2015-04-24 15:17:04 +00:00
|
|
|
/*
|
2015-05-01 16:19:44 +00:00
|
|
|
Copyright 2014 The Kubernetes Authors All rights reserved.
|
2015-04-24 15:17:04 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package apiserver
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NewAlwaysAllowAuthorizer must return a struct which implements authorizer.Authorizer
|
|
|
|
// and always return nil.
|
|
|
|
func TestNewAlwaysAllowAuthorizer(t *testing.T) {
|
|
|
|
aaa := NewAlwaysAllowAuthorizer()
|
|
|
|
if result := aaa.Authorize(nil); result != nil {
|
|
|
|
t.Errorf("AlwaysAllowAuthorizer.Authorize did not return nil. (%s)", result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewAlwaysDenyAuthorizer must return a struct which implements authorizer.Authorizer
|
|
|
|
// and always return an error as everything is forbidden.
|
|
|
|
func TestNewAlwaysDenyAuthorizer(t *testing.T) {
|
|
|
|
ada := NewAlwaysDenyAuthorizer()
|
|
|
|
if result := ada.Authorize(nil); result == nil {
|
|
|
|
t.Errorf("AlwaysDenyAuthorizer.Authorize returned nil instead of error.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewAuthorizerFromAuthorizationConfig has multiple return possibilities. This test
|
|
|
|
// validates that errors are returned only when proper.
|
|
|
|
func TestNewAuthorizerFromAuthorizationConfig(t *testing.T) {
|
|
|
|
// Unknown modes should return errors
|
2015-08-27 23:18:26 +00:00
|
|
|
if _, err := NewAuthorizerFromAuthorizationConfig([]string{"DoesNotExist"}, ""); err == nil {
|
2015-04-24 15:17:04 +00:00
|
|
|
t.Errorf("NewAuthorizerFromAuthorizationConfig using a fake mode should have returned an error")
|
|
|
|
}
|
|
|
|
|
|
|
|
// ModeAlwaysAllow and ModeAlwaysDeny should return without authorizationPolicyFile
|
|
|
|
// but error if one is given
|
2015-08-27 23:18:26 +00:00
|
|
|
if _, err := NewAuthorizerFromAuthorizationConfig([]string{ModeAlwaysAllow, ModeAlwaysDeny}, ""); err != nil {
|
|
|
|
t.Errorf("NewAuthorizerFromAuthorizationConfig returned an error: %s", err)
|
2015-04-24 15:17:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ModeABAC requires a policy file
|
2015-08-27 23:18:26 +00:00
|
|
|
if _, err := NewAuthorizerFromAuthorizationConfig([]string{ModeAlwaysAllow, ModeAlwaysDeny, ModeABAC}, ""); err == nil {
|
2015-04-24 15:17:04 +00:00
|
|
|
t.Errorf("NewAuthorizerFromAuthorizationConfig using a fake mode should have returned an error")
|
|
|
|
}
|
|
|
|
// ModeABAC should not error if a valid policy path is provided
|
2015-08-27 23:18:26 +00:00
|
|
|
if _, err := NewAuthorizerFromAuthorizationConfig([]string{ModeAlwaysAllow, ModeAlwaysDeny, ModeABAC}, "../auth/authorizer/abac/example_policy_file.jsonl"); err != nil {
|
2015-04-24 15:17:04 +00:00
|
|
|
t.Errorf("NewAuthorizerFromAuthorizationConfig errored while using a valid policy file: %s", err)
|
|
|
|
}
|
2015-08-27 23:18:26 +00:00
|
|
|
// Authorization Policy file cannot be used without ModeABAC
|
|
|
|
if _, err := NewAuthorizerFromAuthorizationConfig([]string{ModeAlwaysAllow, ModeAlwaysDeny}, "../auth/authorizer/abac/example_policy_file.jsonl"); err == nil {
|
|
|
|
t.Errorf("NewAuthorizerFromAuthorizationConfig should have errored when Authorization Policy File is used without ModeABAC")
|
|
|
|
}
|
|
|
|
// Atleast one authorizationMode is necessary
|
|
|
|
if _, err := NewAuthorizerFromAuthorizationConfig([]string{}, "../auth/authorizer/abac/example_policy_file.jsonl"); err == nil {
|
|
|
|
t.Errorf("NewAuthorizerFromAuthorizationConfig should have errored when no authorization modes are passed")
|
|
|
|
}
|
2015-04-24 15:17:04 +00:00
|
|
|
}
|