| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113 |
- %%--------------------------------------------------------------------
- %% Copyright (c) 2020-2021 EMQ Technologies Co., Ltd. All Rights Reserved.
- %%
- %% Licensed under the Apache License, Version 2.0 (the "License");
- %% you may not use this file except in compliance with the License.
- %% You may obtain a copy of the License at
- %% http://www.apache.org/licenses/LICENSE-2.0
- %%
- %% Unless required by applicable law or agreed to in writing, software
- %% distributed under the License is distributed on an "AS IS" BASIS,
- %% WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- %% See the License for the specific language governing permissions and
- %% limitations under the License.
- %%--------------------------------------------------------------------
- -module(emqx_authz_pgsql_SUITE).
- -compile(nowarn_export_all).
- -compile(export_all).
- -include("emqx_authz.hrl").
- -include_lib("eunit/include/eunit.hrl").
- -include_lib("common_test/include/ct.hrl").
- all() ->
- emqx_ct:all(?MODULE).
- groups() ->
- [].
- init_per_suite(Config) ->
- meck:new(emqx_resource, [non_strict, passthrough, no_history, no_link]),
- meck:expect(emqx_resource, check_and_create, fun(_, _, _) -> {ok, meck_data} end ),
- ok = emqx_ct_helpers:start_apps([emqx_authz], fun set_special_configs/1),
- Config.
- end_per_suite(_Config) ->
- file:delete(filename:join(emqx:get_env(plugins_etc_dir), 'authz.conf')),
- emqx_ct_helpers:stop_apps([emqx_authz, emqx_resource]),
- meck:unload(emqx_resource).
- set_special_configs(emqx) ->
- application:set_env(emqx, allow_anonymous, false),
- application:set_env(emqx, enable_acl_cache, false),
- application:set_env(emqx, acl_nomatch, deny),
- application:set_env(emqx, plugins_loaded_file,
- emqx_ct_helpers:deps_path(emqx, "test/loaded_plguins")),
- ok;
- set_special_configs(emqx_authz) ->
- Rules = [#{config =>#{<<"meck">> => <<"fake">>},
- principal => all,
- sql => <<"fake sql">>,
- type => pgsql}
- ],
- emqx_config:put([emqx_authz], #{rules => Rules}),
- ok;
- set_special_configs(_App) ->
- ok.
- -define(COLUMNS, [ {column, <<"ipaddress">>, meck, meck, meck, meck, meck, meck, meck}
- , {column, <<"username">>, meck, meck, meck, meck, meck, meck, meck}
- , {column, <<"clientid">>, meck, meck, meck, meck, meck, meck, meck}
- , {column, <<"action">>, meck, meck, meck, meck, meck, meck, meck}
- , {column, <<"permission">>, meck, meck, meck, meck, meck, meck, meck}
- , {column, <<"topic">>, meck, meck, meck, meck, meck, meck, meck}
- ]).
- -define(RULE1, [{<<"127.0.0.1">>, <<>>, <<>>, <<"all">>, <<"deny">>, <<"#">>}]).
- -define(RULE2, [{<<"127.0.0.1">>, <<>>, <<>>, <<"all">>, <<"allow">>, <<"eq #">>}]).
- -define(RULE3, [{<<>>, <<"^test">>, <<"^test">> ,<<"subscribe">>, <<"allow">>, <<"test/%c">>}]).
- -define(RULE4, [{<<>>, <<"^test">>, <<"^test">> ,<<"publish">>, <<"allow">>, <<"test/%u">>}]).
- %%------------------------------------------------------------------------------
- %% Testcases
- %%------------------------------------------------------------------------------
- t_authz(_) ->
- ClientInfo1 = #{clientid => <<"test">>,
- username => <<"test">>,
- peerhost => {127,0,0,1},
- zone => zone
- },
- ClientInfo2 = #{clientid => <<"test_clientid">>,
- username => <<"test_username">>,
- peerhost => {192,168,0,10},
- zone => zone
- },
- ClientInfo3 = #{clientid => <<"test_clientid">>,
- username => <<"fake_username">>,
- peerhost => {127,0,0,1},
- zone => zone
- },
- meck:expect(emqx_resource, query, fun(_, _) -> {ok, ?COLUMNS, []} end),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo1, subscribe, <<"#">>)), % nomatch
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo1, publish, <<"#">>)), % nomatch
- meck:expect(emqx_resource, query, fun(_, _) -> {ok, ?COLUMNS, ?RULE1 ++ ?RULE2} end),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo1, subscribe, <<"+">>)),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo1, publish, <<"+">>)),
- meck:expect(emqx_resource, query, fun(_, _) -> {ok, ?COLUMNS, ?RULE2 ++ ?RULE1} end),
- ?assertEqual(allow, emqx_access_control:authorize(ClientInfo1, subscribe, <<"#">>)),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo2, subscribe, <<"+">>)),
- meck:expect(emqx_resource, query, fun(_, _) -> {ok, ?COLUMNS, ?RULE3 ++ ?RULE4} end),
- ?assertEqual(allow, emqx_access_control:authorize(ClientInfo2, subscribe, <<"test/test_clientid">>)),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo2, publish, <<"test/test_clientid">>)),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo2, subscribe, <<"test/test_username">>)),
- ?assertEqual(allow, emqx_access_control:authorize(ClientInfo2, publish, <<"test/test_username">>)),
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo3, subscribe, <<"test">>)), % nomatch
- ?assertEqual(deny, emqx_access_control:authorize(ClientInfo3, publish, <<"test">>)), % nomatch
- ok.
|