handler_test.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. package authn_test
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net/http"
  6. "net/http/httptest"
  7. "testing"
  8. "github.com/porter-dev/porter/api/server/authn"
  9. "github.com/porter-dev/porter/api/server/shared"
  10. "github.com/porter-dev/porter/api/server/shared/apitest"
  11. "github.com/porter-dev/porter/api/types"
  12. "github.com/porter-dev/porter/internal/models"
  13. "github.com/stretchr/testify/assert"
  14. "gorm.io/gorm"
  15. )
  16. func TestAuthenticatedUserWithCookie(t *testing.T) {
  17. config, handler, next := loadHandlers(t)
  18. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  19. if err != nil {
  20. t.Fatal(err)
  21. }
  22. rr := httptest.NewRecorder()
  23. // create a new user and a cookie for them
  24. user := apitest.CreateTestUser(t, config)
  25. cookie := apitest.AuthenticateUserWithCookie(t, config, user, false)
  26. req.AddCookie(cookie)
  27. handler.ServeHTTP(rr, req)
  28. assertNextHandlerCalled(t, next, rr, user)
  29. }
  30. func TestUnauthenticatedUserWithCookie(t *testing.T) {
  31. _, handler, next := loadHandlers(t)
  32. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  33. if err != nil {
  34. t.Fatal(err)
  35. }
  36. rr := httptest.NewRecorder()
  37. // make the request without a cookie set
  38. handler.ServeHTTP(rr, req)
  39. assertForbiddenError(t, next, rr)
  40. }
  41. func TestAuthenticatedUserWithToken(t *testing.T) {
  42. config, handler, next := loadHandlers(t)
  43. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  44. if err != nil {
  45. t.Fatal(err)
  46. }
  47. rr := httptest.NewRecorder()
  48. // create a new user for the token to reference
  49. user := apitest.CreateTestUser(t, config)
  50. tokenStr := apitest.AuthenticateUserWithToken(t, config, user.ID)
  51. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", tokenStr))
  52. handler.ServeHTTP(rr, req)
  53. assertNextHandlerCalled(t, next, rr, user)
  54. }
  55. func TestUnauthenticatedUserWithToken(t *testing.T) {
  56. _, handler, next := loadHandlers(t)
  57. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  58. if err != nil {
  59. t.Fatal(err)
  60. }
  61. rr := httptest.NewRecorder()
  62. // create a new user and a cookie for them
  63. tokenStr := "badtokenstring"
  64. req.Header.Add("Authorization", fmt.Sprintf("Bearer %s", tokenStr))
  65. handler.ServeHTTP(rr, req)
  66. assertForbiddenError(t, next, rr)
  67. }
  68. func TestAuthBadDatabaseRead(t *testing.T) {
  69. config, handler, next := loadHandlers(t)
  70. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  71. if err != nil {
  72. t.Fatal(err)
  73. }
  74. rr := httptest.NewRecorder()
  75. // create a new user and a cookie for them
  76. user := apitest.CreateTestUser(t, config)
  77. cookie := apitest.AuthenticateUserWithCookie(t, config, user, false)
  78. req.AddCookie(cookie)
  79. // set the repository interface to one that can't query from the db
  80. configLoader := apitest.NewTestConfigLoader(false)
  81. config, err = configLoader.LoadConfig()
  82. factory := authn.NewAuthNFactory(config)
  83. handler = factory.NewAuthenticated(next)
  84. handler.ServeHTTP(rr, req)
  85. assertForbiddenError(t, next, rr)
  86. }
  87. func TestAuthBadSessionUserWrite(t *testing.T) {
  88. config, handler, next := loadHandlers(t)
  89. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  90. if err != nil {
  91. t.Fatal(err)
  92. }
  93. rr := httptest.NewRecorder()
  94. // create a new user and a cookie for them
  95. apitest.CreateTestUser(t, config)
  96. // create cookie where session values are incorrect
  97. // i.e. written for a user that doesn't exist (id 500)
  98. cookie := apitest.AuthenticateUserWithCookie(t, config, &models.User{
  99. Model: gorm.Model{
  100. ID: 500,
  101. },
  102. }, false)
  103. req.AddCookie(cookie)
  104. handler.ServeHTTP(rr, req)
  105. assertForbiddenError(t, next, rr)
  106. }
  107. func TestAuthBadSessionUserIDType(t *testing.T) {
  108. config, handler, next := loadHandlers(t)
  109. req, err := http.NewRequest("GET", "/auth-endpoint", nil)
  110. if err != nil {
  111. t.Fatal(err)
  112. }
  113. rr := httptest.NewRecorder()
  114. // create a new user and a cookie for them
  115. user := apitest.CreateTestUser(t, config)
  116. // create cookie where session values are incorrect
  117. // i.e. written for a user that doesn't exist (id 500)
  118. cookie := apitest.AuthenticateUserWithCookie(t, config, user, true)
  119. req.AddCookie(cookie)
  120. handler.ServeHTTP(rr, req)
  121. assertForbiddenError(t, next, rr)
  122. }
  123. type testHandler struct {
  124. WasCalled bool
  125. User *models.User
  126. }
  127. func (t *testHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
  128. t.WasCalled = true
  129. user, _ := r.Context().Value(types.UserScope).(*models.User)
  130. t.User = user
  131. }
  132. func loadHandlers(t *testing.T) (*shared.Config, http.Handler, *testHandler) {
  133. config := apitest.LoadConfig(t)
  134. factory := authn.NewAuthNFactory(config)
  135. next := &testHandler{}
  136. handler := factory.NewAuthenticated(next)
  137. return config, handler, next
  138. }
  139. func assertForbiddenError(t *testing.T, next *testHandler, rr *httptest.ResponseRecorder) {
  140. assert := assert.New(t)
  141. assert.False(next.WasCalled, "next handler should not have been called")
  142. assert.Equal(http.StatusForbidden, rr.Result().StatusCode, "status code should be forbidden")
  143. // json error should be forbidden
  144. reqErr := &types.ExternalError{}
  145. err := json.NewDecoder(rr.Result().Body).Decode(reqErr)
  146. if err != nil {
  147. t.Fatal(err)
  148. }
  149. expReqErr := &types.ExternalError{
  150. Error: "Forbidden",
  151. }
  152. assert.Equal(expReqErr, reqErr, "body should be forbidden error")
  153. }
  154. func assertNextHandlerCalled(
  155. t *testing.T,
  156. next *testHandler,
  157. rr *httptest.ResponseRecorder,
  158. expUser *models.User,
  159. ) {
  160. // make sure the handler was called with the expected user, and resulted in 200 OK
  161. assert := assert.New(t)
  162. assert.True(next.WasCalled, "next handler should have been called")
  163. assert.Equal(expUser, next.User, "user should be equal")
  164. assert.Equal(http.StatusOK, rr.Result().StatusCode, "status code should be ok")
  165. }