user_token_test.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294
  1. package api
  2. import (
  3. "testing"
  4. "time"
  5. "github.com/grafana/grafana/pkg/bus"
  6. m "github.com/grafana/grafana/pkg/models"
  7. "github.com/grafana/grafana/pkg/services/auth"
  8. . "github.com/smartystreets/goconvey/convey"
  9. )
  10. func TestUserTokenApiEndpoint(t *testing.T) {
  11. Convey("When current user attempts to revoke an auth token for a non-existing user", t, func() {
  12. userId := int64(0)
  13. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  14. userId = cmd.Id
  15. return m.ErrUserNotFound
  16. })
  17. cmd := m.RevokeAuthTokenCmd{AuthTokenId: 2}
  18. revokeUserAuthTokenScenario("Should return not found when calling POST on", "/api/user/revoke-auth-token", "/api/user/revoke-auth-token", cmd, 200, func(sc *scenarioContext) {
  19. sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
  20. So(sc.resp.Code, ShouldEqual, 404)
  21. So(userId, ShouldEqual, 200)
  22. })
  23. })
  24. Convey("When current user gets auth tokens for a non-existing user", t, func() {
  25. userId := int64(0)
  26. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  27. userId = cmd.Id
  28. return m.ErrUserNotFound
  29. })
  30. getUserAuthTokensScenario("Should return not found when calling GET on", "/api/user/auth-tokens", "/api/user/auth-tokens", 200, func(sc *scenarioContext) {
  31. sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
  32. So(sc.resp.Code, ShouldEqual, 404)
  33. So(userId, ShouldEqual, 200)
  34. })
  35. })
  36. Convey("When logout an existing user from all devices", t, func() {
  37. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  38. cmd.Result = &m.User{Id: 200}
  39. return nil
  40. })
  41. logoutUserFromAllDevicesInternalScenario("Should be successful", 1, func(sc *scenarioContext) {
  42. sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
  43. So(sc.resp.Code, ShouldEqual, 200)
  44. })
  45. })
  46. Convey("When logout a non-existing user from all devices", t, func() {
  47. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  48. return m.ErrUserNotFound
  49. })
  50. logoutUserFromAllDevicesInternalScenario("Should return not found", TestUserID, func(sc *scenarioContext) {
  51. sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
  52. So(sc.resp.Code, ShouldEqual, 404)
  53. })
  54. })
  55. Convey("When revoke an auth token for a user", t, func() {
  56. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  57. cmd.Result = &m.User{Id: 200}
  58. return nil
  59. })
  60. cmd := m.RevokeAuthTokenCmd{AuthTokenId: 2}
  61. token := &m.UserToken{Id: 1}
  62. revokeUserAuthTokenInternalScenario("Should be successful", cmd, 200, token, func(sc *scenarioContext) {
  63. sc.userAuthTokenService.GetUserTokenProvider = func(userId, userTokenId int64) (*m.UserToken, error) {
  64. return &m.UserToken{Id: 2}, nil
  65. }
  66. sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
  67. So(sc.resp.Code, ShouldEqual, 200)
  68. })
  69. })
  70. Convey("When revoke the active auth token used by himself", t, func() {
  71. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  72. cmd.Result = &m.User{Id: TestUserID}
  73. return nil
  74. })
  75. cmd := m.RevokeAuthTokenCmd{AuthTokenId: 2}
  76. token := &m.UserToken{Id: 2}
  77. revokeUserAuthTokenInternalScenario("Should not be successful", cmd, TestUserID, token, func(sc *scenarioContext) {
  78. sc.userAuthTokenService.GetUserTokenProvider = func(userId, userTokenId int64) (*m.UserToken, error) {
  79. return token, nil
  80. }
  81. sc.fakeReqWithParams("POST", sc.url, map[string]string{}).exec()
  82. So(sc.resp.Code, ShouldEqual, 400)
  83. })
  84. })
  85. Convey("When gets auth tokens for a user", t, func() {
  86. bus.AddHandler("test", func(cmd *m.GetUserByIdQuery) error {
  87. cmd.Result = &m.User{Id: TestUserID}
  88. return nil
  89. })
  90. currentToken := &m.UserToken{Id: 1}
  91. getUserAuthTokensInternalScenario("Should be successful", currentToken, func(sc *scenarioContext) {
  92. tokens := []*m.UserToken{
  93. {
  94. Id: 1,
  95. ClientIp: "127.0.0.1",
  96. UserAgent: "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36",
  97. CreatedAt: time.Now().Unix(),
  98. SeenAt: time.Now().Unix(),
  99. },
  100. {
  101. Id: 2,
  102. ClientIp: "127.0.0.2",
  103. UserAgent: "Mozilla/5.0 (iPhone; CPU iPhone OS 11_0 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A372 Safari/604.1",
  104. CreatedAt: time.Now().Unix(),
  105. SeenAt: time.Now().Unix(),
  106. },
  107. }
  108. sc.userAuthTokenService.GetUserTokensProvider = func(userId int64) ([]*m.UserToken, error) {
  109. return tokens, nil
  110. }
  111. sc.fakeReqWithParams("GET", sc.url, map[string]string{}).exec()
  112. So(sc.resp.Code, ShouldEqual, 200)
  113. result := sc.ToJSON()
  114. So(result.MustArray(), ShouldHaveLength, 2)
  115. resultOne := result.GetIndex(0)
  116. So(resultOne.Get("id").MustInt64(), ShouldEqual, tokens[0].Id)
  117. So(resultOne.Get("isActive").MustBool(), ShouldBeTrue)
  118. So(resultOne.Get("clientIp").MustString(), ShouldEqual, "127.0.0.1")
  119. So(resultOne.Get("userAgent").MustString(), ShouldEqual, "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36")
  120. So(resultOne.Get("createdAt").MustString(), ShouldEqual, time.Unix(tokens[0].CreatedAt, 0).Format(time.RFC3339))
  121. So(resultOne.Get("seenAt").MustString(), ShouldEqual, time.Unix(tokens[0].SeenAt, 0).Format(time.RFC3339))
  122. resultTwo := result.GetIndex(1)
  123. So(resultTwo.Get("id").MustInt64(), ShouldEqual, tokens[1].Id)
  124. So(resultTwo.Get("isActive").MustBool(), ShouldBeFalse)
  125. So(resultTwo.Get("clientIp").MustString(), ShouldEqual, "127.0.0.2")
  126. So(resultTwo.Get("userAgent").MustString(), ShouldEqual, "Mozilla/5.0 (iPhone; CPU iPhone OS 11_0 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A372 Safari/604.1")
  127. So(resultTwo.Get("createdAt").MustString(), ShouldEqual, time.Unix(tokens[1].CreatedAt, 0).Format(time.RFC3339))
  128. So(resultTwo.Get("seenAt").MustString(), ShouldEqual, time.Unix(tokens[1].SeenAt, 0).Format(time.RFC3339))
  129. })
  130. })
  131. }
  132. func revokeUserAuthTokenScenario(desc string, url string, routePattern string, cmd m.RevokeAuthTokenCmd, userId int64, fn scenarioFunc) {
  133. Convey(desc+" "+url, func() {
  134. defer bus.ClearBusHandlers()
  135. fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
  136. hs := HTTPServer{
  137. Bus: bus.GetBus(),
  138. AuthTokenService: fakeAuthTokenService,
  139. }
  140. sc := setupScenarioContext(url)
  141. sc.userAuthTokenService = fakeAuthTokenService
  142. sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
  143. sc.context = c
  144. sc.context.UserId = userId
  145. sc.context.OrgId = TestOrgID
  146. sc.context.OrgRole = m.ROLE_ADMIN
  147. return hs.RevokeUserAuthToken(c, cmd)
  148. })
  149. sc.m.Post(routePattern, sc.defaultHandler)
  150. fn(sc)
  151. })
  152. }
  153. func getUserAuthTokensScenario(desc string, url string, routePattern string, userId int64, fn scenarioFunc) {
  154. Convey(desc+" "+url, func() {
  155. defer bus.ClearBusHandlers()
  156. fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
  157. hs := HTTPServer{
  158. Bus: bus.GetBus(),
  159. AuthTokenService: fakeAuthTokenService,
  160. }
  161. sc := setupScenarioContext(url)
  162. sc.userAuthTokenService = fakeAuthTokenService
  163. sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
  164. sc.context = c
  165. sc.context.UserId = userId
  166. sc.context.OrgId = TestOrgID
  167. sc.context.OrgRole = m.ROLE_ADMIN
  168. return hs.GetUserAuthTokens(c)
  169. })
  170. sc.m.Get(routePattern, sc.defaultHandler)
  171. fn(sc)
  172. })
  173. }
  174. func logoutUserFromAllDevicesInternalScenario(desc string, userId int64, fn scenarioFunc) {
  175. Convey(desc, func() {
  176. defer bus.ClearBusHandlers()
  177. hs := HTTPServer{
  178. Bus: bus.GetBus(),
  179. AuthTokenService: auth.NewFakeUserAuthTokenService(),
  180. }
  181. sc := setupScenarioContext("/")
  182. sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
  183. sc.context = c
  184. sc.context.UserId = TestUserID
  185. sc.context.OrgId = TestOrgID
  186. sc.context.OrgRole = m.ROLE_ADMIN
  187. return hs.logoutUserFromAllDevicesInternal(userId)
  188. })
  189. sc.m.Post("/", sc.defaultHandler)
  190. fn(sc)
  191. })
  192. }
  193. func revokeUserAuthTokenInternalScenario(desc string, cmd m.RevokeAuthTokenCmd, userId int64, token *m.UserToken, fn scenarioFunc) {
  194. Convey(desc, func() {
  195. defer bus.ClearBusHandlers()
  196. fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
  197. hs := HTTPServer{
  198. Bus: bus.GetBus(),
  199. AuthTokenService: fakeAuthTokenService,
  200. }
  201. sc := setupScenarioContext("/")
  202. sc.userAuthTokenService = fakeAuthTokenService
  203. sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
  204. sc.context = c
  205. sc.context.UserId = TestUserID
  206. sc.context.OrgId = TestOrgID
  207. sc.context.OrgRole = m.ROLE_ADMIN
  208. sc.context.UserToken = token
  209. return hs.revokeUserAuthTokenInternal(c, userId, cmd)
  210. })
  211. sc.m.Post("/", sc.defaultHandler)
  212. fn(sc)
  213. })
  214. }
  215. func getUserAuthTokensInternalScenario(desc string, token *m.UserToken, fn scenarioFunc) {
  216. Convey(desc, func() {
  217. defer bus.ClearBusHandlers()
  218. fakeAuthTokenService := auth.NewFakeUserAuthTokenService()
  219. hs := HTTPServer{
  220. Bus: bus.GetBus(),
  221. AuthTokenService: fakeAuthTokenService,
  222. }
  223. sc := setupScenarioContext("/")
  224. sc.userAuthTokenService = fakeAuthTokenService
  225. sc.defaultHandler = Wrap(func(c *m.ReqContext) Response {
  226. sc.context = c
  227. sc.context.UserId = TestUserID
  228. sc.context.OrgId = TestOrgID
  229. sc.context.OrgRole = m.ROLE_ADMIN
  230. sc.context.UserToken = token
  231. return hs.getUserAuthTokensInternal(c, TestUserID)
  232. })
  233. sc.m.Get("/", sc.defaultHandler)
  234. fn(sc)
  235. })
  236. }