summaryrefslogtreecommitdiffstats
path: root/controller-server/src/test/java/com/yahoo/vespa/hosted/controller/role/RoleMembershipTest.java
blob: 972ddefb1a5e2ce78fabc2ee1e19b8c25b972bb8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
// Copyright 2019 Oath Inc. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
package com.yahoo.vespa.hosted.controller.role;

import com.yahoo.config.provision.ApplicationName;
import com.yahoo.config.provision.SystemName;
import com.yahoo.config.provision.TenantName;
import org.junit.Test;

import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue;

/**
 * @author mpolden
 */
public class RoleMembershipTest {

    @Test
    public void operator_membership() {
        RoleMembership roles = RoleMembership.in(SystemName.main)
                                             .add(Role.hostedOperator)
                                             .build();

        // Operator actions
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertTrue(roles.allows(Action.create, "/controller/v1/foo"));
        assertTrue(roles.allows(Action.update, "/os/v1/bar"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t2/application/a2"));
    }

    @Test
    public void tenant_membership() {
        RoleMembership roles = RoleMembership.in(SystemName.main)
                                             .add(Role.athenzTenantAdmin).limitedTo(TenantName.from("t1"), ApplicationName.from("a1"))
                                             .build();
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertFalse("Deny access to operator API", roles.allows(Action.create, "/controller/v1/foo"));
        assertFalse("Deny access to other tenant and app", roles.allows(Action.update, "/application/v4/tenant/t2/application/a2"));
        assertFalse("Deny access to other app", roles.allows(Action.update, "/application/v4/tenant/t1/application/a2"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));

        RoleMembership multiContext = RoleMembership.in(SystemName.main)
                                                    .add(Role.athenzTenantAdmin).limitedTo(TenantName.from("t1"), ApplicationName.from("a1"))
                                                    .add(Role.athenzTenantAdmin).limitedTo(TenantName.from("t2"), ApplicationName.from("a2"))
                                                    .build();
        assertFalse("Deny access to other tenant and app", multiContext.allows(Action.update, "/application/v4/tenant/t3/application/a3"));
        assertTrue(multiContext.allows(Action.update, "/application/v4/tenant/t2/application/a2"));
        assertTrue(multiContext.allows(Action.update, "/application/v4/tenant/t1/application/a1"));

        RoleMembership publicSystem = RoleMembership.in(SystemName.vaas)
                                                    .add(Role.athenzTenantAdmin).limitedTo(TenantName.from("t1"), ApplicationName.from("a1"))
                                                    .build();
        assertFalse(publicSystem.allows(Action.read, "/controller/v1/foo"));
        assertTrue(multiContext.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
    }

    @Test
    public void build_service_membership() {
        RoleMembership roles = RoleMembership.in(SystemName.main)
                                             .add(Role.tenantPipeline).build();
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertFalse(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
        assertTrue(roles.allows(Action.create, "/application/v4/tenant/t1/application/a1/jobreport"));
        assertFalse("No global read access", roles.allows(Action.read, "/controller/v1/foo"));
    }

    @Test
    public void multi_role_membership() {
        RoleMembership roles = RoleMembership.in(SystemName.main)
                                             .add(Role.athenzTenantAdmin).limitedTo(TenantName.from("t1"), ApplicationName.from("a1"))
                                             .add(Role.tenantPipeline)
                                             .add(Role.everyone)
                                             .build();
        assertFalse(roles.allows(Action.create, "/not/explicitly/defined"));
        assertFalse(roles.allows(Action.create, "/controller/v1/foo"));
        assertTrue(roles.allows(Action.create, "/application/v4/tenant/t1/application/a1/jobreport"));
        assertTrue(roles.allows(Action.update, "/application/v4/tenant/t1/application/a1"));
        assertTrue("Global read access", roles.allows(Action.read, "/controller/v1/foo"));
        assertTrue("Dashboard read access", roles.allows(Action.read, "/"));
        assertTrue("Dashboard read access", roles.allows(Action.read, "/d/nodes"));
        assertTrue("Dashboard read access", roles.allows(Action.read, "/statuspage/v1/incidents"));
    }

}