loopback/test/acl.test.js

274 lines
9.3 KiB
JavaScript
Raw Normal View History

2013-11-10 06:22:16 +00:00
var assert = require('assert');
var loopback = require('../index');
var acl = require('../lib/models/acl');
2013-11-12 06:16:51 +00:00
var Scope = acl.Scope;
var ACL = acl.ACL;
2013-11-20 21:31:30 +00:00
var role = require('../lib/models/role');
var Role = role.Role;
var RoleMapping = role.RoleMapping;
2013-11-10 06:22:16 +00:00
var User = loopback.User;
2013-11-12 18:10:32 +00:00
function checkResult(err, result) {
// console.log(err, result);
assert(!err);
}
2013-11-10 06:22:16 +00:00
describe('security scopes', function () {
2013-11-12 06:16:51 +00:00
it("should allow access to models for the given scope by wildcard", function () {
2013-11-15 17:41:26 +00:00
Scope.create({name: 'userScope', description: 'access user information'}, function (err, scope) {
ACL.create({principalType: ACL.SCOPE, principalId: scope.id, model: 'User', property: ACL.ALL,
2013-11-13 18:02:59 +00:00
accessType: ACL.ALL, permission: ACL.ALLOW},
2013-11-12 18:10:32 +00:00
function (err, resource) {
2013-11-15 17:41:26 +00:00
Scope.checkPermission('userScope', 'User', ACL.ALL, ACL.ALL, checkResult);
Scope.checkPermission('userScope', 'User', 'name', ACL.ALL, checkResult);
Scope.checkPermission('userScope', 'User', 'name', ACL.READ, checkResult);
2013-11-10 06:22:16 +00:00
});
});
});
2013-11-12 06:16:51 +00:00
it("should allow access to models for the given scope", function () {
var ds = loopback.createDataSource({connector: loopback.Memory});
Scope.attachTo(ds);
ACL.attachTo(ds);
2013-11-15 17:41:26 +00:00
Scope.create({name: 'userScope', description: 'access user information'}, function (err, scope) {
2013-11-13 18:02:59 +00:00
ACL.create({principalType: ACL.SCOPE, principalId: scope.id,
2013-11-15 17:41:26 +00:00
model: 'User', property: 'name', accessType: ACL.READ, permission: ACL.ALLOW},
2013-11-12 18:10:32 +00:00
function (err, resource) {
2013-11-14 01:07:43 +00:00
ACL.create({principalType: ACL.SCOPE, principalId: scope.id,
2013-11-15 17:41:26 +00:00
model: 'User', property: 'name', accessType: ACL.WRITE, permission: ACL.DENY},
2013-11-14 01:07:43 +00:00
function (err, resource) {
// console.log(resource);
2013-11-15 17:41:26 +00:00
Scope.checkPermission('userScope', 'User', ACL.ALL, ACL.ALL, function (err, perm) {
2013-11-14 01:24:42 +00:00
assert(perm.permission === ACL.DENY); // because name.WRITE == DENY
2013-11-14 01:07:43 +00:00
});
2013-11-15 17:41:26 +00:00
Scope.checkPermission('userScope', 'User', 'name', ACL.ALL, function (err, perm) {
2013-11-14 01:24:42 +00:00
assert(perm.permission === ACL.DENY); // because name.WRITE == DENY
2013-11-14 01:07:43 +00:00
});
2013-11-15 17:41:26 +00:00
Scope.checkPermission('userScope', 'User', 'name', ACL.READ, function (err, perm) {
2013-11-14 01:07:43 +00:00
assert(perm.permission === ACL.ALLOW);
});
2013-11-15 17:41:26 +00:00
Scope.checkPermission('userScope', 'User', 'name', ACL.WRITE, function (err, perm) {
2013-11-14 01:07:43 +00:00
assert(perm.permission === ACL.DENY);
});
});
});
2013-11-12 06:16:51 +00:00
});
});
});
describe('security ACLs', function () {
it("should allow access to models for the given principal by wildcard", function () {
var ds = loopback.createDataSource({connector: loopback.Memory});
ACL.attachTo(ds);
2013-11-12 06:16:51 +00:00
2013-11-15 17:41:26 +00:00
ACL.create({principalType: ACL.USER, principalId: 'u001', model: 'User', property: ACL.ALL,
2013-11-12 18:10:32 +00:00
accessType: ACL.ALL, permission: ACL.ALLOW}, function (err, acl) {
2013-11-12 06:16:51 +00:00
2013-11-15 17:41:26 +00:00
ACL.create({principalType: ACL.USER, principalId: 'u001', model: 'User', property: ACL.ALL,
2013-11-14 01:24:42 +00:00
accessType: ACL.READ, permission: ACL.DENY}, function (err, acl) {
2013-11-15 17:41:26 +00:00
ACL.checkPermission(ACL.USER, 'u001', 'User', 'name', ACL.READ, function (err, perm) {
2013-11-14 01:24:42 +00:00
assert(perm.permission === ACL.DENY);
});
2013-11-15 17:41:26 +00:00
ACL.checkPermission(ACL.USER, 'u001', 'User', 'name', ACL.ALL, function (err, perm) {
2013-11-14 01:24:42 +00:00
assert(perm.permission === ACL.DENY);
});
});
2013-11-12 06:16:51 +00:00
});
});
it("should allow access to models by exception", function () {
var ds = loopback.createDataSource({connector: loopback.Memory});
ACL.attachTo(ds);
ACL.create({principalType: ACL.USER, principalId: 'u001', model: 'User', property: ACL.ALL,
accessType: ACL.ALL, permission: ACL.DENY}, function (err, acl) {
ACL.create({principalType: ACL.USER, principalId: 'u001', model: 'User', property: ACL.ALL,
accessType: ACL.READ, permission: ACL.ALLOW}, function (err, acl) {
ACL.checkPermission(ACL.USER, 'u001', 'User', 'name', ACL.READ, function (err, perm) {
assert(perm.permission === ACL.ALLOW);
});
ACL.checkPermission(ACL.USER, 'u001', 'User', ACL.ALL, ACL.READ, function (err, perm) {
assert(perm.permission === ACL.ALLOW);
});
ACL.checkPermission(ACL.USER, 'u001', 'User', 'name', ACL.WRITE, function (err, perm) {
assert(perm.permission === ACL.DENY);
});
ACL.checkPermission(ACL.USER, 'u001', 'User', 'name', ACL.ALL, function (err, perm) {
assert(perm.permission === ACL.DENY);
});
});
});
});
2013-11-20 21:31:30 +00:00
it("should honor defaultPermission from the model", function () {
var ds = loopback.createDataSource({connector: loopback.Memory});
ACL.attachTo(ds);
var Customer = ds.createModel('Customer', {
name: {
type: String,
acls: [
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.WRITE, permission: ACL.DENY},
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.ALL, permission: ACL.ALLOW}
]
}
}, {
acls: [
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.ALL, permission: ACL.ALLOW}
]
});
Customer.settings.defaultPermission = ACL.DENY;
ACL.checkPermission(ACL.USER, 'u001', 'Customer', 'name', ACL.WRITE, function (err, perm) {
assert(perm.permission === ACL.DENY);
});
ACL.checkPermission(ACL.USER, 'u001', 'Customer', 'name', ACL.READ, function (err, perm) {
assert(perm.permission === ACL.ALLOW);
});
ACL.checkPermission(ACL.USER, 'u002', 'Customer', 'name', ACL.WRITE, function (err, perm) {
assert(perm.permission === ACL.DENY);
});
});
2013-11-15 17:41:26 +00:00
it("should honor static ACLs from the model", function () {
var ds = loopback.createDataSource({connector: loopback.Memory});
var Customer = ds.createModel('Customer', {
name: {
type: String,
acls: [
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.WRITE, permission: ACL.DENY},
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.ALL, permission: ACL.ALLOW}
]
}
}, {
acls: [
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.ALL, permission: ACL.ALLOW}
]
});
/*
Customer.settings.acls = [
{principalType: ACL.USER, principalId: 'u001', accessType: ACL.ALL, permission: ACL.ALLOW}
];
*/
ACL.checkPermission(ACL.USER, 'u001', 'Customer', 'name', ACL.WRITE, function (err, perm) {
assert(perm.permission === ACL.DENY);
});
ACL.checkPermission(ACL.USER, 'u001', 'Customer', 'name', ACL.READ, function (err, perm) {
assert(perm.permission === ACL.ALLOW);
});
ACL.checkPermission(ACL.USER, 'u001', 'Customer', 'name', ACL.ALL, function (err, perm) {
assert(perm.permission === ACL.ALLOW);
2013-11-15 17:41:26 +00:00
});
});
2013-11-20 21:31:30 +00:00
it("should check access against LDL, ACL, and Role", function () {
var ds = loopback.createDataSource({connector: loopback.Memory});
ACL.attachTo(ds);
Role.attachTo(ds);
RoleMapping.attachTo(ds);
User.attachTo(ds);
// var log = console.log;
var log = function() {};
// Create
User.create({name: 'Raymond', email: 'x@y.com', password: 'foobar'}, function (err, user) {
log('User: ', user.toObject());
var userId = user.id;
2013-11-20 21:31:30 +00:00
// Define a model with static ACLs
var Customer = ds.createModel('Customer', {
name: {
type: String,
acls: [
{principalType: ACL.USER, principalId: userId, accessType: ACL.WRITE, permission: ACL.DENY},
{principalType: ACL.USER, principalId: userId, accessType: ACL.ALL, permission: ACL.ALLOW}
2013-11-20 21:31:30 +00:00
]
}
}, {
acls: [
{principalType: ACL.USER, principalId: userId, accessType: ACL.ALL, permission: ACL.ALLOW}
2013-11-20 21:31:30 +00:00
]
});
ACL.create({principalType: ACL.USER, principalId: userId, model: 'Customer', property: ACL.ALL,
2013-11-20 21:31:30 +00:00
accessType: ACL.ALL, permission: ACL.ALLOW}, function (err, acl) {
log('ACL 1: ', acl.toObject());
Role.create({name: 'MyRole'}, function (err, myRole) {
log('Role: ', myRole.toObject());
myRole.principals.create({principalType: RoleMapping.USER, principalId: userId}, function (err, p) {
2013-11-20 21:31:30 +00:00
log('Principal added to role: ', p.toObject());
ACL.create({principalType: ACL.ROLE, principalId: 'MyRole', model: 'Customer', property: ACL.ALL,
2013-11-20 21:31:30 +00:00
accessType: ACL.READ, permission: ACL.DENY}, function (err, acl) {
log('ACL 2: ', acl.toObject());
ACL.checkAccess({
principals: [
{principalType: ACL.USER, principalId: userId}
2013-11-20 21:31:30 +00:00
],
model: 'Customer',
property: 'name',
accessType: ACL.READ
}, function(err, access) {
assert(!err && access.permission === ACL.ALLOW);
});
/*
2013-11-20 21:31:30 +00:00
ACL.checkAccess({
principals: [
{principalType: ACL.USER, principalId: userId}
2013-11-20 21:31:30 +00:00
],
model: 'Customer',
accessType: ACL.READ
}, function(err, access) {
assert(!err && access.permission === ACL.DENY);
});
*/
2013-11-20 21:31:30 +00:00
});
});
});
});
});
});
2013-11-15 17:41:26 +00:00
2013-11-10 06:22:16 +00:00
});