mirror of
https://github.com/Azure/cosmos-explorer.git
synced 2025-10-13 15:28:05 +01:00
137 lines
6.4 KiB
TypeScript
137 lines
6.4 KiB
TypeScript
import { AuthType } from "../AuthType";
|
|
import * as Constants from "../Common/Constants";
|
|
import { ApiType, updateUserContext, userContext } from "../UserContext";
|
|
import * as AuthorizationUtils from "./AuthorizationUtils";
|
|
jest.mock("../Explorer/Explorer");
|
|
|
|
describe("AuthorizationUtils", () => {
|
|
const setAadDataPlane = (enabled: boolean) => {
|
|
updateUserContext({
|
|
features: {
|
|
enableAadDataPlane: enabled,
|
|
canExceedMaximumValue: false,
|
|
cosmosdb: false,
|
|
enableChangeFeedPolicy: false,
|
|
enableFixedCollectionWithSharedThroughput: false,
|
|
enableKOPanel: false,
|
|
enableNotebooks: false,
|
|
enableReactPane: false,
|
|
enableRightPanelV2: false,
|
|
enableSchema: false,
|
|
enableSDKoperations: false,
|
|
enableSpark: false,
|
|
enableTtl: false,
|
|
executeSproc: false,
|
|
enableResourceGraph: false,
|
|
enableKoResourceTree: false,
|
|
enableThroughputBuckets: false,
|
|
hostedDataExplorer: false,
|
|
sandboxNotebookOutputs: false,
|
|
showMinRUSurvey: false,
|
|
ttl90Days: false,
|
|
enableThroughputCap: false,
|
|
enableHierarchicalKeys: false,
|
|
enableCopilot: false,
|
|
disableCopilotPhoenixGateaway: false,
|
|
enableCopilotFullSchema: false,
|
|
copilotChatFixedMonacoEditorHeight: false,
|
|
enablePriorityBasedExecution: false,
|
|
disableConnectionStringLogin: false,
|
|
enableCloudShell: false,
|
|
autoscaleDefault: false,
|
|
partitionKeyDefault: false,
|
|
partitionKeyDefault2: false,
|
|
notebooksDownBanner: false,
|
|
enableRestoreContainer: false,
|
|
},
|
|
});
|
|
};
|
|
|
|
describe("getAuthorizationHeader()", () => {
|
|
it("should return authorization header if authentication type is AAD", () => {
|
|
updateUserContext({
|
|
authType: AuthType.AAD,
|
|
authorizationToken: "some-token",
|
|
});
|
|
|
|
expect(AuthorizationUtils.getAuthorizationHeader().header).toBe(Constants.HttpHeaders.authorization);
|
|
expect(AuthorizationUtils.getAuthorizationHeader().token).toBe("some-token");
|
|
});
|
|
|
|
it("should return guest access header if authentication type is EncryptedToken", () => {
|
|
updateUserContext({
|
|
authType: AuthType.EncryptedToken,
|
|
accessToken: "some-token",
|
|
});
|
|
|
|
expect(AuthorizationUtils.getAuthorizationHeader().header).toBe(Constants.HttpHeaders.guestAccessToken);
|
|
expect(AuthorizationUtils.getAuthorizationHeader().token).toBe("some-token");
|
|
});
|
|
});
|
|
|
|
describe("decryptJWTToken()", () => {
|
|
it("should throw an error if token is undefined", () => {
|
|
expect(() => AuthorizationUtils.decryptJWTToken(undefined)).toThrow();
|
|
});
|
|
|
|
it("should throw an error if token is empty", () => {
|
|
expect(() => AuthorizationUtils.decryptJWTToken("")).toThrow();
|
|
});
|
|
|
|
it("should throw an error if token is malformed", () => {
|
|
expect(() =>
|
|
AuthorizationUtils.decryptJWTToken(
|
|
// This is an invalid JWT token used for testing
|
|
"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImFQY3R3X29kdlJPb0VOZzNWb09sSWgydGlFcyIsImtpZCI6ImFQY3R3X29kdlJPb0VOZzNWb09sSWgydGlFcyJ9.",
|
|
),
|
|
).toThrow();
|
|
});
|
|
|
|
it("should return decrypted token payload", () => {
|
|
expect(
|
|
AuthorizationUtils.decryptJWTToken(
|
|
// This is an expired JWT token used for testing
|
|
"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImFQY3R3X29kdlJPb0VOZzNWb09sSWgydGlFcyIsImtpZCI6ImFQY3R3X29kdlJPb0VOZzNWb09sSWgydGlFcyJ9.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.nd-CZ6jpTQ8_2wkxQzuaoJCyEeR_woFK4MGMpHEVttwTd5WBDbVOUgk6gz36Jm2fdFemrQFJ03n1MXtCJYNnMoJX37SrGD3lAzZlXs5aBQig6ZrexWkiUDaaNcbx5qVy8O5JEQPds8OGMArsfUra0DG7iW0v7rgvhInX0umeC8ugnU5C-xEMPSZ9xYj0Q7m62AQrrCIIc94nUicEpxm_cusfsbT-CJHf2yLdmLYQkSx-ewzyBca0jiIl98sm0xA9btXDcwnWcmTY9scyGZ9mlSMtz4zmVY0NUdwssysKm7Js4aWtbA_ON8tsNEElViuwy_w3havM_3RQaNv26J87eQ",
|
|
),
|
|
).toBeDefined();
|
|
});
|
|
});
|
|
|
|
describe("useDataplaneRbacAuthorization()", () => {
|
|
it("should return true if enableAadDataPlane feature flag is set", () => {
|
|
setAadDataPlane(true);
|
|
expect(AuthorizationUtils.useDataplaneRbacAuthorization(userContext)).toBe(true);
|
|
});
|
|
|
|
it("should return true if dataPlaneRbacEnabled is set to true and API supports RBAC", () => {
|
|
setAadDataPlane(false);
|
|
["SQL", "Tables", "Gremlin", "Mongo", "Cassandra"].forEach((type) => {
|
|
updateUserContext({
|
|
dataPlaneRbacEnabled: true,
|
|
apiType: type as ApiType,
|
|
});
|
|
expect(AuthorizationUtils.useDataplaneRbacAuthorization(userContext)).toBe(true);
|
|
});
|
|
});
|
|
|
|
it("should return false if dataPlaneRbacEnabled is set to true and API does not support RBAC", () => {
|
|
setAadDataPlane(false);
|
|
["Postgres", "VCoreMongo"].forEach((type) => {
|
|
updateUserContext({
|
|
dataPlaneRbacEnabled: true,
|
|
apiType: type as ApiType,
|
|
});
|
|
expect(AuthorizationUtils.useDataplaneRbacAuthorization(userContext)).toBe(false);
|
|
});
|
|
});
|
|
|
|
it("should return false if dataPlaneRbacEnabled is set to false", () => {
|
|
setAadDataPlane(false);
|
|
updateUserContext({
|
|
dataPlaneRbacEnabled: false,
|
|
});
|
|
expect(AuthorizationUtils.useDataplaneRbacAuthorization(userContext)).toBe(false);
|
|
});
|
|
});
|
|
});
|