1
0
Fork 0
arangodb/tests/RestHandler/RestUsersHandler-test.cpp

642 lines
31 KiB
C++

////////////////////////////////////////////////////////////////////////////////
/// DISCLAIMER
///
/// Copyright 2018 ArangoDB GmbH, Cologne, Germany
///
/// Licensed under the Apache License, Version 2.0 (the "License");
/// you may not use this file except in compliance with the License.
/// You may obtain a copy of the License at
///
/// http://www.apache.org/licenses/LICENSE-2.0
///
/// Unless required by applicable law or agreed to in writing, software
/// distributed under the License is distributed on an "AS IS" BASIS,
/// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
/// See the License for the specific language governing permissions and
/// limitations under the License.
///
/// Copyright holder is ArangoDB GmbH, Cologne, Germany
///
/// @author Andrey Abramov
/// @author Vasiliy Nabatchikov
////////////////////////////////////////////////////////////////////////////////
#include "gtest/gtest.h"
#include "../IResearch/RestHandlerMock.h"
#include "../Mocks/StorageEngineMock.h"
#include "Aql/QueryRegistry.h"
#include "Basics/StaticStrings.h"
#if USE_ENTERPRISE
#include "Enterprise/Ldap/LdapFeature.h"
#endif
#include "GeneralServer/AuthenticationFeature.h"
#include "RestHandler/RestUsersHandler.h"
#include "RestServer/DatabaseFeature.h"
#include "RestServer/QueryRegistryFeature.h"
#include "RestServer/SystemDatabaseFeature.h"
#include "RestServer/ViewTypesFeature.h"
#include "RestServer/VocbaseContext.h"
#include "Sharding/ShardingFeature.h"
#include "StorageEngine/EngineSelectorFeature.h"
#include "Utils/ExecContext.h"
#include "V8Server/V8DealerFeature.h"
#include "VocBase/LogicalCollection.h"
#include "VocBase/LogicalView.h"
#include "VocBase/vocbase.h"
#include "velocypack/Parser.h"
namespace {
struct TestView : public arangodb::LogicalView {
arangodb::Result _appendVelocyPackResult;
arangodb::velocypack::Builder _properties;
TestView(TRI_vocbase_t& vocbase, arangodb::velocypack::Slice const& definition, uint64_t planVersion)
: arangodb::LogicalView(vocbase, definition, planVersion) {}
virtual arangodb::Result appendVelocyPackImpl(
arangodb::velocypack::Builder& builder,
std::underlying_type<arangodb::LogicalDataSource::Serialize>::type) const override {
builder.add("properties", _properties.slice());
return _appendVelocyPackResult;
}
virtual arangodb::Result dropImpl() override { return arangodb::Result(); }
virtual void open() override {}
virtual arangodb::Result renameImpl(std::string const&) override {
return arangodb::Result();
}
virtual arangodb::Result properties(arangodb::velocypack::Slice const& properties,
bool partialUpdate) override {
_properties = arangodb::velocypack::Builder(properties);
return arangodb::Result();
}
virtual bool visitCollections(CollectionVisitor const& visitor) const override {
return true;
}
};
struct ViewFactory : public arangodb::ViewFactory {
virtual arangodb::Result create(arangodb::LogicalView::ptr& view, TRI_vocbase_t& vocbase,
arangodb::velocypack::Slice const& definition) const override {
view = vocbase.createView(definition);
return arangodb::Result();
}
virtual arangodb::Result instantiate(arangodb::LogicalView::ptr& view,
TRI_vocbase_t& vocbase,
arangodb::velocypack::Slice const& definition,
uint64_t planVersion) const override {
view = std::make_shared<TestView>(vocbase, definition, planVersion);
return arangodb::Result();
}
};
} // namespace
// -----------------------------------------------------------------------------
// --SECTION-- setup / tear-down
// -----------------------------------------------------------------------------
class RestUsersHandlerTest : public ::testing::Test {
protected:
StorageEngineMock engine;
arangodb::application_features::ApplicationServer server;
std::unique_ptr<TRI_vocbase_t> system;
std::vector<std::pair<arangodb::application_features::ApplicationFeature*, bool>> features;
ViewFactory viewFactory;
RestUsersHandlerTest() : engine(server), server(nullptr, nullptr) {
arangodb::EngineSelectorFeature::ENGINE = &engine;
// suppress INFO {authentication} Authentication is turned on (system only), authentication for unix sockets is turned on
// suppress WARNING {authentication} --server.jwt-secret is insecure. Use --server.jwt-secret-keyfile instead
arangodb::LogTopic::setLogLevel(arangodb::Logger::AUTHENTICATION.name(),
arangodb::LogLevel::ERR);
features.emplace_back(new arangodb::AuthenticationFeature(server), false); // required for VocbaseContext
features.emplace_back(new arangodb::DatabaseFeature(server),
false); // required for UserManager::updateUser(...)
features.emplace_back(new arangodb::QueryRegistryFeature(server), false); // required for TRI_vocbase_t
arangodb::application_features::ApplicationServer::server->addFeature(
features.back().first); // need QueryRegistryFeature feature to be added now in order to create the system database
system = std::make_unique<TRI_vocbase_t>(TRI_vocbase_type_e::TRI_VOCBASE_TYPE_NORMAL,
0, TRI_VOC_SYSTEM_DATABASE);
features.emplace_back(new arangodb::ShardingFeature(server),
false); // required for LogicalCollection::LogicalCollection(...)
features.emplace_back(new arangodb::SystemDatabaseFeature(server, system.get()),
false); // required for IResearchAnalyzerFeature
features.emplace_back(new arangodb::ViewTypesFeature(server),
false); // required for LogicalView::create(...)
#if USE_ENTERPRISE
features.emplace_back(new arangodb::LdapFeature(server),
false); // required for AuthenticationFeature with USE_ENTERPRISE
#endif
arangodb::application_features::ApplicationServer::server->addFeature(
new arangodb::V8DealerFeature(server)); // add without calling prepare(), required for DatabaseFeature::createDatabase(...)
for (auto& f : features) {
arangodb::application_features::ApplicationServer::server->addFeature(f.first);
}
for (auto& f : features) {
f.first->prepare();
}
for (auto& f : features) {
if (f.second) {
f.first->start();
}
}
auto* viewTypesFeature =
arangodb::application_features::ApplicationServer::lookupFeature<arangodb::ViewTypesFeature>();
viewTypesFeature->emplace(arangodb::LogicalDataSource::Type::emplace(arangodb::velocypack::StringRef(
"testViewType")),
viewFactory);
}
~RestUsersHandlerTest() {
system.reset(); // destroy before reseting the 'ENGINE'
arangodb::application_features::ApplicationServer::server = nullptr;
// destroy application features
for (auto& f : features) {
if (f.second) {
f.first->stop();
}
}
for (auto& f : features) {
f.first->unprepare();
}
arangodb::EngineSelectorFeature::ENGINE =
nullptr; // nullify only after DatabaseFeature::unprepare()
arangodb::LogTopic::setLogLevel(arangodb::Logger::AUTHENTICATION.name(),
arangodb::LogLevel::DEFAULT);
}
};
// -----------------------------------------------------------------------------
// --SECTION-- test suite
// -----------------------------------------------------------------------------
TEST_F(RestUsersHandlerTest, test_collection_auth) {
auto usersJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"_users\", \"isSystem\": true }");
static const std::string userName("testUser");
auto* databaseFeature =
arangodb::application_features::ApplicationServer::getFeature<arangodb::DatabaseFeature>(
"Database");
TRI_vocbase_t* vocbase; // will be owned by DatabaseFeature
ASSERT_TRUE(databaseFeature->createDatabase(1, "testDatabase", vocbase).ok());
auto grantRequestPtr = std::make_unique<GeneralRequestMock>(*vocbase);
auto& grantRequest = *grantRequestPtr;
auto grantResponcePtr = std::make_unique<GeneralResponseMock>();
auto& grantResponce = *grantResponcePtr;
auto grantWildcardRequestPtr = std::make_unique<GeneralRequestMock>(*vocbase);
auto& grantWildcardRequest = *grantWildcardRequestPtr;
auto grantWildcardResponcePtr = std::make_unique<GeneralResponseMock>();
auto& grantWildcardResponce = *grantWildcardResponcePtr;
auto revokeRequestPtr = std::make_unique<GeneralRequestMock>(*vocbase);
auto& revokeRequest = *revokeRequestPtr;
auto revokeResponcePtr = std::make_unique<GeneralResponseMock>();
auto& revokeResponce = *revokeResponcePtr;
auto revokeWildcardRequestPtr = std::make_unique<GeneralRequestMock>(*vocbase);
auto& revokeWildcardRequest = *revokeWildcardRequestPtr;
auto revokeWildcardResponcePtr = std::make_unique<GeneralResponseMock>();
auto& revokeWildcardResponce = *revokeWildcardResponcePtr;
arangodb::RestUsersHandler grantHandler(grantRequestPtr.release(),
grantResponcePtr.release());
arangodb::RestUsersHandler grantWildcardHandler(grantWildcardRequestPtr.release(),
grantWildcardResponcePtr.release());
arangodb::RestUsersHandler revokeHandler(revokeRequestPtr.release(),
revokeResponcePtr.release());
arangodb::RestUsersHandler revokeWildcardHandler(revokeWildcardRequestPtr.release(),
revokeWildcardResponcePtr.release());
grantRequest.addSuffix("testUser");
grantRequest.addSuffix("database");
grantRequest.addSuffix(vocbase->name());
grantRequest.addSuffix("testDataSource");
grantRequest.setRequestType(arangodb::rest::RequestType::PUT);
grantRequest._payload.openObject();
grantRequest._payload.add("grant", arangodb::velocypack::Value(arangodb::auth::convertFromAuthLevel(
arangodb::auth::Level::RW)));
grantRequest._payload.close();
grantWildcardRequest.addSuffix("testUser");
grantWildcardRequest.addSuffix("database");
grantWildcardRequest.addSuffix(vocbase->name());
grantWildcardRequest.addSuffix("*");
grantWildcardRequest.setRequestType(arangodb::rest::RequestType::PUT);
grantWildcardRequest._payload.openObject();
grantWildcardRequest._payload.add("grant", arangodb::velocypack::Value(arangodb::auth::convertFromAuthLevel(
arangodb::auth::Level::RW)));
grantWildcardRequest._payload.close();
revokeRequest.addSuffix("testUser");
revokeRequest.addSuffix("database");
revokeRequest.addSuffix(vocbase->name());
revokeRequest.addSuffix("testDataSource");
revokeRequest.setRequestType(arangodb::rest::RequestType::DELETE_REQ);
revokeWildcardRequest.addSuffix("testUser");
revokeWildcardRequest.addSuffix("database");
revokeWildcardRequest.addSuffix(vocbase->name());
revokeWildcardRequest.addSuffix("*");
revokeWildcardRequest.setRequestType(arangodb::rest::RequestType::DELETE_REQ);
struct ExecContext : public arangodb::ExecContext {
ExecContext()
: arangodb::ExecContext(arangodb::ExecContext::Type::Default, userName,
"", arangodb::auth::Level::RW,
arangodb::auth::Level::NONE) {
} // ExecContext::isAdminUser() == true
} execContext;
arangodb::ExecContextScope execContextScope(&execContext);
auto* authFeature = arangodb::AuthenticationFeature::instance();
auto* userManager = authFeature->userManager();
arangodb::aql::QueryRegistry queryRegistry(0); // required for UserManager::loadFromDB()
userManager->setGlobalVersion(0); // required for UserManager::loadFromDB()
userManager->setQueryRegistry(&queryRegistry);
// test auth missing (grant)
{
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = grantHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::NOT_FOUND == grantResponce.responseCode()));
auto slice = grantResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Code) &&
slice.get(arangodb::StaticStrings::Code).isNumber<size_t>() &&
size_t(arangodb::rest::ResponseCode::NOT_FOUND) ==
slice.get(arangodb::StaticStrings::Code).getNumber<size_t>()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Error) &&
slice.get(arangodb::StaticStrings::Error).isBoolean() &&
true == slice.get(arangodb::StaticStrings::Error).getBoolean()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::ErrorNum) &&
slice.get(arangodb::StaticStrings::ErrorNum).isNumber<int>() &&
TRI_ERROR_ARANGO_DATA_SOURCE_NOT_FOUND ==
slice.get(arangodb::StaticStrings::ErrorNum).getNumber<int>()));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
}
// test auth missing (revoke)
{
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
userPtr->grantCollection(vocbase->name(),
"testDataSource", arangodb::auth::Level::RO); // for missing collections User::collectionAuthLevel(...) returns database auth::Level
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = revokeHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::NOT_FOUND == revokeResponce.responseCode()));
auto slice = revokeResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Code) &&
slice.get(arangodb::StaticStrings::Code).isNumber<size_t>() &&
size_t(arangodb::rest::ResponseCode::NOT_FOUND) ==
slice.get(arangodb::StaticStrings::Code).getNumber<size_t>()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Error) &&
slice.get(arangodb::StaticStrings::Error).isBoolean() &&
true == slice.get(arangodb::StaticStrings::Error).getBoolean()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::ErrorNum) &&
slice.get(arangodb::StaticStrings::ErrorNum).isNumber<int>() &&
TRI_ERROR_ARANGO_DATA_SOURCE_NOT_FOUND ==
slice.get(arangodb::StaticStrings::ErrorNum).getNumber<int>()));
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource"))); // not modified from above
}
// test auth collection (grant)
{
auto collectionJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"testDataSource\" }");
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
auto logicalCollection = std::shared_ptr<arangodb::LogicalCollection>(
vocbase->createCollection(collectionJson->slice()).get(),
[vocbase](arangodb::LogicalCollection* ptr) -> void {
vocbase->dropCollection(ptr->id(), false, 0);
});
ASSERT_TRUE((false == !logicalCollection));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = grantHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::OK == grantResponce.responseCode()));
auto slice = grantResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(vocbase->name() + "/testDataSource") &&
slice.get(vocbase->name() + "/testDataSource").isString() &&
arangodb::auth::convertFromAuthLevel(arangodb::auth::Level::RW) ==
slice.get(vocbase->name() + "/testDataSource").copyString()));
EXPECT_TRUE(
(arangodb::auth::Level::RW ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
}
// test auth collection (revoke)
{
auto collectionJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"testDataSource\" }");
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
userPtr->grantCollection(vocbase->name(),
"testDataSource", arangodb::auth::Level::RO); // for missing collections User::collectionAuthLevel(...) returns database auth::Level
auto logicalCollection = std::shared_ptr<arangodb::LogicalCollection>(
vocbase->createCollection(collectionJson->slice()).get(),
[vocbase](arangodb::LogicalCollection* ptr) -> void {
vocbase->dropCollection(ptr->id(), false, 0);
});
ASSERT_TRUE((false == !logicalCollection));
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = revokeHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::ACCEPTED == revokeResponce.responseCode()));
auto slice = revokeResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Code) &&
slice.get(arangodb::StaticStrings::Code).isNumber<size_t>() &&
size_t(arangodb::rest::ResponseCode::ACCEPTED) ==
slice.get(arangodb::StaticStrings::Code).getNumber<size_t>()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Error) &&
slice.get(arangodb::StaticStrings::Error).isBoolean() &&
false == slice.get(arangodb::StaticStrings::Error).getBoolean()));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
}
// test auth view (grant)
{
auto viewJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"testDataSource\", \"type\": \"testViewType\" }");
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
auto logicalView = std::shared_ptr<arangodb::LogicalView>(
vocbase->createView(viewJson->slice()).get(),
[vocbase](arangodb::LogicalView* ptr) -> void {
vocbase->dropView(ptr->id(), false);
});
ASSERT_TRUE((false == !logicalView));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = grantHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::NOT_FOUND == grantResponce.responseCode()));
auto slice = grantResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Code) &&
slice.get(arangodb::StaticStrings::Code).isNumber<size_t>() &&
size_t(arangodb::rest::ResponseCode::NOT_FOUND) ==
slice.get(arangodb::StaticStrings::Code).getNumber<size_t>()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Error) &&
slice.get(arangodb::StaticStrings::Error).isBoolean() &&
true == slice.get(arangodb::StaticStrings::Error).getBoolean()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::ErrorNum) &&
slice.get(arangodb::StaticStrings::ErrorNum).isNumber<int>() &&
TRI_ERROR_ARANGO_DATA_SOURCE_NOT_FOUND ==
slice.get(arangodb::StaticStrings::ErrorNum).getNumber<int>()));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
}
// test auth view (revoke)
{
auto viewJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"testDataSource\", \"type\": \"testViewType\" }");
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
userPtr->grantCollection(vocbase->name(),
"testDataSource", arangodb::auth::Level::RO); // for missing collections User::collectionAuthLevel(...) returns database auth::Level
auto logicalView = std::shared_ptr<arangodb::LogicalView>(
vocbase->createView(viewJson->slice()).get(),
[vocbase](arangodb::LogicalView* ptr) -> void {
vocbase->dropView(ptr->id(), false);
});
ASSERT_TRUE((false == !logicalView));
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = revokeHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::NOT_FOUND == revokeResponce.responseCode()));
auto slice = revokeResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Code) &&
slice.get(arangodb::StaticStrings::Code).isNumber<size_t>() &&
size_t(arangodb::rest::ResponseCode::NOT_FOUND) ==
slice.get(arangodb::StaticStrings::Code).getNumber<size_t>()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Error) &&
slice.get(arangodb::StaticStrings::Error).isBoolean() &&
true == slice.get(arangodb::StaticStrings::Error).getBoolean()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::ErrorNum) &&
slice.get(arangodb::StaticStrings::ErrorNum).isNumber<int>() &&
TRI_ERROR_ARANGO_DATA_SOURCE_NOT_FOUND ==
slice.get(arangodb::StaticStrings::ErrorNum).getNumber<int>()));
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource"))); // not modified from above
}
// test auth wildcard (grant)
{
auto collectionJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"testDataSource\" }");
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
auto logicalCollection = std::shared_ptr<arangodb::LogicalCollection>(
vocbase->createCollection(collectionJson->slice()).get(),
[vocbase](arangodb::LogicalCollection* ptr) -> void {
vocbase->dropCollection(ptr->id(), false, 0);
});
ASSERT_TRUE((false == !logicalCollection));
EXPECT_TRUE(
(arangodb::auth::Level::NONE ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = grantWildcardHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::OK == grantWildcardResponce.responseCode()));
auto slice = grantWildcardResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(vocbase->name() + "/*") &&
slice.get(vocbase->name() + "/*").isString() &&
arangodb::auth::convertFromAuthLevel(arangodb::auth::Level::RW) ==
slice.get(vocbase->name() + "/*").copyString()));
EXPECT_TRUE(
(arangodb::auth::Level::RW ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
}
// test auth wildcard (revoke)
{
auto collectionJson = arangodb::velocypack::Parser::fromJson(
"{ \"name\": \"testDataSource\" }");
auto scopedUsers = std::shared_ptr<arangodb::LogicalCollection>(
system->createCollection(usersJson->slice()).get(),
[this](arangodb::LogicalCollection* ptr) -> void {
system->dropCollection(ptr->id(), true, 0.0);
});
arangodb::auth::UserMap userMap;
arangodb::auth::User* userPtr = nullptr;
userManager->setAuthInfo(userMap); // insure an empy map is set before UserManager::storeUser(...)
userManager->storeUser(false, userName, arangodb::StaticStrings::Empty,
true, arangodb::velocypack::Slice());
userManager->accessUser(userName, [&userPtr](arangodb::auth::User const& user) -> arangodb::Result {
userPtr = const_cast<arangodb::auth::User*>(&user);
return arangodb::Result();
});
ASSERT_TRUE((nullptr != userPtr));
userPtr->grantCollection(vocbase->name(),
"testDataSource", arangodb::auth::Level::RO); // for missing collections User::collectionAuthLevel(...) returns database auth::Level
auto logicalCollection = std::shared_ptr<arangodb::LogicalCollection>(
vocbase->createCollection(collectionJson->slice()).get(),
[vocbase](arangodb::LogicalCollection* ptr) -> void {
vocbase->dropCollection(ptr->id(), false, 0);
});
ASSERT_TRUE((false == !logicalCollection));
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource")));
auto status = revokeWildcardHandler.execute();
EXPECT_TRUE((arangodb::RestStatus::DONE == status));
EXPECT_TRUE((arangodb::rest::ResponseCode::ACCEPTED ==
revokeWildcardResponce.responseCode()));
auto slice = revokeWildcardResponce._payload.slice();
EXPECT_TRUE((slice.isObject()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Code) &&
slice.get(arangodb::StaticStrings::Code).isNumber<size_t>() &&
size_t(arangodb::rest::ResponseCode::ACCEPTED) ==
slice.get(arangodb::StaticStrings::Code).getNumber<size_t>()));
EXPECT_TRUE((slice.hasKey(arangodb::StaticStrings::Error) &&
slice.get(arangodb::StaticStrings::Error).isBoolean() &&
false == slice.get(arangodb::StaticStrings::Error).getBoolean()));
EXPECT_TRUE(
(arangodb::auth::Level::RO ==
execContext.collectionAuthLevel(vocbase->name(), "testDataSource"))); // unchanged since revocation is only for exactly matching collection names
}
}