|
|
@@ -10,82 +10,33 @@ import (
|
|
|
"github.com/Unknwon/macaron"
|
|
|
"github.com/grafana/grafana/pkg/bus"
|
|
|
m "github.com/grafana/grafana/pkg/models"
|
|
|
+ "github.com/grafana/grafana/pkg/setting"
|
|
|
"github.com/grafana/grafana/pkg/util"
|
|
|
"github.com/macaron-contrib/session"
|
|
|
. "github.com/smartystreets/goconvey/convey"
|
|
|
)
|
|
|
|
|
|
-type scenarioContext struct {
|
|
|
- m *macaron.Macaron
|
|
|
- context *Context
|
|
|
- resp *httptest.ResponseRecorder
|
|
|
- apiKey string
|
|
|
- respJson map[string]interface{}
|
|
|
-}
|
|
|
-
|
|
|
-func (sc *scenarioContext) PerformGet(url string) {
|
|
|
- req, err := http.NewRequest("GET", "/", nil)
|
|
|
- So(err, ShouldBeNil)
|
|
|
- if sc.apiKey != "" {
|
|
|
- req.Header.Add("Authorization", "Bearer "+sc.apiKey)
|
|
|
- }
|
|
|
- sc.m.ServeHTTP(sc.resp, req)
|
|
|
-
|
|
|
- if sc.resp.Header().Get("Content-Type") == "application/json; charset=UTF-8" {
|
|
|
- err := json.NewDecoder(sc.resp.Body).Decode(&sc.respJson)
|
|
|
- So(err, ShouldBeNil)
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-type scenarioFunc func(c *scenarioContext)
|
|
|
-type reqModifier func(c *http.Request)
|
|
|
-
|
|
|
-func middlewareScenario(desc string, fn scenarioFunc) {
|
|
|
- Convey(desc, func() {
|
|
|
- sc := &scenarioContext{}
|
|
|
- viewsPath, _ := filepath.Abs("../../public/views")
|
|
|
-
|
|
|
- sc.m = macaron.New()
|
|
|
- sc.m.Use(macaron.Renderer(macaron.RenderOptions{
|
|
|
- Directory: viewsPath,
|
|
|
- Delims: macaron.Delims{Left: "[[", Right: "]]"},
|
|
|
- }))
|
|
|
-
|
|
|
- sc.m.Use(GetContextHandler())
|
|
|
- // mock out gc goroutine
|
|
|
- startSessionGC = func() {}
|
|
|
- sc.m.Use(Sessioner(&session.Options{}))
|
|
|
-
|
|
|
- sc.m.Get("/", func(c *Context) {
|
|
|
- sc.context = c
|
|
|
- })
|
|
|
-
|
|
|
- sc.resp = httptest.NewRecorder()
|
|
|
- fn(sc)
|
|
|
- })
|
|
|
-}
|
|
|
-
|
|
|
func TestMiddlewareContext(t *testing.T) {
|
|
|
|
|
|
- Convey("Given grafana context", t, func() {
|
|
|
+ Convey("Given the grafana middleware", t, func() {
|
|
|
middlewareScenario("middleware should add context to injector", func(sc *scenarioContext) {
|
|
|
- sc.PerformGet("/")
|
|
|
+ sc.fakeReq("GET", "/").exec()
|
|
|
So(sc.context, ShouldNotBeNil)
|
|
|
})
|
|
|
|
|
|
middlewareScenario("Default middleware should allow get request", func(sc *scenarioContext) {
|
|
|
- sc.PerformGet("/")
|
|
|
+ sc.fakeReq("GET", "/").exec()
|
|
|
So(sc.resp.Code, ShouldEqual, 200)
|
|
|
})
|
|
|
|
|
|
middlewareScenario("Non api request should init session", func(sc *scenarioContext) {
|
|
|
- sc.PerformGet("/")
|
|
|
+ sc.fakeReq("GET", "/").exec()
|
|
|
So(sc.resp.Header().Get("Set-Cookie"), ShouldContainSubstring, "grafana_sess")
|
|
|
})
|
|
|
|
|
|
middlewareScenario("Invalid api key", func(sc *scenarioContext) {
|
|
|
sc.apiKey = "invalid_key_test"
|
|
|
- sc.PerformGet("/")
|
|
|
+ sc.fakeReq("GET", "/").exec()
|
|
|
|
|
|
Convey("Should not init session", func() {
|
|
|
So(sc.resp.Header().Get("Set-Cookie"), ShouldBeEmpty)
|
|
|
@@ -98,7 +49,6 @@ func TestMiddlewareContext(t *testing.T) {
|
|
|
})
|
|
|
|
|
|
middlewareScenario("Valid api key", func(sc *scenarioContext) {
|
|
|
- sc.apiKey = "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9"
|
|
|
keyhash := util.EncodePassword("v5nAwpMafFP6znaS4urhdWDLS5511M42", "asd")
|
|
|
|
|
|
bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
|
|
|
@@ -106,17 +56,164 @@ func TestMiddlewareContext(t *testing.T) {
|
|
|
return nil
|
|
|
})
|
|
|
|
|
|
- sc.PerformGet("/")
|
|
|
+ sc.fakeReq("GET", "/").withValidApiKey().exec()
|
|
|
|
|
|
Convey("Should return 200", func() {
|
|
|
So(sc.resp.Code, ShouldEqual, 200)
|
|
|
})
|
|
|
|
|
|
Convey("Should init middleware context", func() {
|
|
|
+ So(sc.context.IsSignedIn, ShouldEqual, true)
|
|
|
So(sc.context.OrgId, ShouldEqual, 12)
|
|
|
So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
|
|
|
})
|
|
|
})
|
|
|
|
|
|
+ middlewareScenario("Valid api key, but does not match db hash", func(sc *scenarioContext) {
|
|
|
+ keyhash := "something_not_matching"
|
|
|
+
|
|
|
+ bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
|
|
|
+ query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
|
|
|
+ return nil
|
|
|
+ })
|
|
|
+
|
|
|
+ sc.fakeReq("GET", "/").withValidApiKey().exec()
|
|
|
+
|
|
|
+ Convey("Should return api key invalid", func() {
|
|
|
+ So(sc.resp.Code, ShouldEqual, 401)
|
|
|
+ So(sc.respJson["message"], ShouldEqual, "Invalid API key")
|
|
|
+ })
|
|
|
+ })
|
|
|
+
|
|
|
+ middlewareScenario("UserId in session", func(sc *scenarioContext) {
|
|
|
+
|
|
|
+ sc.fakeReq("GET", "/").handler(func(c *Context) {
|
|
|
+ c.Session.Set(SESS_KEY_USERID, int64(12))
|
|
|
+ }).exec()
|
|
|
+
|
|
|
+ bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
|
|
|
+ query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
|
|
|
+ return nil
|
|
|
+ })
|
|
|
+
|
|
|
+ sc.fakeReq("GET", "/").exec()
|
|
|
+
|
|
|
+ Convey("should init context with user info", func() {
|
|
|
+ So(sc.context.IsSignedIn, ShouldBeTrue)
|
|
|
+ So(sc.context.UserId, ShouldEqual, 12)
|
|
|
+ })
|
|
|
+ })
|
|
|
+
|
|
|
+ middlewareScenario("When anonymous access is enabled", func(sc *scenarioContext) {
|
|
|
+ setting.AnonymousEnabled = true
|
|
|
+ setting.AnonymousOrgName = "test"
|
|
|
+ setting.AnonymousOrgRole = string(m.ROLE_EDITOR)
|
|
|
+
|
|
|
+ bus.AddHandler("test", func(query *m.GetOrgByNameQuery) error {
|
|
|
+ So(query.Name, ShouldEqual, "test")
|
|
|
+
|
|
|
+ query.Result = &m.Org{Id: 2, Name: "test"}
|
|
|
+ return nil
|
|
|
+ })
|
|
|
+
|
|
|
+ sc.fakeReq("GET", "/").exec()
|
|
|
+
|
|
|
+ Convey("should init context with org info", func() {
|
|
|
+ So(sc.context.UserId, ShouldEqual, 0)
|
|
|
+ So(sc.context.OrgId, ShouldEqual, 2)
|
|
|
+ So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
|
|
|
+ })
|
|
|
+
|
|
|
+ Convey("context signed in should be false", func() {
|
|
|
+ So(sc.context.IsSignedIn, ShouldBeFalse)
|
|
|
+ })
|
|
|
+ })
|
|
|
})
|
|
|
}
|
|
|
+
|
|
|
+func middlewareScenario(desc string, fn scenarioFunc) {
|
|
|
+ Convey(desc, func() {
|
|
|
+ defer bus.ClearBusHandlers()
|
|
|
+
|
|
|
+ sc := &scenarioContext{}
|
|
|
+ viewsPath, _ := filepath.Abs("../../public/views")
|
|
|
+
|
|
|
+ sc.m = macaron.New()
|
|
|
+ sc.m.Use(macaron.Renderer(macaron.RenderOptions{
|
|
|
+ Directory: viewsPath,
|
|
|
+ Delims: macaron.Delims{Left: "[[", Right: "]]"},
|
|
|
+ }))
|
|
|
+
|
|
|
+ sc.m.Use(GetContextHandler())
|
|
|
+ // mock out gc goroutine
|
|
|
+ startSessionGC = func() {}
|
|
|
+ sc.m.Use(Sessioner(&session.Options{}))
|
|
|
+
|
|
|
+ sc.m.Get("/", func(c *Context) {
|
|
|
+ sc.context = c
|
|
|
+ if sc.handlerFunc != nil {
|
|
|
+ sc.handlerFunc(sc.context)
|
|
|
+ }
|
|
|
+ })
|
|
|
+
|
|
|
+ fn(sc)
|
|
|
+ })
|
|
|
+}
|
|
|
+
|
|
|
+type scenarioContext struct {
|
|
|
+ m *macaron.Macaron
|
|
|
+ context *Context
|
|
|
+ resp *httptest.ResponseRecorder
|
|
|
+ apiKey string
|
|
|
+ respJson map[string]interface{}
|
|
|
+ handlerFunc handlerFunc
|
|
|
+
|
|
|
+ req *http.Request
|
|
|
+}
|
|
|
+
|
|
|
+func (sc *scenarioContext) withValidApiKey() *scenarioContext {
|
|
|
+ sc.apiKey = "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9"
|
|
|
+ return sc
|
|
|
+}
|
|
|
+
|
|
|
+func (sc *scenarioContext) withInvalidApiKey() *scenarioContext {
|
|
|
+ sc.apiKey = "nvalidhhhhds"
|
|
|
+ return sc
|
|
|
+}
|
|
|
+
|
|
|
+func (sc *scenarioContext) fakeReq(method, url string) *scenarioContext {
|
|
|
+ sc.resp = httptest.NewRecorder()
|
|
|
+ req, err := http.NewRequest(method, url, nil)
|
|
|
+ So(err, ShouldBeNil)
|
|
|
+ sc.req = req
|
|
|
+
|
|
|
+ // add session cookie from last request
|
|
|
+ if sc.context != nil {
|
|
|
+ if sc.context.Session.ID() != "" {
|
|
|
+ req.Header.Add("Cookie", "grafana_sess="+sc.context.Session.ID()+";")
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ return sc
|
|
|
+}
|
|
|
+
|
|
|
+func (sc *scenarioContext) handler(fn handlerFunc) *scenarioContext {
|
|
|
+ sc.handlerFunc = fn
|
|
|
+ return sc
|
|
|
+}
|
|
|
+
|
|
|
+func (sc *scenarioContext) exec() {
|
|
|
+ if sc.apiKey != "" {
|
|
|
+ sc.req.Header.Add("Authorization", "Bearer "+sc.apiKey)
|
|
|
+ }
|
|
|
+
|
|
|
+ sc.m.ServeHTTP(sc.resp, sc.req)
|
|
|
+
|
|
|
+ if sc.resp.Header().Get("Content-Type") == "application/json; charset=UTF-8" {
|
|
|
+ err := json.NewDecoder(sc.resp.Body).Decode(&sc.respJson)
|
|
|
+ So(err, ShouldBeNil)
|
|
|
+ }
|
|
|
+}
|
|
|
+
|
|
|
+type scenarioFunc func(c *scenarioContext)
|
|
|
+type handlerFunc func(c *Context)
|