package testutils import ( "testing" "github.com/stretchr/testify/require" "github.com/hashicorp/go-uuid" "github.com/hashicorp/consul/acl" "github.com/hashicorp/consul/acl/resolver" "github.com/hashicorp/consul/agent/structs" ) func ACLAnonymous(t *testing.T) resolver.Result { t.Helper() return resolver.Result{ Authorizer: acl.DenyAll(), ACLIdentity: &structs.ACLToken{ AccessorID: structs.ACLTokenAnonymousID, }, } } func ACLAllowAll(t *testing.T) resolver.Result { t.Helper() return resolver.Result{ Authorizer: acl.AllowAll(), ACLIdentity: randomACLIdentity(t), } } func ACLNoPermissions(t *testing.T) resolver.Result { t.Helper() return resolver.Result{ Authorizer: acl.DenyAll(), ACLIdentity: randomACLIdentity(t), } } func ACLServiceWriteAny(t *testing.T) resolver.Result { t.Helper() policy, err := acl.NewPolicyFromSource(` service "foo" { policy = "write" } `, acl.SyntaxCurrent, nil, nil) require.NoError(t, err) authz, err := acl.NewPolicyAuthorizerWithDefaults(acl.DenyAll(), []*acl.Policy{policy}, nil) require.NoError(t, err) return resolver.Result{ Authorizer: authz, ACLIdentity: randomACLIdentity(t), } } func ACLServiceRead(t *testing.T, serviceName string) resolver.Result { t.Helper() aclRule := &acl.Policy{ PolicyRules: acl.PolicyRules{ Services: []*acl.ServiceRule{ { Name: serviceName, Policy: acl.PolicyRead, }, }, }, } authz, err := acl.NewPolicyAuthorizerWithDefaults(acl.DenyAll(), []*acl.Policy{aclRule}, nil) require.NoError(t, err) return resolver.Result{ Authorizer: authz, ACLIdentity: randomACLIdentity(t), } } func randomACLIdentity(t *testing.T) structs.ACLIdentity { id, err := uuid.GenerateUUID() require.NoError(t, err) return &structs.ACLToken{AccessorID: id} }