123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630 |
- import {
- isPermitted,
- isPermittedToCreate,
- modifyRolesData,
- } from 'lib/permissions';
- import { Action, ResourceType } from 'generated-sources';
- describe('Permission Helpers', () => {
- const clusterName1 = 'local';
- const clusterName2 = 'dev';
- const userPermissionsMock = [
- {
- clusters: [clusterName1],
- resource: ResourceType.TOPIC,
- actions: [Action.VIEW, Action.CREATE],
- value: '.*',
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.KSQL,
- actions: [Action.EXECUTE],
- },
- {
- clusters: [clusterName1, clusterName2],
- resource: ResourceType.SCHEMA,
- actions: [Action.VIEW],
- value: '.*',
- },
- {
- clusters: [clusterName1, clusterName2],
- resource: ResourceType.CONNECT,
- actions: [Action.VIEW],
- value: '.*',
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.APPLICATIONCONFIG,
- actions: [Action.EDIT],
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.CLUSTERCONFIG,
- actions: [Action.EDIT],
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.CONSUMER,
- actions: [Action.DELETE],
- value: '.*',
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.SCHEMA,
- actions: [Action.EDIT, Action.DELETE, Action.CREATE],
- value: '123.*',
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.ACL,
- actions: [Action.VIEW],
- },
- {
- clusters: [clusterName1],
- resource: ResourceType.AUDIT,
- actions: [Action.VIEW],
- },
- {
- clusters: [clusterName1, clusterName2],
- resource: ResourceType.TOPIC,
- value: 'test.*',
- actions: [Action.MESSAGES_DELETE],
- },
- {
- clusters: [clusterName1, clusterName2],
- resource: ResourceType.TOPIC,
- value: '.*',
- actions: [Action.EDIT, Action.DELETE],
- },
- {
- clusters: [clusterName1, clusterName2],
- resource: ResourceType.TOPIC,
- value: 'bobross.*',
- actions: [Action.VIEW, Action.MESSAGES_READ],
- },
- ];
- const roles = modifyRolesData(userPermissionsMock);
- describe('modifyRoles', () => {
- it('should check if it transforms the data in a correct format to normal keys', () => {
- const result = modifyRolesData(userPermissionsMock);
- expect(result.keys()).toContain(clusterName1);
- expect(result.keys()).toContain(clusterName2);
- const cluster1Map = result.get(clusterName1);
- const cluster2Map = result.get(clusterName2);
- expect(cluster1Map).toBeDefined();
- expect(cluster2Map).toBeDefined();
- // first cluster
- expect(cluster1Map?.has(ResourceType.CLUSTERCONFIG)).toBeTruthy();
- expect(cluster1Map?.has(ResourceType.CLUSTERCONFIG)).toBeTruthy();
- expect(cluster1Map?.has(ResourceType.CONSUMER)).toBeTruthy();
- expect(cluster1Map?.has(ResourceType.CONNECT)).toBeTruthy();
- expect(cluster1Map?.has(ResourceType.KSQL)).toBeTruthy();
- expect(cluster1Map?.has(ResourceType.TOPIC)).toBeTruthy();
- // second cluster
- expect(cluster2Map?.has(ResourceType.SCHEMA)).toBeTruthy();
- expect(cluster2Map?.has(ResourceType.CONNECT)).toBeTruthy();
- expect(cluster2Map?.has(ResourceType.TOPIC)).toBeTruthy();
- expect(cluster2Map?.has(ResourceType.CLUSTERCONFIG)).toBeFalsy();
- expect(cluster2Map?.has(ResourceType.CONSUMER)).toBeFalsy();
- expect(cluster2Map?.has(ResourceType.KSQL)).toBeFalsy();
- });
- it('should check if it transforms the data length in keys are correct', () => {
- const result = modifyRolesData(userPermissionsMock);
- const cluster1Map = result.get(clusterName1);
- const cluster2Map = result.get(clusterName2);
- expect(result.size).toBe(2);
- expect(cluster1Map?.size).toBe(9);
- expect(cluster2Map?.size).toBe(3);
- // clusterMap1
- expect(cluster1Map?.get(ResourceType.TOPIC)).toHaveLength(4);
- expect(cluster1Map?.get(ResourceType.SCHEMA)).toHaveLength(2);
- expect(cluster1Map?.get(ResourceType.CONSUMER)).toHaveLength(1);
- expect(cluster1Map?.get(ResourceType.CLUSTERCONFIG)).toHaveLength(1);
- expect(cluster1Map?.get(ResourceType.CONNECT)).toHaveLength(1);
- expect(cluster1Map?.get(ResourceType.CLUSTERCONFIG)).toHaveLength(1);
- // clusterMap2
- expect(cluster2Map?.get(ResourceType.SCHEMA)).toHaveLength(1);
- });
- });
- describe('isPermitted', () => {
- it('should check if the isPermitted returns the correct when there is no roles or clusters', () => {
- expect(
- isPermitted({
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- clusterName: 'unFoundCluster',
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: 'unFoundCluster',
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: '',
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles: new Map(),
- clusterName: 'unFoundCluster',
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles: new Map(),
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- });
- it('should check if the isPermitted returns the correct value without resource values (exempt list)', () => {
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.KSQL,
- action: Action.EXECUTE,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.CLUSTERCONFIG,
- action: Action.EDIT,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.APPLICATIONCONFIG,
- action: Action.EDIT,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.ACL,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.AUDIT,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.CONSUMER,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.CONNECT,
- action: Action.VIEW,
- rbacFlag: true,
- })
- ).toBeFalsy();
- });
- it('should check if the isPermitted returns the correct value with name values', () => {
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: Action.EDIT,
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: Action.EDIT,
- value: '123',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: Action.EDIT,
- value: 'some_wrong_value',
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName2,
- resource: ResourceType.TOPIC,
- action: Action.MESSAGES_DELETE,
- value: 'test_something',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- action: Action.MESSAGES_DELETE,
- value: 'test_something',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName2,
- resource: ResourceType.TOPIC,
- action: Action.EDIT,
- value: 'any_text',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName2,
- resource: ResourceType.TOPIC,
- action: Action.EDIT,
- value: 'any_text',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- action: Action.DELETE,
- value: 'some_other',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName2,
- resource: ResourceType.TOPIC,
- action: Action.DELETE,
- value: 'some_other',
- rbacFlag: true,
- })
- ).toBeTruthy();
- });
- it('should test the algorithmic worse case when the input is multiple actions', () => {
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT, Action.DELETE],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.DELETE],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.DELETE, Action.EDIT],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT, Action.VIEW],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT, Action.VIEW],
- value: 'notFound',
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [],
- value: '123456',
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- action: [Action.MESSAGES_READ],
- value: 'bobross-test',
- rbacFlag: true,
- })
- ).toBeTruthy();
- });
- it('should check the rbac flag and works with permissions accordingly', () => {
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [],
- value: '123456',
- rbacFlag: false,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT, Action.VIEW],
- value: '123456',
- rbacFlag: false,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT, Action.VIEW],
- value: 'notFound',
- rbacFlag: false,
- })
- ).toBeTruthy();
- expect(
- isPermitted({
- roles: new Map(),
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- action: [Action.EDIT, Action.VIEW],
- value: 'notFound',
- rbacFlag: false,
- })
- ).toBeTruthy();
- });
- });
- describe('isPermittedToCreate', () => {
- it('should check if the isPermitted returns the correct when there is no roles or clusters', () => {
- expect(
- isPermittedToCreate({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermittedToCreate({
- roles,
- clusterName: clusterName2,
- resource: ResourceType.TOPIC,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermittedToCreate({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- rbacFlag: false,
- })
- ).toBeTruthy();
- expect(
- isPermittedToCreate({
- roles,
- clusterName: clusterName2,
- resource: ResourceType.TOPIC,
- rbacFlag: false,
- })
- ).toBeTruthy();
- expect(
- isPermittedToCreate({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.SCHEMA,
- rbacFlag: true,
- })
- ).toBeTruthy();
- expect(
- isPermittedToCreate({
- roles,
- clusterName: clusterName1,
- resource: ResourceType.CONNECT,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermittedToCreate({
- roles: new Map(),
- clusterName: 'unFoundCluster',
- resource: ResourceType.TOPIC,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermittedToCreate({
- roles,
- clusterName: 'unFoundCluster',
- resource: ResourceType.TOPIC,
- rbacFlag: true,
- })
- ).toBeFalsy();
- expect(
- isPermittedToCreate({
- roles: new Map(),
- clusterName: clusterName1,
- resource: ResourceType.TOPIC,
- rbacFlag: true,
- })
- ).toBeFalsy();
- });
- });
- });
|