mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
207 lines
4.8 KiB
Go
207 lines
4.8 KiB
Go
// Copyright 2021 The etcd Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package schema
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"go.uber.org/zap/zaptest"
|
|
|
|
"go.etcd.io/etcd/api/v3/authpb"
|
|
"go.etcd.io/etcd/server/v3/auth"
|
|
"go.etcd.io/etcd/server/v3/storage/backend"
|
|
betesting "go.etcd.io/etcd/server/v3/storage/backend/testing"
|
|
)
|
|
|
|
func TestGetAllUsers(t *testing.T) {
|
|
tcs := []struct {
|
|
name string
|
|
setup func(tx auth.UnsafeAuthWriter)
|
|
want []*authpb.User
|
|
}{
|
|
{
|
|
name: "Empty by default",
|
|
setup: func(tx auth.UnsafeAuthWriter) {},
|
|
want: nil,
|
|
},
|
|
{
|
|
name: "Returns user put before",
|
|
setup: func(tx auth.UnsafeAuthWriter) {
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("alicePassword"),
|
|
Roles: []string{"aliceRole1", "aliceRole2"},
|
|
Options: &authpb.UserAddOptions{
|
|
NoPassword: true,
|
|
},
|
|
})
|
|
},
|
|
want: []*authpb.User{
|
|
{
|
|
Name: []byte("alice"),
|
|
Password: []byte("alicePassword"),
|
|
Roles: []string{"aliceRole1", "aliceRole2"},
|
|
Options: &authpb.UserAddOptions{
|
|
NoPassword: true,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "Skips deleted user",
|
|
setup: func(tx auth.UnsafeAuthWriter) {
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
})
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("bob"),
|
|
})
|
|
tx.UnsafeDeleteUser("alice")
|
|
},
|
|
want: []*authpb.User{{Name: []byte("bob")}},
|
|
},
|
|
{
|
|
name: "Returns data overriden by put",
|
|
setup: func(tx auth.UnsafeAuthWriter) {
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("oldPassword"),
|
|
})
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("bob"),
|
|
})
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("newPassword"),
|
|
})
|
|
},
|
|
want: []*authpb.User{
|
|
{Name: []byte("alice"), Password: []byte("newPassword")},
|
|
{Name: []byte("bob")},
|
|
},
|
|
},
|
|
}
|
|
for _, tc := range tcs {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
lg := zaptest.NewLogger(t)
|
|
be, tmpPath := betesting.NewTmpBackend(t, time.Microsecond, 10)
|
|
abe := NewAuthBackend(lg, be)
|
|
abe.CreateAuthBuckets()
|
|
|
|
tx := abe.BatchTx()
|
|
tx.Lock()
|
|
tc.setup(tx)
|
|
tx.Unlock()
|
|
|
|
abe.ForceCommit()
|
|
be.Close()
|
|
|
|
be2 := backend.NewDefaultBackend(lg, tmpPath)
|
|
defer be2.Close()
|
|
abe2 := NewAuthBackend(lg, be2)
|
|
users := abe2.ReadTx().UnsafeGetAllUsers()
|
|
|
|
assert.Equal(t, tc.want, users)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestGetUser(t *testing.T) {
|
|
tcs := []struct {
|
|
name string
|
|
setup func(tx auth.UnsafeAuthWriter)
|
|
want *authpb.User
|
|
}{
|
|
{
|
|
name: "Returns nil for missing user",
|
|
setup: func(tx auth.UnsafeAuthWriter) {},
|
|
want: nil,
|
|
},
|
|
{
|
|
name: "Returns data put before",
|
|
setup: func(tx auth.UnsafeAuthWriter) {
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("alicePassword"),
|
|
Roles: []string{"aliceRole1", "aliceRole2"},
|
|
Options: &authpb.UserAddOptions{
|
|
NoPassword: true,
|
|
},
|
|
})
|
|
},
|
|
want: &authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("alicePassword"),
|
|
Roles: []string{"aliceRole1", "aliceRole2"},
|
|
Options: &authpb.UserAddOptions{
|
|
NoPassword: true,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "Skips deleted",
|
|
setup: func(tx auth.UnsafeAuthWriter) {
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
})
|
|
tx.UnsafeDeleteUser("alice")
|
|
},
|
|
want: nil,
|
|
},
|
|
{
|
|
name: "Returns data overriden by put",
|
|
setup: func(tx auth.UnsafeAuthWriter) {
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("oldPassword"),
|
|
})
|
|
tx.UnsafePutUser(&authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("newPassword"),
|
|
})
|
|
},
|
|
want: &authpb.User{
|
|
Name: []byte("alice"),
|
|
Password: []byte("newPassword"),
|
|
},
|
|
},
|
|
}
|
|
for _, tc := range tcs {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
lg := zaptest.NewLogger(t)
|
|
be, tmpPath := betesting.NewTmpBackend(t, time.Microsecond, 10)
|
|
abe := NewAuthBackend(lg, be)
|
|
abe.CreateAuthBuckets()
|
|
|
|
tx := abe.BatchTx()
|
|
tx.Lock()
|
|
tc.setup(tx)
|
|
tx.Unlock()
|
|
|
|
abe.ForceCommit()
|
|
be.Close()
|
|
|
|
be2 := backend.NewDefaultBackend(lg, tmpPath)
|
|
defer be2.Close()
|
|
abe2 := NewAuthBackend(lg, be2)
|
|
users := abe2.GetUser("alice")
|
|
|
|
assert.Equal(t, tc.want, users)
|
|
})
|
|
}
|
|
}
|