summaryrefslogtreecommitdiffstats
path: root/controller-server/src/test/java/com/yahoo/vespa/hosted/controller/role/RoleMembershipTest.java
blob: bc810fdb5c55b2c6605d6d508574c85969561b17 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
// Copyright 2019 Oath Inc. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
package com.yahoo.vespa.hosted.controller.role;

import com.yahoo.config.provision.ApplicationName;
import com.yahoo.config.provision.SystemName;
import com.yahoo.config.provision.TenantName;
import org.junit.Test;

import java.util.Map;
import java.util.Set;

import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;

/**
 * @author mpolden
 */
public class RoleMembershipTest {

    @Test
    public void operator_membership() {
        RoleMembership roles = new RoleMembership(Map.of(Role.hostedOperator, Set.of(Context.unlimitedIn(SystemName.main))));

        // Operator actions
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertTrue(roles.allows(Action.create, "/controller/v1/foo"));
        assertTrue(roles.allows(Action.update, "/os/v1/bar"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t2/application/a2"));
    }

    @Test
    public void tenant_membership() {
        RoleMembership roles = new RoleMembership(Map.of(Role.tenantAdmin,
                                                         Set.of(Context.limitedTo(TenantName.from("t1"),
                                                                                  ApplicationName.from("a1"),
                                                                                  SystemName.main))));

        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertFalse("Deny access to operator API", roles.allows(Action.create, "/controller/v1/foo"));
        assertFalse("Deny access to other tenant and app", roles.allows(Action.update, "/application/v4/tenant/t2/application/a2"));
        assertFalse("Deny access to other app", roles.allows(Action.update, "/application/v4/tenant/t1/application/a2"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));

        RoleMembership multiContext = new RoleMembership(Map.of(Role.tenantAdmin,
                                                         Set.of(Context.limitedTo(TenantName.from("t1"),
                                                                                  ApplicationName.from("a1"),
                                                                                  SystemName.main),
                                                                Context.limitedTo(TenantName.from("t2"),
                                                                                  ApplicationName.from("a2"),
                                                                                  SystemName.main))));
        assertFalse("Deny access to other tenant and app", multiContext.allows(Action.update, "/application/v4/tenant/t3/application/a3"));
        assertTrue(multiContext.allows(Action.update, "/application/v4/tenant/t2/application/a2"));
        assertTrue(multiContext.allows(Action.update, "/application/v4/tenant/t1/application/a1"));

        RoleMembership publicSystem = new RoleMembership(Map.of(Role.tenantAdmin,
                                                                Set.of(Context.limitedTo(TenantName.from("t1"),
                                                                                         ApplicationName.from("a1"),
                                                                                         SystemName.vaas))));
        assertFalse(publicSystem.allows(Action.read, "/controller/v1/foo"));
        assertTrue(multiContext.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
    }

    @Test
    public void build_service_membership() {
        RoleMembership roles = new RoleMembership(Map.of(Role.tenantPipelineOperator, Set.of(Context.unlimitedIn(SystemName.main))));
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertFalse(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
        assertTrue(roles.allows(Action.create, "/application/v4/tenant/t1/application/a1/jobreport"));
        assertFalse("No global read access", roles.allows(Action.read, "/controller/v1/foo"));
    }

    @Test
    public void multi_role_membership() {
        RoleMembership roles = new RoleMembership(Map.of(Role.tenantAdmin, Set.of(Context.limitedTo(TenantName.from("t1"),
                                                                                                    ApplicationName.from("a1"),
                                                                                                    SystemName.main)),
                                                         Role.tenantPipelineOperator, Set.of(Context.unlimitedIn(SystemName.main)),
                                                         Role.everyone, Set.of(Context.unlimitedIn(SystemName.main))));
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertFalse(roles.allows(Action.create, "/controller/v1/foo"));
        assertTrue(roles.allows(Action.create, "/application/v4/tenant/t1/application/a1/jobreport"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
        assertTrue("Global read access", roles.allows(Action.read, "/controller/v1/foo"));
    }

}