Skip to content
Snippets Groups Projects
role_test.go 13.1 KiB
Newer Older
  • Learn to ignore specific revisions
  • package server
    
    import (
    	"context"
    	"reflect"
    	"testing"
    
    	"buf.build/gen/go/bufbuild/protovalidate/protocolbuffers/go/buf/validate"
    
    	apb "code.fbi.h-da.de/danet/gosdn/api/go/gosdn/rbac"
    
    	"code.fbi.h-da.de/danet/gosdn/controller/rbac"
    
    	"github.com/bufbuild/protovalidate-go"
    
    	"github.com/google/uuid"
    
    
    	eventservice "code.fbi.h-da.de/danet/gosdn/controller/eventService"
    
    func getTestRoleServer(t *testing.T) *RoleServer {
    
    	jwtManager := rbac.NewJWTManager("test", time.Second)
    
    	eventService := eventservice.NewMockEventService()
    
    
    	userStore := rbac.NewMemoryUserStore()
    
    	userService := rbac.NewUserService(userStore, eventService)
    
    
    	roleStore := rbac.NewMemoryRoleStore()
    
    	roleService := rbac.NewRoleService(roleStore, eventService)
    
    	protoValidator, err := protovalidate.New()
    	if err != nil {
    		panic(err)
    	}
    
    	s := NewRoleServer(jwtManager, roleService, protoValidator)
    	err = clearAndCreateAuthTestSetup(userService, roleService)
    
    	if err != nil {
    		t.Fatalf("%v", err)
    	}
    
    	return s
    }
    
    
    func TestRole_CreateRoles(t *testing.T) {
    	type args struct {
    		ctx     context.Context
    		request *apb.CreateRolesRequest
    	}
    	tests := []struct {
    
    		name             string
    		args             args
    		want             *apb.CreateRolesResponse
    		wantErr          bool
    		validationErrors []*validate.Violation
    
    	}{
    		{
    			name: "default create roles",
    			args: args{ctx: context.TODO(),
    				request: &apb.CreateRolesRequest{
    					Roles: []*apb.Role{
    						{
    							Name:        "new role 1",
    							Description: "Role 1",
    							Permissions: []string{"permission 1", "permission 2"},
    						},
    					},
    				},
    			},
    
    			want:    &apb.CreateRolesResponse{},
    
    			wantErr: false,
    		},
    
    		{
    			name: "role with too short name should fail",
    			args: args{ctx: context.TODO(),
    				request: &apb.CreateRolesRequest{
    					Roles: []*apb.Role{
    						{
    							Name:        "r1",
    							Description: "Role 1",
    							Permissions: []string{"permission 1", "permission 2"},
    						},
    					},
    				},
    			},
    			want:    &apb.CreateRolesResponse{},
    			wantErr: true,
    			validationErrors: []*validate.Violation{
    				{
    
    					FieldPath:    stringToPointer("roles[0].name"),
    					ConstraintId: stringToPointer("string.min_len"),
    					Message:      stringToPointer("value length must be at least 3 characters"),
    
    				}},
    		},
    		{
    			name: "role with too short description should fail",
    			args: args{ctx: context.TODO(),
    				request: &apb.CreateRolesRequest{
    					Roles: []*apb.Role{
    						{
    							Name:        "new role 1",
    							Description: "r1",
    							Permissions: []string{"permission 1", "permission 2"},
    						},
    					},
    				},
    			},
    			want:    &apb.CreateRolesResponse{},
    			wantErr: true,
    			validationErrors: []*validate.Violation{{
    
    				FieldPath:    stringToPointer("roles[0].description"),
    				ConstraintId: stringToPointer("string.min_len"),
    				Message:      stringToPointer("value length must be at least 3 characters"),
    
    	}
    	for _, tt := range tests {
    		t.Run(tt.name, func(t *testing.T) {
    
    			_, err := s.CreateRoles(tt.args.ctx, tt.args.request)
    
    			if (err != nil) != tt.wantErr {
    				t.Errorf("Role.CreateRoles() error = %v, wantErr %v", err, tt.wantErr)
    				return
    			}
    
    
    			if tt.wantErr {
    				assertValidationErrors(t, err, tt.validationErrors)
    			}
    
    		})
    	}
    }
    
    func TestRole_GetRole(t *testing.T) {
    	type args struct {
    		ctx     context.Context
    		request *apb.GetRoleRequest
    	}
    	tests := []struct {
    
    		name             string
    		args             args
    		want             *apb.GetRoleResponse
    		wantErr          bool
    		validationErrors []*validate.Violation
    
    	}{
    		{
    			name: "default get role",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.GetRoleRequest{
    					RoleName: "adminTestRole",
    
    				},
    			},
    			want: &apb.GetRoleResponse{
    				Role: &apb.Role{
    					Name:        "adminTestRole",
    					Description: "Admin",
    				},
    			},
    			wantErr: false,
    		},
    		{
    			name: "error get role",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.GetRoleRequest{
    					RoleName: "not role",
    
    				},
    			},
    			want:    nil,
    			wantErr: true,
    		},
    
    		{
    			name: "error get role with missing name",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.GetRoleRequest{
    					RoleName: "",
    					Id:       uuid.Nil.String(),
    				},
    			},
    			want:    nil,
    			wantErr: true,
    			validationErrors: []*validate.Violation{
    				{
    
    					FieldPath:    stringToPointer("role_name"),
    					ConstraintId: stringToPointer("required"),
    					Message:      stringToPointer("value is required"),
    
    	}
    	for _, tt := range tests {
    		t.Run(tt.name, func(t *testing.T) {
    
    			got, err := s.GetRole(tt.args.ctx, tt.args.request)
    			if (err != nil) != tt.wantErr {
    				t.Errorf("Role.GetRole() error = %v, wantErr %v", err, tt.wantErr)
    				return
    			}
    
    
    				if got.Role.Name != tt.want.Role.Name || got.Role.Description != tt.want.Role.Description {
    					t.Errorf("Role.GetRole() = %v, want %v", got, tt.want)
    				}
    			} else {
    
    				if tt.wantErr {
    					assertValidationErrors(t, err, tt.validationErrors)
    
    				}
    			}
    		})
    	}
    }
    
    func TestRole_GetRoles(t *testing.T) {
    	type args struct {
    		ctx     context.Context
    		request *apb.GetRolesRequest
    	}
    	tests := []struct {
    		name    string
    		args    args
    		want    *apb.GetRolesResponse
    		wantLen int
    		wantErr bool
    	}{
    		{
    			name: "default get roles",
    			args: args{
    				ctx:     context.TODO(),
    				request: &apb.GetRolesRequest{},
    			},
    			want: &apb.GetRolesResponse{
    				Roles: []*apb.Role{
    					{
    						Name:        "adminTestRole",
    						Description: "Admin",
    						Permissions: []string{
    							"/gosdn.core.CoreService/GetPnd",
    							"/gosdn.core.CoreService/GetPndList",
    							"/gosdn.rbac.UserService/GetUsers",
    
    							"/gosdn.plugin_internal.PluginInternalService/GetPluginSchema",
    
    						}},
    					{
    						Name:        "userTestRole",
    						Description: "User",
    						Permissions: []string{
    							"/gosdn.pnd.PndService/GetChangeList",
    						}},
    					{
    						Name:        randomRoleName,
    						Description: "Not a role",
    						Permissions: []string{
    							"nope",
    						},
    					},
    				},
    			},
    			wantLen: 3,
    			wantErr: false,
    		},
    	}
    	for _, tt := range tests {
    		t.Run(tt.name, func(t *testing.T) {
    
    			got, err := s.GetRoles(tt.args.ctx, tt.args.request)
    			if (err != nil) != tt.wantErr {
    				t.Errorf("Role.GetRoles() error = %v, wantErr %v", err, tt.wantErr)
    				return
    			}
    
    
    				if len(got.Roles) != tt.wantLen {
    
    					t.Errorf("Role.GetRoles() = %v, want %v", got, tt.want)
    				}
    				for _, gotR := range got.Roles {
    					containsExpected := false
    					for _, wantR := range tt.want.Roles {
    						gotPerm := gotR.Permissions
    						wantPerm := wantR.Permissions
    						if gotR.Description == wantR.Description && gotR.Name == wantR.Name &&
    							reflect.DeepEqual(gotPerm, wantPerm) {
    							containsExpected = true
    							break
    						}
    					}
    					if !containsExpected {
    						t.Errorf("Role.GetRoles() = %v, want %v", got, tt.want)
    					}
    				}
    			}
    		})
    	}
    }
    
    func TestRole_UpdateRoles(t *testing.T) {
    	type args struct {
    		ctx     context.Context
    		request *apb.UpdateRolesRequest
    	}
    	tests := []struct {
    
    		name             string
    		args             args
    		want             *apb.UpdateRolesResponse
    		wantErr          bool
    		validationErrors []*validate.Violation
    
    	}{
    		{
    			name: "default update roles",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.UpdateRolesRequest{
    					Roles: []*apb.Role{
    						{
    
    							Id:          adminRoleID,
    							Name:        "New Name",
    							Description: "Test role",
    
    			want:    &apb.UpdateRolesResponse{},
    
    			wantErr: false,
    		},
    		{
    			name: "error update roles",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.UpdateRolesRequest{
    					Roles: []*apb.Role{
    						{
    
    							Id:          uuid.NewString(),
    							Name:        "New Name",
    							Description: "Test role",
    
    						},
    					},
    				},
    			},
    			want:    nil,
    			wantErr: true,
    		},
    
    		{
    			name: "error update roles with too short name",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.UpdateRolesRequest{
    					Roles: []*apb.Role{
    						{
    							Id:          uuid.NewString(),
    							Name:        "a",
    							Description: "Test role",
    						},
    					},
    				},
    			},
    			want:    nil,
    			wantErr: true,
    			validationErrors: []*validate.Violation{
    				{
    
    					FieldPath:    stringToPointer("roles[0].name"),
    					ConstraintId: stringToPointer("string.min_len"),
    					Message:      stringToPointer("value length must be at least 3 characters"),
    
    				},
    			},
    		},
    		{
    			name: "error update roles with too short description",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.UpdateRolesRequest{
    					Roles: []*apb.Role{
    						{
    							Id:          uuid.NewString(),
    							Name:        "My role",
    							Description: "r",
    						},
    					},
    				},
    			},
    			want:    nil,
    			wantErr: true,
    			validationErrors: []*validate.Violation{
    				{
    
    					FieldPath:    stringToPointer("roles[0].description"),
    					ConstraintId: stringToPointer("string.min_len"),
    					Message:      stringToPointer("value length must be at least 3 characters"),
    
    	}
    	for _, tt := range tests {
    		t.Run(tt.name, func(t *testing.T) {
    
    			_, err := s.UpdateRoles(tt.args.ctx, tt.args.request)
    
    			if (err != nil) != tt.wantErr {
    				t.Errorf("Role.UpdateRoles() error = %v, wantErr %v", err, tt.wantErr)
    				return
    			}
    
    
    			if tt.wantErr {
    				assertValidationErrors(t, err, tt.validationErrors)
    			}
    
    		})
    	}
    }
    
    func TestRole_DeletePermissionsForRole(t *testing.T) {
    	type args struct {
    		ctx     context.Context
    		request *apb.DeletePermissionsForRoleRequest
    	}
    	tests := []struct {
    
    		name             string
    		args             args
    		want             *apb.DeletePermissionsForRoleResponse
    		wantErr          bool
    		validationErrors []*validate.Violation
    
    	}{
    		{
    			name: "default delete permissions for role",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.DeletePermissionsForRoleRequest{
    					RoleName: "adminTestRole",
    					PermissionsToDelete: []string{
    						"/gosdn.core.CoreService/GetPnd",
    						"/gosdn.core.CoreService/GetPndList",
    					},
    				},
    			},
    
    			want:    &apb.DeletePermissionsForRoleResponse{},
    
    			wantErr: false,
    		},
    		{
    			name: "error delete permissions for role no proper permissions provided",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.DeletePermissionsForRoleRequest{
    					RoleName: "adminTestRole",
    					PermissionsToDelete: []string{
    						"no",
    					},
    				},
    			},
    			want:    nil,
    			wantErr: true,
    		},
    
    		{
    			name: "error delete permissions for role with no proper name and permissions provided",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.DeletePermissionsForRoleRequest{
    					RoleName:            "",
    					PermissionsToDelete: []string{},
    				},
    			},
    			want:    nil,
    			wantErr: true,
    			validationErrors: []*validate.Violation{
    				{
    
    					FieldPath:    stringToPointer("role_name"),
    					ConstraintId: stringToPointer("required"),
    					Message:      stringToPointer("value is required"),
    
    					FieldPath:    stringToPointer("permissions_to_delete"),
    					ConstraintId: stringToPointer("required"),
    					Message:      stringToPointer("value is required"),
    
    	}
    	for _, tt := range tests {
    		t.Run(tt.name, func(t *testing.T) {
    
    			_, err := s.DeletePermissionsForRole(tt.args.ctx, tt.args.request)
    
    			if (err != nil) != tt.wantErr {
    				t.Errorf("Role.DeletePermissionsForRole() error = %v, wantErr %v", err, tt.wantErr)
    				return
    			}
    
    
    			if tt.wantErr {
    				assertValidationErrors(t, err, tt.validationErrors)
    			}
    
    		})
    	}
    }
    
    func TestRole_DeleteRoles(t *testing.T) {
    	type args struct {
    		ctx     context.Context
    		request *apb.DeleteRolesRequest
    	}
    	tests := []struct {
    
    		name             string
    		args             args
    		want             *apb.DeleteRolesResponse
    		wantErr          bool
    		validationErrors []*validate.Violation
    
    	}{
    		{
    			name: "default delete roles",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.DeleteRolesRequest{
    					RoleName: []string{
    						"userTestRole",
    						"adminTestRole",
    					},
    				},
    			},
    
    			want:    &apb.DeleteRolesResponse{},
    
    			wantErr: false,
    		},
    		{
    			name: "error delete roles",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.DeleteRolesRequest{
    					RoleName: []string{
    						"no",
    					},
    				},
    			},
    
    			want:    &apb.DeleteRolesResponse{},
    
    			wantErr: true,
    		},
    
    		{
    			name: "error delete roles with missing role name",
    			args: args{
    				ctx: context.TODO(),
    				request: &apb.DeleteRolesRequest{
    					RoleName: []string{
    						"",
    					},
    				},
    			},
    			want:    &apb.DeleteRolesResponse{},
    			wantErr: true,
    			validationErrors: []*validate.Violation{
    				{
    
    					FieldPath:    stringToPointer("role_name"),
    					ConstraintId: stringToPointer("required"),
    					Message:      stringToPointer("value is required"),
    
    	}
    	for _, tt := range tests {
    		t.Run(tt.name, func(t *testing.T) {
    
    			_, err := s.DeleteRoles(tt.args.ctx, tt.args.request)
    
    			if (err != nil) != tt.wantErr {
    				t.Errorf("Role.DeleteRoles() error = %v, wantErr %v", err, tt.wantErr)
    				return
    			}
    
    
    			if tt.wantErr {
    				assertValidationErrors(t, err, tt.validationErrors)
    			}