summaryrefslogtreecommitdiff
path: root/app/middleware/require_permission_test.go
blob: 34a04a77749dd1f853744e22ecd99ddb03f44f2a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
package middleware

import (
	"context"
	"net/http"
	"testing"

	"github.com/stretchr/testify/require"
	"github.com/xlgmokha/x/pkg/test"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/authzd.git/pkg/rpc"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/app/cfg"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/app/domain"
)

type MockAbility func(context.Context, *rpc.AllowRequest) (*rpc.AllowReply, error)

func (m MockAbility) Allowed(ctx context.Context, r *rpc.AllowRequest) (*rpc.AllowReply, error) {
	return m(ctx, r)
}

func TestRequirePermission(t *testing.T) {
	user := &domain.User{ID: domain.ID("1")}
	ctx := cfg.CurrentUser.With(t.Context(), user)
	permission := Permission("read_sparkles")

	t.Run("when the permission is granted", func(t *testing.T) {
		r, w := test.RequestResponse("GET", "/sparkles", test.WithContext(ctx))

		middleware := RequirePermission(permission, MockAbility(func(ctx context.Context, r *rpc.AllowRequest) (*rpc.AllowReply, error) {
			require.Equal(t, "gid://sparkle/User/"+user.ID.String(), r.Subject)
			require.Equal(t, permission.ToGID(), r.Permission)
			require.Equal(t, "gid://sparkle/Sparkle/*", r.Resource)

			return &rpc.AllowReply{Result: true}, nil
		}))
		server := middleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
			w.WriteHeader(http.StatusTeapot)
		}))
		server.ServeHTTP(w, r)

		require.Equal(t, http.StatusTeapot, w.Code)
	})

	t.Run("when the permission is denied", func(t *testing.T) {
		r, w := test.RequestResponse("GET", "/sparkles", test.WithContext(ctx))

		middleware := RequirePermission(permission, MockAbility(func(ctx context.Context, r *rpc.AllowRequest) (*rpc.AllowReply, error) {
			return &rpc.AllowReply{Result: false}, nil
		}))
		server := middleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
			require.Fail(t, "unexpected call to handler")
		}))

		server.ServeHTTP(w, r)

		require.Equal(t, http.StatusForbidden, w.Code)
	})
}