]> git.proxmox.com Git - pve-access-control.git/blob - src/test/perm-test5.pl
fix various perlcritic lints
[pve-access-control.git] / src / test / perm-test5.pl
1 #!/usr/bin/perl -w
2
3 use strict;
4 use warnings;
5
6 use Getopt::Long;
7
8 use PVE::Tools;
9
10 use PVE::AccessControl;
11 use PVE::RPCEnvironment;
12
13 my $rpcenv = PVE::RPCEnvironment->init('cli');
14
15 my $cfgfn = "test5.cfg";
16 $rpcenv->init_request(userconfig => $cfgfn);
17
18 sub check_roles {
19 my ($user, $path, $expected_result) = @_;
20
21 my $roles = PVE::AccessControl::roles($rpcenv->{user_cfg}, $user, $path);
22 my $res = join(',', sort keys %$roles);
23
24 die "unexpected result\nneed '${expected_result}'\ngot '$res'\n"
25 if $res ne $expected_result;
26
27 print "ROLES:$path:$user:$res\n";
28 }
29
30
31 check_roles('User1@pve', '/vms', 'Role1');
32 check_roles('User1@pve', '/vms/100', 'Role1');
33 check_roles('User1@pve', '/vms/100/a', 'Role1');
34 check_roles('User1@pve', '/vms/100/a/b', 'Role2');
35 check_roles('User1@pve', '/vms/100/a/b/c', 'Role2');
36 check_roles('User1@pve', '/vms/200', 'Role1');
37
38 check_roles('User2@pve', '/kvm', 'Role2');
39 check_roles('User2@pve', '/kvm/vms', 'Role1');
40 check_roles('User2@pve', '/kvm/vms/100', '');
41 check_roles('User2@pve', '/kvm/vms/100/a', 'Role3');
42 check_roles('User2@pve', '/kvm/vms/100/a/b', '');
43
44 print "all tests passed\n";
45
46 exit (0);