mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
3f374534ab
* [FIX] LDAP Not Checking for Updated Groups * refactor handlers verifyFromSessionCookie * refactor authorizer selectMatchingObjectRules * refactor authorizer isDomainMatching * add authorizer URLHasGroupSubjects method * add user provider ProviderType method * update tests * check for new LDAP groups and update session when: * user provider type is LDAP * authorization is forbidden * URL has rule with group subjects * Implement Refresh Interval * add default values for LDAP user provider * add default for refresh interval * add schema validator for refresh interval * add various tests * rename hasUserBeenInactiveLongEnough to hasUserBeenInactiveTooLong * use Authelia ctx clock * add check to determine if user is deleted, if so destroy the * make ldap user not found error a const * implement GetRefreshSettings in mock * Use user not found const with FileProvider * comment exports * use ctx.Clock instead of time pkg * add debug logging * use ptr to reference userSession so we don't have to retrieve it again * add documenation * add check for 0 refresh interval to reduce CPU cost * remove badly copied debug msg * add group change delta message * add SliceStringDelta * refactor ldap refresh to use the new func * improve delta add/remove log message * fix incorrect logic in SliceStringDelta * add tests to SliceStringDelta * add always config option * add tests for always config option * update docs * apply suggestions from code review Co-Authored-By: Amir Zarrinkafsh <nightah@me.com> * complete mocks and fix an old one * show warning when LDAP details failed to update for an unknown reason * golint fix * actually fix existing mocks * use mocks for LDAP refresh testing * use mocks for LDAP refresh testing for both added and removed groups * use test mock to verify disabled refresh behaviour * add information to threat model * add time const for default Unix() value * misc adjustments to mocks * Suggestions from code review * requested changes * update emails * docs updates * test updates * misc * golint fix * set debug for dev testing * misc docs and logging updates * misc grammar/spelling * use built function for VerifyGet * fix reviewdog suggestions * requested changes * Apply suggestions from code review Co-authored-by: Amir Zarrinkafsh <nightah@me.com> Co-authored-by: Clément Michaud <clement.michaud34@gmail.com>
37 lines
1.4 KiB
Go
37 lines
1.4 KiB
Go
package authorization
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func TestShouldMatchACLWithSingleDomain(t *testing.T) {
|
|
assert.True(t, isDomainMatching("example.com", []string{"example.com"}))
|
|
|
|
assert.True(t, isDomainMatching("abc.example.com", []string{"*.example.com"}))
|
|
assert.True(t, isDomainMatching("abc.def.example.com", []string{"*.example.com"}))
|
|
}
|
|
|
|
func TestShouldNotMatchACLWithSingleDomain(t *testing.T) {
|
|
assert.False(t, isDomainMatching("example.com", []string{"*.example.com"}))
|
|
// Character * must be followed by . to be valid.
|
|
assert.False(t, isDomainMatching("example.com", []string{"*example.com"}))
|
|
|
|
assert.False(t, isDomainMatching("example.com", []string{"*.exampl.com"}))
|
|
|
|
assert.False(t, isDomainMatching("example.com", []string{"*.other.net"}))
|
|
assert.False(t, isDomainMatching("example.com", []string{"*other.net"}))
|
|
assert.False(t, isDomainMatching("example.com", []string{"other.net"}))
|
|
}
|
|
|
|
func TestShouldMatchACLWithMultipleDomains(t *testing.T) {
|
|
assert.True(t, isDomainMatching("example.com", []string{"*.example.com", "example.com"}))
|
|
assert.True(t, isDomainMatching("apple.example.com", []string{"*.example.com", "example.com"}))
|
|
}
|
|
|
|
func TestShouldNotMatchACLWithMultipleDomains(t *testing.T) {
|
|
assert.False(t, isDomainMatching("example.com", []string{"*.example.com", "*example.com"}))
|
|
assert.False(t, isDomainMatching("apple.example.com", []string{"*example.com", "example.com"}))
|
|
}
|