use of com.bakdata.conquery.models.auth.entities.Role in project conquery by bakdata.
the class IntegrationUtils method importPermissionConstellation.
/**
* Load the constellation of roles, users and permissions into the provided storage.
*/
public static void importPermissionConstellation(MetaStorage storage, Role[] roles, RequiredUser[] rUsers) {
for (Role role : roles) {
storage.addRole(role);
}
for (RequiredUser rUser : rUsers) {
User user = rUser.getUser();
storage.addUser(user);
RoleId[] rolesInjected = rUser.getRolesInjected();
for (RoleId mandatorId : rolesInjected) {
user.addRole(storage.getRole(mandatorId));
}
}
}
use of com.bakdata.conquery.models.auth.entities.Role in project conquery by bakdata.
the class PermissionGroupHandlingTest method execute.
/**
* This is a longer test that plays through different scenarios of permission
* and role adding/deleting. Creating many objects here to avoid side effects.
*/
@Override
public void execute(StandaloneSupport conquery) throws Exception {
MetaStorage storage = conquery.getMetaStorage();
Dataset dataset1 = new Dataset();
dataset1.setLabel("dataset1");
ManagedExecutionId query1 = new ManagedExecutionId(dataset1.getId(), UUID.randomUUID());
Role role1 = new Role("role", "role", storage);
TestUser user1 = new TestUser(storage);
Group group1 = new Group("company", "company", storage);
try {
storage.addRole(role1);
storage.addUser(user1);
storage.addGroup(group1);
user1.addRole(role1);
group1.addMember(user1);
user1.addPermission(ExecutionPermission.onInstance(Ability.READ, query1));
role1.addPermission(ExecutionPermission.onInstance(Ability.DELETE, query1));
group1.addPermission(ExecutionPermission.onInstance(Ability.SHARE, query1));
assertThat(user1.isPermitted(ExecutionPermission.onInstance(Ability.READ, query1))).isTrue();
assertThat(user1.isPermitted(ExecutionPermission.onInstance(Ability.DELETE, query1))).isTrue();
assertThat(user1.isPermitted(ExecutionPermission.onInstance(Ability.SHARE, query1))).isTrue();
// remove user from group
group1.removeMember(user1);
assertThat(user1.isPermitted(ExecutionPermission.onInstance(Ability.READ, query1))).isTrue();
assertThat(user1.isPermitted(ExecutionPermission.onInstance(Ability.DELETE, query1))).isTrue();
assertThat(user1.isPermitted(ExecutionPermission.onInstance(Ability.SHARE, query1))).isFalse();
} finally {
storage.removeGroup(group1.getId());
storage.removeUser(user1.getId());
storage.removeRole(role1.getId());
}
}
use of com.bakdata.conquery.models.auth.entities.Role in project conquery by bakdata.
the class RestartTest method execute.
@Override
public void execute(String name, TestConquery testConquery) throws Exception {
// read test specification
String testJson = In.resource("/tests/query/RESTART_TEST_DATA/SIMPLE_TREECONCEPT_Query.json").withUTF8().readAll();
Validator validator = Validators.newValidator();
EntityIdMap entityIdMap = IdMapSerialisationTest.createTestPersistentMap();
ManagerNode manager = testConquery.getStandaloneCommand().getManager();
AdminDatasetProcessor adminDatasetProcessor = manager.getAdmin().getAdminDatasetProcessor();
AdminProcessor adminProcessor = manager.getAdmin().getAdminProcessor();
StandaloneSupport conquery = testConquery.getSupport(name);
DatasetId dataset = conquery.getDataset().getId();
ConqueryTestSpec test = JsonIntegrationTest.readJson(dataset, testJson);
ValidatorHelper.failOnError(log, validator.validate(test));
test.importRequiredData(conquery);
test.executeTest(conquery);
final int numberOfExecutions = conquery.getMetaStorage().getAllExecutions().size();
// IDMapping Testing
NamespaceStorage namespaceStorage = conquery.getNamespaceStorage();
namespaceStorage.updateIdMapping(entityIdMap);
final Dataset dataset1 = adminDatasetProcessor.addDataset(TEST_DATASET_1);
final Dataset dataset2 = adminDatasetProcessor.addDataset(TEST_DATASET_2);
final Dataset dataset3 = adminDatasetProcessor.addDataset(TEST_DATASET_3);
final Dataset dataset4 = adminDatasetProcessor.addDataset(TEST_DATASET_4);
final Dataset dataset5 = adminDatasetProcessor.addDataset(TEST_DATASET_5);
final Dataset dataset6 = adminDatasetProcessor.addDataset(TEST_DATASET_6);
MetaStorage storage = conquery.getMetaStorage();
Role role = new Role("role", "ROLE", storage);
Role roleToDelete = new Role("roleDelete", "ROLE_DELETE", storage);
User user = new User("user@test.email", "USER", storage);
User userToDelete = new User("userDelete@test.email", "USER_DELETE", storage);
Group group = new Group("group", "GROUP", storage);
Group groupToDelete = new Group("groupDelete", "GROUP_DELETE", storage);
{
// Auth testing (deletion and permission grant)
// build constellation
// TODO USE APIS
adminProcessor.addUser(user);
adminProcessor.addUser(userToDelete);
adminProcessor.addRole(role);
adminProcessor.addRole(roleToDelete);
adminProcessor.addGroup(group);
adminProcessor.addGroup(groupToDelete);
adminProcessor.addRoleTo(user, role);
adminProcessor.addRoleTo(user, roleToDelete);
adminProcessor.addRoleTo(userToDelete, role);
adminProcessor.addRoleTo(userToDelete, roleToDelete);
adminProcessor.addRoleTo(group, role);
adminProcessor.addRoleTo(group, roleToDelete);
adminProcessor.addRoleTo(groupToDelete, role);
adminProcessor.addRoleTo(groupToDelete, roleToDelete);
adminProcessor.addUserToGroup(group, user);
adminProcessor.addUserToGroup(group, userToDelete);
adminProcessor.addUserToGroup(groupToDelete, user);
adminProcessor.addUserToGroup(groupToDelete, userToDelete);
// Adding Permissions
adminProcessor.createPermission(user, dataset1.createPermission(Ability.READ.asSet()));
adminProcessor.createPermission(userToDelete, dataset2.createPermission(Ability.READ.asSet()));
adminProcessor.createPermission(role, dataset3.createPermission(Ability.READ.asSet()));
adminProcessor.createPermission(roleToDelete, dataset4.createPermission(Ability.READ.asSet()));
adminProcessor.createPermission(group, dataset5.createPermission(Ability.READ.asSet()));
adminProcessor.createPermission(groupToDelete, dataset6.createPermission(Ability.READ.asSet()));
// Delete entities
// TODO use API
adminProcessor.deleteUser(userToDelete);
adminProcessor.deleteRole(roleToDelete);
adminProcessor.deleteGroup(groupToDelete);
}
log.info("Shutting down for restart");
testConquery.shutdown();
log.info("Restarting");
testConquery.beforeAll();
final StandaloneSupport support = testConquery.openDataset(dataset);
log.info("Restart complete");
DatasetRegistry datasetRegistry = support.getDatasetsProcessor().getDatasetRegistry();
assertThat(support.getMetaStorage().getAllExecutions().size()).as("Executions after restart").isEqualTo(numberOfExecutions);
test.executeTest(support);
{
// Auth actual tests
User userStored = storage.getUser(user.getId());
assertThat(userStored).isEqualTo(user);
assertThat(storage.getRole(role.getId())).isEqualTo(role);
assertThat(storage.getGroup(group.getId())).isEqualTo(group);
assertThat(storage.getUser(userToDelete.getId())).as("deleted user should stay deleted").isNull();
assertThat(storage.getRole(roleToDelete.getId())).as("deleted role should stay deleted").isNull();
assertThat(storage.getGroup(groupToDelete.getId())).as("deleted group should stay deleted").isNull();
assertThat(userStored.isPermitted(datasetRegistry.get(TEST_DATASET_1.getId()).getDataset(), Ability.READ)).isTrue();
assertThat(userStored.isPermitted(datasetRegistry.get(TEST_DATASET_2.getId()).getDataset(), Ability.READ)).isFalse();
assertThat(userStored.isPermitted(datasetRegistry.get(TEST_DATASET_3.getId()).getDataset(), Ability.READ)).isTrue();
assertThat(userStored.isPermitted(datasetRegistry.get(TEST_DATASET_4.getId()).getDataset(), Ability.READ)).isFalse();
assertThat(userStored.isPermitted(datasetRegistry.get(TEST_DATASET_5.getId()).getDataset(), Ability.READ)).isTrue();
assertThat(userStored.isPermitted(datasetRegistry.get(TEST_DATASET_6.getId()).getDataset(), Ability.READ)).isFalse();
}
EntityIdMap entityIdMapAfterRestart = conquery.getNamespaceStorage().getIdMapping();
assertThat(entityIdMapAfterRestart).isEqualTo(entityIdMap);
// We need to reassign the dataset processor because the instance prio to the restart became invalid
adminDatasetProcessor = testConquery.getStandaloneCommand().getManager().getAdmin().getAdminDatasetProcessor();
// Cleanup
adminDatasetProcessor.deleteDataset(dataset1);
adminDatasetProcessor.deleteDataset(dataset2);
adminDatasetProcessor.deleteDataset(dataset3);
adminDatasetProcessor.deleteDataset(dataset4);
adminDatasetProcessor.deleteDataset(dataset5);
adminDatasetProcessor.deleteDataset(dataset6);
}
Aggregations