| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295 |
- package api
- import (
- "context"
- "testing"
- "time"
- "github.com/grafana/grafana/pkg/bus"
- m "github.com/grafana/grafana/pkg/models"
- "github.com/grafana/grafana/pkg/services/auth"
- . "github.com/smartystreets/goconvey/convey"
- )
- func TestUserTokenApiEndpoint(t *testing.T) {
- Convey("When current user attempts to revoke an auth token for a non-existing user", t, func() {
- userId := int64(0)
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- userId = cmd.Id
- return m.ErrUserNotFound
- })
- cmd := m.RevokeAuthTokenCmd{AuthTokenId: 2}
- revokeUserAuthTokenScenario("Should return not found when calling POST on", "/api/user/revoke-auth-token", "/api/user/revoke-auth-token", cmd, 200, func(sc *scenarioContext) {
- sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 404)
- So(userId, ShouldEqual, 200)
- })
- })
- Convey("When current user gets auth tokens for a non-existing user", t, func() {
- userId := int64(0)
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- userId = cmd.Id
- return m.ErrUserNotFound
- })
- getUserAuthTokensScenario("Should return not found when calling GET on", "/api/user/auth-tokens", "/api/user/auth-tokens", 200, func(sc *scenarioContext) {
- sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 404)
- So(userId, ShouldEqual, 200)
- })
- })
- Convey("When logout an existing user from all devices", t, func() {
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- cmd.Result = &m.User{Id: 200}
- return nil
- })
- logoutUserFromAllDevicesInternalScenario("Should be successful", 1, func(sc *scenarioContext) {
- sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- })
- })
- Convey("When logout a non-existing user from all devices", t, func() {
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- return m.ErrUserNotFound
- })
- logoutUserFromAllDevicesInternalScenario("Should return not found", TestUserID, func(sc *scenarioContext) {
- sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 404)
- })
- })
- Convey("When revoke an auth token for a user", t, func() {
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- cmd.Result = &m.User{Id: 200}
- return nil
- })
- cmd := m.RevokeAuthTokenCmd{AuthTokenId: 2}
- token := &m.UserToken{Id: 1}
- revokeUserAuthTokenInternalScenario("Should be successful", cmd, 200, token, func(sc *scenarioContext) {
- sc.userAuthTokenService.GetUserTokenProvider = func(ctx context.Context, userId, userTokenId int64) (*m.UserToken, error) {
- return &m.UserToken{Id: 2}, nil
- }
- sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- })
- })
- Convey("When revoke the active auth token used by himself", t, func() {
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- cmd.Result = &m.User{Id: TestUserID}
- return nil
- })
- cmd := m.RevokeAuthTokenCmd{AuthTokenId: 2}
- token := &m.UserToken{Id: 2}
- revokeUserAuthTokenInternalScenario("Should not be successful", cmd, TestUserID, token, func(sc *scenarioContext) {
- sc.userAuthTokenService.GetUserTokenProvider = func(ctx context.Context, userId, userTokenId int64) (*m.UserToken, error) {
- return token, nil
- }
- sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 400)
- })
- })
- Convey("When gets auth tokens for a user", t, func() {
- bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
- cmd.Result = &m.User{Id: TestUserID}
- return nil
- })
- currentToken := &m.UserToken{Id: 1}
- getUserAuthTokensInternalScenario("Should be successful", currentToken, func(sc *scenarioContext) {
- tokens := []*m.UserToken{
- {
- Id: 1,
- ClientIp: "127.0.0.1",
- UserAgent: "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36",
- CreatedAt: time.Now().Unix(),
- SeenAt: time.Now().Unix(),
- },
- {
- Id: 2,
- ClientIp: "127.0.0.2",
- UserAgent: "Mozilla/5.0 (iPhone; CPU iPhone OS 11_0 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A372 Safari/604.1",
- CreatedAt: time.Now().Unix(),
- SeenAt: time.Now().Unix(),
- },
- }
- sc.userAuthTokenService.GetUserTokensProvider = func(ctx context.Context, userId int64) ([]*m.UserToken, error) {
- return tokens, nil
- }
- sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
- So(sc.resp.Code, ShouldEqual, 200)
- result := sc.ToJSON()
- So(result.MustArray(), ShouldHaveLength, 2)
- resultOne := result.GetIndex(0)
- So(resultOne.Get("id").MustInt64(), ShouldEqual, tokens[0].Id)
- So(resultOne.Get("isActive").MustBool(), ShouldBeTrue)
- So(resultOne.Get("clientIp").MustString(), ShouldEqual, "127.0.0.1")
- So(resultOne.Get("userAgent").MustString(), ShouldEqual, "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36")
- So(resultOne.Get("createdAt").MustString(), ShouldEqual, time.Unix(tokens[0].CreatedAt, 0).Format(time.RFC3339))
- So(resultOne.Get("seenAt").MustString(), ShouldEqual, time.Unix(tokens[0].SeenAt, 0).Format(time.RFC3339))
- resultTwo := result.GetIndex(1)
- So(resultTwo.Get("id").MustInt64(), ShouldEqual, tokens[1].Id)
- So(resultTwo.Get("isActive").MustBool(), ShouldBeFalse)
- So(resultTwo.Get("clientIp").MustString(), ShouldEqual, "127.0.0.2")
- So(resultTwo.Get("userAgent").MustString(), ShouldEqual, "Mozilla/5.0 (iPhone; CPU iPhone OS 11_0 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A372 Safari/604.1")
- So(resultTwo.Get("createdAt").MustString(), ShouldEqual, time.Unix(tokens[1].CreatedAt, 0).Format(time.RFC3339))
- So(resultTwo.Get("seenAt").MustString(), ShouldEqual, time.Unix(tokens[1].SeenAt, 0).Format(time.RFC3339))
- })
- })
- }
- func revokeUserAuthTokenScenario(desc string, url string, routePattern string, cmd m.RevokeAuthTokenCmd, userId int64, fn scenarioFunc) {
- Convey(desc+" "+url, func() {
- defer bus.ClearBusHandlers()
- fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
- hs := HTTPServer{
- Bus: bus.GetBus(),
- AuthTokenService: fakeAuthTokenService,
- }
- sc := setupScenarioContext(url)
- sc.userAuthTokenService = fakeAuthTokenService
- sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
- sc.context = c
- sc.context.UserId = userId
- sc.context.OrgId = TestOrgID
- sc.context.OrgRole = m.ROLE_ADMIN
- return hs.RevokeUserAuthToken(c, cmd)
- })
- sc.m.Post(routePattern, sc.defaultHandler)
- fn(sc)
- })
- }
- func getUserAuthTokensScenario(desc string, url string, routePattern string, userId int64, fn scenarioFunc) {
- Convey(desc+" "+url, func() {
- defer bus.ClearBusHandlers()
- fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
- hs := HTTPServer{
- Bus: bus.GetBus(),
- AuthTokenService: fakeAuthTokenService,
- }
- sc := setupScenarioContext(url)
- sc.userAuthTokenService = fakeAuthTokenService
- sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
- sc.context = c
- sc.context.UserId = userId
- sc.context.OrgId = TestOrgID
- sc.context.OrgRole = m.ROLE_ADMIN
- return hs.GetUserAuthTokens(c)
- })
- sc.m.Get(routePattern, sc.defaultHandler)
- fn(sc)
- })
- }
- func logoutUserFromAllDevicesInternalScenario(desc string, userId int64, fn scenarioFunc) {
- Convey(desc, func() {
- defer bus.ClearBusHandlers()
- hs := HTTPServer{
- Bus: bus.GetBus(),
- AuthTokenService: auth.NewFakeUserAuthTokenService(),
- }
- sc := setupScenarioContext("/")
- sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
- sc.context = c
- sc.context.UserId = TestUserID
- sc.context.OrgId = TestOrgID
- sc.context.OrgRole = m.ROLE_ADMIN
- return hs.logoutUserFromAllDevicesInternal(context.Background(), userId)
- })
- sc.m.Post("/", sc.defaultHandler)
- fn(sc)
- })
- }
- func revokeUserAuthTokenInternalScenario(desc string, cmd m.RevokeAuthTokenCmd, userId int64, token *m.UserToken, fn scenarioFunc) {
- Convey(desc, func() {
- defer bus.ClearBusHandlers()
- fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
- hs := HTTPServer{
- Bus: bus.GetBus(),
- AuthTokenService: fakeAuthTokenService,
- }
- sc := setupScenarioContext("/")
- sc.userAuthTokenService = fakeAuthTokenService
- sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
- sc.context = c
- sc.context.UserId = TestUserID
- sc.context.OrgId = TestOrgID
- sc.context.OrgRole = m.ROLE_ADMIN
- sc.context.UserToken = token
- return hs.revokeUserAuthTokenInternal(c, userId, cmd)
- })
- sc.m.Post("/", sc.defaultHandler)
- fn(sc)
- })
- }
- func getUserAuthTokensInternalScenario(desc string, token *m.UserToken, fn scenarioFunc) {
- Convey(desc, func() {
- defer bus.ClearBusHandlers()
- fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
- hs := HTTPServer{
- Bus: bus.GetBus(),
- AuthTokenService: fakeAuthTokenService,
- }
- sc := setupScenarioContext("/")
- sc.userAuthTokenService = fakeAuthTokenService
- sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
- sc.context = c
- sc.context.UserId = TestUserID
- sc.context.OrgId = TestOrgID
- sc.context.OrgRole = m.ROLE_ADMIN
- sc.context.UserToken = token
- return hs.getUserAuthTokensInternal(c, TestUserID)
- })
- sc.m.Get("/", sc.defaultHandler)
- fn(sc)
- })
- }
|