etcd/server/etcdserver/server_access_control_test.go
wafuwafu13 8dcfca0097 tests(etcdserver): add server_access_control_test.go
Signed-off-by: wafuwafu13 <mariobaske@i.softbank.jp>
2022-12-15 21:46:48 +09:00

120 lines
2.5 KiB
Go

// Copyright 2016 The etcd Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package etcdserver
import "testing"
func TestOriginAllowed(t *testing.T) {
tests := []struct {
accessController *AccessController
origin string
allowed bool
}{
{
&AccessController{
CORS: map[string]struct{}{},
},
"https://example.com",
true,
},
{
&AccessController{
CORS: map[string]struct{}{"*": {}},
},
"https://example.com",
true,
},
{
&AccessController{
CORS: map[string]struct{}{"https://example.com": {}, "http://example.org": {}},
},
"https://example.com",
true,
},
{
&AccessController{
CORS: map[string]struct{}{"http://example.org": {}},
},
"https://example.com",
false,
},
{
&AccessController{
CORS: map[string]struct{}{"*": {}, "http://example.org/": {}},
},
"https://example.com",
true,
},
}
for i, tt := range tests {
allowed := tt.accessController.OriginAllowed(tt.origin)
if allowed != tt.allowed {
t.Fatalf("#%d: allowd = %t, want %t", i, allowed, tt.allowed)
}
}
}
func TestIsHostWhitelisted(t *testing.T) {
tests := []struct{
accessController *AccessController
host string
whitelisted bool
}{
{
&AccessController{
HostWhitelist: map[string]struct{}{},
},
"example.com",
true,
},
{
&AccessController{
HostWhitelist: map[string]struct{}{"*": {}},
},
"example.com",
true,
},
{
&AccessController{
HostWhitelist: map[string]struct{}{"example.com": {}, "example.org": {}},
},
"example.com",
true,
},
{
&AccessController{
HostWhitelist: map[string]struct{}{"example.org": {}},
},
"example.com",
false,
},
{
&AccessController{
HostWhitelist: map[string]struct{}{"*": {}, "example.org/": {}},
},
"example.com",
true,
},
}
for i, tt := range tests {
whitelisted := tt.accessController.IsHostWhitelisted(tt.host)
if whitelisted != tt.whitelisted {
t.Fatalf("#%d:whitelisted = %t, want %t", i, whitelisted, tt.whitelisted)
}
}
}