本文整理汇总了Golang中github.com/openshift/origin/pkg/authorization/authorizer.NewForbiddenMessageResolver函数的典型用法代码示例。如果您正苦于以下问题:Golang NewForbiddenMessageResolver函数的具体用法?Golang NewForbiddenMessageResolver怎么用?Golang NewForbiddenMessageResolver使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。
在下文中一共展示了NewForbiddenMessageResolver函数的4个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Golang代码示例。
示例1: newAuthorizer
func newAuthorizer(policyClient policyclient.ReadOnlyPolicyClient, projectRequestDenyMessage string) authorizer.Authorizer {
authorizer := authorizer.NewAuthorizer(rulevalidation.NewDefaultRuleResolver(
rulevalidation.PolicyGetter(policyClient),
rulevalidation.BindingLister(policyClient),
rulevalidation.ClusterPolicyGetter(policyClient),
rulevalidation.ClusterBindingLister(policyClient),
), authorizer.NewForbiddenMessageResolver(projectRequestDenyMessage))
return authorizer
}
示例2: TestAuthorize
func TestAuthorize(t *testing.T) {
testCases := []struct {
name string
user user.Info
attributes defaultauthorizer.DefaultAuthorizationAttributes
delegateAuthAllowed bool
expectedCalled bool
expectedAllowed bool
expectedErr string
expectedMsg string
}{
{
name: "no user",
expectedErr: `user missing from context`,
},
{
name: "no extra",
user: &user.DefaultInfo{},
expectedCalled: true,
},
{
name: "empty extra",
user: &user.DefaultInfo{Extra: map[string][]string{}},
expectedCalled: true,
},
{
name: "empty scopes",
user: &user.DefaultInfo{Extra: map[string][]string{authorizationapi.ScopesKey: {}}},
expectedCalled: true,
},
{
name: "bad scope",
user: &user.DefaultInfo{Extra: map[string][]string{authorizationapi.ScopesKey: {"does-not-exist"}}},
expectedMsg: `scopes [does-not-exist] prevent this action; User "" cannot "" "" with name "" in project "ns"`,
expectedErr: `no scope evaluator found for "does-not-exist"`,
},
{
name: "bad scope 2",
user: &user.DefaultInfo{Extra: map[string][]string{authorizationapi.ScopesKey: {"user:dne"}}},
expectedMsg: `scopes [user:dne] prevent this action; User "" cannot "" "" with name "" in project "ns"`,
expectedErr: `unrecognized scope: user:dne`,
},
{
name: "scope doesn't cover",
user: &user.DefaultInfo{Extra: map[string][]string{authorizationapi.ScopesKey: {"user:info"}}},
attributes: defaultauthorizer.DefaultAuthorizationAttributes{Verb: "get", Resource: "users", ResourceName: "harold"},
expectedMsg: `scopes [user:info] prevent this action; User "" cannot get users in project "ns"`,
},
{
name: "scope covers",
user: &user.DefaultInfo{Extra: map[string][]string{authorizationapi.ScopesKey: {"user:info"}}},
attributes: defaultauthorizer.DefaultAuthorizationAttributes{Verb: "get", Resource: "users", ResourceName: "~"},
expectedCalled: true,
},
{
name: "scope covers for discovery",
user: &user.DefaultInfo{Extra: map[string][]string{authorizationapi.ScopesKey: {"user:info"}}},
attributes: defaultauthorizer.DefaultAuthorizationAttributes{Verb: "get", NonResourceURL: true, URL: "/api"},
expectedCalled: true,
},
}
for _, tc := range testCases {
delegate := &fakeAuthorizer{allowed: tc.delegateAuthAllowed}
authorizer := NewAuthorizer(delegate, nil, defaultauthorizer.NewForbiddenMessageResolver(""))
ctx := kapi.WithNamespace(kapi.NewContext(), "ns")
if tc.user != nil {
ctx = kapi.WithUser(ctx, tc.user)
}
actualAllowed, actualMsg, actualErr := authorizer.Authorize(ctx, tc.attributes)
switch {
case len(tc.expectedErr) == 0 && actualErr == nil:
case len(tc.expectedErr) == 0 && actualErr != nil:
t.Errorf("%s: unexpected error: %v", tc.name, actualErr)
case len(tc.expectedErr) != 0 && actualErr == nil:
t.Errorf("%s: missing error: %v", tc.name, tc.expectedErr)
case len(tc.expectedErr) != 0 && actualErr != nil:
if !strings.Contains(actualErr.Error(), tc.expectedErr) {
t.Errorf("%s: expected %v, got %v", tc.name, tc.expectedErr, actualErr)
}
}
if tc.expectedMsg != actualMsg {
t.Errorf("%s: expected %v, got %v", tc.name, tc.expectedMsg, actualMsg)
}
if tc.expectedAllowed != actualAllowed {
t.Errorf("%s: expected %v, got %v", tc.name, tc.expectedAllowed, actualAllowed)
}
if tc.expectedCalled != delegate.called {
t.Errorf("%s: expected %v, got %v", tc.name, tc.expectedCalled, delegate.called)
}
}
}
示例3: newAuthorizer
func newAuthorizer(ruleResolver rulevalidation.AuthorizationRuleResolver, informerFactory shared.InformerFactory, projectRequestDenyMessage string) authorizer.Authorizer {
messageMaker := authorizer.NewForbiddenMessageResolver(projectRequestDenyMessage)
roleBasedAuthorizer := authorizer.NewAuthorizer(ruleResolver, messageMaker)
scopeLimitedAuthorizer := scope.NewAuthorizer(roleBasedAuthorizer, informerFactory.ClusterPolicies().Lister().ClusterPolicies(), messageMaker)
return scopeLimitedAuthorizer
}
示例4: newAuthorizer
func newAuthorizer(ruleResolver rulevalidation.AuthorizationRuleResolver, policyClient policyclient.ReadOnlyPolicyClient, projectRequestDenyMessage string) authorizer.Authorizer {
messageMaker := authorizer.NewForbiddenMessageResolver(projectRequestDenyMessage)
roleBasedAuthorizer := authorizer.NewAuthorizer(ruleResolver, messageMaker)
scopeLimitedAuthorizer := scope.NewAuthorizer(roleBasedAuthorizer, policyClient, messageMaker)
return scopeLimitedAuthorizer
}