mirror of https://github.com/hashicorp/consul
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
298 lines
5.0 KiB
298 lines
5.0 KiB
package acl |
|
|
|
import ( |
|
"testing" |
|
) |
|
|
|
func TestCache_GetPolicy(t *testing.T) { |
|
c, err := NewCache(1, nil) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
p, err := c.GetPolicy("") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Should get the same policy |
|
p1, err := c.GetPolicy("") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if p != p1 { |
|
t.Fatalf("should be cached") |
|
} |
|
|
|
// Cache a new policy |
|
_, err = c.GetPolicy(testSimplePolicy) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Test invalidation of p |
|
p3, err := c.GetPolicy("") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if p == p3 { |
|
t.Fatalf("should be not cached") |
|
} |
|
} |
|
|
|
func TestCache_GetACL(t *testing.T) { |
|
policies := map[string]string{ |
|
"foo": testSimplePolicy, |
|
"bar": testSimplePolicy2, |
|
} |
|
faultfn := func(id string) (string, string, error) { |
|
return "deny", policies[id], nil |
|
} |
|
|
|
c, err := NewCache(1, faultfn) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
acl, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if acl.KeyRead("bar/test") { |
|
t.Fatalf("should deny") |
|
} |
|
if !acl.KeyRead("foo/test") { |
|
t.Fatalf("should allow") |
|
} |
|
|
|
acl2, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if acl != acl2 { |
|
t.Fatalf("should be cached") |
|
} |
|
|
|
// Invalidate cache |
|
_, err = c.GetACL("bar") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
acl3, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if acl == acl3 { |
|
t.Fatalf("should not be cached") |
|
} |
|
} |
|
|
|
func TestCache_ClearACL(t *testing.T) { |
|
policies := map[string]string{ |
|
"foo": testSimplePolicy, |
|
"bar": testSimplePolicy, |
|
} |
|
faultfn := func(id string) (string, string, error) { |
|
return "deny", policies[id], nil |
|
} |
|
|
|
c, err := NewCache(1, faultfn) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
acl, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Nuke the cache |
|
c.ClearACL("foo") |
|
|
|
// Clear the policy cache |
|
c.policyCache.Purge() |
|
|
|
acl2, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if acl == acl2 { |
|
t.Fatalf("should not be cached") |
|
} |
|
} |
|
|
|
func TestCache_Purge(t *testing.T) { |
|
policies := map[string]string{ |
|
"foo": testSimplePolicy, |
|
"bar": testSimplePolicy, |
|
} |
|
faultfn := func(id string) (string, string, error) { |
|
return "deny", policies[id], nil |
|
} |
|
|
|
c, err := NewCache(1, faultfn) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
acl, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
// Nuke the cache |
|
c.Purge() |
|
c.policyCache.Purge() |
|
|
|
acl2, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if acl == acl2 { |
|
t.Fatalf("should not be cached") |
|
} |
|
} |
|
|
|
func TestCache_GetACLPolicy(t *testing.T) { |
|
policies := map[string]string{ |
|
"foo": testSimplePolicy, |
|
"bar": testSimplePolicy, |
|
} |
|
faultfn := func(id string) (string, string, error) { |
|
return "deny", policies[id], nil |
|
} |
|
c, err := NewCache(1, faultfn) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
p, err := c.GetPolicy(testSimplePolicy) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
_, err = c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
parent, p2, err := c.GetACLPolicy("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if parent != "deny" { |
|
t.Fatalf("bad: %v", parent) |
|
} |
|
|
|
if p2 != p { |
|
t.Fatalf("expected cached policy") |
|
} |
|
|
|
parent, p3, err := c.GetACLPolicy("bar") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
if parent != "deny" { |
|
t.Fatalf("bad: %v", parent) |
|
} |
|
|
|
if p3 != p { |
|
t.Fatalf("expected cached policy") |
|
} |
|
} |
|
|
|
func TestCache_GetACL_Parent(t *testing.T) { |
|
faultfn := func(id string) (string, string, error) { |
|
switch id { |
|
case "foo": |
|
// Foo inherits from bar |
|
return "bar", testSimplePolicy, nil |
|
case "bar": |
|
return "deny", testSimplePolicy2, nil |
|
} |
|
t.Fatalf("bad case") |
|
return "", "", nil |
|
} |
|
|
|
c, err := NewCache(1, faultfn) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
acl, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if !acl.KeyRead("bar/test") { |
|
t.Fatalf("should allow") |
|
} |
|
if !acl.KeyRead("foo/test") { |
|
t.Fatalf("should allow") |
|
} |
|
} |
|
|
|
func TestCache_GetACL_ParentCache(t *testing.T) { |
|
// Same rules, different parent |
|
faultfn := func(id string) (string, string, error) { |
|
switch id { |
|
case "foo": |
|
return "allow", testSimplePolicy, nil |
|
case "bar": |
|
return "deny", testSimplePolicy, nil |
|
} |
|
t.Fatalf("bad case") |
|
return "", "", nil |
|
} |
|
|
|
c, err := NewCache(16, faultfn) |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
acl, err := c.GetACL("foo") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if !acl.KeyRead("bar/test") { |
|
t.Fatalf("should allow") |
|
} |
|
if !acl.KeyRead("foo/test") { |
|
t.Fatalf("should allow") |
|
} |
|
|
|
acl2, err := c.GetACL("bar") |
|
if err != nil { |
|
t.Fatalf("err: %v", err) |
|
} |
|
|
|
if acl == acl2 { |
|
t.Fatalf("should not match") |
|
} |
|
|
|
if acl2.KeyRead("bar/test") { |
|
t.Fatalf("should not allow") |
|
} |
|
if !acl2.KeyRead("foo/test") { |
|
t.Fatalf("should allow") |
|
} |
|
} |
|
|
|
var testSimplePolicy = ` |
|
key "foo/" { |
|
policy = "read" |
|
} |
|
` |
|
|
|
var testSimplePolicy2 = ` |
|
key "bar/" { |
|
policy = "read" |
|
} |
|
`
|
|
|