mirror of
https://github.com/bitechdev/ResolveSpec.git
synced 2026-01-11 05:24:26 +00:00
Fixed providers
This commit is contained in:
660
pkg/security/providers_test.go
Normal file
660
pkg/security/providers_test.go
Normal file
@@ -0,0 +1,660 @@
|
||||
package security
|
||||
|
||||
import (
|
||||
"context"
|
||||
"database/sql"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
|
||||
"github.com/DATA-DOG/go-sqlmock"
|
||||
)
|
||||
|
||||
// Test HeaderAuthenticator
|
||||
func TestHeaderAuthenticator(t *testing.T) {
|
||||
auth := NewHeaderAuthenticator()
|
||||
|
||||
t.Run("successful authentication", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
req.Header.Set("X-User-ID", "123")
|
||||
req.Header.Set("X-User-Name", "testuser")
|
||||
req.Header.Set("X-User-Level", "5")
|
||||
req.Header.Set("X-Session-ID", "session123")
|
||||
req.Header.Set("X-Remote-ID", "remote456")
|
||||
req.Header.Set("X-User-Email", "test@example.com")
|
||||
req.Header.Set("X-User-Roles", "admin,user")
|
||||
|
||||
userCtx, err := auth.Authenticate(req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if userCtx.UserID != 123 {
|
||||
t.Errorf("expected UserID 123, got %d", userCtx.UserID)
|
||||
}
|
||||
if userCtx.UserName != "testuser" {
|
||||
t.Errorf("expected UserName testuser, got %s", userCtx.UserName)
|
||||
}
|
||||
if userCtx.UserLevel != 5 {
|
||||
t.Errorf("expected UserLevel 5, got %d", userCtx.UserLevel)
|
||||
}
|
||||
if userCtx.SessionID != "session123" {
|
||||
t.Errorf("expected SessionID session123, got %s", userCtx.SessionID)
|
||||
}
|
||||
if userCtx.Email != "test@example.com" {
|
||||
t.Errorf("expected Email test@example.com, got %s", userCtx.Email)
|
||||
}
|
||||
if len(userCtx.Roles) != 2 {
|
||||
t.Errorf("expected 2 roles, got %d", len(userCtx.Roles))
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("missing user ID header", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
req.Header.Set("X-User-Name", "testuser")
|
||||
|
||||
_, err := auth.Authenticate(req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error when X-User-ID is missing")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("invalid user ID", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
req.Header.Set("X-User-ID", "invalid")
|
||||
|
||||
_, err := auth.Authenticate(req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error with invalid user ID")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("login not supported", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LoginRequest{Username: "test", Password: "pass"}
|
||||
|
||||
_, err := auth.Login(ctx, req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error for unsupported login")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("logout always succeeds", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LogoutRequest{Token: "token", UserID: 1}
|
||||
|
||||
err := auth.Logout(ctx, req)
|
||||
if err != nil {
|
||||
t.Errorf("expected no error, got %v", err)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test parseRoles helper
|
||||
func TestParseRoles(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
input string
|
||||
expected []string
|
||||
}{
|
||||
{
|
||||
name: "single role",
|
||||
input: "admin",
|
||||
expected: []string{"admin"},
|
||||
},
|
||||
{
|
||||
name: "multiple roles",
|
||||
input: "admin,user,moderator",
|
||||
expected: []string{"admin", "user", "moderator"},
|
||||
},
|
||||
{
|
||||
name: "empty string",
|
||||
input: "",
|
||||
expected: []string{},
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
result := parseRoles(tt.input)
|
||||
if len(result) != len(tt.expected) {
|
||||
t.Errorf("expected %d roles, got %d", len(tt.expected), len(result))
|
||||
return
|
||||
}
|
||||
for i, role := range tt.expected {
|
||||
if result[i] != role {
|
||||
t.Errorf("expected role[%d] = %s, got %s", i, role, result[i])
|
||||
}
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// Test parseIntHeader helper
|
||||
func TestParseIntHeader(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
|
||||
t.Run("valid int header", func(t *testing.T) {
|
||||
req.Header.Set("X-Test-Int", "42")
|
||||
result := parseIntHeader(req, "X-Test-Int", 0)
|
||||
if result != 42 {
|
||||
t.Errorf("expected 42, got %d", result)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("missing header returns default", func(t *testing.T) {
|
||||
result := parseIntHeader(req, "X-Missing", 99)
|
||||
if result != 99 {
|
||||
t.Errorf("expected default 99, got %d", result)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("invalid int returns default", func(t *testing.T) {
|
||||
req.Header.Set("X-Invalid-Int", "not-a-number")
|
||||
result := parseIntHeader(req, "X-Invalid-Int", 10)
|
||||
if result != 10 {
|
||||
t.Errorf("expected default 10, got %d", result)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test DatabaseAuthenticator
|
||||
func TestDatabaseAuthenticator(t *testing.T) {
|
||||
db, mock, err := sqlmock.New()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create mock db: %v", err)
|
||||
}
|
||||
defer db.Close()
|
||||
|
||||
auth := NewDatabaseAuthenticator(db)
|
||||
|
||||
t.Run("successful login", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LoginRequest{
|
||||
Username: "testuser",
|
||||
Password: "password123",
|
||||
}
|
||||
|
||||
// Mock the stored procedure call
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_data"}).
|
||||
AddRow(true, nil, `{"token":"abc123","user":{"user_id":1,"user_name":"testuser"},"expires_in":86400}`)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_data::text FROM resolvespec_login`).
|
||||
WithArgs(sqlmock.AnyArg()).
|
||||
WillReturnRows(rows)
|
||||
|
||||
resp, err := auth.Login(ctx, req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if resp.Token != "abc123" {
|
||||
t.Errorf("expected token abc123, got %s", resp.Token)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("failed login", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LoginRequest{
|
||||
Username: "testuser",
|
||||
Password: "wrongpass",
|
||||
}
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_data"}).
|
||||
AddRow(false, "Invalid credentials", nil)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_data::text FROM resolvespec_login`).
|
||||
WithArgs(sqlmock.AnyArg()).
|
||||
WillReturnRows(rows)
|
||||
|
||||
_, err := auth.Login(ctx, req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error for failed login")
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("successful logout", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LogoutRequest{
|
||||
Token: "abc123",
|
||||
UserID: 1,
|
||||
}
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_data"}).
|
||||
AddRow(true, nil, nil)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_data::text FROM resolvespec_logout`).
|
||||
WithArgs(sqlmock.AnyArg()).
|
||||
WillReturnRows(rows)
|
||||
|
||||
err := auth.Logout(ctx, req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("authenticate with bearer token", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
req.Header.Set("Authorization", "Bearer test-token-123")
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_user"}).
|
||||
AddRow(true, nil, `{"user_id":1,"user_name":"testuser","session_id":"test-token-123"}`)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_user::text FROM resolvespec_session`).
|
||||
WithArgs("test-token-123", "authenticate").
|
||||
WillReturnRows(rows)
|
||||
|
||||
userCtx, err := auth.Authenticate(req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if userCtx.UserID != 1 {
|
||||
t.Errorf("expected UserID 1, got %d", userCtx.UserID)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("authenticate with cookie", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
req.AddCookie(&http.Cookie{
|
||||
Name: "session_token",
|
||||
Value: "cookie-token-456",
|
||||
})
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_user"}).
|
||||
AddRow(true, nil, `{"user_id":2,"user_name":"cookieuser","session_id":"cookie-token-456"}`)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_user::text FROM resolvespec_session`).
|
||||
WithArgs("cookie-token-456", "authenticate").
|
||||
WillReturnRows(rows)
|
||||
|
||||
userCtx, err := auth.Authenticate(req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if userCtx.UserID != 2 {
|
||||
t.Errorf("expected UserID 2, got %d", userCtx.UserID)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("authenticate missing token", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
|
||||
_, err := auth.Authenticate(req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error when token is missing")
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test DatabaseAuthenticator RefreshToken
|
||||
func TestDatabaseAuthenticatorRefreshToken(t *testing.T) {
|
||||
db, mock, err := sqlmock.New()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create mock db: %v", err)
|
||||
}
|
||||
defer db.Close()
|
||||
|
||||
auth := NewDatabaseAuthenticator(db)
|
||||
ctx := context.Background()
|
||||
|
||||
t.Run("successful token refresh", func(t *testing.T) {
|
||||
refreshToken := "refresh-token-123"
|
||||
|
||||
// First call to validate refresh token
|
||||
sessionRows := sqlmock.NewRows([]string{"p_success", "p_error", "p_user"}).
|
||||
AddRow(true, nil, `{"user_id":1,"user_name":"testuser"}`)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_user::text FROM resolvespec_session`).
|
||||
WithArgs(refreshToken, "refresh").
|
||||
WillReturnRows(sessionRows)
|
||||
|
||||
// Second call to generate new token
|
||||
refreshRows := sqlmock.NewRows([]string{"p_success", "p_error", "p_user"}).
|
||||
AddRow(true, nil, `{"user_id":1,"user_name":"testuser","session_id":"new-token-456"}`)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_user::text FROM resolvespec_refresh_token`).
|
||||
WithArgs(refreshToken, sqlmock.AnyArg()).
|
||||
WillReturnRows(refreshRows)
|
||||
|
||||
resp, err := auth.RefreshToken(ctx, refreshToken)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if resp.Token != "new-token-456" {
|
||||
t.Errorf("expected token new-token-456, got %s", resp.Token)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("invalid refresh token", func(t *testing.T) {
|
||||
refreshToken := "invalid-token"
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_user"}).
|
||||
AddRow(false, "Invalid refresh token", nil)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_user::text FROM resolvespec_session`).
|
||||
WithArgs(refreshToken, "refresh").
|
||||
WillReturnRows(rows)
|
||||
|
||||
_, err := auth.RefreshToken(ctx, refreshToken)
|
||||
if err == nil {
|
||||
t.Fatal("expected error for invalid refresh token")
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test JWTAuthenticator
|
||||
func TestJWTAuthenticator(t *testing.T) {
|
||||
db, mock, err := sqlmock.New()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create mock db: %v", err)
|
||||
}
|
||||
defer db.Close()
|
||||
|
||||
auth := NewJWTAuthenticator("secret-key", db)
|
||||
|
||||
t.Run("successful login", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LoginRequest{
|
||||
Username: "testuser",
|
||||
Password: "password123",
|
||||
}
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_user"}).
|
||||
AddRow(true, nil, []byte(`{"id":1,"username":"testuser","email":"test@example.com","user_level":5,"roles":"admin,user"}`))
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_user FROM resolvespec_jwt_login`).
|
||||
WithArgs("testuser", "password123").
|
||||
WillReturnRows(rows)
|
||||
|
||||
resp, err := auth.Login(ctx, req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if resp.User.UserID != 1 {
|
||||
t.Errorf("expected UserID 1, got %d", resp.User.UserID)
|
||||
}
|
||||
if resp.User.UserName != "testuser" {
|
||||
t.Errorf("expected UserName testuser, got %s", resp.User.UserName)
|
||||
}
|
||||
if len(resp.User.Roles) != 2 {
|
||||
t.Errorf("expected 2 roles, got %d", len(resp.User.Roles))
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("authenticate returns not implemented", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
req.Header.Set("Authorization", "Bearer test-token")
|
||||
|
||||
_, err := auth.Authenticate(req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error for unimplemented JWT parsing")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("authenticate missing bearer token", func(t *testing.T) {
|
||||
req := httptest.NewRequest("GET", "/test", nil)
|
||||
|
||||
_, err := auth.Authenticate(req)
|
||||
if err == nil {
|
||||
t.Fatal("expected error when authorization header is missing")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("successful logout", func(t *testing.T) {
|
||||
ctx := context.Background()
|
||||
req := LogoutRequest{
|
||||
Token: "token123",
|
||||
UserID: 1,
|
||||
}
|
||||
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error"}).
|
||||
AddRow(true, nil)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error FROM resolvespec_jwt_logout`).
|
||||
WithArgs("token123", 1).
|
||||
WillReturnRows(rows)
|
||||
|
||||
err := auth.Logout(ctx, req)
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test DatabaseColumnSecurityProvider
|
||||
func TestDatabaseColumnSecurityProvider(t *testing.T) {
|
||||
db, mock, err := sqlmock.New()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create mock db: %v", err)
|
||||
}
|
||||
defer db.Close()
|
||||
|
||||
provider := NewDatabaseColumnSecurityProvider(db)
|
||||
ctx := context.Background()
|
||||
|
||||
t.Run("load column security successfully", func(t *testing.T) {
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_rules"}).
|
||||
AddRow(true, nil, []byte(`[{"control":"public.users.email","accesstype":"mask","jsonvalue":""}]`))
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_rules FROM resolvespec_column_security`).
|
||||
WithArgs(1, "public", "users").
|
||||
WillReturnRows(rows)
|
||||
|
||||
rules, err := provider.GetColumnSecurity(ctx, 1, "public", "users")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if len(rules) != 1 {
|
||||
t.Errorf("expected 1 rule, got %d", len(rules))
|
||||
}
|
||||
if rules[0].Accesstype != "mask" {
|
||||
t.Errorf("expected accesstype mask, got %s", rules[0].Accesstype)
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("failed to load column security", func(t *testing.T) {
|
||||
rows := sqlmock.NewRows([]string{"p_success", "p_error", "p_rules"}).
|
||||
AddRow(false, "No security rules found", nil)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_success, p_error, p_rules FROM resolvespec_column_security`).
|
||||
WithArgs(1, "public", "orders").
|
||||
WillReturnRows(rows)
|
||||
|
||||
_, err := provider.GetColumnSecurity(ctx, 1, "public", "orders")
|
||||
if err == nil {
|
||||
t.Fatal("expected error when loading fails")
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test DatabaseRowSecurityProvider
|
||||
func TestDatabaseRowSecurityProvider(t *testing.T) {
|
||||
db, mock, err := sqlmock.New()
|
||||
if err != nil {
|
||||
t.Fatalf("failed to create mock db: %v", err)
|
||||
}
|
||||
defer db.Close()
|
||||
|
||||
provider := NewDatabaseRowSecurityProvider(db)
|
||||
ctx := context.Background()
|
||||
|
||||
t.Run("load row security successfully", func(t *testing.T) {
|
||||
rows := sqlmock.NewRows([]string{"p_template", "p_block"}).
|
||||
AddRow("user_id = {UserID}", false)
|
||||
|
||||
mock.ExpectQuery(`SELECT p_template, p_block FROM resolvespec_row_security`).
|
||||
WithArgs("public", "orders", 1).
|
||||
WillReturnRows(rows)
|
||||
|
||||
rowSec, err := provider.GetRowSecurity(ctx, 1, "public", "orders")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if rowSec.Template != "user_id = {UserID}" {
|
||||
t.Errorf("expected template 'user_id = {UserID}', got %s", rowSec.Template)
|
||||
}
|
||||
if rowSec.HasBlock {
|
||||
t.Error("expected HasBlock to be false")
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("query error", func(t *testing.T) {
|
||||
mock.ExpectQuery(`SELECT p_template, p_block FROM resolvespec_row_security`).
|
||||
WithArgs("public", "blocked_table", 1).
|
||||
WillReturnError(sql.ErrNoRows)
|
||||
|
||||
_, err := provider.GetRowSecurity(ctx, 1, "public", "blocked_table")
|
||||
if err == nil {
|
||||
t.Fatal("expected error when query fails")
|
||||
}
|
||||
|
||||
if err := mock.ExpectationsWereMet(); err != nil {
|
||||
t.Errorf("unfulfilled expectations: %v", err)
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test ConfigColumnSecurityProvider
|
||||
func TestConfigColumnSecurityProvider(t *testing.T) {
|
||||
rules := map[string][]ColumnSecurity{
|
||||
"public.users": {
|
||||
{
|
||||
Schema: "public",
|
||||
Tablename: "users",
|
||||
Path: []string{"email"},
|
||||
Accesstype: "mask",
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
provider := NewConfigColumnSecurityProvider(rules)
|
||||
ctx := context.Background()
|
||||
|
||||
t.Run("get existing rules", func(t *testing.T) {
|
||||
result, err := provider.GetColumnSecurity(ctx, 1, "public", "users")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if len(result) != 1 {
|
||||
t.Errorf("expected 1 rule, got %d", len(result))
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("get non-existent rules returns empty", func(t *testing.T) {
|
||||
result, err := provider.GetColumnSecurity(ctx, 1, "public", "orders")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if len(result) != 0 {
|
||||
t.Errorf("expected 0 rules, got %d", len(result))
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
// Test ConfigRowSecurityProvider
|
||||
func TestConfigRowSecurityProvider(t *testing.T) {
|
||||
templates := map[string]string{
|
||||
"public.orders": "user_id = {UserID}",
|
||||
}
|
||||
blocked := map[string]bool{
|
||||
"public.secrets": true,
|
||||
}
|
||||
|
||||
provider := NewConfigRowSecurityProvider(templates, blocked)
|
||||
ctx := context.Background()
|
||||
|
||||
t.Run("get template for allowed table", func(t *testing.T) {
|
||||
result, err := provider.GetRowSecurity(ctx, 1, "public", "orders")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if result.Template != "user_id = {UserID}" {
|
||||
t.Errorf("expected template 'user_id = {UserID}', got %s", result.Template)
|
||||
}
|
||||
if result.HasBlock {
|
||||
t.Error("expected HasBlock to be false")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("get blocked table", func(t *testing.T) {
|
||||
result, err := provider.GetRowSecurity(ctx, 1, "public", "secrets")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if !result.HasBlock {
|
||||
t.Error("expected HasBlock to be true")
|
||||
}
|
||||
})
|
||||
|
||||
t.Run("get non-existent table returns empty template", func(t *testing.T) {
|
||||
result, err := provider.GetRowSecurity(ctx, 1, "public", "unknown")
|
||||
if err != nil {
|
||||
t.Fatalf("expected no error, got %v", err)
|
||||
}
|
||||
|
||||
if result.Template != "" {
|
||||
t.Errorf("expected empty template, got %s", result.Template)
|
||||
}
|
||||
if result.HasBlock {
|
||||
t.Error("expected HasBlock to be false")
|
||||
}
|
||||
})
|
||||
}
|
||||
Reference in New Issue
Block a user