1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
|
package middleware
import (
"context"
"net/http"
"testing"
v1 "github.com/authzed/authzed-go/proto/authzed/api/v1"
"github.com/stretchr/testify/require"
"github.com/xlgmokha/x/pkg/test"
"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/app/cfg"
"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/app/domain"
"google.golang.org/grpc"
)
type MockAbility func(context.Context, *v1.CheckPermissionRequest) (*v1.CheckPermissionResponse, error)
func (m MockAbility) CheckPermission(ctx context.Context, r *v1.CheckPermissionRequest, opts ...grpc.CallOption) (*v1.CheckPermissionResponse, error) {
return m(ctx, r)
}
func TestRequirePermission(t *testing.T) {
user := &domain.User{ID: domain.ID("1")}
ctx := cfg.CurrentUser.With(t.Context(), user)
permission := Permission("read_sparkles")
t.Run("when the permission is granted", func(t *testing.T) {
r, w := test.RequestResponse("GET", "/sparkles", test.WithContext(ctx))
middleware := RequirePermission(permission, MockAbility(func(ctx context.Context, r *v1.CheckPermissionRequest) (*v1.CheckPermissionResponse, error) {
require.Equal(t, "user", r.Subject.Object.ObjectType)
require.Equal(t, user.Username, r.Subject.Object.ObjectId)
require.Equal(t, permission.String(), r.Permission)
require.Equal(t, "sparkle", r.Resource.ObjectType)
require.Equal(t, "*", r.Resource.ObjectId)
return &v1.CheckPermissionResponse{
Permissionship: v1.CheckPermissionResponse_PERMISSIONSHIP_HAS_PERMISSION,
}, nil
}))
server := middleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.WriteHeader(http.StatusTeapot)
}))
server.ServeHTTP(w, r)
require.Equal(t, http.StatusTeapot, w.Code)
})
t.Run("when the permission is denied", func(t *testing.T) {
r, w := test.RequestResponse("GET", "/sparkles", test.WithContext(ctx))
middleware := RequirePermission(permission, MockAbility(func(ctx context.Context, r *v1.CheckPermissionRequest) (*v1.CheckPermissionResponse, error) {
return &v1.CheckPermissionResponse{
Permissionship: v1.CheckPermissionResponse_PERMISSIONSHIP_NO_PERMISSION,
}, nil
}))
server := middleware(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
require.Fail(t, "unexpected call to handler")
}))
server.ServeHTTP(w, r)
require.Equal(t, http.StatusForbidden, w.Code)
})
}
|