mirror of
https://github.com/blakeblackshear/frigate.git
synced 2025-09-23 17:52:05 +02:00
* update config for roles and add validator * ensure admin and viewer are never overridden * add class method to user to retrieve all allowed cameras * enforce config roles in auth api endpoints * add camera access api dependency functions * protect review endpoints * protect preview endpoints * rename param name for better fastapi injection matching * remove unneeded * protect export endpoints * protect event endpoints * protect media endpoints * update auth hook for allowed cameras * update default app view * ensure anonymous user always returns all cameras * limit cameras in explore * cameras is already a list * limit cameras in review/history * limit cameras in live view * limit cameras in camera groups * only show face library and classification in sidebar for admin * remove check in delete reviews since admin role is required, no need to check camera access. fixes failing test * pass request with camera access for tests * more async * camera access tests * fix proxy auth tests * allowed cameras for review tests * combine event tests and refactor for camera access * fix post validation for roles * don't limit roles in create user dialog * fix triggers endpoints no need to run require camera access dep since the required role is admin * fix type * create and edit role dialogs * delete role dialog * fix role change dialog * update settings view for roles * i18n changes * minor spacing tweaks * docs * use badges and camera name label component * clarify docs * display all cameras badge for admin and viewer * i18n fix * use validator to prevent reserved and empty roles from being assigned * split users and roles into separate tabs in settings * tweak docs * clarify docs * change icon * don't memoize roles always recalculate on component render
79 lines
3.0 KiB
Python
79 lines
3.0 KiB
Python
import unittest
|
|
|
|
from frigate.api.auth import resolve_role
|
|
from frigate.config import HeaderMappingConfig, ProxyConfig
|
|
|
|
|
|
class TestProxyRoleResolution(unittest.TestCase):
|
|
def setUp(self):
|
|
self.proxy_config = ProxyConfig(
|
|
auth_secret=None,
|
|
default_role="viewer",
|
|
separator="|",
|
|
header_map=HeaderMappingConfig(
|
|
user="x-remote-user",
|
|
role="x-remote-role",
|
|
role_map={
|
|
"admin": ["group_admin"],
|
|
"viewer": ["group_viewer"],
|
|
},
|
|
),
|
|
)
|
|
self.config_roles = list(["admin", "viewer"])
|
|
|
|
def test_role_map_single_group_match(self):
|
|
headers = {"x-remote-role": "group_admin"}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, "admin")
|
|
|
|
def test_role_map_multiple_groups(self):
|
|
headers = {"x-remote-role": "group_admin|group_viewer"}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, "admin")
|
|
|
|
def test_direct_role_header_with_separator(self):
|
|
config = self.proxy_config
|
|
config.header_map.role_map = None # disable role_map
|
|
headers = {"x-remote-role": "admin|viewer"}
|
|
role = resolve_role(headers, config, self.config_roles)
|
|
self.assertEqual(role, "admin")
|
|
|
|
def test_invalid_role_header(self):
|
|
config = self.proxy_config
|
|
config.header_map.role_map = None
|
|
headers = {"x-remote-role": "notarole"}
|
|
role = resolve_role(headers, config, self.config_roles)
|
|
self.assertEqual(role, config.default_role)
|
|
|
|
def test_missing_role_header(self):
|
|
headers = {}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, self.proxy_config.default_role)
|
|
|
|
def test_empty_role_header(self):
|
|
headers = {"x-remote-role": ""}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, self.proxy_config.default_role)
|
|
|
|
def test_whitespace_groups(self):
|
|
headers = {"x-remote-role": " | group_admin | "}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, "admin")
|
|
|
|
def test_mixed_valid_and_invalid_groups(self):
|
|
headers = {"x-remote-role": "bogus|group_viewer"}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, "viewer")
|
|
|
|
def test_case_insensitive_role_direct(self):
|
|
config = self.proxy_config
|
|
config.header_map.role_map = None
|
|
headers = {"x-remote-role": "AdMiN"}
|
|
role = resolve_role(headers, config, self.config_roles)
|
|
self.assertEqual(role, "admin")
|
|
|
|
def test_role_map_no_match_falls_back(self):
|
|
headers = {"x-remote-role": "group_unknown"}
|
|
role = resolve_role(headers, self.proxy_config, self.config_roles)
|
|
self.assertEqual(role, self.proxy_config.default_role)
|