gitee.com/ks-custle/core-gm@v0.0.0-20230922171213-b83bdd97b62c/grpc/authz/sdk_server_interceptors_test.go (about)

     1  /*
     2   *
     3   * Copyright 2021 gRPC authors.
     4   *
     5   * Licensed under the Apache License, Version 2.0 (the "License");
     6   * you may not use this file except in compliance with the License.
     7   * You may obtain a copy of the License at
     8   *
     9   *     http://www.apache.org/licenses/LICENSE-2.0
    10   *
    11   * Unless required by applicable law or agreed to in writing, software
    12   * distributed under the License is distributed on an "AS IS" BASIS,
    13   * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    14   * See the License for the specific language governing permissions and
    15   * limitations under the License.
    16   *
    17   */
    18  
    19  package authz_test
    20  
    21  import (
    22  	"fmt"
    23  	"io/ioutil"
    24  	"os"
    25  	"path"
    26  	"testing"
    27  	"time"
    28  
    29  	"gitee.com/ks-custle/core-gm/grpc/authz"
    30  )
    31  
    32  func createTmpPolicyFile(t *testing.T, dirSuffix string, policy []byte) string {
    33  	t.Helper()
    34  
    35  	// Create a temp directory. Passing an empty string for the first argument
    36  	// uses the system temp directory.
    37  	dir, err := ioutil.TempDir("", dirSuffix)
    38  	if err != nil {
    39  		t.Fatalf("ioutil.TempDir() failed: %v", err)
    40  	}
    41  	t.Logf("Using tmpdir: %s", dir)
    42  	// Write policy into file.
    43  	filename := path.Join(dir, "policy.json")
    44  	if err := ioutil.WriteFile(filename, policy, os.ModePerm); err != nil {
    45  		t.Fatalf("ioutil.WriteFile(%q) failed: %v", filename, err)
    46  	}
    47  	t.Logf("Wrote policy %s to file at %s", string(policy), filename)
    48  	return filename
    49  }
    50  
    51  func (s) TestNewStatic(t *testing.T) {
    52  	tests := map[string]struct {
    53  		authzPolicy string
    54  		wantErr     error
    55  	}{
    56  		"InvalidPolicyFailsToCreateInterceptor": {
    57  			authzPolicy: `{}`,
    58  			wantErr:     fmt.Errorf(`"name" is not present`),
    59  		},
    60  		"ValidPolicyCreatesInterceptor": {
    61  			authzPolicy: `{		
    62  				"name": "authz",
    63  				"allow_rules": 
    64  				[
    65  					{
    66  						"name": "allow_all"
    67  					}
    68  				]
    69  			}`,
    70  		},
    71  	}
    72  	for name, test := range tests {
    73  		t.Run(name, func(t *testing.T) {
    74  			if _, err := authz.NewStatic(test.authzPolicy); fmt.Sprint(err) != fmt.Sprint(test.wantErr) {
    75  				t.Fatalf("NewStatic(%v) returned err: %v, want err: %v", test.authzPolicy, err, test.wantErr)
    76  			}
    77  		})
    78  	}
    79  }
    80  
    81  func (s) TestNewFileWatcher(t *testing.T) {
    82  	tests := map[string]struct {
    83  		authzPolicy     string
    84  		refreshDuration time.Duration
    85  		wantErr         error
    86  	}{
    87  		"InvalidRefreshDurationFailsToCreateInterceptor": {
    88  			refreshDuration: time.Duration(0),
    89  			wantErr:         fmt.Errorf("requires refresh interval(0s) greater than 0s"),
    90  		},
    91  		"InvalidPolicyFailsToCreateInterceptor": {
    92  			authzPolicy:     `{}`,
    93  			refreshDuration: time.Duration(1),
    94  			wantErr:         fmt.Errorf(`"name" is not present`),
    95  		},
    96  		"ValidPolicyCreatesInterceptor": {
    97  			authzPolicy: `{
    98  				"name": "authz",
    99  				"allow_rules":
   100  				[
   101  					{
   102  						"name": "allow_all"
   103  					}
   104  				]
   105  			}`,
   106  			refreshDuration: time.Duration(1),
   107  		},
   108  	}
   109  	for name, test := range tests {
   110  		t.Run(name, func(t *testing.T) {
   111  			file := createTmpPolicyFile(t, name, []byte(test.authzPolicy))
   112  			i, err := authz.NewFileWatcher(file, test.refreshDuration)
   113  			if fmt.Sprint(err) != fmt.Sprint(test.wantErr) {
   114  				t.Fatalf("NewFileWatcher(%v) returned err: %v, want err: %v", test.authzPolicy, err, test.wantErr)
   115  			}
   116  			if i != nil {
   117  				i.Close()
   118  			}
   119  		})
   120  	}
   121  }