summaryrefslogtreecommitdiff
path: root/internal/authorization/access_control_query_test.go
blob: 6905787d17fd6ceddcb4e4797bd3caacb9766afc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
package authorization

import (
	"testing"

	"github.com/stretchr/testify/assert"

	"github.com/authelia/authelia/v4/internal/configuration/schema"
)

func TestNewAccessControlQuery(t *testing.T) {
	testCases := []struct {
		name     string
		have     [][]schema.AccessControlRuleQuery
		expected []AccessControlQuery
		matches  [][]Object
	}{
		{
			"ShouldSkipInvalidTypeEqual",
			[][]schema.AccessControlRuleQuery{
				{
					{Operator: operatorEqual, Key: "example", Value: 1},
				},
			},
			[]AccessControlQuery{{Rules: []ObjectMatcher(nil)}},
			[][]Object{{{}}},
		},
		{
			"ShouldSkipInvalidTypePattern",
			[][]schema.AccessControlRuleQuery{
				{
					{Operator: operatorPattern, Key: "example", Value: 1},
				},
			},
			[]AccessControlQuery{{Rules: []ObjectMatcher(nil)}},
			[][]Object{{{}}},
		},
		{
			"ShouldSkipInvalidOperator",
			[][]schema.AccessControlRuleQuery{
				{
					{Operator: "nop", Key: "example", Value: 1},
				},
			},
			[]AccessControlQuery{{Rules: []ObjectMatcher(nil)}},
			[][]Object{{{}}},
		},
	}

	for _, tc := range testCases {
		t.Run(tc.name, func(t *testing.T) {
			actual := NewAccessControlQuery(tc.have)
			assert.Equal(t, tc.expected, actual)

			for i, rule := range actual {
				for _, object := range tc.matches[i] {
					assert.True(t, rule.IsMatch(object))
				}
			}
		})
	}
}