rbac_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package rbacutils
  15. import (
  16. "testing"
  17. "yunion.io/x/jsonutils"
  18. "yunion.io/x/pkg/util/netutils"
  19. )
  20. func TestSRabcRule_Match(t *testing.T) {
  21. all := SRbacRule{Service: "*", Resource: "*", Action: "*"}
  22. compute := SRbacRule{Service: "compute", Resource: "*", Action: "*"}
  23. getOnly := SRbacRule{Service: "*", Resource: "*", Action: "get"}
  24. listOnly := SRbacRule{Service: "*", Resource: "*", Action: "list"}
  25. serverList := SRbacRule{Service: "compute", Resource: "server", Action: "list"}
  26. serverPerform := SRbacRule{Service: "compute", Resource: "server", Action: "perform", Extra: []string{"*"}}
  27. rule_server_list := []string{"compute", "server", "list"}
  28. rule_server_perform_start := []string{"compute", "server", "perform", "start"}
  29. rule_server_create := []string{"compute", "server", "create"}
  30. cases := []struct {
  31. inRule SRbacRule
  32. inMatch []string
  33. want bool
  34. count int
  35. }{
  36. {all, rule_server_list, true, 0},
  37. {all, rule_server_perform_start, true, 0},
  38. {all, rule_server_create, true, 0},
  39. {compute, rule_server_list, true, 1},
  40. {compute, rule_server_perform_start, true, 1},
  41. {compute, rule_server_create, true, 1},
  42. {getOnly, rule_server_list, false, 0},
  43. {getOnly, rule_server_perform_start, false, 0},
  44. {getOnly, rule_server_create, false, 0},
  45. {listOnly, rule_server_list, true, 1},
  46. {listOnly, rule_server_perform_start, false, 0},
  47. {listOnly, rule_server_create, false, 0},
  48. {serverList, rule_server_list, true, 3},
  49. {serverList, rule_server_perform_start, false, 0},
  50. {serverList, rule_server_create, false, 0},
  51. {serverPerform, rule_server_list, false, 0},
  52. {serverPerform, rule_server_perform_start, true, 3},
  53. {serverPerform, rule_server_create, false, 0},
  54. }
  55. for _, c := range cases {
  56. got, cnt, _ := c.inRule.match(c.inMatch[0], c.inMatch[1], c.inMatch[2], c.inMatch[3:]...)
  57. if got != c.want {
  58. t.Errorf("%#v %#v want %#v got %#v", c.inRule, c.inMatch, c.want, got)
  59. }
  60. if cnt != c.count {
  61. t.Errorf("%#v %#v want %#v got %#v", c.inRule, c.inMatch, c.count, cnt)
  62. }
  63. }
  64. }
  65. func TestContains(t *testing.T) {
  66. cases := []struct {
  67. left SRbacRule
  68. right SRbacRule
  69. contains bool
  70. }{
  71. {
  72. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  73. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  74. true,
  75. },
  76. {
  77. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  78. SRbacRule{Service: "compute", Resource: "*", Action: "*", Result: Allow},
  79. true,
  80. },
  81. {
  82. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  83. SRbacRule{Service: "compute", Resource: "server", Action: "*", Result: Allow},
  84. true,
  85. },
  86. {
  87. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  88. SRbacRule{Service: "compute", Resource: "server", Action: "list", Result: Allow},
  89. true,
  90. },
  91. {
  92. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  93. SRbacRule{Service: "compute", Resource: "server", Action: "get", Extra: []string{"vnc"}, Result: Allow},
  94. true,
  95. },
  96. {
  97. SRbacRule{Service: "compute", Resource: "*", Action: "*", Result: Allow},
  98. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  99. false,
  100. },
  101. {
  102. SRbacRule{Service: "compute", Resource: "server", Action: "*", Result: Allow},
  103. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  104. false,
  105. },
  106. {
  107. SRbacRule{Service: "compute", Resource: "server", Action: "list", Result: Allow},
  108. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  109. false,
  110. },
  111. {
  112. SRbacRule{Service: "compute", Resource: "server", Action: "get", Extra: []string{"vnc"}, Result: Allow},
  113. SRbacRule{Service: "*", Resource: "*", Action: "*", Result: Allow},
  114. false,
  115. },
  116. }
  117. for _, c := range cases {
  118. got := c.left.contains(&c.right)
  119. if got != c.contains {
  120. t.Errorf("%s contains %s want %#v got %#v", c.left, c.right, c.contains, got)
  121. }
  122. }
  123. }
  124. func TestSRabcPolicy_Encode(t *testing.T) {
  125. cases := []string{
  126. `{
  127. "condition": "tenant == \"system\" && roles.contains(\"projectowner\")",
  128. "is_admin": false,
  129. "policy": {
  130. "compute": {
  131. "keypair": "allow",
  132. "server": "deny",
  133. "*": {
  134. "*": "allow",
  135. "create": "deny"
  136. }
  137. },
  138. "meter": {
  139. "*": "allow"
  140. }
  141. }
  142. }`,
  143. `{
  144. "auth": false,
  145. "ips": ["10.0.0.0/8", "192.168.222.171"],
  146. "projects": ["system"],
  147. "roles": ["projectowner","admin"],
  148. "scope": "domain",
  149. "policy": {
  150. "compute": {
  151. "keypair": "allow",
  152. "server": "deny",
  153. "*": {
  154. "*": "allow",
  155. "create": "deny"
  156. }
  157. },
  158. "meter": {
  159. "*": "allow"
  160. }
  161. }
  162. }`,
  163. `{
  164. "auth": false,
  165. "scope": "domain",
  166. "policy": {
  167. "compute": {
  168. "keypair": "allow",
  169. "server": "deny",
  170. "*": {
  171. "*": "allow",
  172. "create": "deny"
  173. }
  174. },
  175. "meter": {
  176. "*": "allow"
  177. }
  178. }
  179. }`,
  180. }
  181. for _, policyStr := range cases {
  182. policyJson, err := jsonutils.ParseString(policyStr)
  183. if err != nil {
  184. t.Errorf("fail to parse json string %s", err)
  185. return
  186. }
  187. policy := SRbacPolicy{}
  188. err = policy.Decode(policyJson)
  189. if err != nil {
  190. t.Errorf("decode error %s", err)
  191. return
  192. }
  193. policyJson1 := policy.Encode()
  194. policy2 := SRbacPolicy{}
  195. err = policy2.Decode(policyJson1)
  196. if err != nil {
  197. t.Errorf("decode error 2 %s", err)
  198. return
  199. }
  200. policyJson2 := policy2.Encode()
  201. policyStr1 := policyJson1.PrettyString()
  202. policyStr2 := policyJson2.PrettyString()
  203. if policyStr1 != policyStr2 {
  204. t.Errorf("%s != %s", policyStr1, policyStr2)
  205. return
  206. }
  207. t.Logf("%s", policyStr1)
  208. }
  209. }
  210. /*
  211. func TestSRabcPolicy_Explain(t *testing.T) {
  212. policyStr := `{
  213. "condition": "usercred.project != \"system\" && usercred.roles==\"projectowner\"",
  214. "is_admin": false,
  215. "policy": {
  216. "compute": {
  217. "keypair": "allow",
  218. "server": "deny",
  219. "*": {
  220. "*": "allow",
  221. "create": "deny"
  222. }
  223. },
  224. "meter": {
  225. "*": "allow"
  226. },
  227. "k8s": "allow"
  228. }
  229. }`
  230. policyJson, err := jsonutils.ParseString(policyStr)
  231. if err != nil {
  232. t.Errorf("fail to parse json string %s", err)
  233. return
  234. }
  235. policy := SRbacPolicy{}
  236. err = policy.Decode(policyJson)
  237. if err != nil {
  238. t.Errorf("decode error %s", err)
  239. return
  240. }
  241. request := [][]string{
  242. {"compute", "keypair", "list"},
  243. {"compute", "server", "list"},
  244. {"compute", "server", "get", "vnc"},
  245. {"compute", "keypair", "create"},
  246. {"meter", "price", "list"},
  247. {"image", "image", "list"},
  248. {"k8s", "pod", "list"},
  249. }
  250. output := policy.Explain(request)
  251. t.Logf("%#v", output)
  252. }
  253. */
  254. func TestConditionParser(t *testing.T) {
  255. condition := `tenant=="system" && roles.contains("admin")`
  256. tenants := searchMatchTenants(condition)
  257. t.Logf("%s", tenants)
  258. roles := searchMatchRoles(condition)
  259. t.Logf("%s", roles)
  260. }
  261. func TestSRbacPolicyMatch(t *testing.T) {
  262. prefix, _ := netutils.NewIPV4Prefix("10.168.22.0/24")
  263. cases := []struct {
  264. policy SRbacPolicy
  265. userCred IRbacIdentity2
  266. want bool
  267. }{
  268. {
  269. SRbacPolicy{},
  270. newRbacIdentity2("", "", nil, ""),
  271. true,
  272. },
  273. {
  274. SRbacPolicy{},
  275. nil,
  276. true,
  277. },
  278. {
  279. SRbacPolicy{
  280. Projects: []string{"system"},
  281. },
  282. newRbacIdentity2("", "system", nil, ""),
  283. true,
  284. },
  285. {
  286. SRbacPolicy{
  287. Projects: []string{"system"},
  288. },
  289. newRbacIdentity2("", "demo", nil, ""),
  290. false,
  291. },
  292. {
  293. SRbacPolicy{
  294. Projects: []string{"system"},
  295. Roles: []string{"admin"},
  296. },
  297. newRbacIdentity2("", "system", []string{"admin"}, ""),
  298. true,
  299. },
  300. {
  301. SRbacPolicy{
  302. Projects: []string{"system"},
  303. Roles: []string{"admin"},
  304. },
  305. newRbacIdentity2("", "system", []string{"admin", "_member_"}, ""),
  306. true,
  307. },
  308. {
  309. SRbacPolicy{
  310. Projects: []string{"system"},
  311. Roles: []string{"admin"},
  312. },
  313. newRbacIdentity2("", "system", []string{"_member_"}, ""),
  314. false,
  315. },
  316. {
  317. SRbacPolicy{
  318. Projects: []string{"system"},
  319. Roles: []string{"admin"},
  320. },
  321. nil,
  322. false,
  323. },
  324. {
  325. SRbacPolicy{
  326. Auth: false,
  327. },
  328. nil,
  329. true,
  330. },
  331. {
  332. SRbacPolicy{
  333. Projects: []string{"system"},
  334. Roles: []string{"admin"},
  335. Ips: []netutils.IPV4Prefix{prefix},
  336. },
  337. newRbacIdentity2("", "system", []string{"admin"}, "10.0.0.23"),
  338. false,
  339. },
  340. {
  341. SRbacPolicy{
  342. Projects: []string{"system"},
  343. Roles: []string{"admin"},
  344. Ips: []netutils.IPV4Prefix{prefix},
  345. },
  346. newRbacIdentity2("", "system", []string{"admin"}, "10.168.22.23"),
  347. true,
  348. },
  349. {
  350. SRbacPolicy{
  351. Projects: []string{"system"},
  352. Roles: []string{"admin"},
  353. Ips: []netutils.IPV4Prefix{prefix},
  354. },
  355. newRbacIdentity2("", "system", []string{"_member_"}, "10.168.22.23"),
  356. false,
  357. },
  358. {
  359. SRbacPolicy{
  360. Roles: []string{"admin"},
  361. Ips: []netutils.IPV4Prefix{prefix},
  362. },
  363. newRbacIdentity2("", "system", []string{"_member_", "admin"}, "10.168.22.23"),
  364. true,
  365. },
  366. {
  367. SRbacPolicy{
  368. Projects: []string{"system"},
  369. Roles: []string{"admin", "_member_"},
  370. Ips: []netutils.IPV4Prefix{prefix},
  371. },
  372. newRbacIdentity2("", "system", []string{"_member_", "projectowner"}, "10.168.22.23"),
  373. true,
  374. },
  375. {
  376. SRbacPolicy{
  377. Projects: []string{},
  378. Roles: []string{"domain_admin"},
  379. Auth: true,
  380. },
  381. newRbacIdentity2("", "ldapproj", []string{"domain_admin"}, ""),
  382. true,
  383. },
  384. {
  385. SRbacPolicy{
  386. Projects: []string{},
  387. Roles: []string{"admin"},
  388. Auth: true,
  389. },
  390. newRbacIdentity2("", "", []string{"admin"}, ""),
  391. true,
  392. },
  393. }
  394. for i, c := range cases {
  395. got, _ := c.policy.Match(c.userCred)
  396. if got != c.want {
  397. t.Errorf("[%d]: %#v %#v got %v want %v", i, c.policy, c.userCred, got, c.want)
  398. }
  399. }
  400. }
  401. func TestGetMatchRules(t *testing.T) {
  402. cases := []struct {
  403. rules []SRbacRule
  404. service string
  405. resource string
  406. action string
  407. want bool
  408. }{
  409. {
  410. []SRbacRule{
  411. {
  412. Service: "yunionconf",
  413. Resource: "parameters",
  414. Action: "list",
  415. Result: Allow,
  416. },
  417. },
  418. "yunionconf",
  419. "parameters",
  420. "list",
  421. true,
  422. },
  423. }
  424. for _, c := range cases {
  425. rule := GetMatchRule(c.rules, c.service, c.resource, c.action)
  426. got := rule != nil
  427. if got != c.want {
  428. t.Errorf("want %v got %v", c.want, got)
  429. }
  430. }
  431. }