// Copyright (c) HashiCorp, Inc. // SPDX-License-Identifier: MPL-2.0 package structs import ( "testing" "github.com/stretchr/testify/require" "github.com/hashicorp/consul/acl" ) func TestStructs_ACLCaches(t *testing.T) { t.Run("New", func(t *testing.T) { t.Run("Valid Sizes", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{2, 2, 2, 2, 2} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) require.NotNil(t, cache.identities) require.NotNil(t, cache.policies) require.NotNil(t, cache.parsedPolicies) require.NotNil(t, cache.authorizers) }) t.Run("Zero Sizes", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{0, 0, 0, 0, 0} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) require.Nil(t, cache.identities) require.Nil(t, cache.policies) require.Nil(t, cache.parsedPolicies) require.Nil(t, cache.authorizers) }) }) t.Run("Identities", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{Identities: 4} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) cache.PutIdentity("foo", &ACLToken{}) entry := cache.GetIdentity("foo") require.NotNil(t, entry) require.NotNil(t, entry.Identity) cache.PutIdentityWithSecretToken("secret", &ACLToken{}) entry = cache.GetIdentityWithSecretToken("secret") require.NotNil(t, entry) require.NotNil(t, entry.Identity) cache.RemoveIdentityWithSecretToken("secret") entry = cache.GetIdentityWithSecretToken("secret") require.Nil(t, entry) }) t.Run("Policies", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{Policies: 4} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) cache.PutPolicy("foo", &ACLPolicy{}) entry := cache.GetPolicy("foo") require.NotNil(t, entry) require.NotNil(t, entry.Policy) }) t.Run("ParsedPolicies", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{ParsedPolicies: 4} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) cache.PutParsedPolicy("foo", &acl.Policy{}) entry := cache.GetParsedPolicy("foo") require.NotNil(t, entry) require.NotNil(t, entry.Policy) }) t.Run("Authorizers", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{Authorizers: 4} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) cache.PutAuthorizer("foo", acl.DenyAll()) entry := cache.GetAuthorizer("foo") require.NotNil(t, entry) require.NotNil(t, entry.Authorizer) require.True(t, entry.Authorizer == acl.DenyAll()) }) t.Run("Roles", func(t *testing.T) { // 1 isn't valid due to a bug in golang-lru library config := ACLCachesConfig{Roles: 4} cache, err := NewACLCaches(&config) require.NoError(t, err) require.NotNil(t, cache) cache.PutRole("foo", &ACLRole{}) entry := cache.GetRole("foo") require.NotNil(t, entry) require.NotNil(t, entry.Role) }) }