Files
object-browser/web-app/tests/permissions-3/bucketAssignPolicy.ts
2023-12-29 11:44:01 -06:00

126 lines
4.6 KiB
TypeScript

// This file is part of MinIO Console Server
// Copyright (c) 2022 MinIO, Inc.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU Affero General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU Affero General Public License for more details.
//
// You should have received a copy of the GNU Affero General Public License
// along with this program. If not, see <http://www.gnu.org/licenses/>.
import * as roles from "../utils/roles";
import * as elements from "../utils/elements";
import * as functions from "../utils/functions";
import { bucketsElement, logoutItem } from "../utils/elements-menu";
import { Selector } from "testcafe";
import * as constants from "../utils/constants";
import { manageButtonFor } from "../utils/functions";
fixture("For user with Bucket Assign Policy permissions")
.page("http://localhost:9090")
.beforeEach(async (t) => {
await t.useRole(roles.bucketAssignPolicy);
});
// Bucket assign policy permissions
test("Buckets sidebar item exists", async (t) => {
const bucketsExist = bucketsElement.exists;
await t.expect(bucketsExist).ok();
});
test
.before(async (t) => {
// Create a bucket
await functions.setUpBucket(t, "bucketassign1");
})("A readonly policy can be assigned to a bucket", async (t) => {
await t
// We need to log back in after we use the admin account to create bucket,
// using the specific role we use in this module
.useRole(roles.bucketAssignPolicy)
.navigateTo("http://localhost:9090/buckets")
.click(manageButtonFor("bucketassign1"))
.click(elements.bucketAccessRulesTab)
.click(elements.addAccessRuleButton)
.typeText(elements.bucketsPrefixInput, "readonlytest")
.click(elements.bucketsAccessInput)
.click(elements.bucketsAccessReadOnlyInput)
.click(elements.saveButton);
})
.after(async (t) => {
// Cleanup created bucket
await functions.cleanUpBucket(t, "bucketassign1");
});
test
.before(async (t) => {
// Create a bucket
await functions.setUpBucket(t, "bucketassign3");
})("A writeonly policy can be assigned to a bucket", async (t) => {
await t
// We need to log back in after we use the admin account to create bucket,
// using the specific role we use in this module
.useRole(roles.bucketAssignPolicy)
.navigateTo("http://localhost:9090/buckets")
.click(manageButtonFor("bucketassign3"))
.click(elements.bucketAccessRulesTab)
.click(elements.addAccessRuleButton)
.typeText(elements.bucketsPrefixInput, "writeonlytest")
.click(elements.bucketsAccessInput)
.click(elements.bucketsAccessWriteOnlyInput)
.click(elements.saveButton);
})
.after(async (t) => {
// Cleanup created bucket
await functions.cleanUpBucket(t, "bucketassign3");
});
test
.before(async (t) => {
// Create a bucket
await functions.setUpBucket(t, "bucketassign4");
})("A readwrite policy can be assigned to a bucket", async (t) => {
await t
// We need to log back in after we use the admin account to create bucket,
// using the specific role we use in this module
.useRole(roles.bucketAssignPolicy)
.navigateTo("http://localhost:9090/buckets")
.click(manageButtonFor("bucketassign4"))
.click(elements.bucketAccessRulesTab)
.click(elements.addAccessRuleButton)
.typeText(elements.bucketsPrefixInput, "readwritetest")
.click(elements.bucketsAccessInput)
.click(elements.bucketsAccessReadWriteInput)
.click(elements.saveButton);
})
.after(async (t) => {
// Cleanup created bucket
await functions.cleanUpBucket(t, "bucketassign4");
});
// test
// .before(async (t) => {
// // Create a bucket
// await functions.setUpBucket(t, "bucketassign5");
// })("Previously assigned policy to a bucket can be deleted", async (t) => {
// await new Promise((resolve) => setTimeout(resolve, 2000));
// await t
// .useRole(roles.bucketAssignPolicy)
// .navigateTo("http://localhost:9090/buckets")
// .click(manageButtonFor("bucketassign5"))
// .click(elements.bucketAccessRulesTab)
// .click(elements.deleteIconButtonAlt)
// .click(elements.deleteButton)
// .click(logoutItem);
// })
// .after(async (t) => {
// // Cleanup created bucket
// await functions.cleanUpBucket(t, "bucketassign5");
// });