2024-05-17 01:53:15 -07:00
|
|
|
import Container from 'typedi';
|
2024-08-28 04:59:27 -07:00
|
|
|
import * as testDb from './shared/test-db';
|
2024-05-17 01:53:15 -07:00
|
|
|
|
2024-08-22 02:10:37 -07:00
|
|
|
import { CredentialsHelper } from '@/credentials-helper';
|
2024-05-17 01:53:15 -07:00
|
|
|
import { createOwner, createAdmin, createMember } from './shared/db/users';
|
|
|
|
import type { User } from '@/databases/entities/User';
|
|
|
|
import { saveCredential } from './shared/db/credentials';
|
|
|
|
import { randomCredentialPayload } from './shared/random';
|
|
|
|
import { createTeamProject, linkUserToProject } from './shared/db/projects';
|
|
|
|
|
|
|
|
let credentialHelper: CredentialsHelper;
|
|
|
|
let owner: User;
|
|
|
|
let admin: User;
|
|
|
|
let member: User;
|
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
await testDb.init();
|
|
|
|
|
|
|
|
credentialHelper = Container.get(CredentialsHelper);
|
|
|
|
owner = await createOwner();
|
|
|
|
admin = await createAdmin();
|
|
|
|
member = await createMember();
|
|
|
|
});
|
|
|
|
|
|
|
|
afterAll(async () => {
|
|
|
|
await testDb.terminate();
|
|
|
|
});
|
|
|
|
|
|
|
|
describe('CredentialsHelper', () => {
|
|
|
|
describe('credentialOwnedBySuperUsers', () => {
|
|
|
|
test.each([
|
|
|
|
{
|
|
|
|
testName: 'owners are super users',
|
|
|
|
user: () => owner,
|
|
|
|
credentialRole: 'credential:owner',
|
|
|
|
expectedResult: true,
|
|
|
|
} as const,
|
|
|
|
{
|
|
|
|
testName: 'admins are super users',
|
|
|
|
user: () => admin,
|
|
|
|
credentialRole: 'credential:owner',
|
|
|
|
expectedResult: true,
|
|
|
|
} as const,
|
|
|
|
{
|
|
|
|
testName: 'owners need to own the credential',
|
|
|
|
user: () => owner,
|
|
|
|
credentialRole: 'credential:user',
|
|
|
|
expectedResult: false,
|
|
|
|
} as const,
|
|
|
|
{
|
|
|
|
testName: 'admins need to own the credential',
|
|
|
|
user: () => admin,
|
|
|
|
credentialRole: 'credential:user',
|
|
|
|
expectedResult: false,
|
|
|
|
} as const,
|
|
|
|
{
|
|
|
|
testName: 'members are no super users',
|
|
|
|
user: () => member,
|
|
|
|
credentialRole: 'credential:owner',
|
|
|
|
expectedResult: false,
|
|
|
|
} as const,
|
|
|
|
])('$testName', async ({ user, credentialRole, expectedResult }) => {
|
|
|
|
const credential = await saveCredential(randomCredentialPayload(), {
|
|
|
|
user: user(),
|
|
|
|
role: credentialRole,
|
|
|
|
});
|
|
|
|
|
|
|
|
const result = await credentialHelper.credentialCanUseExternalSecrets(credential);
|
|
|
|
|
|
|
|
expect(result).toBe(expectedResult);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('credential in team project with instance owner as an admin can use external secrets', async () => {
|
|
|
|
const teamProject = await createTeamProject();
|
|
|
|
const [credential] = await Promise.all([
|
|
|
|
await saveCredential(randomCredentialPayload(), {
|
|
|
|
project: teamProject,
|
|
|
|
role: 'credential:owner',
|
|
|
|
}),
|
|
|
|
await linkUserToProject(owner, teamProject, 'project:admin'),
|
|
|
|
await linkUserToProject(member, teamProject, 'project:admin'),
|
|
|
|
]);
|
|
|
|
|
|
|
|
const result = await credentialHelper.credentialCanUseExternalSecrets(credential);
|
|
|
|
|
|
|
|
expect(result).toBe(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('credential in team project with instance admin as an admin can use external secrets', async () => {
|
|
|
|
const teamProject = await createTeamProject();
|
|
|
|
const [credential] = await Promise.all([
|
|
|
|
await saveCredential(randomCredentialPayload(), {
|
|
|
|
project: teamProject,
|
|
|
|
role: 'credential:owner',
|
|
|
|
}),
|
|
|
|
await linkUserToProject(admin, teamProject, 'project:admin'),
|
|
|
|
await linkUserToProject(member, teamProject, 'project:admin'),
|
|
|
|
]);
|
|
|
|
|
|
|
|
const result = await credentialHelper.credentialCanUseExternalSecrets(credential);
|
|
|
|
|
|
|
|
expect(result).toBe(true);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('credential in team project with instance owner as an editor cannot use external secrets', async () => {
|
|
|
|
const teamProject = await createTeamProject();
|
|
|
|
const [credential] = await Promise.all([
|
|
|
|
await saveCredential(randomCredentialPayload(), {
|
|
|
|
project: teamProject,
|
|
|
|
role: 'credential:owner',
|
|
|
|
}),
|
|
|
|
await linkUserToProject(owner, teamProject, 'project:editor'),
|
|
|
|
await linkUserToProject(member, teamProject, 'project:admin'),
|
|
|
|
]);
|
|
|
|
|
|
|
|
const result = await credentialHelper.credentialCanUseExternalSecrets(credential);
|
|
|
|
|
|
|
|
expect(result).toBe(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('credential in team project with instance admin as an editor cannot use external secrets', async () => {
|
|
|
|
const teamProject = await createTeamProject();
|
|
|
|
const [credential] = await Promise.all([
|
|
|
|
await saveCredential(randomCredentialPayload(), {
|
|
|
|
project: teamProject,
|
|
|
|
role: 'credential:owner',
|
|
|
|
}),
|
|
|
|
await linkUserToProject(admin, teamProject, 'project:editor'),
|
|
|
|
await linkUserToProject(member, teamProject, 'project:admin'),
|
|
|
|
]);
|
|
|
|
|
|
|
|
const result = await credentialHelper.credentialCanUseExternalSecrets(credential);
|
|
|
|
|
|
|
|
expect(result).toBe(false);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('credential in team project with no instance admin or owner as part of the project cannot use external secrets', async () => {
|
|
|
|
const teamProject = await createTeamProject();
|
|
|
|
const [credential] = await Promise.all([
|
|
|
|
await saveCredential(randomCredentialPayload(), {
|
|
|
|
project: teamProject,
|
|
|
|
role: 'credential:owner',
|
|
|
|
}),
|
|
|
|
await linkUserToProject(member, teamProject, 'project:admin'),
|
|
|
|
]);
|
|
|
|
|
|
|
|
const result = await credentialHelper.credentialCanUseExternalSecrets(credential);
|
|
|
|
|
|
|
|
expect(result).toBe(false);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|