperator, |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "KeyringRead", |
|
resource: ResourceKeyring, |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "KeyringRead", |
|
resource: ResourceKeyring, |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "KeyringWrite", |
|
resource: ResourceKeyring, |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "KeyringWrite", |
|
resource: ResourceKeyring, |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceKeyring, |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "AgentRead", |
|
resource: ResourceAgent, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "AgentRead", |
|
resource: ResourceAgent, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "AgentWrite", |
|
resource: ResourceAgent, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "AgentWrite", |
|
resource: ResourceAgent, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceAgent, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "EventRead", |
|
resource: ResourceEvent, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "EventRead", |
|
resource: ResourceEvent, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "EventWrite", |
|
resource: ResourceEvent, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "EventWrite", |
|
resource: ResourceEvent, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceEvent, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "IntentionRead", |
|
resource: ResourceIntention, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "IntentionRead", |
|
resource: ResourceIntention, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "IntentionWrite", |
|
resource: ResourceIntention, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "IntentionWrite", |
|
resource: ResourceIntention, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceIntention, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "NodeRead", |
|
resource: ResourceNode, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "NodeRead", |
|
resource: ResourceNode, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "NodeWrite", |
|
resource: ResourceNode, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "NodeWrite", |
|
resource: ResourceNode, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceNode, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "PeeringRead", |
|
resource: ResourcePeering, |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "PeeringRead", |
|
resource: ResourcePeering, |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "PeeringWrite", |
|
resource: ResourcePeering, |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "PeeringWrite", |
|
resource: ResourcePeering, |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "PreparedQueryRead", |
|
resource: ResourceQuery, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "PreparedQueryRead", |
|
resource: ResourceQuery, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "PreparedQueryWrite", |
|
resource: ResourceQuery, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "PreparedQueryWrite", |
|
resource: ResourceQuery, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceQuery, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "ServiceRead", |
|
resource: ResourceService, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "ServiceRead", |
|
resource: ResourceService, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "ServiceWrite", |
|
resource: ResourceService, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "ServiceWrite", |
|
resource: ResourceService, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceSession, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "SessionRead", |
|
resource: ResourceSession, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "SessionRead", |
|
resource: ResourceSession, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "SessionWrite", |
|
resource: ResourceSession, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "SessionWrite", |
|
resource: ResourceSession, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceSession, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
method: "KeyRead", |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "read", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "KeyRead", |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "read", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "KeyWrite", |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "write", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "KeyWrite", |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "write", |
|
ret: Allow, |
|
}, |
|
{ |
|
method: "KeyList", |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "list", |
|
ret: Deny, |
|
}, |
|
{ |
|
method: "KeyList", |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "list", |
|
ret: Allow, |
|
}, |
|
{ |
|
resource: ResourceKey, |
|
segment: "foo", |
|
access: "deny", |
|
ret: Deny, |
|
err: "Invalid access level", |
|
}, |
|
{ |
|
resource: "not-a-real-resource", |
|
access: "read", |
|
ret: Deny, |
|
err: "Invalid ACL resource requested:", |
|
}, |
|
} |
|
|
|
for _, tcase := range cases { |
|
t.Run(testName(tcase), func(t *testing.T) { |
|
m := &mockAuthorizer{} |
|
|
|
if tcase.err == "" { |
|
var nilCtx *AuthorizerContext |
|
if tcase.segment != "" { |
|
m.On(tcase.method, tcase.segment, nilCtx).Return(tcase.ret) |
|
} else { |
|
m.On(tcase.method, nilCtx).Return(tcase.ret) |
|
} |
|
} |
|
|
|
ret, err := Enforce(m, tcase.resource, tcase.segment, tcase.access, nil) |
|
if tcase.err == "" { |
|
require.NoError(t, err) |
|
} else { |
|
require.Error(t, err) |
|
require.Contains(t, err.Error(), tcase.err) |
|
} |
|
require.Equal(t, tcase.ret, ret) |
|
m.AssertExpectations(t) |
|
}) |
|
} |
|
}
|
|
|