Skip to content

Commit

Permalink
add tests for empty relation
Browse files Browse the repository at this point in the history
Signed-off-by: WashingtonKK <[email protected]>
  • Loading branch information
WashingtonKK committed Apr 16, 2024
1 parent 5440a03 commit 3ad6f7b
Show file tree
Hide file tree
Showing 2 changed files with 53 additions and 53 deletions.
11 changes: 11 additions & 0 deletions auth/postgres/domains_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -83,6 +83,17 @@ func TestDeletePolicyCopy(t *testing.T) {
},
err: nil,
},
{
desc: "delete a policy with empty relation",
pc: auth.Policy{
SubjectType: "unknown",
SubjectID: "unknown",
Relation: "",
ObjectType: "unknown",
ObjectID: "unknown",
},
err: nil,
},
}

for _, tc := range cases {
Expand Down
95 changes: 42 additions & 53 deletions auth/service.go
Original file line number Diff line number Diff line change
Expand Up @@ -718,87 +718,76 @@ func (svc service) AssignUsers(ctx context.Context, token, id string, userIds []
}

func (svc service) UnassignUsers(ctx context.Context, token, id string, userIds []string, relation string) error {
if err := svc.Authorize(ctx, PolicyReq{
pr := PolicyReq{
Subject: token,
SubjectType: UserType,
SubjectKind: TokenKind,
Object: id,
ObjectType: DomainType,
Permission: SharePermission,
}); err != nil {
}
if err := svc.Authorize(ctx, pr); err != nil {
return err
}

if relation != "" {
if err := svc.Authorize(ctx, PolicyReq{
Subject: token,
SubjectType: UserType,
SubjectKind: TokenKind,
Object: id,
ObjectType: DomainType,
Permission: SwitchToPermission(relation),
}); err != nil {
pr.Permission = SwitchToPermission(relation)
if err := svc.Authorize(ctx, pr); err != nil {
return err
}

if err := svc.removeDomainPolicies(ctx, id, relation, userIds...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}
} else {
if err := svc.Authorize(ctx, PolicyReq{
Subject: token,
SubjectType: UserType,
SubjectKind: TokenKind,
Object: id,
ObjectType: DomainType,
Permission: AdminPermission,
}); err != nil {
// User is not admin.
var ids []string
for _, userID := range userIds {
if err := svc.Authorize(ctx, PolicyReq{
Subject: userID,
SubjectType: UserType,
SubjectKind: UsersKind,
Permission: AdminPermission,
Object: id,
ObjectType: DomainType,
}); err != nil {
// Append all non-admins to ids.
ids = append(ids, userID)
}
}

// Remove only non-admins.
if err := svc.removeDomainPolicies(ctx, id, MemberRelation, ids...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, ViewerRelation, ids...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, EditorRelation, ids...); err != nil {
return errors.Wrap(errRemovePolicies, err)
return nil
}
pr.Permission = AdminPermission
if err := svc.Authorize(ctx, pr); err != nil {
// User is not admin.
var ids []string
for _, userID := range userIds {
if err := svc.Authorize(ctx, PolicyReq{
Subject: userID,
SubjectType: UserType,
SubjectKind: UsersKind,
Permission: AdminPermission,
Object: id,
ObjectType: DomainType,
}); err != nil {
// Append all non-admins to ids.
ids = append(ids, userID)
}
}

// If user is admin, remove all policies from all users.
if err := svc.removeDomainPolicies(ctx, id, MemberRelation, userIds...); err != nil {
// Remove only non-admins.
if err := svc.removeDomainPolicies(ctx, id, MemberRelation, ids...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, ViewerRelation, userIds...); err != nil {
if err := svc.removeDomainPolicies(ctx, id, ViewerRelation, ids...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, EditorRelation, userIds...); err != nil {
if err := svc.removeDomainPolicies(ctx, id, EditorRelation, ids...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}
}

if err := svc.removeDomainPolicies(ctx, id, AdministratorRelation, userIds...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}
// If user is admin, remove all policies from all users.
if err := svc.removeDomainPolicies(ctx, id, MemberRelation, userIds...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, ViewerRelation, userIds...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, EditorRelation, userIds...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

if err := svc.removeDomainPolicies(ctx, id, AdministratorRelation, userIds...); err != nil {
return errors.Wrap(errRemovePolicies, err)
}

return nil
Expand Down

0 comments on commit 3ad6f7b

Please sign in to comment.