206 lines
4.4 KiB
Go
206 lines
4.4 KiB
Go
package vault
|
|
|
|
import (
|
|
"reflect"
|
|
"strings"
|
|
"testing"
|
|
)
|
|
|
|
var rawPolicy = strings.TrimSpace(`
|
|
# Developer policy
|
|
name = "dev"
|
|
|
|
# Deny all paths by default
|
|
path "*" {
|
|
policy = "deny"
|
|
}
|
|
|
|
# Allow full access to staging
|
|
path "stage/*" {
|
|
policy = "sudo"
|
|
}
|
|
|
|
# Limited read privilege to production
|
|
path "prod/version" {
|
|
policy = "read"
|
|
}
|
|
|
|
# Read access to foobar
|
|
# Also tests stripping of leading slash
|
|
path "/foo/bar" {
|
|
policy = "read"
|
|
}
|
|
|
|
# Add capabilities for creation and sudo to foobar
|
|
# This will be separate; they are combined when compiled into an ACL
|
|
path "foo/bar" {
|
|
capabilities = ["create", "sudo"]
|
|
}
|
|
|
|
# Check that only allowedparameters are being added to foobar
|
|
path "foo/bar" {
|
|
capabilities = ["create", "sudo"]
|
|
permissions = {
|
|
allowedparameters = {
|
|
"zip" = []
|
|
"zap" = []
|
|
}
|
|
}
|
|
}
|
|
|
|
# Check that only deniedparameters are being added to bazbar
|
|
path "baz/bar" {
|
|
capabilities = ["create", "sudo"]
|
|
permissions = {
|
|
deniedparameters = {
|
|
"zip" = []
|
|
"zap" = []
|
|
}
|
|
}
|
|
}
|
|
|
|
# Check that both allowed and denied parameters are being added to bizbar
|
|
path "biz/bar" {
|
|
capabilities = ["create", "sudo"]
|
|
permissions = {
|
|
allowedparameters = {
|
|
"zim" = []
|
|
"zam" = []
|
|
}
|
|
deniedparameters = {
|
|
"zip" = []
|
|
"zap" = []
|
|
}
|
|
}
|
|
}
|
|
`)
|
|
|
|
func TestPolicy_Parse(t *testing.T) {
|
|
p, err := Parse(rawPolicy)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if p.Name != "dev" {
|
|
t.Fatalf("bad name: %q", p.Name)
|
|
}
|
|
|
|
expect := []*PathCapabilities{
|
|
&PathCapabilities{"", "deny",
|
|
[]string{
|
|
"deny",
|
|
}, &Permissions{CapabilitiesBitmap: DenyCapabilityInt}, true},
|
|
&PathCapabilities{"stage/", "sudo",
|
|
[]string{
|
|
"create",
|
|
"read",
|
|
"update",
|
|
"delete",
|
|
"list",
|
|
"sudo",
|
|
}, &Permissions{CapabilitiesBitmap: (CreateCapabilityInt | ReadCapabilityInt | UpdateCapabilityInt |
|
|
DeleteCapabilityInt | ListCapabilityInt | SudoCapabilityInt)}, true},
|
|
&PathCapabilities{"prod/version", "read",
|
|
[]string{
|
|
"read",
|
|
"list",
|
|
}, &Permissions{CapabilitiesBitmap: (ReadCapabilityInt | ListCapabilityInt)}, false},
|
|
&PathCapabilities{"foo/bar", "read",
|
|
[]string{
|
|
"read",
|
|
"list",
|
|
}, &Permissions{CapabilitiesBitmap: (ReadCapabilityInt | ListCapabilityInt)}, false},
|
|
&PathCapabilities{"foo/bar", "",
|
|
[]string{
|
|
"create",
|
|
"sudo",
|
|
}, &Permissions{CapabilitiesBitmap: (CreateCapabilityInt | SudoCapabilityInt)}, false},
|
|
&PathCapabilities{"foo/bar", "",
|
|
[]string{
|
|
"create",
|
|
"sudo",
|
|
}, &Permissions{(CreateCapabilityInt | SudoCapabilityInt),
|
|
map[string][]interface{}{"zip": {}, "zap": {}}, nil}, false},
|
|
&PathCapabilities{"baz/bar", "",
|
|
[]string{
|
|
"create",
|
|
"sudo",
|
|
}, &Permissions{(CreateCapabilityInt | SudoCapabilityInt),
|
|
nil, map[string][]interface{}{"zip": {}, "zap": {}}}, false},
|
|
&PathCapabilities{"biz/bar", "",
|
|
[]string{
|
|
"create",
|
|
"sudo",
|
|
}, &Permissions{(CreateCapabilityInt | SudoCapabilityInt),
|
|
map[string][]interface{}{"zim": {}, "zam": {}}, map[string][]interface{}{"zip": {}, "zap": {}}}, false},
|
|
}
|
|
if !reflect.DeepEqual(p.Paths, expect) {
|
|
t.Errorf("expected \n\n%#v\n\n to be \n\n%#v\n\n", p.Paths, expect)
|
|
}
|
|
}
|
|
|
|
func TestPolicy_ParseBadRoot(t *testing.T) {
|
|
_, err := Parse(strings.TrimSpace(`
|
|
name = "test"
|
|
bad = "foo"
|
|
nope = "yes"
|
|
`))
|
|
if err == nil {
|
|
t.Fatalf("expected error")
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), "invalid key 'bad' on line 2") {
|
|
t.Errorf("bad error: %q", err)
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), "invalid key 'nope' on line 3") {
|
|
t.Errorf("bad error: %q", err)
|
|
}
|
|
}
|
|
|
|
func TestPolicy_ParseBadPath(t *testing.T) {
|
|
_, err := Parse(strings.TrimSpace(`
|
|
path "/" {
|
|
capabilities = ["read"]
|
|
capabilites = ["read"]
|
|
}
|
|
`))
|
|
if err == nil {
|
|
t.Fatalf("expected error")
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), "invalid key 'capabilites' on line 3") {
|
|
t.Errorf("bad error: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestPolicy_ParseBadPolicy(t *testing.T) {
|
|
_, err := Parse(strings.TrimSpace(`
|
|
path "/" {
|
|
policy = "banana"
|
|
}
|
|
`))
|
|
if err == nil {
|
|
t.Fatalf("expected error")
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), `path "/": invalid policy 'banana'`) {
|
|
t.Errorf("bad error: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestPolicy_ParseBadCapabilities(t *testing.T) {
|
|
_, err := Parse(strings.TrimSpace(`
|
|
path "/" {
|
|
capabilities = ["read", "banana"]
|
|
}
|
|
`))
|
|
if err == nil {
|
|
t.Fatalf("expected error")
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), `path "/": invalid capability 'banana'`) {
|
|
t.Errorf("bad error: %s", err)
|
|
}
|
|
}
|