mirror of
https://github.com/goharbor/harbor
synced 2025-04-08 03:50:36 +00:00
135 lines
3.5 KiB
Go
135 lines
3.5 KiB
Go
// Copyright (c) 2017 VMware, Inc. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package secret
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/vmware/harbor/src/common/secret"
|
|
)
|
|
|
|
func TestIsAuthenticated(t *testing.T) {
|
|
// secret store is null
|
|
context := NewSecurityContext("", nil)
|
|
isAuthenticated := context.IsAuthenticated()
|
|
assert.False(t, isAuthenticated)
|
|
|
|
//invalid secret
|
|
context = NewSecurityContext("invalid_secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
isAuthenticated = context.IsAuthenticated()
|
|
assert.False(t, isAuthenticated)
|
|
|
|
//valid secret
|
|
context = NewSecurityContext("secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
isAuthenticated = context.IsAuthenticated()
|
|
assert.True(t, isAuthenticated)
|
|
}
|
|
|
|
func TestGetUsername(t *testing.T) {
|
|
// secret store is null
|
|
context := NewSecurityContext("", nil)
|
|
username := context.GetUsername()
|
|
assert.Equal(t, "", username)
|
|
|
|
//invalid secret
|
|
context = NewSecurityContext("invalid_secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
username = context.GetUsername()
|
|
assert.Equal(t, "", username)
|
|
|
|
//valid secret
|
|
context = NewSecurityContext("secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
username = context.GetUsername()
|
|
assert.Equal(t, "username", username)
|
|
}
|
|
|
|
func TestIsSysAdmin(t *testing.T) {
|
|
context := NewSecurityContext("secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
isSysAdmin := context.IsSysAdmin()
|
|
assert.False(t, isSysAdmin)
|
|
}
|
|
|
|
func TestHasReadPerm(t *testing.T) {
|
|
// secret store is null
|
|
context := NewSecurityContext("", nil)
|
|
hasReadPerm := context.HasReadPerm("project_name")
|
|
assert.False(t, hasReadPerm)
|
|
|
|
//invalid secret
|
|
context = NewSecurityContext("invalid_secret",
|
|
secret.NewStore(map[string]string{
|
|
"jobservice_secret": secret.JobserviceUser,
|
|
}))
|
|
hasReadPerm = context.HasReadPerm("project_name")
|
|
assert.False(t, hasReadPerm)
|
|
|
|
//valid secret, project name
|
|
context = NewSecurityContext("jobservice_secret",
|
|
secret.NewStore(map[string]string{
|
|
"jobservice_secret": secret.JobserviceUser,
|
|
}))
|
|
hasReadPerm = context.HasReadPerm("project_name")
|
|
assert.True(t, hasReadPerm)
|
|
|
|
//valid secret, project ID
|
|
hasReadPerm = context.HasReadPerm(1)
|
|
assert.True(t, hasReadPerm)
|
|
}
|
|
|
|
func TestHasWritePerm(t *testing.T) {
|
|
context := NewSecurityContext("secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
|
|
// project name
|
|
hasWritePerm := context.HasWritePerm("project_name")
|
|
assert.False(t, hasWritePerm)
|
|
|
|
// project ID
|
|
hasWritePerm = context.HasWritePerm(1)
|
|
assert.False(t, hasWritePerm)
|
|
}
|
|
|
|
func TestHasAllPerm(t *testing.T) {
|
|
context := NewSecurityContext("secret",
|
|
secret.NewStore(map[string]string{
|
|
"secret": "username",
|
|
}))
|
|
|
|
// project name
|
|
hasAllPerm := context.HasAllPerm("project_name")
|
|
assert.False(t, hasAllPerm)
|
|
|
|
// project ID
|
|
hasAllPerm = context.HasAllPerm(1)
|
|
assert.False(t, hasAllPerm)
|
|
}
|