|
| 1 | +#include <library/cpp/testing/unittest/tests_data.h> |
| 2 | +#include <library/cpp/testing/unittest/registar.h> |
| 3 | + |
| 4 | +#include <ydb/core/base/storage_pools.h> |
| 5 | +#include <ydb/core/testlib/test_client.h> |
| 6 | + |
| 7 | +#include <ydb/public/sdk/cpp/include/ydb-cpp-sdk/client/discovery/discovery.h> |
| 8 | + |
| 9 | +#include "ydb_common_ut.h" |
| 10 | + |
| 11 | +namespace NKikimr { |
| 12 | + |
| 13 | +using namespace Tests; |
| 14 | +using namespace NYdb; |
| 15 | + |
| 16 | +namespace { |
| 17 | + |
| 18 | +struct TServerInitialization { |
| 19 | + bool EnforceUserToken = true; |
| 20 | + std::vector<TString> AdministrationAllowedSids = {}; |
| 21 | + std::vector<TString> MonitoringAllowedSids = {}; |
| 22 | + std::vector<TString> ViewerAllowedSids = {}; |
| 23 | + std::vector<TString> DatabaseAllowedSids = {}; |
| 24 | +}; |
| 25 | + |
| 26 | +NKikimrConfig::TAppConfig GetWhoAmIAppConfig(const TServerInitialization& serverInitialization) { |
| 27 | + auto config = NKikimrConfig::TAppConfig(); |
| 28 | + |
| 29 | + auto& securityConfig = *config.MutableDomainsConfig()->MutableSecurityConfig(); |
| 30 | + securityConfig.SetEnforceUserTokenRequirement(serverInitialization.EnforceUserToken); |
| 31 | + |
| 32 | + for (const auto& sid : serverInitialization.AdministrationAllowedSids) { |
| 33 | + securityConfig.AddAdministrationAllowedSIDs(sid); |
| 34 | + } |
| 35 | + for (const auto& sid : serverInitialization.MonitoringAllowedSids) { |
| 36 | + securityConfig.AddMonitoringAllowedSIDs(sid); |
| 37 | + } |
| 38 | + for (const auto& sid : serverInitialization.ViewerAllowedSids) { |
| 39 | + securityConfig.AddViewerAllowedSIDs(sid); |
| 40 | + } |
| 41 | + for (const auto& sid : serverInitialization.DatabaseAllowedSids) { |
| 42 | + securityConfig.AddDatabaseAllowedSIDs(sid); |
| 43 | + } |
| 44 | + |
| 45 | + return config; |
| 46 | +} |
| 47 | + |
| 48 | +NDiscovery::TWhoAmIResult WhoAmI(ui16 grpc, const TString& token, bool withGroups) { |
| 49 | + TString location = TStringBuilder() << "localhost:" << grpc; |
| 50 | + TDriverConfig config; |
| 51 | + config.SetEndpoint(location); |
| 52 | + config.SetAuthToken(token); |
| 53 | + config.SetDatabase("/Root"); |
| 54 | + auto connection = NYdb::TDriver(config); |
| 55 | + NYdb::NDiscovery::TDiscoveryClient discoveryClient = NYdb::NDiscovery::TDiscoveryClient(connection); |
| 56 | + auto settings = NDiscovery::TWhoAmISettings().WithGroups(withGroups); |
| 57 | + auto result = discoveryClient.WhoAmI(settings).GetValueSync(); |
| 58 | + connection.Stop(true); |
| 59 | + return result; |
| 60 | +} |
| 61 | + |
| 62 | +} // namespace |
| 63 | + |
| 64 | +Y_UNIT_TEST_SUITE(TWhoAmI) { |
| 65 | + |
| 66 | + Y_UNIT_TEST(WhoAmIBasic) { |
| 67 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 68 | + .EnforceUserToken = true |
| 69 | + })); |
| 70 | + ui16 grpc = server.GetPort(); |
| 71 | + |
| 72 | + auto result = WhoAmI(grpc, "user1@builtin", false); |
| 73 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 74 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 75 | + } |
| 76 | + |
| 77 | + Y_UNIT_TEST(WhoAmIWithGroups) { |
| 78 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 79 | + .EnforceUserToken = true |
| 80 | + })); |
| 81 | + ui16 grpc = server.GetPort(); |
| 82 | + |
| 83 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 84 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 85 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 86 | + // Check that we got groups (even if empty, the call should succeed) |
| 87 | + auto groups = result.GetGroups(); |
| 88 | + // User might have groups or not, depending on setup |
| 89 | + } |
| 90 | + |
| 91 | + Y_UNIT_TEST(WhoAmIWithPermissions_NoPermissions) { |
| 92 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 93 | + .EnforceUserToken = true, |
| 94 | + .AdministrationAllowedSids = {}, |
| 95 | + .MonitoringAllowedSids = {}, |
| 96 | + .ViewerAllowedSids = {}, |
| 97 | + .DatabaseAllowedSids = {} |
| 98 | + })); |
| 99 | + ui16 grpc = server.GetPort(); |
| 100 | + |
| 101 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 102 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 103 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 104 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), true); |
| 105 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 106 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), false); |
| 107 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), false); |
| 108 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), false); |
| 109 | + } |
| 110 | + |
| 111 | + Y_UNIT_TEST(WhoAmIWithPermissions_DatabaseAllowed) { |
| 112 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 113 | + .EnforceUserToken = true, |
| 114 | + .DatabaseAllowedSids = {"user1@builtin"} |
| 115 | + })); |
| 116 | + ui16 grpc = server.GetPort(); |
| 117 | + |
| 118 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 119 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 120 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 121 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), true); |
| 122 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 123 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), false); |
| 124 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), false); |
| 125 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), true); |
| 126 | + } |
| 127 | + |
| 128 | + Y_UNIT_TEST(WhoAmIWithPermissions_ViewerAllowed) { |
| 129 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 130 | + .EnforceUserToken = true, |
| 131 | + .ViewerAllowedSids = {"user1@builtin"} |
| 132 | + })); |
| 133 | + ui16 grpc = server.GetPort(); |
| 134 | + |
| 135 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 136 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 137 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 138 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), true); |
| 139 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 140 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), false); |
| 141 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), true); |
| 142 | + // Viewer implies database access |
| 143 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), true); |
| 144 | + } |
| 145 | + |
| 146 | + Y_UNIT_TEST(WhoAmIWithPermissions_MonitoringAllowed) { |
| 147 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 148 | + .EnforceUserToken = true, |
| 149 | + .MonitoringAllowedSids = {"user1@builtin"} |
| 150 | + })); |
| 151 | + ui16 grpc = server.GetPort(); |
| 152 | + |
| 153 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 154 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 155 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 156 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), true); |
| 157 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 158 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), true); |
| 159 | + // Monitoring implies viewer and database access |
| 160 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), true); |
| 161 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), true); |
| 162 | + } |
| 163 | + |
| 164 | + Y_UNIT_TEST(WhoAmIWithPermissions_AdministrationAllowed) { |
| 165 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 166 | + .EnforceUserToken = true, |
| 167 | + .AdministrationAllowedSids = {"user1@builtin"} |
| 168 | + })); |
| 169 | + ui16 grpc = server.GetPort(); |
| 170 | + |
| 171 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 172 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 173 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 174 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), true); |
| 175 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), true); |
| 176 | + // Administration implies all other permissions |
| 177 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), true); |
| 178 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), true); |
| 179 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), true); |
| 180 | + } |
| 181 | + |
| 182 | + Y_UNIT_TEST(WhoAmIWithPermissions_TokenNotRequired) { |
| 183 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 184 | + .EnforceUserToken = false |
| 185 | + })); |
| 186 | + ui16 grpc = server.GetPort(); |
| 187 | + |
| 188 | + auto result = WhoAmI(grpc, "user1@builtin", true); |
| 189 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 190 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), false); |
| 191 | + } |
| 192 | + |
| 193 | + Y_UNIT_TEST(WhoAmIWithoutGroups_NoPermissions) { |
| 194 | + // When withGroups is false, permission fields should not be populated |
| 195 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 196 | + .EnforceUserToken = true, |
| 197 | + .AdministrationAllowedSids = {"user1@builtin"} |
| 198 | + })); |
| 199 | + ui16 grpc = server.GetPort(); |
| 200 | + |
| 201 | + auto result = WhoAmI(grpc, "user1@builtin", false); |
| 202 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 203 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "user1@builtin"); |
| 204 | + // Without groups flag, permissions should not be populated (all false) |
| 205 | + UNIT_ASSERT_VALUES_EQUAL(result.IsTokenRequired(), false); |
| 206 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 207 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), false); |
| 208 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), false); |
| 209 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), false); |
| 210 | + } |
| 211 | + |
| 212 | + Y_UNIT_TEST(WhoAmIWithPermissions_DifferentUser) { |
| 213 | + TBasicKikimrWithGrpcAndRootSchema<TKikimrTestWithAuth> server(GetWhoAmIAppConfig({ |
| 214 | + .EnforceUserToken = true, |
| 215 | + .AdministrationAllowedSids = {"admin@builtin"}, |
| 216 | + .ViewerAllowedSids = {"viewer@builtin"} |
| 217 | + })); |
| 218 | + ui16 grpc = server.GetPort(); |
| 219 | + |
| 220 | + // Test admin user |
| 221 | + { |
| 222 | + auto result = WhoAmI(grpc, "admin@builtin", true); |
| 223 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 224 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "admin@builtin"); |
| 225 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), true); |
| 226 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), true); |
| 227 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), true); |
| 228 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), true); |
| 229 | + } |
| 230 | + |
| 231 | + // Test viewer user |
| 232 | + { |
| 233 | + auto result = WhoAmI(grpc, "viewer@builtin", true); |
| 234 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 235 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "viewer@builtin"); |
| 236 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 237 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), false); |
| 238 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), true); |
| 239 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), true); |
| 240 | + } |
| 241 | + |
| 242 | + // Test regular user |
| 243 | + { |
| 244 | + auto result = WhoAmI(grpc, "regular@builtin", true); |
| 245 | + UNIT_ASSERT_C(result.IsSuccess(), result.GetIssues().ToOneLineString()); |
| 246 | + UNIT_ASSERT_STRINGS_EQUAL(result.GetUserName(), "regular@builtin"); |
| 247 | + UNIT_ASSERT_VALUES_EQUAL(result.IsAdministrationAllowed(), false); |
| 248 | + UNIT_ASSERT_VALUES_EQUAL(result.IsMonitoringAllowed(), false); |
| 249 | + UNIT_ASSERT_VALUES_EQUAL(result.IsViewerAllowed(), false); |
| 250 | + UNIT_ASSERT_VALUES_EQUAL(result.IsDatabaseAllowed(), false); |
| 251 | + } |
| 252 | + } |
| 253 | +} |
| 254 | + |
| 255 | +} // namespace NKikimr |
0 commit comments