handler_test.go 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345
  1. package authn_test
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "net/http/httptest"
  7. "testing"
  8. "github.com/porter-dev/porter/api/server/authn"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/test"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/auth/token"
  13. "github.com/porter-dev/porter/internal/models"
  14. "github.com/stretchr/testify/assert"
  15. "gorm.io/gorm"
  16. )
  17. func TestAuthenticatedUserWithCookie(t *testing.T) {
  18. config, handler, next := loadHandlers(t)
  19. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  20. if err != nil {
  21. t.Fatal(err)
  22. }
  23. rr := httptest.NewRecorder()
  24. // create a new user and a cookie for them
  25. user, err := config.Repo.User().CreateUser(&models.User{
  26. Email: "test@test.it",
  27. Password: "hello",
  28. EmailVerified: true,
  29. })
  30. if err != nil {
  31. t.Fatal(err)
  32. }
  33. cookie := authenticateUserWithCookie(t, config, user, false)
  34. req.AddCookie(cookie)
  35. handler.ServeHTTP(rr, req)
  36. assertNextHandlerCalled(t, next, rr, user)
  37. }
  38. func TestUnauthenticatedUserWithCookie(t *testing.T) {
  39. _, handler, next := loadHandlers(t)
  40. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  41. if err != nil {
  42. t.Fatal(err)
  43. }
  44. rr := httptest.NewRecorder()
  45. // make the request without a cookie set
  46. handler.ServeHTTP(rr, req)
  47. assertForbiddenError(t, next, rr)
  48. }
  49. func TestAuthenticatedUserWithToken(t *testing.T) {
  50. config, handler, next := loadHandlers(t)
  51. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  52. if err != nil {
  53. t.Fatal(err)
  54. }
  55. rr := httptest.NewRecorder()
  56. // create a new user for the token to reference
  57. user, err := config.Repo.User().CreateUser(&models.User{
  58. Email: "test@test.it",
  59. Password: "hello",
  60. EmailVerified: true,
  61. })
  62. if err != nil {
  63. t.Fatal(err)
  64. }
  65. tokenStr := authenticateUserWithToken(t, config, user.ID)
  66. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", tokenStr))
  67. handler.ServeHTTP(rr, req)
  68. assertNextHandlerCalled(t, next, rr, user)
  69. }
  70. func TestUnauthenticatedUserWithToken(t *testing.T) {
  71. _, handler, next := loadHandlers(t)
  72. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  73. if err != nil {
  74. t.Fatal(err)
  75. }
  76. rr := httptest.NewRecorder()
  77. // create a new user and a cookie for them
  78. tokenStr := "badtokenstring"
  79. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", tokenStr))
  80. handler.ServeHTTP(rr, req)
  81. assertForbiddenError(t, next, rr)
  82. }
  83. func TestAuthBadDatabaseRead(t *testing.T) {
  84. config, handler, next := loadHandlers(t)
  85. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  86. if err != nil {
  87. t.Fatal(err)
  88. }
  89. rr := httptest.NewRecorder()
  90. // create a new user and a cookie for them
  91. user, err := config.Repo.User().CreateUser(&models.User{
  92. Email: "test@test.it",
  93. Password: "hello",
  94. EmailVerified: true,
  95. })
  96. if err != nil {
  97. t.Fatal(err)
  98. }
  99. cookie := authenticateUserWithCookie(t, config, user, false)
  100. req.AddCookie(cookie)
  101. // set the repository interface to one that can't query from the db
  102. configLoader := test.NewTestConfigLoader(false)
  103. config, err = configLoader.LoadConfig()
  104. factory := authn.NewAuthNFactory(config)
  105. handler = factory.NewAuthenticated(next)
  106. handler.ServeHTTP(rr, req)
  107. assertForbiddenError(t, next, rr)
  108. }
  109. func TestAuthBadSessionUserWrite(t *testing.T) {
  110. config, handler, next := loadHandlers(t)
  111. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  112. if err != nil {
  113. t.Fatal(err)
  114. }
  115. rr := httptest.NewRecorder()
  116. // create a new user and a cookie for them
  117. _, err = config.Repo.User().CreateUser(&models.User{
  118. Email: "test@test.it",
  119. Password: "hello",
  120. EmailVerified: true,
  121. })
  122. if err != nil {
  123. t.Fatal(err)
  124. }
  125. // create cookie where session values are incorrect
  126. // i.e. written for a user that doesn't exist (id 500)
  127. cookie := authenticateUserWithCookie(t, config, &models.User{
  128. Model: gorm.Model{
  129. ID: 500,
  130. },
  131. }, false)
  132. req.AddCookie(cookie)
  133. handler.ServeHTTP(rr, req)
  134. assertForbiddenError(t, next, rr)
  135. }
  136. func TestAuthBadSessionUserIDType(t *testing.T) {
  137. config, handler, next := loadHandlers(t)
  138. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  139. if err != nil {
  140. t.Fatal(err)
  141. }
  142. rr := httptest.NewRecorder()
  143. // create a new user and a cookie for them
  144. user, err := config.Repo.User().CreateUser(&models.User{
  145. Email: "test@test.it",
  146. Password: "hello",
  147. EmailVerified: true,
  148. })
  149. if err != nil {
  150. t.Fatal(err)
  151. }
  152. // create cookie where session values are incorrect
  153. // i.e. written for a user that doesn't exist (id 500)
  154. cookie := authenticateUserWithCookie(t, config, user, true)
  155. req.AddCookie(cookie)
  156. handler.ServeHTTP(rr, req)
  157. assertForbiddenError(t, next, rr)
  158. }
  159. type testHandler struct {
  160. WasCalled bool
  161. User *models.User
  162. }
  163. func (t *testHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  164. t.WasCalled = true
  165. user, _ := r.Context().Value(types.UserScope).(*models.User)
  166. t.User = user
  167. }
  168. func loadHandlers(t *testing.T) (*shared.Config, http.Handler, *testHandler) {
  169. configLoader := test.NewTestConfigLoader(true)
  170. config, err := configLoader.LoadConfig()
  171. if err != nil {
  172. t.Fatal(err)
  173. }
  174. factory := authn.NewAuthNFactory(config)
  175. next := &testHandler{}
  176. handler := factory.NewAuthenticated(next)
  177. return config, handler, next
  178. }
  179. // authenticateUserWithCookie uses the session store to create a cookie for a user
  180. func authenticateUserWithCookie(
  181. t *testing.T,
  182. config *shared.Config,
  183. user *models.User,
  184. badUserIDType bool,
  185. ) *http.Cookie {
  186. rr2 := httptest.NewRecorder()
  187. req2, err := http.NewRequest("GET", "/login", nil)
  188. if err != nil {
  189. t.Fatal(err)
  190. }
  191. // set the user as authenticated
  192. session, err := config.Store.Get(req2, config.CookieName)
  193. if err != nil {
  194. t.Fatal(err)
  195. }
  196. session.Values["authenticated"] = true
  197. session.Values["user_id"] = user.ID
  198. session.Values["email"] = user.Email
  199. if badUserIDType {
  200. session.Values["user_id"] = "badtype"
  201. }
  202. if err := session.Save(req2, rr2); err != nil {
  203. t.Fatal(err)
  204. }
  205. var cookie *http.Cookie
  206. if cookies := rr2.Result().Cookies(); len(cookies) > 0 {
  207. cookie = cookies[0]
  208. } else {
  209. t.Fatal(fmt.Errorf("no cookie in response"))
  210. }
  211. return cookie
  212. }
  213. // authenticateUserWithToken uses the JWT token generator to create a token for a user
  214. func authenticateUserWithToken(t *testing.T, config *shared.Config, userID uint) string {
  215. issToken, err := token.GetTokenForUser(userID)
  216. if err != nil {
  217. t.Fatal(err)
  218. }
  219. res, err := issToken.EncodeToken(config.TokenConf)
  220. if err != nil {
  221. t.Fatal(err)
  222. }
  223. return res
  224. }
  225. func assertForbiddenError(t *testing.T, next *testHandler, rr *httptest.ResponseRecorder) {
  226. assert := assert.New(t)
  227. assert.False(next.WasCalled, "next handler should not have been called")
  228. assert.Equal(http.StatusForbidden, rr.Result().StatusCode, "status code should be forbidden")
  229. // json error should be forbidden
  230. reqErr := &types.ExternalError{}
  231. err := json.NewDecoder(rr.Result().Body).Decode(reqErr)
  232. if err != nil {
  233. t.Fatal(err)
  234. }
  235. expReqErr := &types.ExternalError{
  236. Error: "Forbidden",
  237. }
  238. assert.Equal(expReqErr, reqErr, "body should be forbidden error")
  239. }
  240. func assertNextHandlerCalled(
  241. t *testing.T,
  242. next *testHandler,
  243. rr *httptest.ResponseRecorder,
  244. expUser *models.User,
  245. ) {
  246. // make sure the handler was called with the expected user, and resulted in 200 OK
  247. assert := assert.New(t)
  248. assert.True(next.WasCalled, "next handler should have been called")
  249. assert.Equal(expUser, next.User, "user should be equal")
  250. assert.Equal(http.StatusOK, rr.Result().StatusCode, "status code should be ok")
  251. }