]> git.proxmox.com Git - pve-access-control.git/blame - src/test/perm-test1.pl
add new SDN.use privilege in PVESDNUser role
[pve-access-control.git] / src / test / perm-test1.pl
CommitLineData
2c3a6c0a
DM
1#!/usr/bin/perl -w
2
3use strict;
95fb22e6
TL
4use warnings;
5
6use Getopt::Long;
7
2c3a6c0a 8use PVE::Tools;
95fb22e6 9
2c3a6c0a
DM
10use PVE::AccessControl;
11use PVE::RPCEnvironment;
2c3a6c0a
DM
12
13my $rpcenv = PVE::RPCEnvironment->init('cli');
14
9449fe21 15my $cfgfn = "test1.cfg";
2c3a6c0a
DM
16$rpcenv->init_request(userconfig => $cfgfn);
17
18sub check_roles {
19 my ($user, $path, $expected_result) = @_;
20
7e8bcaa7
FG
21 my $roles = PVE::AccessControl::roles($rpcenv->{user_cfg}, $user, $path);
22 my $res = join(',', sort keys %$roles);
2c3a6c0a
DM
23
24 die "unexpected result\nneed '${expected_result}'\ngot '$res'\n"
25 if $res ne $expected_result;
26
27 print "ROLES:$path:$user:$res\n";
28}
29
30sub check_permission {
31 my ($user, $path, $expected_result) = @_;
32
9efcb561 33 my $perm = $rpcenv->permissions($user, $path);
2c3a6c0a
DM
34 my $res = join(',', sort keys %$perm);
35
36 die "unexpected result\nneed '${expected_result}'\ngot '$res'\n"
37 if $res ne $expected_result;
38
39 $perm = $rpcenv->permissions($user, $path);
40 $res = join(',', sort keys %$perm);
41 die "unexpected result (compiled)\nneed '${expected_result}'\ngot '$res'\n"
42 if $res ne $expected_result;
43
44 print "PERM:$path:$user:$res\n";
2c3a6c0a
DM
45}
46
47check_roles('max@pve', '/', '');
48check_roles('max@pve', '/vms', 'vm_admin');
49
50#user permissions overrides group permissions
51check_roles('max@pve', '/vms/100', 'customer');
52check_roles('max@pve', '/vms/101', 'vm_admin');
53
54check_permission('max@pve', '/', '');
55check_permission('max@pve', '/vms', 'Permissions.Modify,VM.Allocate,VM.Audit,VM.Console');
56check_permission('max@pve', '/vms/100', 'VM.Audit,VM.PowerMgmt');
57
58check_permission('alex@pve', '/vms', '');
59check_permission('alex@pve', '/vms/100', 'VM.Audit,VM.PowerMgmt');
60
df619a8d
FG
61# PVEVMAdmin -> no Permissions.Modify!
62check_permission('alex@pve', '/vms/300', 'VM.Allocate,VM.Audit,VM.Backup,VM.Clone,VM.Config.CDROM,VM.Config.CPU,VM.Config.Cloudinit,VM.Config.Disk,VM.Config.HWType,VM.Config.Memory,VM.Config.Network,VM.Config.Options,VM.Console,VM.Migrate,VM.Monitor,VM.PowerMgmt,VM.Snapshot,VM.Snapshot.Rollback');
63# Administrator -> Permissions.Modify!
a62d78db 64check_permission('alex@pve', '/vms/400', 'Datastore.Allocate,Datastore.AllocateSpace,Datastore.AllocateTemplate,Datastore.Audit,Group.Allocate,Permissions.Modify,Pool.Allocate,Pool.Audit,Realm.Allocate,Realm.AllocateUser,SDN.Allocate,SDN.Audit,SDN.Use,Sys.Audit,Sys.Console,Sys.Incoming,Sys.Modify,Sys.PowerMgmt,Sys.Syslog,User.Modify,VM.Allocate,VM.Audit,VM.Backup,VM.Clone,VM.Config.CDROM,VM.Config.CPU,VM.Config.Cloudinit,VM.Config.Disk,VM.Config.HWType,VM.Config.Memory,VM.Config.Network,VM.Config.Options,VM.Console,VM.Migrate,VM.Monitor,VM.PowerMgmt,VM.Snapshot,VM.Snapshot.Rollback');
2c3a6c0a
DM
65
66check_roles('max@pve', '/vms/200', 'storage_manager');
67check_roles('joe@pve', '/vms/200', 'vm_admin');
4bc17477 68check_roles('sue@pve', '/vms/200', 'NoAccess');
2c3a6c0a
DM
69
70print "all tests passed\n";
71
72exit (0);