milvus/pkg/util/paramtable/role_param_test.go
PowderLi bcd6865b29
enhance: add 3 builtin roles (#28961)
issue: #28960 [milvus-proto
#212](https://github.com/milvus-io/milvus-proto/issues/212)

add new configuration: builtinRoles
user can define roles in config file: `milvus.yaml`

there is an example:
1. db_ro, only have read privileges, include load
2. db_rw, read and write privileges, include create/drop/rename
collection
3. db_admin, not only read and write privileges, but also user
administration

Signed-off-by: PowderLi <min.li@zilliz.com>
2023-12-18 14:28:41 +08:00

58 lines
1.5 KiB
Go

package paramtable
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/milvus-io/milvus/pkg/config"
)
func TestRoleConfig_Init(t *testing.T) {
params := ComponentParam{}
params.Init(NewBaseTable(SkipRemote(true)))
cfg := &params.RoleCfg
assert.Equal(t, cfg.Enabled.GetAsBool(), false)
assert.Equal(t, cfg.Roles.GetValue(), "{}")
assert.Equal(t, len(cfg.Roles.GetAsJSONMap()), 0)
}
func TestRoleConfig_Invalid(t *testing.T) {
t.Run("valid roles", func(t *testing.T) {
mgr := config.NewManager()
mgr.SetConfig("builtinRoles.enable", "true")
mgr.SetConfig("builtinRoles.roles", `{"db_admin": {"privileges": [{"object_type": "Global", "object_name": "*", "privilege": "CreateCollection", "db_name": "*"}]}}`)
p := &roleConfig{
Enabled: ParamItem{
Key: "builtinRoles.enable",
},
Roles: ParamItem{
Key: "builtinRoles.roles",
},
}
p.Enabled.Init(mgr)
p.Roles.Init(mgr)
assert.NotPanics(t, func() {
p.panicIfNotValid(mgr)
})
})
t.Run("invalid roles", func(t *testing.T) {
mgr := config.NewManager()
mgr.SetConfig("builtinRoles.enable", "true")
mgr.SetConfig("builtinRoles.roles", `{"db_admin": {"privileges": {"object_type": "Global", "object_name": "*", "privilege": "CreateCollection", "db_name": "*"}}}`)
p := &roleConfig{
Enabled: ParamItem{
Key: "builtinRoles.enable",
},
Roles: ParamItem{
Key: "builtinRoles.roles",
},
}
p.Enabled.Init(mgr)
p.Roles.Init(mgr)
assert.Panics(t, func() {
p.panicIfNotValid(mgr)
})
})
}