auth_token_test.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535
  1. package auth
  2. import (
  3. "context"
  4. "encoding/json"
  5. "testing"
  6. "time"
  7. "github.com/grafana/grafana/pkg/components/simplejson"
  8. "github.com/grafana/grafana/pkg/setting"
  9. "github.com/grafana/grafana/pkg/infra/log"
  10. "github.com/grafana/grafana/pkg/models"
  11. "github.com/grafana/grafana/pkg/services/sqlstore"
  12. . "github.com/smartystreets/goconvey/convey"
  13. )
  14. func TestUserAuthToken(t *testing.T) {
  15. Convey("Test user auth token", t, func() {
  16. ctx := createTestContext(t)
  17. userAuthTokenService := ctx.tokenService
  18. userID := int64(10)
  19. t := time.Date(2018, 12, 13, 13, 45, 0, 0, time.UTC)
  20. getTime = func() time.Time {
  21. return t
  22. }
  23. Convey("When creating token", func() {
  24. userToken, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  25. So(err, ShouldBeNil)
  26. So(userToken, ShouldNotBeNil)
  27. So(userToken.AuthTokenSeen, ShouldBeFalse)
  28. Convey("Can count active tokens", func() {
  29. count, err := userAuthTokenService.ActiveTokenCount(context.Background())
  30. So(err, ShouldBeNil)
  31. So(count, ShouldEqual, 1)
  32. })
  33. Convey("When lookup unhashed token should return user auth token", func() {
  34. userToken, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  35. So(err, ShouldBeNil)
  36. So(userToken, ShouldNotBeNil)
  37. So(userToken.UserId, ShouldEqual, userID)
  38. So(userToken.AuthTokenSeen, ShouldBeTrue)
  39. storedAuthToken, err := ctx.getAuthTokenByID(userToken.Id)
  40. So(err, ShouldBeNil)
  41. So(storedAuthToken, ShouldNotBeNil)
  42. So(storedAuthToken.AuthTokenSeen, ShouldBeTrue)
  43. })
  44. Convey("When lookup hashed token should return user auth token not found error", func() {
  45. userToken, err := userAuthTokenService.LookupToken(context.Background(), userToken.AuthToken)
  46. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  47. So(userToken, ShouldBeNil)
  48. })
  49. Convey("revoking existing token should delete token", func() {
  50. err = userAuthTokenService.RevokeToken(context.Background(), userToken)
  51. So(err, ShouldBeNil)
  52. model, err := ctx.getAuthTokenByID(userToken.Id)
  53. So(err, ShouldBeNil)
  54. So(model, ShouldBeNil)
  55. })
  56. Convey("revoking nil token should return error", func() {
  57. err = userAuthTokenService.RevokeToken(context.Background(), nil)
  58. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  59. })
  60. Convey("revoking non-existing token should return error", func() {
  61. userToken.Id = 1000
  62. err = userAuthTokenService.RevokeToken(context.Background(), userToken)
  63. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  64. })
  65. Convey("When creating an additional token", func() {
  66. userToken2, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  67. So(err, ShouldBeNil)
  68. So(userToken2, ShouldNotBeNil)
  69. Convey("Can get first user token", func() {
  70. token, err := userAuthTokenService.GetUserToken(context.Background(), userID, userToken.Id)
  71. So(err, ShouldBeNil)
  72. So(token, ShouldNotBeNil)
  73. So(token.Id, ShouldEqual, userToken.Id)
  74. })
  75. Convey("Can get second user token", func() {
  76. token, err := userAuthTokenService.GetUserToken(context.Background(), userID, userToken2.Id)
  77. So(err, ShouldBeNil)
  78. So(token, ShouldNotBeNil)
  79. So(token.Id, ShouldEqual, userToken2.Id)
  80. })
  81. Convey("Can get user tokens", func() {
  82. tokens, err := userAuthTokenService.GetUserTokens(context.Background(), userID)
  83. So(err, ShouldBeNil)
  84. So(tokens, ShouldHaveLength, 2)
  85. So(tokens[0].Id, ShouldEqual, userToken.Id)
  86. So(tokens[1].Id, ShouldEqual, userToken2.Id)
  87. })
  88. Convey("Can revoke all user tokens", func() {
  89. err := userAuthTokenService.RevokeAllUserTokens(context.Background(), userID)
  90. So(err, ShouldBeNil)
  91. model, err := ctx.getAuthTokenByID(userToken.Id)
  92. So(err, ShouldBeNil)
  93. So(model, ShouldBeNil)
  94. model2, err := ctx.getAuthTokenByID(userToken2.Id)
  95. So(err, ShouldBeNil)
  96. So(model2, ShouldBeNil)
  97. })
  98. })
  99. })
  100. Convey("expires correctly", func() {
  101. userToken, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  102. So(err, ShouldBeNil)
  103. userToken, err = userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  104. So(err, ShouldBeNil)
  105. getTime = func() time.Time {
  106. return t.Add(time.Hour)
  107. }
  108. rotated, err := userAuthTokenService.TryRotateToken(context.Background(), userToken, "192.168.10.11:1234", "some user agent")
  109. So(err, ShouldBeNil)
  110. So(rotated, ShouldBeTrue)
  111. userToken, err = userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  112. So(err, ShouldBeNil)
  113. stillGood, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  114. So(err, ShouldBeNil)
  115. So(stillGood, ShouldNotBeNil)
  116. model, err := ctx.getAuthTokenByID(userToken.Id)
  117. So(err, ShouldBeNil)
  118. Convey("when rotated_at is 6:59:59 ago should find token", func() {
  119. getTime = func() time.Time {
  120. return time.Unix(model.RotatedAt, 0).Add(24 * 7 * time.Hour).Add(-time.Second)
  121. }
  122. stillGood, err = userAuthTokenService.LookupToken(context.Background(), stillGood.UnhashedToken)
  123. So(err, ShouldBeNil)
  124. So(stillGood, ShouldNotBeNil)
  125. })
  126. Convey("when rotated_at is 7:00:00 ago should not find token", func() {
  127. getTime = func() time.Time {
  128. return time.Unix(model.RotatedAt, 0).Add(24 * 7 * time.Hour)
  129. }
  130. notGood, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  131. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  132. So(notGood, ShouldBeNil)
  133. Convey("should not find active token when expired", func() {
  134. count, err := userAuthTokenService.ActiveTokenCount(context.Background())
  135. So(err, ShouldBeNil)
  136. So(count, ShouldEqual, 0)
  137. })
  138. })
  139. Convey("when rotated_at is 5 days ago and created_at is 29 days and 23:59:59 ago should not find token", func() {
  140. updated, err := ctx.updateRotatedAt(model.Id, time.Unix(model.CreatedAt, 0).Add(24*25*time.Hour).Unix())
  141. So(err, ShouldBeNil)
  142. So(updated, ShouldBeTrue)
  143. getTime = func() time.Time {
  144. return time.Unix(model.CreatedAt, 0).Add(24 * 30 * time.Hour).Add(-time.Second)
  145. }
  146. stillGood, err = userAuthTokenService.LookupToken(context.Background(), stillGood.UnhashedToken)
  147. So(err, ShouldBeNil)
  148. So(stillGood, ShouldNotBeNil)
  149. })
  150. Convey("when rotated_at is 5 days ago and created_at is 30 days ago should not find token", func() {
  151. updated, err := ctx.updateRotatedAt(model.Id, time.Unix(model.CreatedAt, 0).Add(24*25*time.Hour).Unix())
  152. So(err, ShouldBeNil)
  153. So(updated, ShouldBeTrue)
  154. getTime = func() time.Time {
  155. return time.Unix(model.CreatedAt, 0).Add(24 * 30 * time.Hour)
  156. }
  157. notGood, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  158. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  159. So(notGood, ShouldBeNil)
  160. })
  161. })
  162. Convey("can properly rotate tokens", func() {
  163. userToken, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  164. So(err, ShouldBeNil)
  165. prevToken := userToken.AuthToken
  166. unhashedPrev := userToken.UnhashedToken
  167. rotated, err := userAuthTokenService.TryRotateToken(context.Background(), userToken, "192.168.10.12:1234", "a new user agent")
  168. So(err, ShouldBeNil)
  169. So(rotated, ShouldBeFalse)
  170. updated, err := ctx.markAuthTokenAsSeen(userToken.Id)
  171. So(err, ShouldBeNil)
  172. So(updated, ShouldBeTrue)
  173. model, err := ctx.getAuthTokenByID(userToken.Id)
  174. So(err, ShouldBeNil)
  175. var tok models.UserToken
  176. err = model.toUserToken(&tok)
  177. So(err, ShouldBeNil)
  178. getTime = func() time.Time {
  179. return t.Add(time.Hour)
  180. }
  181. rotated, err = userAuthTokenService.TryRotateToken(context.Background(), &tok, "192.168.10.12:1234", "a new user agent")
  182. So(err, ShouldBeNil)
  183. So(rotated, ShouldBeTrue)
  184. unhashedToken := tok.UnhashedToken
  185. model, err = ctx.getAuthTokenByID(tok.Id)
  186. So(err, ShouldBeNil)
  187. model.UnhashedToken = unhashedToken
  188. So(model.RotatedAt, ShouldEqual, getTime().Unix())
  189. So(model.ClientIp, ShouldEqual, "192.168.10.12")
  190. So(model.UserAgent, ShouldEqual, "a new user agent")
  191. So(model.AuthTokenSeen, ShouldBeFalse)
  192. So(model.SeenAt, ShouldEqual, 0)
  193. So(model.PrevAuthToken, ShouldEqual, prevToken)
  194. // ability to auth using an old token
  195. lookedUpUserToken, err := userAuthTokenService.LookupToken(context.Background(), model.UnhashedToken)
  196. So(err, ShouldBeNil)
  197. So(lookedUpUserToken, ShouldNotBeNil)
  198. So(lookedUpUserToken.AuthTokenSeen, ShouldBeTrue)
  199. So(lookedUpUserToken.SeenAt, ShouldEqual, getTime().Unix())
  200. lookedUpUserToken, err = userAuthTokenService.LookupToken(context.Background(), unhashedPrev)
  201. So(err, ShouldBeNil)
  202. So(lookedUpUserToken, ShouldNotBeNil)
  203. So(lookedUpUserToken.Id, ShouldEqual, model.Id)
  204. So(lookedUpUserToken.AuthTokenSeen, ShouldBeTrue)
  205. getTime = func() time.Time {
  206. return t.Add(time.Hour + (2 * time.Minute))
  207. }
  208. lookedUpUserToken, err = userAuthTokenService.LookupToken(context.Background(), unhashedPrev)
  209. So(err, ShouldBeNil)
  210. So(lookedUpUserToken, ShouldNotBeNil)
  211. So(lookedUpUserToken.AuthTokenSeen, ShouldBeTrue)
  212. lookedUpModel, err := ctx.getAuthTokenByID(lookedUpUserToken.Id)
  213. So(err, ShouldBeNil)
  214. So(lookedUpModel, ShouldNotBeNil)
  215. So(lookedUpModel.AuthTokenSeen, ShouldBeFalse)
  216. rotated, err = userAuthTokenService.TryRotateToken(context.Background(), userToken, "192.168.10.12:1234", "a new user agent")
  217. So(err, ShouldBeNil)
  218. So(rotated, ShouldBeTrue)
  219. model, err = ctx.getAuthTokenByID(userToken.Id)
  220. So(err, ShouldBeNil)
  221. So(model, ShouldNotBeNil)
  222. So(model.SeenAt, ShouldEqual, 0)
  223. })
  224. Convey("keeps prev token valid for 1 minute after it is confirmed", func() {
  225. userToken, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  226. So(err, ShouldBeNil)
  227. So(userToken, ShouldNotBeNil)
  228. lookedUpUserToken, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  229. So(err, ShouldBeNil)
  230. So(lookedUpUserToken, ShouldNotBeNil)
  231. getTime = func() time.Time {
  232. return t.Add(10 * time.Minute)
  233. }
  234. prevToken := userToken.UnhashedToken
  235. rotated, err := userAuthTokenService.TryRotateToken(context.Background(), userToken, "1.1.1.1", "firefox")
  236. So(err, ShouldBeNil)
  237. So(rotated, ShouldBeTrue)
  238. getTime = func() time.Time {
  239. return t.Add(20 * time.Minute)
  240. }
  241. currentUserToken, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  242. So(err, ShouldBeNil)
  243. So(currentUserToken, ShouldNotBeNil)
  244. prevUserToken, err := userAuthTokenService.LookupToken(context.Background(), prevToken)
  245. So(err, ShouldBeNil)
  246. So(prevUserToken, ShouldNotBeNil)
  247. })
  248. Convey("will not mark token unseen when prev and current are the same", func() {
  249. userToken, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  250. So(err, ShouldBeNil)
  251. So(userToken, ShouldNotBeNil)
  252. lookedUpUserToken, err := userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  253. So(err, ShouldBeNil)
  254. So(lookedUpUserToken, ShouldNotBeNil)
  255. lookedUpUserToken, err = userAuthTokenService.LookupToken(context.Background(), userToken.UnhashedToken)
  256. So(err, ShouldBeNil)
  257. So(lookedUpUserToken, ShouldNotBeNil)
  258. lookedUpModel, err := ctx.getAuthTokenByID(lookedUpUserToken.Id)
  259. So(err, ShouldBeNil)
  260. So(lookedUpModel, ShouldNotBeNil)
  261. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  262. })
  263. Convey("Rotate token", func() {
  264. userToken, err := userAuthTokenService.CreateToken(context.Background(), userID, "192.168.10.11:1234", "some user agent")
  265. So(err, ShouldBeNil)
  266. So(userToken, ShouldNotBeNil)
  267. prevToken := userToken.AuthToken
  268. Convey("Should rotate current token and previous token when auth token seen", func() {
  269. updated, err := ctx.markAuthTokenAsSeen(userToken.Id)
  270. So(err, ShouldBeNil)
  271. So(updated, ShouldBeTrue)
  272. getTime = func() time.Time {
  273. return t.Add(10 * time.Minute)
  274. }
  275. rotated, err := userAuthTokenService.TryRotateToken(context.Background(), userToken, "1.1.1.1", "firefox")
  276. So(err, ShouldBeNil)
  277. So(rotated, ShouldBeTrue)
  278. storedToken, err := ctx.getAuthTokenByID(userToken.Id)
  279. So(err, ShouldBeNil)
  280. So(storedToken, ShouldNotBeNil)
  281. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  282. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  283. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  284. prevToken = storedToken.AuthToken
  285. updated, err = ctx.markAuthTokenAsSeen(userToken.Id)
  286. So(err, ShouldBeNil)
  287. So(updated, ShouldBeTrue)
  288. getTime = func() time.Time {
  289. return t.Add(20 * time.Minute)
  290. }
  291. rotated, err = userAuthTokenService.TryRotateToken(context.Background(), userToken, "1.1.1.1", "firefox")
  292. So(err, ShouldBeNil)
  293. So(rotated, ShouldBeTrue)
  294. storedToken, err = ctx.getAuthTokenByID(userToken.Id)
  295. So(err, ShouldBeNil)
  296. So(storedToken, ShouldNotBeNil)
  297. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  298. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  299. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  300. })
  301. Convey("Should rotate current token, but keep previous token when auth token not seen", func() {
  302. userToken.RotatedAt = getTime().Add(-2 * time.Minute).Unix()
  303. getTime = func() time.Time {
  304. return t.Add(2 * time.Minute)
  305. }
  306. rotated, err := userAuthTokenService.TryRotateToken(context.Background(), userToken, "1.1.1.1", "firefox")
  307. So(err, ShouldBeNil)
  308. So(rotated, ShouldBeTrue)
  309. storedToken, err := ctx.getAuthTokenByID(userToken.Id)
  310. So(err, ShouldBeNil)
  311. So(storedToken, ShouldNotBeNil)
  312. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  313. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  314. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  315. })
  316. })
  317. Convey("When populating userAuthToken from UserToken should copy all properties", func() {
  318. ut := models.UserToken{
  319. Id: 1,
  320. UserId: 2,
  321. AuthToken: "a",
  322. PrevAuthToken: "b",
  323. UserAgent: "c",
  324. ClientIp: "d",
  325. AuthTokenSeen: true,
  326. SeenAt: 3,
  327. RotatedAt: 4,
  328. CreatedAt: 5,
  329. UpdatedAt: 6,
  330. UnhashedToken: "e",
  331. }
  332. utBytes, err := json.Marshal(ut)
  333. So(err, ShouldBeNil)
  334. utJSON, err := simplejson.NewJson(utBytes)
  335. So(err, ShouldBeNil)
  336. utMap := utJSON.MustMap()
  337. var uat userAuthToken
  338. uat.fromUserToken(&ut)
  339. uatBytes, err := json.Marshal(uat)
  340. So(err, ShouldBeNil)
  341. uatJSON, err := simplejson.NewJson(uatBytes)
  342. So(err, ShouldBeNil)
  343. uatMap := uatJSON.MustMap()
  344. So(uatMap, ShouldResemble, utMap)
  345. })
  346. Convey("When populating userToken from userAuthToken should copy all properties", func() {
  347. uat := userAuthToken{
  348. Id: 1,
  349. UserId: 2,
  350. AuthToken: "a",
  351. PrevAuthToken: "b",
  352. UserAgent: "c",
  353. ClientIp: "d",
  354. AuthTokenSeen: true,
  355. SeenAt: 3,
  356. RotatedAt: 4,
  357. CreatedAt: 5,
  358. UpdatedAt: 6,
  359. UnhashedToken: "e",
  360. }
  361. uatBytes, err := json.Marshal(uat)
  362. So(err, ShouldBeNil)
  363. uatJSON, err := simplejson.NewJson(uatBytes)
  364. So(err, ShouldBeNil)
  365. uatMap := uatJSON.MustMap()
  366. var ut models.UserToken
  367. err = uat.toUserToken(&ut)
  368. So(err, ShouldBeNil)
  369. utBytes, err := json.Marshal(ut)
  370. So(err, ShouldBeNil)
  371. utJSON, err := simplejson.NewJson(utBytes)
  372. So(err, ShouldBeNil)
  373. utMap := utJSON.MustMap()
  374. So(utMap, ShouldResemble, uatMap)
  375. })
  376. Reset(func() {
  377. getTime = time.Now
  378. })
  379. })
  380. }
  381. func createTestContext(t *testing.T) *testContext {
  382. t.Helper()
  383. sqlstore := sqlstore.InitTestDB(t)
  384. tokenService := &UserAuthTokenService{
  385. SQLStore: sqlstore,
  386. Cfg: &setting.Cfg{
  387. LoginMaxInactiveLifetimeDays: 7,
  388. LoginMaxLifetimeDays: 30,
  389. TokenRotationIntervalMinutes: 10,
  390. },
  391. log: log.New("test-logger"),
  392. }
  393. return &testContext{
  394. sqlstore: sqlstore,
  395. tokenService: tokenService,
  396. }
  397. }
  398. type testContext struct {
  399. sqlstore *sqlstore.SqlStore
  400. tokenService *UserAuthTokenService
  401. }
  402. func (c *testContext) getAuthTokenByID(id int64) (*userAuthToken, error) {
  403. sess := c.sqlstore.NewSession()
  404. var t userAuthToken
  405. found, err := sess.ID(id).Get(&t)
  406. if err != nil || !found {
  407. return nil, err
  408. }
  409. return &t, nil
  410. }
  411. func (c *testContext) markAuthTokenAsSeen(id int64) (bool, error) {
  412. sess := c.sqlstore.NewSession()
  413. res, err := sess.Exec("UPDATE user_auth_token SET auth_token_seen = ? WHERE id = ?", c.sqlstore.Dialect.BooleanStr(true), id)
  414. if err != nil {
  415. return false, err
  416. }
  417. rowsAffected, err := res.RowsAffected()
  418. if err != nil {
  419. return false, err
  420. }
  421. return rowsAffected == 1, nil
  422. }
  423. func (c *testContext) updateRotatedAt(id, rotatedAt int64) (bool, error) {
  424. sess := c.sqlstore.NewSession()
  425. res, err := sess.Exec("UPDATE user_auth_token SET rotated_at = ? WHERE id = ?", rotatedAt, id)
  426. if err != nil {
  427. return false, err
  428. }
  429. rowsAffected, err := res.RowsAffected()
  430. if err != nil {
  431. return false, err
  432. }
  433. return rowsAffected == 1, nil
  434. }