-
-
Notifications
You must be signed in to change notification settings - Fork 7
/
adapter_test.go
86 lines (72 loc) · 2.72 KB
/
adapter_test.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
// Copyright 2017 The casbin Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package jsonadapter
import (
"io/ioutil"
"log"
"path/filepath"
"testing"
"github.com/casbin/casbin/v2"
"github.com/casbin/casbin/v2/util"
)
func testGetPolicy(t *testing.T, e *casbin.Enforcer, res [][]string) {
myRes := e.GetPolicy()
log.Print("Policy: ", myRes)
if !util.Array2DEquals(res, myRes) {
t.Error("Policy: ", myRes, ", supposed to be ", res)
}
}
func errorExpected(t *testing.T, err error) {
if err == nil {
t.Error("expected error")
}
}
func TestAdapter(t *testing.T) {
b, _ := ioutil.ReadFile(filepath.Join("examples", "rbac_policy.json"))
a := NewAdapter(&b)
e, _ := casbin.NewEnforcer("examples/rbac_model.conf", a)
e.GetPolicy()
// Now the JSON Buffer has policy, so we can provide a normal use case.
// Create an adapter and an enforcer.
// NewEnforcer() will load the policy automatically.
a = NewAdapter(&b)
e, _ = casbin.NewEnforcer("examples/rbac_model.conf", a)
testGetPolicy(t, e, [][]string{{"alice", "data1", "read"}, {"bob", "data2", "write"}, {"data2_admin", "data2", "read"}, {"data2_admin", "data2", "write"}})
//Test Clear Policy
e.ClearPolicy()
testGetPolicy(t, e, [][]string{})
// Test Add Policy
_, _ = e.AddPolicy("alice", "data1", "read")
testGetPolicy(t, e, [][]string{{"alice", "data1", "read"}})
// Add policies with up to 6 rule elements
_, _ = e.AddPolicy("alice", "data1", "read", "indeterminate")
_, _ = e.AddPolicy("alice", "domain1", "data1", "write", "indeterminate")
_, _ = e.AddPolicy("alice", "domain1", "data1", "write", "indeterminate", "foo")
_, _ = e.AddPolicy("alice", "domain1", "data1", "write", "indeterminate", "foo", "bar")
// Add grouping policy
_, _ = e.AddGroupingPolicy("alice", "data2_admin")
// Test Save Policy
expectedPolicies := len(e.GetPolicy()) + len(e.GetGroupingPolicy())
_ = e.SavePolicy()
if len(a.policy) != expectedPolicies {
t.Errorf("expected %d policies, got %d", expectedPolicies, len(a.policy))
}
// Not implemented methods
err := a.AddPolicy("", "", []string{""})
errorExpected(t, err)
err = a.RemovePolicy("", "", []string{""})
errorExpected(t, err)
err = a.RemoveFilteredPolicy("", "", 0, "")
errorExpected(t, err)
}