@@ -500,7 +500,7 @@ func TestAuthorizeAccess(t *testing.T) {
500500 t .Fatalf ("failed to create RBACManager: %v" , err )
501501 }
502502
503- result , err := rbacManager .Authorize (tt .user , tt .appPathDomain , tt .appAuthSetting , tt .permission )
503+ result , err := rbacManager .Authorize (tt .user , tt .appPathDomain , tt .appAuthSetting , tt .permission , [] string {} )
504504
505505 if tt .expectError {
506506 if err == nil {
@@ -600,7 +600,7 @@ func TestAuthorizeAccessWithGroupHierarchy(t *testing.T) {
600600 t .Fatalf ("failed to create RBACManager: %v" , err )
601601 }
602602
603- result , err := rbacManager .Authorize (tt .user , tt .appPathDomain , "rbac:test" , tt .permission )
603+ result , err := rbacManager .Authorize (tt .user , tt .appPathDomain , "rbac:test" , tt .permission , [] string {} )
604604 if err != nil {
605605 t .Errorf ("unexpected error: %v" , err )
606606 return
@@ -710,7 +710,7 @@ func TestAuthorizeAccessWithRoleHierarchy(t *testing.T) {
710710 t .Fatalf ("failed to create RBACManager: %v" , err )
711711 }
712712
713- result , err := rbacManager .Authorize (tt .user , tt .appPathDomain , "rbac:test" , tt .permission )
713+ result , err := rbacManager .Authorize (tt .user , tt .appPathDomain , "rbac:test" , tt .permission , [] string {} )
714714 if err != nil {
715715 t .Errorf ("unexpected error: %v" , err )
716716 return
@@ -833,7 +833,7 @@ func TestUpdateRBACConfig(t *testing.T) {
833833 }
834834
835835 // Test that the update worked by checking authorization
836- result , err := rbacManager .Authorize ("user1" , types.AppPathDomain {Path : "/new" , Domain : "" }, "rbac:test" , types .PermissionList )
836+ result , err := rbacManager .Authorize ("user1" , types.AppPathDomain {Path : "/new" , Domain : "" }, "rbac:test" , types .PermissionList , [] string {} )
837837 if err != nil {
838838 t .Errorf ("unexpected error during authorization test: %v" , err )
839839 return
@@ -884,7 +884,7 @@ func TestAuthorizeAccessConcurrency(t *testing.T) {
884884 go func (user string ) {
885885 defer func () { done <- true }()
886886
887- result , err := rbacManager .Authorize (user , types.AppPathDomain {Path : "/test" , Domain : "" }, "rbac:test" , types .PermissionList )
887+ result , err := rbacManager .Authorize (user , types.AppPathDomain {Path : "/test" , Domain : "" }, "rbac:test" , types .PermissionList , [] string {} )
888888 if err != nil {
889889 t .Errorf ("unexpected error: %v" , err )
890890 return
@@ -987,7 +987,7 @@ func TestValidateGrants(t *testing.T) {
987987 expectError : false ,
988988 },
989989 {
990- name : "invalid grant - undefined group reference" ,
990+ name : "valid grant - undefined group reference (no longer validated) " ,
991991 rbacConfig : & types.RBACConfig {
992992 Enabled : true ,
993993 Groups : map [string ][]string {
@@ -998,15 +998,14 @@ func TestValidateGrants(t *testing.T) {
998998 },
999999 Grants : []types.RBACGrant {
10001000 {
1001- Description : "invalid grant" ,
1001+ Description : "valid grant with undefined group " ,
10021002 Users : []string {"group:nonexistent" },
10031003 Roles : []string {"read" },
10041004 Targets : []string {"/test" },
10051005 },
10061006 },
10071007 },
1008- expectError : true ,
1009- errorMsg : "grant 0 ('invalid grant'): Users references undefined group 'nonexistent'" ,
1008+ expectError : false ,
10101009 },
10111010 {
10121011 name : "invalid grant - undefined role reference" ,
@@ -1031,7 +1030,7 @@ func TestValidateGrants(t *testing.T) {
10311030 errorMsg : "grant 0 ('invalid grant'): Roles references undefined role 'nonexistent'" ,
10321031 },
10331032 {
1034- name : "invalid grant - multiple undefined group references" ,
1033+ name : "valid grant - multiple undefined group references (no longer validated) " ,
10351034 rbacConfig : & types.RBACConfig {
10361035 Enabled : true ,
10371036 Groups : map [string ][]string {
@@ -1042,15 +1041,14 @@ func TestValidateGrants(t *testing.T) {
10421041 },
10431042 Grants : []types.RBACGrant {
10441043 {
1045- Description : "invalid grant" ,
1044+ Description : "valid grant with multiple undefined groups " ,
10461045 Users : []string {"group:nonexistent1" , "group:nonexistent2" },
10471046 Roles : []string {"read" },
10481047 Targets : []string {"/test" },
10491048 },
10501049 },
10511050 },
1052- expectError : true ,
1053- errorMsg : "grant 0 ('invalid grant'): Users references undefined group 'nonexistent1'" ,
1051+ expectError : false ,
10541052 },
10551053 {
10561054 name : "invalid grant - multiple undefined role references" ,
@@ -1075,7 +1073,7 @@ func TestValidateGrants(t *testing.T) {
10751073 errorMsg : "grant 0 ('invalid grant'): Roles references undefined role 'nonexistent1'" ,
10761074 },
10771075 {
1078- name : "invalid grant - multiple grants with errors " ,
1076+ name : "valid grants - multiple grants with undefined group (no longer validated) " ,
10791077 rbacConfig : & types.RBACConfig {
10801078 Enabled : true ,
10811079 Groups : map [string ][]string {
@@ -1092,15 +1090,14 @@ func TestValidateGrants(t *testing.T) {
10921090 Targets : []string {"/test" },
10931091 },
10941092 {
1095- Description : "invalid grant" ,
1093+ Description : "valid grant with undefined group " ,
10961094 Users : []string {"group:nonexistent" },
10971095 Roles : []string {"read" },
10981096 Targets : []string {"/test" },
10991097 },
11001098 },
11011099 },
1102- expectError : true ,
1103- errorMsg : "grant 1 ('invalid grant'): Users references undefined group 'nonexistent'" ,
1100+ expectError : false ,
11041101 },
11051102 {
11061103 name : "empty grants - should be valid" ,
0 commit comments