2 * Copyright (c) 2014 Samsung Electronics Co., Ltd All Rights Reserved
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 * @file test/cyad/commandline.cpp
18 * @author Aleksander Zdyb <a.zdyb@samsung.com>
20 * @brief Tests for CyadCommandlineParser
25 #include <gmock/gmock.h>
26 #include <gtest/gtest.h>
28 #include <common/types/PolicyKey.h>
29 #include <cyad/CommandlineParser/CyadCommand.h>
30 #include <cyad/CommandlineParser/CyadCommandlineParser.h>
32 #include "CyadCommandlineTest.h"
34 TEST_F(CyadCommandlineTest, help) {
35 prepare_argv({ "./cyad", "--help" });
36 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
38 auto result = std::dynamic_pointer_cast<Cynara::HelpCyadCommand>(parser.parseMain());
39 ASSERT_NE(nullptr, result);
42 TEST_F(CyadCommandlineTest, deleteBucket) {
43 prepare_argv({ "./cyad", "--delete-bucket=bucket" });
44 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
46 auto result = std::dynamic_pointer_cast<Cynara::DeleteBucketCyadCommand>(parser.parseMain());
47 ASSERT_NE(nullptr, result);
48 ASSERT_EQ("bucket", result->bucketId());
51 TEST_F(CyadCommandlineTest, setBucket) {
52 prepare_argv({ "./cyad", "--set-bucket=bucket", "--policy=42" });
53 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
55 auto result = std::dynamic_pointer_cast<Cynara::SetBucketCyadCommand>(parser.parseMain());
56 ASSERT_NE(nullptr, result);
57 ASSERT_EQ("bucket", result->bucketId());
58 ASSERT_EQ(42, result->policyResult().policyType());
59 ASSERT_TRUE(result->policyResult().metadata().empty());
62 TEST_F(CyadCommandlineTest, setBucketWithMetadata) {
63 const std::string ultimateAnswer = "Answer to The Ultimate Question of Life,"
64 " the Universe, and Everything";
66 prepare_argv({ "./cyad", "--set-bucket=adams", "--policy=42", "--metadata=" + ultimateAnswer });
67 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
69 auto result = std::dynamic_pointer_cast<Cynara::SetBucketCyadCommand>(parser.parseMain());
70 ASSERT_NE(nullptr, result);
71 ASSERT_EQ("adams", result->bucketId());
72 ASSERT_EQ(42, result->policyResult().policyType());
73 ASSERT_EQ(ultimateAnswer, result->policyResult().metadata());
76 TEST_F(CyadCommandlineTest, setPolicy) {
77 prepare_argv({ "./cyad", "--set-policy", "--bucket=some-bucket",
78 "--client=client", "--user=user", "--privilege=privilege",
80 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
82 auto result = std::dynamic_pointer_cast<Cynara::SetPolicyCyadCommand>(parser.parseMain());
83 ASSERT_NE(nullptr, result);
84 ASSERT_EQ("some-bucket", result->bucketId());
86 ASSERT_EQ(Cynara::PolicyKey("client", "user", "privilege"), result->policyKey());
87 ASSERT_EQ(42, result->policyResult().policyType());
88 ASSERT_TRUE(result->policyResult().metadata().empty());
91 TEST_F(CyadCommandlineTest, setPolicyWithMetadata) {
92 prepare_argv({ "./cyad", "--set-policy", "--bucket=some-bucket",
93 "--client=client", "--user=user", "--privilege=privilege",
94 "--policy=42", "--metadata=some-metadata" });
95 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
97 auto result = std::dynamic_pointer_cast<Cynara::SetPolicyCyadCommand>(parser.parseMain());
98 ASSERT_NE(nullptr, result);
99 ASSERT_EQ("some-bucket", result->bucketId());
101 ASSERT_EQ(Cynara::PolicyKey("client", "user", "privilege"), result->policyKey());
102 ASSERT_EQ(42, result->policyResult().policyType());
103 ASSERT_EQ("some-metadata", result->policyResult().metadata());
106 TEST_F(CyadCommandlineTest, setPolicyInDefaultBucket) {
107 prepare_argv({ "./cyad", "--set-policy", "--bucket=",
108 "--client=client", "--user=user", "--privilege=privilege",
109 "--policy=ALLOW", "--metadata=some-metadata" });
110 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
112 auto result = std::dynamic_pointer_cast<Cynara::SetPolicyCyadCommand>(parser.parseMain());
113 ASSERT_NE(nullptr, result);
114 ASSERT_EQ("", result->bucketId());
115 ASSERT_EQ(Cynara::PolicyKey("client", "user", "privilege"), result->policyKey());
116 ASSERT_EQ(CYNARA_ADMIN_ALLOW, result->policyResult().policyType());
117 ASSERT_EQ("some-metadata", result->policyResult().metadata());
120 TEST_F(CyadCommandlineTest, setPolicyInDefaultBucketNoOption) {
121 prepare_argv({ "./cyad", "--set-policy",
122 "--client=client", "--user=user", "--privilege=privilege",
123 "--policy=ALLOW", "--metadata=some-metadata" });
124 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
126 auto result = std::dynamic_pointer_cast<Cynara::SetPolicyCyadCommand>(parser.parseMain());
127 ASSERT_NE(nullptr, result);
128 ASSERT_EQ("", result->bucketId());
129 ASSERT_EQ(Cynara::PolicyKey("client", "user", "privilege"), result->policyKey());
130 ASSERT_EQ(CYNARA_ADMIN_ALLOW, result->policyResult().policyType());
131 ASSERT_EQ("some-metadata", result->policyResult().metadata());
134 TEST_F(CyadCommandlineTest, parsePolicyTypeBase10) {
135 auto parsePolicyType = [] (const char *rawPolicy) -> Cynara::PolicyType {
136 return Cynara::CyadCommandlineParser::parsePolicyType(rawPolicy);
139 ASSERT_EQ(CYNARA_ADMIN_DENY, parsePolicyType("0"));
140 ASSERT_EQ(CYNARA_ADMIN_NONE, parsePolicyType("1"));
141 ASSERT_EQ(CYNARA_ADMIN_BUCKET, parsePolicyType("65534"));
142 ASSERT_EQ(CYNARA_ADMIN_ALLOW, parsePolicyType("65535"));
145 TEST_F(CyadCommandlineTest, parsePolicyTypeBase16) {
146 auto parsePolicyType = [] (const char *rawPolicy) -> Cynara::PolicyType {
147 return Cynara::CyadCommandlineParser::parsePolicyType(rawPolicy);
150 ASSERT_EQ(CYNARA_ADMIN_DENY, parsePolicyType("0x0"));
151 ASSERT_EQ(CYNARA_ADMIN_NONE, parsePolicyType("0x1"));
152 ASSERT_EQ(CYNARA_ADMIN_BUCKET, parsePolicyType("0xFFFE"));
153 ASSERT_EQ(CYNARA_ADMIN_ALLOW, parsePolicyType("0xFFFF"));
156 TEST_F(CyadCommandlineTest, parsePolicyTypeHuman) {
157 auto parsePolicyType = [] (const char *rawPolicy) -> Cynara::PolicyType {
158 return Cynara::CyadCommandlineParser::parsePolicyType(rawPolicy);
161 ASSERT_EQ(CYNARA_ADMIN_DENY, parsePolicyType("DENY"));
162 ASSERT_EQ(CYNARA_ADMIN_NONE, parsePolicyType("NONE"));
163 ASSERT_EQ(CYNARA_ADMIN_BUCKET, parsePolicyType("BUCKET"));
164 ASSERT_EQ(CYNARA_ADMIN_ALLOW, parsePolicyType("ALLOW"));
167 TEST_F(CyadCommandlineTest, setPoliciesBulkFilename) {
168 prepare_argv({ "./cyad", "--set-policy", "--bulk=/tmp/input_file" });
169 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
171 auto result = std::dynamic_pointer_cast<Cynara::SetPolicyBulkCyadCommand>(parser.parseMain());
172 ASSERT_NE(nullptr, result);
173 ASSERT_EQ("/tmp/input_file", result->filename());
176 TEST_F(CyadCommandlineTest, setPoliciesBulkStdin) {
177 prepare_argv({ "./cyad", "--set-policy", "--bulk=-" });
178 Cynara::CyadCommandlineParser parser(this->argc(), this->argv());
180 auto result = std::dynamic_pointer_cast<Cynara::SetPolicyBulkCyadCommand>(parser.parseMain());
181 ASSERT_NE(nullptr, result);
182 ASSERT_EQ("-", result->filename());