auth_token_test.go 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336
  1. package auth
  2. import (
  3. "testing"
  4. "time"
  5. "github.com/grafana/grafana/pkg/setting"
  6. "github.com/grafana/grafana/pkg/log"
  7. "github.com/grafana/grafana/pkg/models"
  8. "github.com/grafana/grafana/pkg/services/sqlstore"
  9. . "github.com/smartystreets/goconvey/convey"
  10. )
  11. func TestUserAuthToken(t *testing.T) {
  12. Convey("Test user auth token", t, func() {
  13. ctx := createTestContext(t)
  14. userAuthTokenService := ctx.tokenService
  15. userID := int64(10)
  16. t := time.Date(2018, 12, 13, 13, 45, 0, 0, time.UTC)
  17. getTime = func() time.Time {
  18. return t
  19. }
  20. Convey("When creating token", func() {
  21. token, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  22. So(err, ShouldBeNil)
  23. So(token, ShouldNotBeNil)
  24. So(token.AuthTokenSeen, ShouldBeFalse)
  25. Convey("When lookup unhashed token should return user auth token", func() {
  26. LookupToken, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  27. So(err, ShouldBeNil)
  28. So(LookupToken, ShouldNotBeNil)
  29. So(LookupToken.UserId, ShouldEqual, userID)
  30. So(LookupToken.AuthTokenSeen, ShouldBeTrue)
  31. storedAuthToken, err := ctx.getAuthTokenByID(LookupToken.Id)
  32. So(err, ShouldBeNil)
  33. So(storedAuthToken, ShouldNotBeNil)
  34. So(storedAuthToken.AuthTokenSeen, ShouldBeTrue)
  35. })
  36. Convey("When lookup hashed token should return user auth token not found error", func() {
  37. LookupToken, err := userAuthTokenService.LookupToken(token.AuthToken)
  38. So(err, ShouldEqual, ErrAuthTokenNotFound)
  39. So(LookupToken, ShouldBeNil)
  40. })
  41. })
  42. Convey("expires correctly", func() {
  43. token, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  44. So(err, ShouldBeNil)
  45. So(token, ShouldNotBeNil)
  46. _, err = userAuthTokenService.LookupToken(token.UnhashedToken)
  47. So(err, ShouldBeNil)
  48. token, err = ctx.getAuthTokenByID(token.Id)
  49. So(err, ShouldBeNil)
  50. getTime = func() time.Time {
  51. return t.Add(time.Hour)
  52. }
  53. refreshed, err := userAuthTokenService.RefreshToken(token, "192.168.10.11:1234", "some user agent")
  54. So(err, ShouldBeNil)
  55. So(refreshed, ShouldBeTrue)
  56. _, err = userAuthTokenService.LookupToken(token.UnhashedToken)
  57. So(err, ShouldBeNil)
  58. stillGood, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  59. So(err, ShouldBeNil)
  60. So(stillGood, ShouldNotBeNil)
  61. getTime = func() time.Time {
  62. return t.Add(24 * 7 * time.Hour)
  63. }
  64. notGood, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  65. So(err, ShouldEqual, ErrAuthTokenNotFound)
  66. So(notGood, ShouldBeNil)
  67. })
  68. Convey("can properly rotate tokens", func() {
  69. token, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  70. So(err, ShouldBeNil)
  71. So(token, ShouldNotBeNil)
  72. prevToken := token.AuthToken
  73. unhashedPrev := token.UnhashedToken
  74. refreshed, err := userAuthTokenService.RefreshToken(token, "192.168.10.12:1234", "a new user agent")
  75. So(err, ShouldBeNil)
  76. So(refreshed, ShouldBeFalse)
  77. updated, err := ctx.markAuthTokenAsSeen(token.Id)
  78. So(err, ShouldBeNil)
  79. So(updated, ShouldBeTrue)
  80. token, err = ctx.getAuthTokenByID(token.Id)
  81. So(err, ShouldBeNil)
  82. getTime = func() time.Time {
  83. return t.Add(time.Hour)
  84. }
  85. refreshed, err = userAuthTokenService.RefreshToken(token, "192.168.10.12:1234", "a new user agent")
  86. So(err, ShouldBeNil)
  87. So(refreshed, ShouldBeTrue)
  88. unhashedToken := token.UnhashedToken
  89. token, err = ctx.getAuthTokenByID(token.Id)
  90. So(err, ShouldBeNil)
  91. token.UnhashedToken = unhashedToken
  92. So(token.RotatedAt, ShouldEqual, getTime().Unix())
  93. So(token.ClientIp, ShouldEqual, "192.168.10.12")
  94. So(token.UserAgent, ShouldEqual, "a new user agent")
  95. So(token.AuthTokenSeen, ShouldBeFalse)
  96. So(token.SeenAt, ShouldEqual, 0)
  97. So(token.PrevAuthToken, ShouldEqual, prevToken)
  98. // ability to auth using an old token
  99. lookedUp, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  100. So(err, ShouldBeNil)
  101. So(lookedUp, ShouldNotBeNil)
  102. So(lookedUp.AuthTokenSeen, ShouldBeTrue)
  103. So(lookedUp.SeenAt, ShouldEqual, getTime().Unix())
  104. lookedUp, err = userAuthTokenService.LookupToken(unhashedPrev)
  105. So(err, ShouldBeNil)
  106. So(lookedUp, ShouldNotBeNil)
  107. So(lookedUp.Id, ShouldEqual, token.Id)
  108. So(lookedUp.AuthTokenSeen, ShouldBeTrue)
  109. getTime = func() time.Time {
  110. return t.Add(time.Hour + (2 * time.Minute))
  111. }
  112. lookedUp, err = userAuthTokenService.LookupToken(unhashedPrev)
  113. So(err, ShouldBeNil)
  114. So(lookedUp, ShouldNotBeNil)
  115. So(lookedUp.AuthTokenSeen, ShouldBeTrue)
  116. lookedUp, err = ctx.getAuthTokenByID(lookedUp.Id)
  117. So(err, ShouldBeNil)
  118. So(lookedUp, ShouldNotBeNil)
  119. So(lookedUp.AuthTokenSeen, ShouldBeFalse)
  120. refreshed, err = userAuthTokenService.RefreshToken(token, "192.168.10.12:1234", "a new user agent")
  121. So(err, ShouldBeNil)
  122. So(refreshed, ShouldBeTrue)
  123. token, err = ctx.getAuthTokenByID(token.Id)
  124. So(err, ShouldBeNil)
  125. So(token, ShouldNotBeNil)
  126. So(token.SeenAt, ShouldEqual, 0)
  127. })
  128. Convey("keeps prev token valid for 1 minute after it is confirmed", func() {
  129. token, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  130. So(err, ShouldBeNil)
  131. So(token, ShouldNotBeNil)
  132. lookedUp, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  133. So(err, ShouldBeNil)
  134. So(lookedUp, ShouldNotBeNil)
  135. getTime = func() time.Time {
  136. return t.Add(10 * time.Minute)
  137. }
  138. prevToken := token.UnhashedToken
  139. refreshed, err := userAuthTokenService.RefreshToken(token, "1.1.1.1", "firefox")
  140. So(err, ShouldBeNil)
  141. So(refreshed, ShouldBeTrue)
  142. getTime = func() time.Time {
  143. return t.Add(20 * time.Minute)
  144. }
  145. current, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  146. So(err, ShouldBeNil)
  147. So(current, ShouldNotBeNil)
  148. prev, err := userAuthTokenService.LookupToken(prevToken)
  149. So(err, ShouldBeNil)
  150. So(prev, ShouldNotBeNil)
  151. })
  152. Convey("will not mark token unseen when prev and current are the same", func() {
  153. token, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  154. So(err, ShouldBeNil)
  155. So(token, ShouldNotBeNil)
  156. lookedUp, err := userAuthTokenService.LookupToken(token.UnhashedToken)
  157. So(err, ShouldBeNil)
  158. So(lookedUp, ShouldNotBeNil)
  159. lookedUp, err = userAuthTokenService.LookupToken(token.UnhashedToken)
  160. So(err, ShouldBeNil)
  161. So(lookedUp, ShouldNotBeNil)
  162. lookedUp, err = ctx.getAuthTokenByID(lookedUp.Id)
  163. So(err, ShouldBeNil)
  164. So(lookedUp, ShouldNotBeNil)
  165. So(lookedUp.AuthTokenSeen, ShouldBeTrue)
  166. })
  167. Convey("Rotate token", func() {
  168. token, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  169. So(err, ShouldBeNil)
  170. So(token, ShouldNotBeNil)
  171. prevToken := token.AuthToken
  172. Convey("Should rotate current token and previous token when auth token seen", func() {
  173. updated, err := ctx.markAuthTokenAsSeen(token.Id)
  174. So(err, ShouldBeNil)
  175. So(updated, ShouldBeTrue)
  176. getTime = func() time.Time {
  177. return t.Add(10 * time.Minute)
  178. }
  179. refreshed, err := userAuthTokenService.RefreshToken(token, "1.1.1.1", "firefox")
  180. So(err, ShouldBeNil)
  181. So(refreshed, ShouldBeTrue)
  182. storedToken, err := ctx.getAuthTokenByID(token.Id)
  183. So(err, ShouldBeNil)
  184. So(storedToken, ShouldNotBeNil)
  185. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  186. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  187. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  188. prevToken = storedToken.AuthToken
  189. updated, err = ctx.markAuthTokenAsSeen(token.Id)
  190. So(err, ShouldBeNil)
  191. So(updated, ShouldBeTrue)
  192. getTime = func() time.Time {
  193. return t.Add(20 * time.Minute)
  194. }
  195. refreshed, err = userAuthTokenService.RefreshToken(token, "1.1.1.1", "firefox")
  196. So(err, ShouldBeNil)
  197. So(refreshed, ShouldBeTrue)
  198. storedToken, err = ctx.getAuthTokenByID(token.Id)
  199. So(err, ShouldBeNil)
  200. So(storedToken, ShouldNotBeNil)
  201. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  202. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  203. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  204. })
  205. Convey("Should rotate current token, but keep previous token when auth token not seen", func() {
  206. token.RotatedAt = getTime().Add(-2 * time.Minute).Unix()
  207. getTime = func() time.Time {
  208. return t.Add(2 * time.Minute)
  209. }
  210. refreshed, err := userAuthTokenService.RefreshToken(token, "1.1.1.1", "firefox")
  211. So(err, ShouldBeNil)
  212. So(refreshed, ShouldBeTrue)
  213. storedToken, err := ctx.getAuthTokenByID(token.Id)
  214. So(err, ShouldBeNil)
  215. So(storedToken, ShouldNotBeNil)
  216. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  217. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  218. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  219. })
  220. })
  221. Reset(func() {
  222. getTime = time.Now
  223. })
  224. })
  225. }
  226. func createTestContext(t *testing.T) *testContext {
  227. t.Helper()
  228. sqlstore := sqlstore.InitTestDB(t)
  229. tokenService := &UserAuthTokenService{
  230. SQLStore: sqlstore,
  231. log: log.New("test-logger"),
  232. }
  233. RotateTime = 10 * time.Minute
  234. UrgentRotateTime = time.Minute
  235. setting.LogInRememberDays = 7
  236. return &testContext{
  237. sqlstore: sqlstore,
  238. tokenService: tokenService,
  239. }
  240. }
  241. type testContext struct {
  242. sqlstore *sqlstore.SqlStore
  243. tokenService *UserAuthTokenService
  244. }
  245. func (c *testContext) getAuthTokenByID(id int64) (*models.UserAuthToken, error) {
  246. sess := c.sqlstore.NewSession()
  247. var t models.UserAuthToken
  248. found, err := sess.ID(id).Get(&t)
  249. if err != nil || !found {
  250. return nil, err
  251. }
  252. return &t, nil
  253. }
  254. func (c *testContext) markAuthTokenAsSeen(id int64) (bool, error) {
  255. sess := c.sqlstore.NewSession()
  256. res, err := sess.Exec("UPDATE user_auth_token SET auth_token_seen = ? WHERE id = ?", c.sqlstore.Dialect.BooleanStr(true), id)
  257. if err != nil {
  258. return false, err
  259. }
  260. rowsAffected, err := res.RowsAffected()
  261. if err != nil {
  262. return false, err
  263. }
  264. return rowsAffected == 1, nil
  265. }