mirror of https://github.com/status-im/consul.git
3514 lines
117 KiB
Go
3514 lines
117 KiB
Go
// Copyright (c) HashiCorp, Inc.
|
|
// SPDX-License-Identifier: BUSL-1.1
|
|
|
|
package acl
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
//
|
|
// The following 1 line functions are created to all conform to what
|
|
// can be stored in the aclCheck type to make defining ACL tests
|
|
// nicer in the embedded struct within TestACL
|
|
//
|
|
|
|
func checkAllowACLRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ACLRead(entCtx))
|
|
}
|
|
|
|
func checkAllowACLWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ACLWrite(entCtx))
|
|
}
|
|
|
|
func checkAllowAgentRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.AgentRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowAgentWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.AgentWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowEventRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.EventRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowEventWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.EventWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowIdentityRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IdentityRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowIdentityReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IdentityReadAll(entCtx))
|
|
}
|
|
|
|
func checkAllowIdentityWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IdentityWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowIdentityWriteAny(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IdentityWriteAny(entCtx))
|
|
}
|
|
|
|
func checkAllowIntentionDefaultAllow(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IntentionDefaultAllow(entCtx))
|
|
}
|
|
|
|
func checkAllowIntentionRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IntentionRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowIntentionWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.IntentionWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowKeyRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.KeyRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowKeyList(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.KeyList(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowKeyringRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.KeyringRead(entCtx))
|
|
}
|
|
|
|
func checkAllowKeyringWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.KeyringWrite(entCtx))
|
|
}
|
|
|
|
func checkAllowKeyWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.KeyWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowKeyWritePrefix(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.KeyWritePrefix(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowNodeRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.NodeRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowNodeReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.NodeReadAll(entCtx))
|
|
}
|
|
|
|
func checkAllowNodeWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.NodeWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowMeshRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.MeshRead(entCtx))
|
|
}
|
|
|
|
func checkAllowMeshWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.MeshWrite(entCtx))
|
|
}
|
|
|
|
func checkAllowPeeringRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.PeeringRead(entCtx))
|
|
}
|
|
|
|
func checkAllowPeeringWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.PeeringWrite(entCtx))
|
|
}
|
|
|
|
func checkAllowOperatorRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.OperatorRead(entCtx))
|
|
}
|
|
|
|
func checkAllowOperatorWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.OperatorWrite(entCtx))
|
|
}
|
|
|
|
func checkAllowPreparedQueryRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.PreparedQueryRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowPreparedQueryWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.PreparedQueryWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowServiceRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ServiceRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowServiceReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ServiceReadAll(entCtx))
|
|
}
|
|
|
|
func checkAllowServiceWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ServiceWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowServiceWriteAny(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ServiceWriteAny(entCtx))
|
|
}
|
|
|
|
func checkAllowSessionRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.SessionRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowSessionWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.SessionWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowSnapshot(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.Snapshot(entCtx))
|
|
}
|
|
|
|
func checkAllowTrafficPermissionsRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.TrafficPermissionsRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkAllowTrafficPermissionsWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.TrafficPermissionsWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyACLRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ACLRead(entCtx))
|
|
}
|
|
|
|
func checkDenyACLWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ACLWrite(entCtx))
|
|
}
|
|
|
|
func checkDenyAgentRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.AgentRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyAgentWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.AgentWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyEventRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.EventRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyEventWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.EventWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyIdentityRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IdentityRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyIdentityReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IdentityReadAll(entCtx))
|
|
}
|
|
|
|
func checkDenyIdentityWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IdentityWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyIdentityWriteAny(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IdentityWriteAny(entCtx))
|
|
}
|
|
|
|
func checkDenyIntentionDefaultAllow(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IntentionDefaultAllow(entCtx))
|
|
}
|
|
|
|
func checkDenyIntentionRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IntentionRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyIntentionWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.IntentionWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyKeyRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.KeyRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyKeyList(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.KeyList(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyKeyringRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.KeyringRead(entCtx))
|
|
}
|
|
|
|
func checkDenyKeyringWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.KeyringWrite(entCtx))
|
|
}
|
|
|
|
func checkDenyKeyWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.KeyWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyKeyWritePrefix(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.KeyWritePrefix(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyNodeRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.NodeRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyNodeReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.NodeReadAll(entCtx))
|
|
}
|
|
|
|
func checkDenyNodeWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.NodeWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyMeshRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.MeshRead(entCtx))
|
|
}
|
|
|
|
func checkDenyMeshWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.MeshWrite(entCtx))
|
|
}
|
|
|
|
func checkDenyPeeringRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.PeeringRead(entCtx))
|
|
}
|
|
|
|
func checkDenyPeeringWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.PeeringWrite(entCtx))
|
|
}
|
|
|
|
func checkDenyOperatorRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.OperatorRead(entCtx))
|
|
}
|
|
|
|
func checkDenyOperatorWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.OperatorWrite(entCtx))
|
|
}
|
|
|
|
func checkDenyPreparedQueryRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.PreparedQueryRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyPreparedQueryWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.PreparedQueryWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyServiceRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ServiceRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyServiceReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ServiceReadAll(entCtx))
|
|
}
|
|
|
|
func checkAllowServiceReadPrefix(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Allow, authz.ServiceReadPrefix(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyServiceReadPrefix(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ServiceReadPrefix(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyServiceWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ServiceWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyServiceWriteAny(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.ServiceWriteAny(entCtx))
|
|
}
|
|
|
|
func checkDenySessionRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.SessionRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenySessionWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.SessionWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenySnapshot(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.Snapshot(entCtx))
|
|
}
|
|
|
|
func checkDenyTrafficPermissionsRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.TrafficPermissionsRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDenyTrafficPermissionsWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Deny, authz.TrafficPermissionsWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultACLRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ACLRead(entCtx))
|
|
}
|
|
|
|
func checkDefaultACLWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ACLWrite(entCtx))
|
|
}
|
|
|
|
func checkDefaultAgentRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.AgentRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultAgentWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.AgentWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultEventRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.EventRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultEventWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.EventWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultIdentityRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IdentityRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultIdentityReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IdentityReadAll(entCtx))
|
|
}
|
|
|
|
func checkDefaultIdentityWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IdentityWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultIdentityWriteAny(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IdentityWriteAny(entCtx))
|
|
}
|
|
|
|
func checkDefaultIntentionDefaultAllow(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IntentionDefaultAllow(entCtx))
|
|
}
|
|
|
|
func checkDefaultIntentionRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IntentionRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultIntentionWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.IntentionWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultKeyRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.KeyRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultKeyList(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.KeyList(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultKeyringRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.KeyringRead(entCtx))
|
|
}
|
|
|
|
func checkDefaultKeyringWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.KeyringWrite(entCtx))
|
|
}
|
|
|
|
func checkDefaultKeyWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.KeyWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultKeyWritePrefix(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.KeyWritePrefix(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultNodeRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.NodeRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultNodeReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.NodeReadAll(entCtx))
|
|
}
|
|
|
|
func checkDefaultNodeWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.NodeWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultMeshRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.MeshRead(entCtx))
|
|
}
|
|
|
|
func checkDefaultMeshWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.MeshWrite(entCtx))
|
|
}
|
|
|
|
func checkDefaultPeeringRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.PeeringRead(entCtx))
|
|
}
|
|
|
|
func checkDefaultPeeringWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.PeeringWrite(entCtx))
|
|
}
|
|
|
|
func checkDefaultOperatorRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.OperatorRead(entCtx))
|
|
}
|
|
|
|
func checkDefaultOperatorWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.OperatorWrite(entCtx))
|
|
}
|
|
|
|
func checkDefaultPreparedQueryRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.PreparedQueryRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultPreparedQueryWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.PreparedQueryWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultServiceRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ServiceRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultServiceReadAll(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ServiceReadAll(entCtx))
|
|
}
|
|
|
|
func checkDefaultServiceReadPrefix(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ServiceReadPrefix(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultServiceWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ServiceWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultServiceWriteAny(t *testing.T, authz Authorizer, _ string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.ServiceWriteAny(entCtx))
|
|
}
|
|
|
|
func checkDefaultSessionRead(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.SessionRead(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultSessionWrite(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.SessionWrite(prefix, entCtx))
|
|
}
|
|
|
|
func checkDefaultSnapshot(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext) {
|
|
require.Equal(t, Default, authz.Snapshot(entCtx))
|
|
}
|
|
|
|
func TestACL(t *testing.T) {
|
|
type aclCheck struct {
|
|
name string
|
|
prefix string
|
|
check func(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext)
|
|
}
|
|
|
|
type aclTest struct {
|
|
name string
|
|
defaultPolicy Authorizer
|
|
policyStack []*Policy
|
|
checks []aclCheck
|
|
}
|
|
|
|
tests := []aclTest{
|
|
{
|
|
name: "DenyAll",
|
|
defaultPolicy: DenyAll(),
|
|
checks: []aclCheck{
|
|
{name: "DenyACLRead", check: checkDenyACLRead},
|
|
{name: "DenyACLWrite", check: checkDenyACLWrite},
|
|
{name: "DenyAgentRead", check: checkDenyAgentRead},
|
|
{name: "DenyAgentWrite", check: checkDenyAgentWrite},
|
|
{name: "DenyEventRead", check: checkDenyEventRead},
|
|
{name: "DenyEventWrite", check: checkDenyEventWrite},
|
|
{name: "DenyIntentionDefaultAllow", check: checkDenyIntentionDefaultAllow},
|
|
{name: "DenyIntentionRead", check: checkDenyIntentionRead},
|
|
{name: "DenyIntentionWrite", check: checkDenyIntentionWrite},
|
|
{name: "DenyIdentityRead", check: checkDenyIdentityRead},
|
|
{name: "DenyIdentityReadAll", check: checkDenyIdentityReadAll},
|
|
{name: "DenyIdentityWrite", check: checkDenyIdentityWrite},
|
|
{name: "DenyIdentityWriteAny", check: checkDenyIdentityWriteAny},
|
|
{name: "DenyKeyRead", check: checkDenyKeyRead},
|
|
{name: "DenyKeyringRead", check: checkDenyKeyringRead},
|
|
{name: "DenyKeyringWrite", check: checkDenyKeyringWrite},
|
|
{name: "DenyKeyWrite", check: checkDenyKeyWrite},
|
|
{name: "DenyNodeRead", check: checkDenyNodeRead},
|
|
{name: "DenyNodeReadAll", check: checkDenyNodeReadAll},
|
|
{name: "DenyNodeWrite", check: checkDenyNodeWrite},
|
|
{name: "DenyMeshRead", check: checkDenyMeshRead},
|
|
{name: "DenyMeshWrite", check: checkDenyMeshWrite},
|
|
{name: "DenyPeeringRead", check: checkDenyPeeringRead},
|
|
{name: "DenyPeeringWrite", check: checkDenyPeeringWrite},
|
|
{name: "DenyOperatorRead", check: checkDenyOperatorRead},
|
|
{name: "DenyOperatorWrite", check: checkDenyOperatorWrite},
|
|
{name: "DenyPreparedQueryRead", check: checkDenyPreparedQueryRead},
|
|
{name: "DenyPreparedQueryWrite", check: checkDenyPreparedQueryWrite},
|
|
{name: "DenyServiceRead", check: checkDenyServiceRead},
|
|
{name: "DenyServiceReadAll", check: checkDenyServiceReadAll},
|
|
{name: "DenyServiceWrite", check: checkDenyServiceWrite},
|
|
{name: "DenyServiceWriteAny", check: checkDenyServiceWriteAny},
|
|
{name: "DenySessionRead", check: checkDenySessionRead},
|
|
{name: "DenySessionWrite", check: checkDenySessionWrite},
|
|
{name: "DenySnapshot", check: checkDenySnapshot},
|
|
},
|
|
},
|
|
{
|
|
name: "AllowAll",
|
|
defaultPolicy: AllowAll(),
|
|
checks: []aclCheck{
|
|
{name: "DenyACLRead", check: checkDenyACLRead},
|
|
{name: "DenyACLWrite", check: checkDenyACLWrite},
|
|
{name: "AllowAgentRead", check: checkAllowAgentRead},
|
|
{name: "AllowAgentWrite", check: checkAllowAgentWrite},
|
|
{name: "AllowEventRead", check: checkAllowEventRead},
|
|
{name: "AllowEventWrite", check: checkAllowEventWrite},
|
|
{name: "AllowIdentityRead", check: checkAllowIdentityRead},
|
|
{name: "AllowIdentityReadAll", check: checkAllowIdentityReadAll},
|
|
{name: "AllowIdentityWrite", check: checkAllowIdentityWrite},
|
|
{name: "AllowIdentityWriteAny", check: checkAllowIdentityWriteAny},
|
|
{name: "AllowIntentionDefaultAllow", check: checkAllowIntentionDefaultAllow},
|
|
{name: "AllowIntentionRead", check: checkAllowIntentionRead},
|
|
{name: "AllowIntentionWrite", check: checkAllowIntentionWrite},
|
|
{name: "AllowKeyRead", check: checkAllowKeyRead},
|
|
{name: "AllowKeyringRead", check: checkAllowKeyringRead},
|
|
{name: "AllowKeyringWrite", check: checkAllowKeyringWrite},
|
|
{name: "AllowKeyWrite", check: checkAllowKeyWrite},
|
|
{name: "AllowNodeRead", check: checkAllowNodeRead},
|
|
{name: "AllowNodeReadAll", check: checkAllowNodeReadAll},
|
|
{name: "AllowNodeWrite", check: checkAllowNodeWrite},
|
|
{name: "AllowMeshRead", check: checkAllowMeshRead},
|
|
{name: "AllowMeshWrite", check: checkAllowMeshWrite},
|
|
{name: "AllowPeeringRead", check: checkAllowPeeringRead},
|
|
{name: "AllowPeeringWrite", check: checkAllowPeeringWrite},
|
|
{name: "AllowOperatorRead", check: checkAllowOperatorRead},
|
|
{name: "AllowOperatorWrite", check: checkAllowOperatorWrite},
|
|
{name: "AllowPreparedQueryRead", check: checkAllowPreparedQueryRead},
|
|
{name: "AllowPreparedQueryWrite", check: checkAllowPreparedQueryWrite},
|
|
{name: "AllowServiceRead", check: checkAllowServiceRead},
|
|
{name: "AllowServiceReadAll", check: checkAllowServiceReadAll},
|
|
{name: "AllowServiceWrite", check: checkAllowServiceWrite},
|
|
{name: "AllowServiceWriteAny", check: checkAllowServiceWriteAny},
|
|
{name: "AllowSessionRead", check: checkAllowSessionRead},
|
|
{name: "AllowSessionWrite", check: checkAllowSessionWrite},
|
|
{name: "DenySnapshot", check: checkDenySnapshot},
|
|
{name: "AllowTrafficPermissionsRead", check: checkAllowTrafficPermissionsRead},
|
|
{name: "AllowTrafficPermissionsWrite", check: checkAllowTrafficPermissionsWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "ManageAll",
|
|
defaultPolicy: ManageAll(),
|
|
checks: []aclCheck{
|
|
{name: "AllowACLRead", check: checkAllowACLRead},
|
|
{name: "AllowACLWrite", check: checkAllowACLWrite},
|
|
{name: "AllowAgentRead", check: checkAllowAgentRead},
|
|
{name: "AllowAgentWrite", check: checkAllowAgentWrite},
|
|
{name: "AllowEventRead", check: checkAllowEventRead},
|
|
{name: "AllowEventWrite", check: checkAllowEventWrite},
|
|
{name: "AllowIdentityRead", check: checkAllowIdentityRead},
|
|
{name: "AllowIdentityReadAll", check: checkAllowIdentityReadAll},
|
|
{name: "AllowIdentityWrite", check: checkAllowIdentityWrite},
|
|
{name: "AllowIdentityWriteAny", check: checkAllowIdentityWriteAny},
|
|
{name: "AllowIntentionDefaultAllow", check: checkAllowIntentionDefaultAllow},
|
|
{name: "AllowIntentionRead", check: checkAllowIntentionRead},
|
|
{name: "AllowIntentionWrite", check: checkAllowIntentionWrite},
|
|
{name: "AllowKeyRead", check: checkAllowKeyRead},
|
|
{name: "AllowKeyringRead", check: checkAllowKeyringRead},
|
|
{name: "AllowKeyringWrite", check: checkAllowKeyringWrite},
|
|
{name: "AllowKeyWrite", check: checkAllowKeyWrite},
|
|
{name: "AllowNodeRead", check: checkAllowNodeRead},
|
|
{name: "AllowNodeReadAll", check: checkAllowNodeReadAll},
|
|
{name: "AllowNodeWrite", check: checkAllowNodeWrite},
|
|
{name: "AllowMeshRead", check: checkAllowMeshRead},
|
|
{name: "AllowMeshWrite", check: checkAllowMeshWrite},
|
|
{name: "AllowPeeringRead", check: checkAllowPeeringRead},
|
|
{name: "AllowPeeringWrite", check: checkAllowPeeringWrite},
|
|
{name: "AllowOperatorRead", check: checkAllowOperatorRead},
|
|
{name: "AllowOperatorWrite", check: checkAllowOperatorWrite},
|
|
{name: "AllowPreparedQueryRead", check: checkAllowPreparedQueryRead},
|
|
{name: "AllowPreparedQueryWrite", check: checkAllowPreparedQueryWrite},
|
|
{name: "AllowServiceRead", check: checkAllowServiceRead},
|
|
{name: "AllowServiceReadAll", check: checkAllowServiceReadAll},
|
|
{name: "AllowServiceWrite", check: checkAllowServiceWrite},
|
|
{name: "AllowServiceWriteAny", check: checkAllowServiceWriteAny},
|
|
{name: "AllowSessionRead", check: checkAllowSessionRead},
|
|
{name: "AllowSessionWrite", check: checkAllowSessionWrite},
|
|
{name: "AllowSnapshot", check: checkAllowSnapshot},
|
|
{name: "AllowTrafficPermissionsRead", check: checkAllowTrafficPermissionsRead},
|
|
{name: "AllowTrafficPermissionsWrite", check: checkAllowTrafficPermissionsWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "AgentBasicDefaultDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "root",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "root",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "DefaultReadDenied", prefix: "ro", check: checkDenyAgentRead},
|
|
{name: "DefaultWriteDenied", prefix: "ro", check: checkDenyAgentWrite},
|
|
{name: "ROReadAllowed", prefix: "root", check: checkAllowAgentRead},
|
|
{name: "ROWriteDenied", prefix: "root", check: checkDenyAgentWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro", check: checkAllowAgentRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro", check: checkDenyAgentWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowAgentRead},
|
|
{name: "RWWriteDenied", prefix: "root-rw", check: checkAllowAgentWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-sub", check: checkAllowAgentRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-sub", check: checkAllowAgentWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenyAgentRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenyAgentWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-sub", check: checkDenyAgentRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-sub", check: checkDenyAgentWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "AgentBasicDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "root",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "root",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "DefaultReadDenied", prefix: "ro", check: checkAllowAgentRead},
|
|
{name: "DefaultWriteDenied", prefix: "ro", check: checkAllowAgentWrite},
|
|
{name: "ROReadAllowed", prefix: "root", check: checkAllowAgentRead},
|
|
{name: "ROWriteDenied", prefix: "root", check: checkDenyAgentWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro", check: checkAllowAgentRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro", check: checkDenyAgentWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowAgentRead},
|
|
{name: "RWWriteDenied", prefix: "root-rw", check: checkAllowAgentWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-sub", check: checkAllowAgentRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-sub", check: checkAllowAgentWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenyAgentRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenyAgentWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-sub", check: checkDenyAgentRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-sub", check: checkDenyAgentWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PreparedQueryDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
PreparedQueries: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "other",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
PreparedQueryPrefixes: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "other",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "ReadAllowed", prefix: "foo", check: checkAllowPreparedQueryRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteAllowed", prefix: "foo", check: checkAllowPreparedQueryWrite},
|
|
{name: "ReadDenied", prefix: "other", check: checkDenyPreparedQueryRead},
|
|
{name: "WriteDenied", prefix: "other", check: checkDenyPreparedQueryWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "AgentNestedDefaultDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "DefaultReadDenied", prefix: "nope", check: checkDenyAgentRead},
|
|
{name: "DefaultWriteDenied", prefix: "nope", check: checkDenyAgentWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenyAgentRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenyAgentWrite},
|
|
{name: "ROReadAllowed", prefix: "root-ro", check: checkAllowAgentRead},
|
|
{name: "ROWriteDenied", prefix: "root-ro", check: checkDenyAgentWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowAgentRead},
|
|
{name: "RWWriteAllowed", prefix: "root-rw", check: checkAllowAgentWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-prefix", check: checkDenyAgentRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-prefix", check: checkDenyAgentWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro-prefix", check: checkAllowAgentRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro-prefix", check: checkDenyAgentWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-prefix", check: checkAllowAgentRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-prefix", check: checkAllowAgentWrite},
|
|
{name: "ChildDenyReadDenied", prefix: "child-nope", check: checkDenyAgentRead},
|
|
{name: "ChildDenyWriteDenied", prefix: "child-nope", check: checkDenyAgentWrite},
|
|
{name: "ChildROReadAllowed", prefix: "child-ro", check: checkAllowAgentRead},
|
|
{name: "ChildROWriteDenied", prefix: "child-ro", check: checkDenyAgentWrite},
|
|
{name: "ChildRWReadAllowed", prefix: "child-rw", check: checkAllowAgentRead},
|
|
{name: "ChildRWWriteAllowed", prefix: "child-rw", check: checkAllowAgentWrite},
|
|
{name: "ChildDenySuffixReadDenied", prefix: "child-nope-prefix", check: checkDenyAgentRead},
|
|
{name: "ChildDenySuffixWriteDenied", prefix: "child-nope-prefix", check: checkDenyAgentWrite},
|
|
{name: "ChildROSuffixReadAllowed", prefix: "child-ro-prefix", check: checkAllowAgentRead},
|
|
{name: "ChildROSuffixWriteDenied", prefix: "child-ro-prefix", check: checkDenyAgentWrite},
|
|
{name: "ChildRWSuffixReadAllowed", prefix: "child-rw-prefix", check: checkAllowAgentRead},
|
|
{name: "ChildRWSuffixWriteAllowed", prefix: "child-rw-prefix", check: checkAllowAgentWrite},
|
|
{name: "ChildOverrideReadAllowed", prefix: "override", check: checkAllowAgentRead},
|
|
{name: "ChildOverrideWriteAllowed", prefix: "override", check: checkAllowAgentWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "AgentNestedDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "DefaultReadAllowed", prefix: "nope", check: checkAllowAgentRead},
|
|
{name: "DefaultWriteAllowed", prefix: "nope", check: checkAllowAgentWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenyAgentRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenyAgentWrite},
|
|
{name: "ROReadAllowed", prefix: "root-ro", check: checkAllowAgentRead},
|
|
{name: "ROWriteDenied", prefix: "root-ro", check: checkDenyAgentWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowAgentRead},
|
|
{name: "RWWriteAllowed", prefix: "root-rw", check: checkAllowAgentWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-prefix", check: checkDenyAgentRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-prefix", check: checkDenyAgentWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro-prefix", check: checkAllowAgentRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro-prefix", check: checkDenyAgentWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-prefix", check: checkAllowAgentRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-prefix", check: checkAllowAgentWrite},
|
|
{name: "ChildDenyReadDenied", prefix: "child-nope", check: checkDenyAgentRead},
|
|
{name: "ChildDenyWriteDenied", prefix: "child-nope", check: checkDenyAgentWrite},
|
|
{name: "ChildROReadAllowed", prefix: "child-ro", check: checkAllowAgentRead},
|
|
{name: "ChildROWriteDenied", prefix: "child-ro", check: checkDenyAgentWrite},
|
|
{name: "ChildRWReadAllowed", prefix: "child-rw", check: checkAllowAgentRead},
|
|
{name: "ChildRWWriteAllowed", prefix: "child-rw", check: checkAllowAgentWrite},
|
|
{name: "ChildDenySuffixReadDenied", prefix: "child-nope-prefix", check: checkDenyAgentRead},
|
|
{name: "ChildDenySuffixWriteDenied", prefix: "child-nope-prefix", check: checkDenyAgentWrite},
|
|
{name: "ChildROSuffixReadAllowed", prefix: "child-ro-prefix", check: checkAllowAgentRead},
|
|
{name: "ChildROSuffixWriteDenied", prefix: "child-ro-prefix", check: checkDenyAgentWrite},
|
|
{name: "ChildRWSuffixReadAllowed", prefix: "child-rw-prefix", check: checkAllowAgentRead},
|
|
{name: "ChildRWSuffixWriteAllowed", prefix: "child-rw-prefix", check: checkAllowAgentWrite},
|
|
{name: "ChildOverrideReadAllowed", prefix: "override", check: checkAllowAgentRead},
|
|
{name: "ChildOverrideWriteAllowed", prefix: "override", check: checkAllowAgentWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "IdentityDefaultAllowPolicyDeny",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Identities: []*IdentityRule{
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
IdentityPrefixes: []*IdentityRule{
|
|
{
|
|
Name: "prefix",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "IdentityFooReadDenied", prefix: "foo", check: checkDenyIdentityRead},
|
|
{name: "IdentityFooWriteDenied", prefix: "foo", check: checkDenyIdentityWrite},
|
|
{name: "IdentityPrefixReadDenied", prefix: "prefix", check: checkDenyIdentityRead},
|
|
{name: "IdentityPrefixWriteDenied", prefix: "prefix", check: checkDenyIdentityWrite},
|
|
{name: "IdentityBarReadAllowed", prefix: "fail", check: checkAllowIdentityRead},
|
|
{name: "IdentityBarWriteAllowed", prefix: "fail", check: checkAllowIdentityWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "IdentityDefaultDenyPolicyAllow",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Identities: []*IdentityRule{
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
IdentityPrefixes: []*IdentityRule{
|
|
{
|
|
Name: "prefix",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "IdentityFooReadAllowed", prefix: "foo", check: checkAllowIdentityRead},
|
|
{name: "IdentityFooWriteAllowed", prefix: "foo", check: checkAllowIdentityWrite},
|
|
{name: "IdentityPrefixReadAllowed", prefix: "prefix", check: checkAllowIdentityRead},
|
|
{name: "IdentityPrefixWriteDenied", prefix: "prefix", check: checkDenyIdentityWrite},
|
|
{name: "IdentityBarReadDenied", prefix: "fail", check: checkDenyIdentityRead},
|
|
{name: "IdentityBarWriteDenied", prefix: "fail", check: checkDenyIdentityWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "IdentityDefaultDenyPolicyComplex",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Identities: []*IdentityRule{
|
|
{
|
|
Name: "football",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "prefix-forbidden",
|
|
Policy: PolicyDeny,
|
|
Intentions: PolicyDeny,
|
|
},
|
|
},
|
|
IdentityPrefixes: []*IdentityRule{
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "prefix",
|
|
Policy: PolicyRead,
|
|
Intentions: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Identities: []*IdentityRule{
|
|
{
|
|
Name: "foozball",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "IdentityReadAllowed", prefix: "foo", check: checkAllowIdentityRead},
|
|
{name: "IdentityWriteAllowed", prefix: "foo", check: checkAllowIdentityWrite},
|
|
{name: "TrafficPermissionsReadAllowed", prefix: "foo", check: checkAllowTrafficPermissionsRead},
|
|
{name: "TrafficPermissionsWriteAllowed", prefix: "foo", check: checkAllowTrafficPermissionsWrite},
|
|
{name: "IdentityReadAllowed", prefix: "football", check: checkAllowIdentityRead},
|
|
{name: "IdentityWriteDenied", prefix: "football", check: checkDenyIdentityWrite},
|
|
{name: "TrafficPermissionsReadAllowed", prefix: "football", check: checkAllowTrafficPermissionsRead},
|
|
// This might be surprising but omitting intention rule gives at most intention:read
|
|
// if we have identity:write perms. This matches services as well.
|
|
{name: "TrafficPermissionsWriteDenied", prefix: "football", check: checkDenyTrafficPermissionsWrite},
|
|
{name: "IdentityReadAllowed", prefix: "prefix", check: checkAllowIdentityRead},
|
|
{name: "IdentityWriteDenied", prefix: "prefix", check: checkDenyIdentityWrite},
|
|
{name: "TrafficPermissionsReadAllowed", prefix: "prefix", check: checkAllowTrafficPermissionsRead},
|
|
{name: "TrafficPermissionsWriteDenied", prefix: "prefix", check: checkAllowTrafficPermissionsWrite},
|
|
{name: "IdentityReadDenied", prefix: "prefix-forbidden", check: checkDenyIdentityRead},
|
|
{name: "IdentityWriteDenied", prefix: "prefix-forbidden", check: checkDenyIdentityWrite},
|
|
{name: "TrafficPermissionsReadDenied", prefix: "prefix-forbidden", check: checkDenyTrafficPermissionsRead},
|
|
{name: "TrafficPermissionsWriteDenied", prefix: "prefix-forbidden", check: checkDenyTrafficPermissionsWrite},
|
|
{name: "IdentityReadAllowed", prefix: "foozball", check: checkAllowIdentityRead},
|
|
{name: "IdentityWriteAllowed", prefix: "foozball", check: checkAllowIdentityWrite},
|
|
{name: "TrafficPermissionsReadAllowed", prefix: "foozball", check: checkAllowTrafficPermissionsRead},
|
|
{name: "TrafficPermissionsWriteDenied", prefix: "foozball", check: checkDenyTrafficPermissionsWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultAllowPolicyDeny",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keyring: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyKeyringRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteDenied", check: checkDenyKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultAllowPolicyRead",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keyring: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowKeyringRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteDenied", check: checkDenyKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultAllowPolicyWrite",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keyring: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowKeyringRead},
|
|
{name: "WriteAllowed", check: checkAllowKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultAllowPolicyNone",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowKeyringRead},
|
|
{name: "WriteAllowed", check: checkAllowKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultDenyPolicyDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keyring: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyKeyringRead},
|
|
{name: "WriteDenied", check: checkDenyKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultDenyPolicyRead",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keyring: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowKeyringRead},
|
|
{name: "WriteDenied", check: checkDenyKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultDenyPolicyWrite",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keyring: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowKeyringRead},
|
|
{name: "WriteAllowed", check: checkAllowKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyringDefaultDenyPolicyNone",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyKeyringRead},
|
|
{name: "WriteDenied", check: checkDenyKeyringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultAllowPolicyDeny",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Mesh: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultAllowPolicyRead",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Mesh: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultAllowPolicyWrite",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Mesh: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultAllowPolicyNone",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultDenyPolicyDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Mesh: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultDenyPolicyRead",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Mesh: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultDenyPolicyWrite",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Mesh: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "MeshDefaultDenyPolicyNone",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, m:deny = deny
|
|
name: "MeshOperatorDenyPolicyDeny",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
Mesh: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, m:deny = deny
|
|
name: "MeshOperatorReadPolicyDeny",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
Mesh: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, m:deny = deny
|
|
name: "MeshOperatorWritePolicyDeny",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
Mesh: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, m:read = read
|
|
name: "MeshOperatorDenyPolicyRead",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
Mesh: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, m:read = read
|
|
name: "MeshOperatorReadPolicyRead",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
Mesh: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, m:read = read
|
|
name: "MeshOperatorWritePolicyRead",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
Mesh: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, m:write = write
|
|
name: "MeshOperatorDenyPolicyWrite",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
Mesh: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, m:write = write
|
|
name: "MeshOperatorReadPolicyWrite",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
Mesh: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, m:write = write
|
|
name: "MeshOperatorWritePolicyWrite",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
Mesh: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, m:<none> = deny
|
|
name: "MeshOperatorDenyPolicyNone",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, m:<none> = read
|
|
name: "MeshOperatorReadPolicyNone",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteDenied", check: checkDenyMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, m:<none> = write
|
|
name: "MeshOperatorWritePolicyNone",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowMeshRead},
|
|
{name: "WriteAllowed", check: checkAllowMeshWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultAllowPolicyDeny",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Peering: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultAllowPolicyRead",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Peering: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultAllowPolicyWrite",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Peering: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultAllowPolicyNone",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultDenyPolicyDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Peering: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultDenyPolicyRead",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Peering: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultDenyPolicyWrite",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Peering: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "PeeringDefaultDenyPolicyNone",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, p:deny = deny
|
|
name: "PeeringOperatorDenyPolicyDeny",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
Peering: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, p:deny = deny
|
|
name: "PeeringOperatorReadPolicyDeny",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
Peering: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, p:deny = deny
|
|
name: "PeeringOperatorWritePolicyDeny",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
Peering: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, p:read = read
|
|
name: "PeeringOperatorDenyPolicyRead",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
Peering: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, p:read = read
|
|
name: "PeeringOperatorReadPolicyRead",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
Peering: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, p:read = read
|
|
name: "PeeringOperatorWritePolicyRead",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
Peering: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, p:write = write
|
|
name: "PeeringOperatorDenyPolicyWrite",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
Peering: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, p:write = write
|
|
name: "PeeringOperatorReadPolicyWrite",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
Peering: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, p:write = write
|
|
name: "PeeringOperatorWritePolicyWrite",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
Peering: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:deny, p:<none> = deny
|
|
name: "PeeringOperatorDenyPolicyNone",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:read, p:<none> = read
|
|
name: "PeeringOperatorReadPolicyNone",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteDenied", check: checkDenyPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
// o:write, p:<none> = write
|
|
name: "PeeringOperatorWritePolicyNone",
|
|
defaultPolicy: nil, // test both
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowPeeringRead},
|
|
{name: "WriteAllowed", check: checkAllowPeeringWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultAllowPolicyDeny",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyOperatorRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteDenied", check: checkDenyOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultAllowPolicyRead",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowOperatorRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteDenied", check: checkDenyOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultAllowPolicyWrite",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowOperatorRead},
|
|
{name: "WriteAllowed", check: checkAllowOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultAllowPolicyNone",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowOperatorRead},
|
|
{name: "WriteAllowed", check: checkAllowOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultDenyPolicyDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyOperatorRead},
|
|
{name: "WriteDenied", check: checkDenyOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultDenyPolicyRead",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowOperatorRead},
|
|
{name: "WriteDenied", check: checkDenyOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultDenyPolicyWrite",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Operator: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowOperatorRead},
|
|
{name: "WriteAllowed", check: checkAllowOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "OperatorDefaultDenyPolicyNone",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadDenied", check: checkDenyOperatorRead},
|
|
{name: "WriteDenied", check: checkDenyOperatorWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "NodeDefaultDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Nodes: []*NodeRule{
|
|
{
|
|
Name: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
NodePrefixes: []*NodeRule{
|
|
{
|
|
Name: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Nodes: []*NodeRule{
|
|
{
|
|
Name: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
NodePrefixes: []*NodeRule{
|
|
{
|
|
Name: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllDenied", prefix: "", check: checkDenyNodeReadAll},
|
|
{name: "DefaultReadDenied", prefix: "nope", check: checkDenyNodeRead},
|
|
{name: "DefaultWriteDenied", prefix: "nope", check: checkDenyNodeWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenyNodeRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenyNodeWrite},
|
|
{name: "ROReadAllowed", prefix: "root-ro", check: checkAllowNodeRead},
|
|
{name: "ROWriteDenied", prefix: "root-ro", check: checkDenyNodeWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowNodeRead},
|
|
{name: "RWWriteAllowed", prefix: "root-rw", check: checkAllowNodeWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-prefix", check: checkDenyNodeRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-prefix", check: checkDenyNodeWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro-prefix", check: checkAllowNodeRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro-prefix", check: checkDenyNodeWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-prefix", check: checkAllowNodeRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-prefix", check: checkAllowNodeWrite},
|
|
{name: "ChildDenyReadDenied", prefix: "child-nope", check: checkDenyNodeRead},
|
|
{name: "ChildDenyWriteDenied", prefix: "child-nope", check: checkDenyNodeWrite},
|
|
{name: "ChildROReadAllowed", prefix: "child-ro", check: checkAllowNodeRead},
|
|
{name: "ChildROWriteDenied", prefix: "child-ro", check: checkDenyNodeWrite},
|
|
{name: "ChildRWReadAllowed", prefix: "child-rw", check: checkAllowNodeRead},
|
|
{name: "ChildRWWriteAllowed", prefix: "child-rw", check: checkAllowNodeWrite},
|
|
{name: "ChildDenySuffixReadDenied", prefix: "child-nope-prefix", check: checkDenyNodeRead},
|
|
{name: "ChildDenySuffixWriteDenied", prefix: "child-nope-prefix", check: checkDenyNodeWrite},
|
|
{name: "ChildROSuffixReadAllowed", prefix: "child-ro-prefix", check: checkAllowNodeRead},
|
|
{name: "ChildROSuffixWriteDenied", prefix: "child-ro-prefix", check: checkDenyNodeWrite},
|
|
{name: "ChildRWSuffixReadAllowed", prefix: "child-rw-prefix", check: checkAllowNodeRead},
|
|
{name: "ChildRWSuffixWriteAllowed", prefix: "child-rw-prefix", check: checkAllowNodeWrite},
|
|
{name: "ChildOverrideReadAllowed", prefix: "override", check: checkAllowNodeRead},
|
|
{name: "ChildOverrideWriteAllowed", prefix: "override", check: checkAllowNodeWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "NodeDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Nodes: []*NodeRule{
|
|
{
|
|
Name: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
NodePrefixes: []*NodeRule{
|
|
{
|
|
Name: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Nodes: []*NodeRule{
|
|
{
|
|
Name: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
NodePrefixes: []*NodeRule{
|
|
{
|
|
Name: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllDenied", prefix: "", check: checkDenyNodeReadAll},
|
|
{name: "DefaultReadAllowed", prefix: "nope", check: checkAllowNodeRead},
|
|
{name: "DefaultWriteAllowed", prefix: "nope", check: checkAllowNodeWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenyNodeRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenyNodeWrite},
|
|
{name: "ROReadAllowed", prefix: "root-ro", check: checkAllowNodeRead},
|
|
{name: "ROWriteDenied", prefix: "root-ro", check: checkDenyNodeWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowNodeRead},
|
|
{name: "RWWriteAllowed", prefix: "root-rw", check: checkAllowNodeWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-prefix", check: checkDenyNodeRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-prefix", check: checkDenyNodeWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro-prefix", check: checkAllowNodeRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro-prefix", check: checkDenyNodeWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-prefix", check: checkAllowNodeRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-prefix", check: checkAllowNodeWrite},
|
|
{name: "ChildDenyReadDenied", prefix: "child-nope", check: checkDenyNodeRead},
|
|
{name: "ChildDenyWriteDenied", prefix: "child-nope", check: checkDenyNodeWrite},
|
|
{name: "ChildROReadAllowed", prefix: "child-ro", check: checkAllowNodeRead},
|
|
{name: "ChildROWriteDenied", prefix: "child-ro", check: checkDenyNodeWrite},
|
|
{name: "ChildRWReadAllowed", prefix: "child-rw", check: checkAllowNodeRead},
|
|
{name: "ChildRWWriteAllowed", prefix: "child-rw", check: checkAllowNodeWrite},
|
|
{name: "ChildDenySuffixReadDenied", prefix: "child-nope-prefix", check: checkDenyNodeRead},
|
|
{name: "ChildDenySuffixWriteDenied", prefix: "child-nope-prefix", check: checkDenyNodeWrite},
|
|
{name: "ChildROSuffixReadAllowed", prefix: "child-ro-prefix", check: checkAllowNodeRead},
|
|
{name: "ChildROSuffixWriteDenied", prefix: "child-ro-prefix", check: checkDenyNodeWrite},
|
|
{name: "ChildRWSuffixReadAllowed", prefix: "child-rw-prefix", check: checkAllowNodeRead},
|
|
{name: "ChildRWSuffixWriteAllowed", prefix: "child-rw-prefix", check: checkAllowNodeWrite},
|
|
{name: "ChildOverrideReadAllowed", prefix: "override", check: checkAllowNodeRead},
|
|
{name: "ChildOverrideWriteAllowed", prefix: "override", check: checkAllowNodeWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "SessionDefaultDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Sessions: []*SessionRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
SessionPrefixes: []*SessionRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Sessions: []*SessionRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
SessionPrefixes: []*SessionRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "DefaultReadDenied", prefix: "nope", check: checkDenySessionRead},
|
|
{name: "DefaultWriteDenied", prefix: "nope", check: checkDenySessionWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenySessionRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenySessionWrite},
|
|
{name: "ROReadAllowed", prefix: "root-ro", check: checkAllowSessionRead},
|
|
{name: "ROWriteDenied", prefix: "root-ro", check: checkDenySessionWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowSessionRead},
|
|
{name: "RWWriteAllowed", prefix: "root-rw", check: checkAllowSessionWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-prefix", check: checkDenySessionRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-prefix", check: checkDenySessionWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro-prefix", check: checkAllowSessionRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro-prefix", check: checkDenySessionWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-prefix", check: checkAllowSessionRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-prefix", check: checkAllowSessionWrite},
|
|
{name: "ChildDenyReadDenied", prefix: "child-nope", check: checkDenySessionRead},
|
|
{name: "ChildDenyWriteDenied", prefix: "child-nope", check: checkDenySessionWrite},
|
|
{name: "ChildROReadAllowed", prefix: "child-ro", check: checkAllowSessionRead},
|
|
{name: "ChildROWriteDenied", prefix: "child-ro", check: checkDenySessionWrite},
|
|
{name: "ChildRWReadAllowed", prefix: "child-rw", check: checkAllowSessionRead},
|
|
{name: "ChildRWWriteAllowed", prefix: "child-rw", check: checkAllowSessionWrite},
|
|
{name: "ChildDenySuffixReadDenied", prefix: "child-nope-prefix", check: checkDenySessionRead},
|
|
{name: "ChildDenySuffixWriteDenied", prefix: "child-nope-prefix", check: checkDenySessionWrite},
|
|
{name: "ChildROSuffixReadAllowed", prefix: "child-ro-prefix", check: checkAllowSessionRead},
|
|
{name: "ChildROSuffixWriteDenied", prefix: "child-ro-prefix", check: checkDenySessionWrite},
|
|
{name: "ChildRWSuffixReadAllowed", prefix: "child-rw-prefix", check: checkAllowSessionRead},
|
|
{name: "ChildRWSuffixWriteAllowed", prefix: "child-rw-prefix", check: checkAllowSessionWrite},
|
|
{name: "ChildOverrideReadAllowed", prefix: "override", check: checkAllowSessionRead},
|
|
{name: "ChildOverrideWriteAllowed", prefix: "override", check: checkAllowSessionWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "SessionDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Sessions: []*SessionRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
SessionPrefixes: []*SessionRule{
|
|
{
|
|
Node: "root-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "root-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "root-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Sessions: []*SessionRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
SessionPrefixes: []*SessionRule{
|
|
{
|
|
Node: "child-nope",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Node: "child-ro",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "child-rw",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "override",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "DefaultReadAllowed", prefix: "nope", check: checkAllowSessionRead},
|
|
{name: "DefaultWriteAllowed", prefix: "nope", check: checkAllowSessionWrite},
|
|
{name: "DenyReadDenied", prefix: "root-nope", check: checkDenySessionRead},
|
|
{name: "DenyWriteDenied", prefix: "root-nope", check: checkDenySessionWrite},
|
|
{name: "ROReadAllowed", prefix: "root-ro", check: checkAllowSessionRead},
|
|
{name: "ROWriteDenied", prefix: "root-ro", check: checkDenySessionWrite},
|
|
{name: "RWReadAllowed", prefix: "root-rw", check: checkAllowSessionRead},
|
|
{name: "RWWriteAllowed", prefix: "root-rw", check: checkAllowSessionWrite},
|
|
{name: "DenySuffixReadDenied", prefix: "root-nope-prefix", check: checkDenySessionRead},
|
|
{name: "DenySuffixWriteDenied", prefix: "root-nope-prefix", check: checkDenySessionWrite},
|
|
{name: "ROSuffixReadAllowed", prefix: "root-ro-prefix", check: checkAllowSessionRead},
|
|
{name: "ROSuffixWriteDenied", prefix: "root-ro-prefix", check: checkDenySessionWrite},
|
|
{name: "RWSuffixReadAllowed", prefix: "root-rw-prefix", check: checkAllowSessionRead},
|
|
{name: "RWSuffixWriteAllowed", prefix: "root-rw-prefix", check: checkAllowSessionWrite},
|
|
{name: "ChildDenyReadDenied", prefix: "child-nope", check: checkDenySessionRead},
|
|
{name: "ChildDenyWriteDenied", prefix: "child-nope", check: checkDenySessionWrite},
|
|
{name: "ChildROReadAllowed", prefix: "child-ro", check: checkAllowSessionRead},
|
|
{name: "ChildROWriteDenied", prefix: "child-ro", check: checkDenySessionWrite},
|
|
{name: "ChildRWReadAllowed", prefix: "child-rw", check: checkAllowSessionRead},
|
|
{name: "ChildRWWriteAllowed", prefix: "child-rw", check: checkAllowSessionWrite},
|
|
{name: "ChildDenySuffixReadDenied", prefix: "child-nope-prefix", check: checkDenySessionRead},
|
|
{name: "ChildDenySuffixWriteDenied", prefix: "child-nope-prefix", check: checkDenySessionWrite},
|
|
{name: "ChildROSuffixReadAllowed", prefix: "child-ro-prefix", check: checkAllowSessionRead},
|
|
{name: "ChildROSuffixWriteDenied", prefix: "child-ro-prefix", check: checkDenySessionWrite},
|
|
{name: "ChildRWSuffixReadAllowed", prefix: "child-rw-prefix", check: checkAllowSessionRead},
|
|
{name: "ChildRWSuffixWriteAllowed", prefix: "child-rw-prefix", check: checkAllowSessionWrite},
|
|
{name: "ChildOverrideReadAllowed", prefix: "override", check: checkAllowSessionRead},
|
|
{name: "ChildOverrideWriteAllowed", prefix: "override", check: checkAllowSessionWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "Parent",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keys: []*KeyRule{
|
|
{
|
|
Prefix: "foo/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
KeyPrefixes: []*KeyRule{
|
|
{
|
|
Prefix: "foo/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
PreparedQueries: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "other",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "foo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
PreparedQueryPrefixes: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "other",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "foo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
Services: []*ServiceRule{
|
|
{
|
|
Name: "other",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
ServicePrefixes: []*ServiceRule{
|
|
{
|
|
Name: "other",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keys: []*KeyRule{
|
|
{
|
|
Prefix: "foo/priv/",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "zip/",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
KeyPrefixes: []*KeyRule{
|
|
{
|
|
Prefix: "foo/priv/",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "zip/",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
PreparedQueries: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
PreparedQueryPrefixes: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
Services: []*ServiceRule{
|
|
{
|
|
Name: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
ServicePrefixes: []*ServiceRule{
|
|
{
|
|
Name: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ServiceReadAllDenied", prefix: "", check: checkDenyServiceReadAll},
|
|
{name: "KeyReadDenied", prefix: "other", check: checkDenyKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "other", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "other", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyReadAllowed", prefix: "foo/test", check: checkAllowKeyRead},
|
|
{name: "KeyWriteAllowed", prefix: "foo/test", check: checkAllowKeyWrite},
|
|
{name: "KeyWritePrefixAllowed", prefix: "foo/test", check: checkAllowKeyWritePrefix},
|
|
{name: "KeyReadAllowed", prefix: "foo/priv/test", check: checkAllowKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "foo/priv/test", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "foo/priv/test", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyReadDenied", prefix: "bar/any", check: checkDenyKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "bar/any", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "bar/any", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyReadAllowed", prefix: "zip/test", check: checkAllowKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "zip/test", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "zip/test", check: checkDenyKeyWritePrefix},
|
|
{name: "ServiceReadDenied", prefix: "fail", check: checkDenyServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "fail", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "other", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteAllowed", prefix: "other", check: checkAllowServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "foo", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "foo", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadDenied", prefix: "bar", check: checkDenyServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "bar", check: checkDenyServiceWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "foo", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "foo", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "foobar", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "foobar", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "bar", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "bar", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "barbaz", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "barbaz", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "baz", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "baz", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "nope", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "nope", check: checkDenyPreparedQueryWrite},
|
|
{name: "ACLReadDenied", check: checkDenyACLRead},
|
|
{name: "ACLWriteDenied", check: checkDenyACLWrite},
|
|
{name: "SnapshotDenied", check: checkDenySnapshot},
|
|
{name: "IntentionDefaultAllowDenied", check: checkDenyIntentionDefaultAllow},
|
|
},
|
|
},
|
|
{
|
|
name: "ComplexDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Events: []*EventRule{
|
|
{
|
|
Event: "",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Event: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Event: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
EventPrefixes: []*EventRule{
|
|
{
|
|
Event: "",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Event: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Event: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
Keys: []*KeyRule{
|
|
{
|
|
Prefix: "foo/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "foo/priv/",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "zip/",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "zap/",
|
|
Policy: PolicyList,
|
|
},
|
|
},
|
|
KeyPrefixes: []*KeyRule{
|
|
{
|
|
Prefix: "foo/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "foo/priv/",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "zip/",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "zap/",
|
|
Policy: PolicyList,
|
|
},
|
|
},
|
|
PreparedQueries: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "zoo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
PreparedQueryPrefixes: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Prefix: "zoo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
Services: []*ServiceRule{
|
|
{
|
|
Name: "",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "barfoo",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "intbaz",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyDeny,
|
|
},
|
|
},
|
|
ServicePrefixes: []*ServiceRule{
|
|
{
|
|
Name: "",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "bar",
|
|
Policy: PolicyDeny,
|
|
},
|
|
{
|
|
Name: "barfoo",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "intbaz",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyDeny,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ServiceReadAllDenied", prefix: "", check: checkDenyServiceReadAll},
|
|
{name: "KeyReadAllowed", prefix: "other", check: checkAllowKeyRead},
|
|
{name: "KeyWriteAllowed", prefix: "other", check: checkAllowKeyWrite},
|
|
{name: "KeyWritePrefixAllowed", prefix: "other", check: checkAllowKeyWritePrefix},
|
|
{name: "KeyListAllowed", prefix: "other", check: checkAllowKeyList},
|
|
{name: "KeyReadAllowed", prefix: "foo/test", check: checkAllowKeyRead},
|
|
{name: "KeyWriteAllowed", prefix: "foo/test", check: checkAllowKeyWrite},
|
|
{name: "KeyWritePrefixAllowed", prefix: "foo/test", check: checkAllowKeyWritePrefix},
|
|
{name: "KeyListAllowed", prefix: "foo/test", check: checkAllowKeyList},
|
|
{name: "KeyReadDenied", prefix: "foo/priv/test", check: checkDenyKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "foo/priv/test", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "foo/priv/test", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyListDenied", prefix: "foo/priv/test", check: checkDenyKeyList},
|
|
{name: "KeyReadDenied", prefix: "bar/any", check: checkDenyKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "bar/any", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "bar/any", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyListDenied", prefix: "bar/any", check: checkDenyKeyList},
|
|
{name: "KeyReadAllowed", prefix: "zip/test", check: checkAllowKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "zip/test", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "zip/test", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyListDenied", prefix: "zip/test", check: checkDenyKeyList},
|
|
{name: "KeyReadAllowed", prefix: "foo/", check: checkAllowKeyRead},
|
|
{name: "KeyWriteAllowed", prefix: "foo/", check: checkAllowKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "foo/", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyListAllowed", prefix: "foo/", check: checkAllowKeyList},
|
|
{name: "KeyReadAllowed", prefix: "", check: checkAllowKeyRead},
|
|
{name: "KeyWriteAllowed", prefix: "", check: checkAllowKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyListAllowed", prefix: "", check: checkAllowKeyList},
|
|
{name: "KeyReadAllowed", prefix: "zap/test", check: checkAllowKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "zap/test", check: checkDenyKeyWrite},
|
|
{name: "KeyWritePrefixDenied", prefix: "zap/test", check: checkDenyKeyWritePrefix},
|
|
{name: "KeyListAllowed", prefix: "zap/test", check: checkAllowKeyList},
|
|
{name: "IntentionReadAllowed", prefix: "other", check: checkAllowIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "other", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadAllowed", prefix: "foo", check: checkAllowIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "foo", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadDenied", prefix: "bar", check: checkDenyIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "bar", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadAllowed", prefix: "foobar", check: checkAllowIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "foobar", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadDenied", prefix: "barfo", check: checkDenyIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "barfo", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadAllowed", prefix: "barfoo", check: checkAllowIntentionRead},
|
|
{name: "IntentionWriteAllowed", prefix: "barfoo", check: checkAllowIntentionWrite},
|
|
{name: "IntentionReadAllowed", prefix: "barfoo2", check: checkAllowIntentionRead},
|
|
{name: "IntentionWriteAllowed", prefix: "barfoo2", check: checkAllowIntentionWrite},
|
|
{name: "IntentionReadDenied", prefix: "intbaz", check: checkDenyIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "intbaz", check: checkDenyIntentionWrite},
|
|
{name: "IntentionDefaultAllowAllowed", check: checkAllowIntentionDefaultAllow},
|
|
{name: "ServiceReadAllowed", prefix: "other", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteAllowed", prefix: "other", check: checkAllowServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "foo", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "foo", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadDenied", prefix: "bar", check: checkDenyServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "bar", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "foobar", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "foobar", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadDenied", prefix: "barfo", check: checkDenyServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "barfo", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "barfoo", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteAllowed", prefix: "barfoo", check: checkAllowServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "barfoo2", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteAllowed", prefix: "barfoo2", check: checkAllowServiceWrite},
|
|
{name: "EventReadAllowed", prefix: "foo", check: checkAllowEventRead},
|
|
{name: "EventWriteAllowed", prefix: "foo", check: checkAllowEventWrite},
|
|
{name: "EventReadAllowed", prefix: "foobar", check: checkAllowEventRead},
|
|
{name: "EventWriteAllowed", prefix: "foobar", check: checkAllowEventWrite},
|
|
{name: "EventReadDenied", prefix: "bar", check: checkDenyEventRead},
|
|
{name: "EventWriteDenied", prefix: "bar", check: checkDenyEventWrite},
|
|
{name: "EventReadDenied", prefix: "barbaz", check: checkDenyEventRead},
|
|
{name: "EventWriteDenied", prefix: "barbaz", check: checkDenyEventWrite},
|
|
{name: "EventReadAllowed", prefix: "baz", check: checkAllowEventRead},
|
|
{name: "EventWriteDenied", prefix: "baz", check: checkDenyEventWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "foo", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteAllowed", prefix: "foo", check: checkAllowPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "foobar", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteAllowed", prefix: "foobar", check: checkAllowPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "bar", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "bar", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "barbaz", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "barbaz", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "baz", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "baz", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "nope", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "nope", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "zoo", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteAllowed", prefix: "zoo", check: checkAllowPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "zookeeper", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteAllowed", prefix: "zookeeper", check: checkAllowPreparedQueryWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "ExactMatchPrecedence",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Agents: []*AgentRule{
|
|
{
|
|
Node: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
AgentPrefixes: []*AgentRule{
|
|
{
|
|
Node: "foot",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
Keys: []*KeyRule{
|
|
{
|
|
Prefix: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
KeyPrefixes: []*KeyRule{
|
|
{
|
|
Prefix: "foot",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
Nodes: []*NodeRule{
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
NodePrefixes: []*NodeRule{
|
|
{
|
|
Name: "foot",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Name: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
Services: []*ServiceRule{
|
|
{
|
|
Name: "foo",
|
|
Policy: PolicyWrite,
|
|
Intentions: PolicyWrite,
|
|
},
|
|
{
|
|
Name: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
ServicePrefixes: []*ServiceRule{
|
|
{
|
|
Name: "foot",
|
|
Policy: PolicyRead,
|
|
Intentions: PolicyRead,
|
|
},
|
|
{
|
|
Name: "fo",
|
|
Policy: PolicyRead,
|
|
Intentions: PolicyRead,
|
|
},
|
|
},
|
|
Sessions: []*SessionRule{
|
|
{
|
|
Node: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Node: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
SessionPrefixes: []*SessionRule{
|
|
{
|
|
Node: "foot",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Node: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
Events: []*EventRule{
|
|
{
|
|
Event: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Event: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
EventPrefixes: []*EventRule{
|
|
{
|
|
Event: "foot",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Event: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
PreparedQueries: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "foo",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "football",
|
|
Policy: PolicyDeny,
|
|
},
|
|
},
|
|
PreparedQueryPrefixes: []*PreparedQueryRule{
|
|
{
|
|
Prefix: "foot",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "NodeReadAllDenied", prefix: "", check: checkDenyNodeReadAll},
|
|
{name: "ServiceReadAllDenied", prefix: "", check: checkDenyServiceReadAll},
|
|
|
|
{name: "AgentReadPrefixAllowed", prefix: "fo", check: checkAllowAgentRead},
|
|
{name: "AgentWritePrefixDenied", prefix: "fo", check: checkDenyAgentWrite},
|
|
{name: "AgentReadPrefixAllowed", prefix: "for", check: checkAllowAgentRead},
|
|
{name: "AgentWritePrefixDenied", prefix: "for", check: checkDenyAgentWrite},
|
|
{name: "AgentReadAllowed", prefix: "foo", check: checkAllowAgentRead},
|
|
{name: "AgentWriteAllowed", prefix: "foo", check: checkAllowAgentWrite},
|
|
{name: "AgentReadPrefixAllowed", prefix: "foot", check: checkAllowAgentRead},
|
|
{name: "AgentWritePrefixDenied", prefix: "foot", check: checkDenyAgentWrite},
|
|
{name: "AgentReadPrefixAllowed", prefix: "foot2", check: checkAllowAgentRead},
|
|
{name: "AgentWritePrefixDenied", prefix: "foot2", check: checkDenyAgentWrite},
|
|
{name: "AgentReadPrefixAllowed", prefix: "food", check: checkAllowAgentRead},
|
|
{name: "AgentWritePrefixDenied", prefix: "food", check: checkDenyAgentWrite},
|
|
{name: "AgentReadDenied", prefix: "football", check: checkDenyAgentRead},
|
|
{name: "AgentWriteDenied", prefix: "football", check: checkDenyAgentWrite},
|
|
|
|
{name: "KeyReadPrefixAllowed", prefix: "fo", check: checkAllowKeyRead},
|
|
{name: "KeyWritePrefixDenied", prefix: "fo", check: checkDenyKeyWrite},
|
|
{name: "KeyReadPrefixAllowed", prefix: "for", check: checkAllowKeyRead},
|
|
{name: "KeyWritePrefixDenied", prefix: "for", check: checkDenyKeyWrite},
|
|
{name: "KeyReadAllowed", prefix: "foo", check: checkAllowKeyRead},
|
|
{name: "KeyWriteAllowed", prefix: "foo", check: checkAllowKeyWrite},
|
|
{name: "KeyReadPrefixAllowed", prefix: "foot", check: checkAllowKeyRead},
|
|
{name: "KeyWritePrefixDenied", prefix: "foot", check: checkDenyKeyWrite},
|
|
{name: "KeyReadPrefixAllowed", prefix: "foot2", check: checkAllowKeyRead},
|
|
{name: "KeyWritePrefixDenied", prefix: "foot2", check: checkDenyKeyWrite},
|
|
{name: "KeyReadPrefixAllowed", prefix: "food", check: checkAllowKeyRead},
|
|
{name: "KeyWritePrefixDenied", prefix: "food", check: checkDenyKeyWrite},
|
|
{name: "KeyReadDenied", prefix: "football", check: checkDenyKeyRead},
|
|
{name: "KeyWriteDenied", prefix: "football", check: checkDenyKeyWrite},
|
|
|
|
{name: "NodeReadPrefixAllowed", prefix: "fo", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "fo", check: checkDenyNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "for", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "for", check: checkDenyNodeWrite},
|
|
{name: "NodeReadAllowed", prefix: "foo", check: checkAllowNodeRead},
|
|
{name: "NodeWriteAllowed", prefix: "foo", check: checkAllowNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "foot", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "foot", check: checkDenyNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "foot2", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "foot2", check: checkDenyNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "food", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "food", check: checkDenyNodeWrite},
|
|
{name: "NodeReadDenied", prefix: "football", check: checkDenyNodeRead},
|
|
{name: "NodeWriteDenied", prefix: "football", check: checkDenyNodeWrite},
|
|
|
|
{name: "ServiceReadPrefixAllowed", prefix: "fo", check: checkAllowServiceRead},
|
|
{name: "ServiceWritePrefixDenied", prefix: "fo", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadPrefixAllowed", prefix: "for", check: checkAllowServiceRead},
|
|
{name: "ServiceWritePrefixDenied", prefix: "for", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadAllowed", prefix: "foo", check: checkAllowServiceRead},
|
|
{name: "ServiceWriteAllowed", prefix: "foo", check: checkAllowServiceWrite},
|
|
{name: "ServiceReadPrefixAllowed", prefix: "foot", check: checkAllowServiceRead},
|
|
{name: "ServiceWritePrefixDenied", prefix: "foot", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadPrefixAllowed", prefix: "foot2", check: checkAllowServiceRead},
|
|
{name: "ServiceWritePrefixDenied", prefix: "foot2", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadPrefixAllowed", prefix: "food", check: checkAllowServiceRead},
|
|
{name: "ServiceWritePrefixDenied", prefix: "food", check: checkDenyServiceWrite},
|
|
{name: "ServiceReadDenied", prefix: "football", check: checkDenyServiceRead},
|
|
{name: "ServiceWriteDenied", prefix: "football", check: checkDenyServiceWrite},
|
|
|
|
{name: "NodeReadPrefixAllowed", prefix: "fo", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "fo", check: checkDenyNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "for", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "for", check: checkDenyNodeWrite},
|
|
{name: "NodeReadAllowed", prefix: "foo", check: checkAllowNodeRead},
|
|
{name: "NodeWriteAllowed", prefix: "foo", check: checkAllowNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "foot", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "foot", check: checkDenyNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "foot2", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "foot2", check: checkDenyNodeWrite},
|
|
{name: "NodeReadPrefixAllowed", prefix: "food", check: checkAllowNodeRead},
|
|
{name: "NodeWritePrefixDenied", prefix: "food", check: checkDenyNodeWrite},
|
|
{name: "NodeReadDenied", prefix: "football", check: checkDenyNodeRead},
|
|
{name: "NodeWriteDenied", prefix: "football", check: checkDenyNodeWrite},
|
|
|
|
{name: "IntentionReadPrefixAllowed", prefix: "fo", check: checkAllowIntentionRead},
|
|
{name: "IntentionWritePrefixDenied", prefix: "fo", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadPrefixAllowed", prefix: "for", check: checkAllowIntentionRead},
|
|
{name: "IntentionWritePrefixDenied", prefix: "for", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadAllowed", prefix: "foo", check: checkAllowIntentionRead},
|
|
{name: "IntentionWriteAllowed", prefix: "foo", check: checkAllowIntentionWrite},
|
|
{name: "IntentionReadPrefixAllowed", prefix: "foot", check: checkAllowIntentionRead},
|
|
{name: "IntentionWritePrefixDenied", prefix: "foot", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadPrefixAllowed", prefix: "foot2", check: checkAllowIntentionRead},
|
|
{name: "IntentionWritePrefixDenied", prefix: "foot2", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadPrefixAllowed", prefix: "food", check: checkAllowIntentionRead},
|
|
{name: "IntentionWritePrefixDenied", prefix: "food", check: checkDenyIntentionWrite},
|
|
{name: "IntentionReadDenied", prefix: "football", check: checkDenyIntentionRead},
|
|
{name: "IntentionWriteDenied", prefix: "football", check: checkDenyIntentionWrite},
|
|
|
|
{name: "SessionReadPrefixAllowed", prefix: "fo", check: checkAllowSessionRead},
|
|
{name: "SessionWritePrefixDenied", prefix: "fo", check: checkDenySessionWrite},
|
|
{name: "SessionReadPrefixAllowed", prefix: "for", check: checkAllowSessionRead},
|
|
{name: "SessionWritePrefixDenied", prefix: "for", check: checkDenySessionWrite},
|
|
{name: "SessionReadAllowed", prefix: "foo", check: checkAllowSessionRead},
|
|
{name: "SessionWriteAllowed", prefix: "foo", check: checkAllowSessionWrite},
|
|
{name: "SessionReadPrefixAllowed", prefix: "foot", check: checkAllowSessionRead},
|
|
{name: "SessionWritePrefixDenied", prefix: "foot", check: checkDenySessionWrite},
|
|
{name: "SessionReadPrefixAllowed", prefix: "foot2", check: checkAllowSessionRead},
|
|
{name: "SessionWritePrefixDenied", prefix: "foot2", check: checkDenySessionWrite},
|
|
{name: "SessionReadPrefixAllowed", prefix: "food", check: checkAllowSessionRead},
|
|
{name: "SessionWritePrefixDenied", prefix: "food", check: checkDenySessionWrite},
|
|
{name: "SessionReadDenied", prefix: "football", check: checkDenySessionRead},
|
|
{name: "SessionWriteDenied", prefix: "football", check: checkDenySessionWrite},
|
|
|
|
{name: "EventReadPrefixAllowed", prefix: "fo", check: checkAllowEventRead},
|
|
{name: "EventWritePrefixDenied", prefix: "fo", check: checkDenyEventWrite},
|
|
{name: "EventReadPrefixAllowed", prefix: "for", check: checkAllowEventRead},
|
|
{name: "EventWritePrefixDenied", prefix: "for", check: checkDenyEventWrite},
|
|
{name: "EventReadAllowed", prefix: "foo", check: checkAllowEventRead},
|
|
{name: "EventWriteAllowed", prefix: "foo", check: checkAllowEventWrite},
|
|
{name: "EventReadPrefixAllowed", prefix: "foot", check: checkAllowEventRead},
|
|
{name: "EventWritePrefixDenied", prefix: "foot", check: checkDenyEventWrite},
|
|
{name: "EventReadPrefixAllowed", prefix: "foot2", check: checkAllowEventRead},
|
|
{name: "EventWritePrefixDenied", prefix: "foot2", check: checkDenyEventWrite},
|
|
{name: "EventReadPrefixAllowed", prefix: "food", check: checkAllowEventRead},
|
|
{name: "EventWritePrefixDenied", prefix: "food", check: checkDenyEventWrite},
|
|
{name: "EventReadDenied", prefix: "football", check: checkDenyEventRead},
|
|
{name: "EventWriteDenied", prefix: "football", check: checkDenyEventWrite},
|
|
|
|
{name: "PreparedQueryReadPrefixAllowed", prefix: "fo", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWritePrefixDenied", prefix: "fo", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadPrefixAllowed", prefix: "for", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWritePrefixDenied", prefix: "for", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadAllowed", prefix: "foo", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWriteAllowed", prefix: "foo", check: checkAllowPreparedQueryWrite},
|
|
{name: "PreparedQueryReadPrefixAllowed", prefix: "foot", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWritePrefixDenied", prefix: "foot", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadPrefixAllowed", prefix: "foot2", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWritePrefixDenied", prefix: "foot2", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadPrefixAllowed", prefix: "food", check: checkAllowPreparedQueryRead},
|
|
{name: "PreparedQueryWritePrefixDenied", prefix: "food", check: checkDenyPreparedQueryWrite},
|
|
{name: "PreparedQueryReadDenied", prefix: "football", check: checkDenyPreparedQueryRead},
|
|
{name: "PreparedQueryWriteDenied", prefix: "football", check: checkDenyPreparedQueryWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "ACLRead",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
ACL: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowACLRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteDenied", check: checkDenyACLWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "ACLRead",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
ACL: PolicyWrite,
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
{name: "ReadAllowed", check: checkAllowACLRead},
|
|
// in version 1.2.1 and below this would have failed
|
|
{name: "WriteAllowed", check: checkAllowACLWrite},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyWritePrefixDefaultDeny",
|
|
defaultPolicy: DenyAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
KeyPrefixes: []*KeyRule{
|
|
{
|
|
Prefix: "fo",
|
|
Policy: PolicyRead,
|
|
},
|
|
{
|
|
Prefix: "foo/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "bar/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "baz/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "test/",
|
|
Policy: PolicyWrite,
|
|
},
|
|
},
|
|
Keys: []*KeyRule{
|
|
{
|
|
Prefix: "foo/bar",
|
|
Policy: PolicyWrite,
|
|
},
|
|
{
|
|
Prefix: "bar/baz",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
// Ensure we deny access if the best match key_prefix rule does not grant
|
|
// write access (disregards both the default policy and any other rules with
|
|
// segments that may fall within the given kv prefix)
|
|
{name: "DeniedTopLevelPrefix", prefix: "foo", check: checkDenyKeyWritePrefix},
|
|
// Allow recursive KV writes when we have a prefix rule that allows it and no
|
|
// other rules with segments that fall within the requested kv prefix to be written.
|
|
{name: "AllowedTopLevelPrefix", prefix: "baz/", check: checkAllowKeyWritePrefix},
|
|
// Ensure we allow recursive KV writes when we have a prefix rule that would allow it
|
|
// and all other rules with segments prefixed by the kv prefix to be written also allow
|
|
// write access.
|
|
{name: "AllowedPrefixWithNestedWrite", prefix: "foo/", check: checkAllowKeyWritePrefix},
|
|
// Ensure that we deny recursive KV writes when they would be allowed for a prefix but
|
|
// denied by either an exact match rule or prefix match rule for a segment prefixed by
|
|
// the kv prefix being checked against.
|
|
{name: "DenyPrefixWithNestedRead", prefix: "bar/", check: checkDenyKeyWritePrefix},
|
|
// Ensure that the default deny policy is used when there is no key_prefix rule
|
|
// for the given kv segment regardless of any rules that would grant write access
|
|
// to segments prefixed by the kv prefix being checked against.
|
|
{name: "DenyNoPrefixMatch", prefix: "te", check: checkDenyKeyWritePrefix},
|
|
},
|
|
},
|
|
{
|
|
name: "KeyWritePrefixDefaultAllow",
|
|
defaultPolicy: AllowAll(),
|
|
policyStack: []*Policy{
|
|
{
|
|
PolicyRules: PolicyRules{
|
|
Keys: []*KeyRule{
|
|
{
|
|
Prefix: "foo/bar",
|
|
Policy: PolicyRead,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
checks: []aclCheck{
|
|
// Ensure that we deny a key prefix write when a rule for a key within our prefix
|
|
// doesn't allow writing and the default policy is to allow
|
|
{name: "KeyWritePrefixDenied", prefix: "foo", check: checkDenyKeyWritePrefix},
|
|
// Ensure that the default allow policy is used when there is no prefix rule
|
|
// and there are no other rules regarding keys within that prefix to be written.
|
|
{name: "KeyWritePrefixAllowed", prefix: "bar", check: checkAllowKeyWritePrefix},
|
|
},
|
|
},
|
|
}
|
|
|
|
run := func(t *testing.T, tcase aclTest, defaultPolicy Authorizer) {
|
|
acl := defaultPolicy
|
|
for _, policy := range tcase.policyStack {
|
|
newACL, err := NewPolicyAuthorizerWithDefaults(acl, []*Policy{policy}, nil)
|
|
require.NoError(t, err)
|
|
acl = newACL
|
|
}
|
|
|
|
for _, check := range tcase.checks {
|
|
checkName := check.name
|
|
if check.prefix != "" {
|
|
checkName = fmt.Sprintf("%s.Prefix(%s)", checkName, check.prefix)
|
|
}
|
|
t.Run(checkName, func(t *testing.T) {
|
|
check.check(t, acl, check.prefix, nil)
|
|
})
|
|
}
|
|
}
|
|
|
|
for _, tcase := range tests {
|
|
t.Run(tcase.name, func(t *testing.T) {
|
|
if tcase.defaultPolicy == nil {
|
|
t.Run("default-allow", func(t *testing.T) {
|
|
run(t, tcase, AllowAll())
|
|
})
|
|
t.Run("default-deny", func(t *testing.T) {
|
|
run(t, tcase, DenyAll())
|
|
})
|
|
} else {
|
|
run(t, tcase, tcase.defaultPolicy)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestRootAuthorizer(t *testing.T) {
|
|
require.Equal(t, AllowAll(), RootAuthorizer("allow"))
|
|
require.Equal(t, DenyAll(), RootAuthorizer("deny"))
|
|
require.Equal(t, ManageAll(), RootAuthorizer("manage"))
|
|
require.Nil(t, RootAuthorizer("foo"))
|
|
}
|
|
|
|
func TestACLEnforce(t *testing.T) {
|
|
type enforceTest struct {
|
|
name string
|
|
rule AccessLevel
|
|
required AccessLevel
|
|
expected EnforcementDecision
|
|
}
|
|
|
|
tests := []enforceTest{
|
|
{
|
|
name: "RuleNoneRequireRead",
|
|
rule: AccessUnknown,
|
|
required: AccessRead,
|
|
expected: Default,
|
|
},
|
|
{
|
|
name: "RuleNoneRequireWrite",
|
|
rule: AccessUnknown,
|
|
required: AccessWrite,
|
|
expected: Default,
|
|
},
|
|
{
|
|
name: "RuleNoneRequireList",
|
|
rule: AccessUnknown,
|
|
required: AccessList,
|
|
expected: Default,
|
|
},
|
|
{
|
|
name: "RuleReadRequireRead",
|
|
rule: AccessRead,
|
|
required: AccessRead,
|
|
expected: Allow,
|
|
},
|
|
{
|
|
name: "RuleReadRequireWrite",
|
|
rule: AccessRead,
|
|
required: AccessWrite,
|
|
expected: Deny,
|
|
},
|
|
{
|
|
name: "RuleReadRequireList",
|
|
rule: AccessRead,
|
|
required: AccessList,
|
|
expected: Deny,
|
|
},
|
|
{
|
|
name: "RuleListRequireRead",
|
|
rule: AccessList,
|
|
required: AccessRead,
|
|
expected: Allow,
|
|
},
|
|
{
|
|
name: "RuleListRequireWrite",
|
|
rule: AccessList,
|
|
required: AccessWrite,
|
|
expected: Deny,
|
|
},
|
|
{
|
|
name: "RuleListRequireList",
|
|
rule: AccessList,
|
|
required: AccessList,
|
|
expected: Allow,
|
|
},
|
|
{
|
|
name: "RuleWritetRequireRead",
|
|
rule: AccessWrite,
|
|
required: AccessRead,
|
|
expected: Allow,
|
|
},
|
|
{
|
|
name: "RuleWritetRequireWrite",
|
|
rule: AccessWrite,
|
|
required: AccessWrite,
|
|
expected: Allow,
|
|
},
|
|
{
|
|
name: "RuleWritetRequireList",
|
|
rule: AccessWrite,
|
|
required: AccessList,
|
|
expected: Allow,
|
|
},
|
|
{
|
|
name: "RuleDenyRequireRead",
|
|
rule: AccessDeny,
|
|
required: AccessRead,
|
|
expected: Deny,
|
|
},
|
|
{
|
|
name: "RuleDenyRequireWrite",
|
|
rule: AccessDeny,
|
|
required: AccessWrite,
|
|
expected: Deny,
|
|
},
|
|
{
|
|
name: "RuleDenyRequireList",
|
|
rule: AccessDeny,
|
|
required: AccessList,
|
|
expected: Deny,
|
|
},
|
|
}
|
|
|
|
for _, tcase := range tests {
|
|
t.Run(tcase.name, func(t *testing.T) {
|
|
require.Equal(t, tcase.expected, enforce(tcase.rule, tcase.required))
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestACL_ReadAll(t *testing.T) {
|
|
type testcase struct {
|
|
name string
|
|
rules string
|
|
check func(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext)
|
|
}
|
|
|
|
tests := []testcase{
|
|
{
|
|
name: "node:bar:read",
|
|
rules: `node "bar" { policy = "read" }`,
|
|
check: checkDenyNodeReadAll,
|
|
},
|
|
{
|
|
name: "node:bar:write",
|
|
rules: `node "bar" { policy = "write" }`,
|
|
check: checkDenyNodeReadAll,
|
|
},
|
|
{
|
|
name: "node:*:read",
|
|
rules: `node_prefix "" { policy = "read" }`,
|
|
check: checkAllowNodeReadAll,
|
|
},
|
|
{
|
|
name: "node:*:write",
|
|
rules: `node_prefix "" { policy = "write" }`,
|
|
check: checkAllowNodeReadAll,
|
|
},
|
|
{
|
|
name: "service:bar:read",
|
|
rules: `service "bar" { policy = "read" }`,
|
|
check: checkDenyServiceReadAll,
|
|
},
|
|
{
|
|
name: "service:bar:write",
|
|
rules: `service "bar" { policy = "write" }`,
|
|
check: checkDenyServiceReadAll,
|
|
},
|
|
{
|
|
name: "service:*:read",
|
|
rules: `service_prefix "" { policy = "read" }`,
|
|
check: checkAllowServiceReadAll,
|
|
},
|
|
{
|
|
name: "service:*:write",
|
|
rules: `service_prefix "" { policy = "write" }`,
|
|
check: checkAllowServiceReadAll,
|
|
},
|
|
}
|
|
|
|
body := func(t *testing.T, rules string, defaultPolicy Authorizer, check func(t *testing.T, authz Authorizer, prefix string, entCtx *AuthorizerContext)) {
|
|
t.Helper()
|
|
|
|
policy, err := NewPolicyFromSource(rules, nil, nil)
|
|
require.NoError(t, err)
|
|
|
|
acl, err := NewPolicyAuthorizerWithDefaults(defaultPolicy, []*Policy{policy}, nil)
|
|
require.NoError(t, err)
|
|
|
|
check(t, acl, "", nil)
|
|
}
|
|
|
|
for _, tc := range tests {
|
|
tc := tc
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
t.Run("default deny", func(t *testing.T) {
|
|
body(t, tc.rules, DenyAll(), tc.check)
|
|
})
|
|
t.Run("default allow", func(t *testing.T) {
|
|
body(t, tc.rules, AllowAll(), checkAllowNodeReadAll)
|
|
})
|
|
})
|
|
}
|
|
}
|