1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82
|
// Copyright 2019-present Facebook Inc. All rights reserved.
// This source code is licensed under the Apache 2.0 license found
// in the LICENSE file in the root directory of this source tree.
package privacy
import (
"context"
"errors"
"testing"
"github.com/facebook/ent/entc/integration/privacy/ent/enttest"
"github.com/facebook/ent/entc/integration/privacy/ent/privacy"
"github.com/facebook/ent/entc/integration/privacy/ent/task"
"github.com/facebook/ent/entc/integration/privacy/rule"
"github.com/facebook/ent/entc/integration/privacy/viewer"
_ "github.com/mattn/go-sqlite3"
"github.com/stretchr/testify/require"
)
func TestPrivacyRules(t *testing.T) {
client := enttest.Open(t, "sqlite3",
"file:ent?mode=memory&cache=shared&_fk=1",
)
defer client.Close()
logf := rule.SetMutationLogFunc(func(string, ...interface{}) {
require.FailNow(t, "hook called on privacy deny")
})
ctx := context.Background()
_, err := client.Team.Create().SetName("ent").Save(ctx)
require.True(t, errors.Is(err, privacy.Deny), "policy requires viewer context")
view := viewer.NewContext(ctx, viewer.AppViewer{
Role: viewer.View,
})
_, err = client.Team.CreateBulk(
client.Team.Create().SetName("ent"),
client.Team.Create().SetName("ent-contrib"),
).Save(view)
require.True(t, errors.Is(err, privacy.Deny), "team policy requires admin user")
rule.SetMutationLogFunc(logf)
admin := viewer.NewContext(ctx, viewer.AppViewer{
Role: viewer.Admin,
})
teams := client.Team.CreateBulk(
client.Team.Create().SetName("ent"),
client.Team.Create().SetName("ent-contrib"),
).SaveX(admin)
_, err = client.User.Create().SetName("a8m").AddTeams(teams[0]).Save(view)
require.True(t, errors.Is(err, privacy.Deny), "user creation requires admin user")
a8m := client.User.Create().SetName("a8m").AddTeams(teams[0], teams[1]).SaveX(admin)
nat := client.User.Create().SetName("nati").AddTeams(teams[1]).SaveX(admin)
_, err = client.Task.Create().SetTitle("task 1").AddTeams(teams[0]).SetOwner(a8m).Save(ctx)
require.True(t, errors.Is(err, privacy.Deny), "task creation requires viewer/owner match")
a8mctx := viewer.NewContext(view, &viewer.UserViewer{User: a8m, Role: viewer.View | viewer.Edit})
client.Task.Create().SetTitle("task 1").AddTeams(teams[0]).SetOwner(a8m).SaveX(a8mctx)
_, err = client.Task.Create().SetTitle("task 2").AddTeams(teams[1]).SetOwner(nat).Save(a8mctx)
require.True(t, errors.Is(err, privacy.Deny), "task creation requires viewer/owner match")
natctx := viewer.NewContext(view, &viewer.UserViewer{User: nat, Role: viewer.View | viewer.Edit})
client.Task.Create().SetTitle("task 2").AddTeams(teams[1]).SetOwner(nat).SaveX(natctx)
tasks := client.Task.Query().AllX(a8mctx)
require.Len(t, tasks, 2, "returned tasks from teams 1, 2")
task2 := client.Task.Query().OnlyX(natctx)
require.Equal(t, "task 2", task2.Title, "returned tasks must be from the same team")
task3 := client.Task.Create().SetTitle("multi-team-task (1, 2)").AddTeams(teams...).SetOwner(a8m).SaveX(a8mctx)
_, err = task3.Update().SetStatus(task.StatusClosed).Save(natctx)
require.True(t, errors.Is(err, privacy.Deny), "viewer 2 is not allowed to change the task status")
// DecisionContext returns a new context from the parent with a decision attached to it.
task3.Update().SetStatus(task.StatusClosed).SaveX(privacy.DecisionContext(natctx, privacy.Allow))
task3.Update().SetStatus(task.StatusClosed).SaveX(a8mctx)
// Update description is allow for other users in the team.
task3.Update().SetDescription("boring description").SaveX(natctx)
task3.Update().SetDescription("boring description").SaveX(a8mctx)
}
|