mirror of
https://gitee.com/milvus-io/milvus.git
synced 2024-12-02 20:09:57 +08:00
e8f8c1b445
Signed-off-by: SimFG <bang.fu@zilliz.com>
84 lines
2.6 KiB
Go
84 lines
2.6 KiB
Go
package proxy
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/milvus-io/milvus/internal/types"
|
|
"github.com/milvus-io/milvus/internal/util"
|
|
"github.com/milvus-io/milvus/internal/util/crypto"
|
|
"github.com/milvus-io/milvus/internal/util/paramtable"
|
|
"github.com/stretchr/testify/assert"
|
|
"google.golang.org/grpc/metadata"
|
|
)
|
|
|
|
// validAuth validates the authentication
|
|
func TestValidAuth(t *testing.T) {
|
|
validAuth := func(ctx context.Context, authorization []string) bool {
|
|
username, password := parseMD(authorization)
|
|
if username == "" || password == "" {
|
|
return false
|
|
}
|
|
return passwordVerify(ctx, username, password, globalMetaCache)
|
|
}
|
|
|
|
ctx := context.Background()
|
|
// no metadata
|
|
res := validAuth(ctx, nil)
|
|
assert.False(t, res)
|
|
// illegal metadata
|
|
res = validAuth(ctx, []string{"xxx"})
|
|
assert.False(t, res)
|
|
// normal metadata
|
|
rootCoord := &MockRootCoordClientInterface{}
|
|
queryCoord := &types.MockQueryCoord{}
|
|
mgr := newShardClientMgr()
|
|
err := InitMetaCache(ctx, rootCoord, queryCoord, mgr)
|
|
assert.Nil(t, err)
|
|
res = validAuth(ctx, []string{crypto.Base64Encode("mockUser:mockPass")})
|
|
assert.True(t, res)
|
|
}
|
|
|
|
func TestValidSourceID(t *testing.T) {
|
|
ctx := context.Background()
|
|
// no metadata
|
|
res := validSourceID(ctx, nil)
|
|
assert.False(t, res)
|
|
// illegal metadata
|
|
res = validSourceID(ctx, []string{"invalid_sourceid"})
|
|
assert.False(t, res)
|
|
// normal sourceId
|
|
res = validSourceID(ctx, []string{crypto.Base64Encode(util.MemberCredID)})
|
|
assert.True(t, res)
|
|
}
|
|
|
|
func TestAuthenticationInterceptor(t *testing.T) {
|
|
ctx := context.Background()
|
|
paramtable.Get().Save(Params.CommonCfg.AuthorizationEnabled.Key, "true") // mock authorization is turned on
|
|
defer paramtable.Get().Reset(Params.CommonCfg.AuthorizationEnabled.Key) // mock authorization is turned on
|
|
// no metadata
|
|
_, err := AuthenticationInterceptor(ctx)
|
|
assert.NotNil(t, err)
|
|
// mock metacache
|
|
rootCoord := &MockRootCoordClientInterface{}
|
|
queryCoord := &types.MockQueryCoord{}
|
|
mgr := newShardClientMgr()
|
|
err = InitMetaCache(ctx, rootCoord, queryCoord, mgr)
|
|
assert.Nil(t, err)
|
|
// with invalid metadata
|
|
md := metadata.Pairs("xxx", "yyy")
|
|
ctx = metadata.NewIncomingContext(ctx, md)
|
|
_, err = AuthenticationInterceptor(ctx)
|
|
assert.NotNil(t, err)
|
|
// with valid username/password
|
|
md = metadata.Pairs(util.HeaderAuthorize, crypto.Base64Encode("mockUser:mockPass"))
|
|
ctx = metadata.NewIncomingContext(ctx, md)
|
|
_, err = AuthenticationInterceptor(ctx)
|
|
assert.Nil(t, err)
|
|
// with valid sourceId
|
|
md = metadata.Pairs("sourceid", crypto.Base64Encode(util.MemberCredID))
|
|
ctx = metadata.NewIncomingContext(ctx, md)
|
|
_, err = AuthenticationInterceptor(ctx)
|
|
assert.Nil(t, err)
|
|
}
|