auth_token_test.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534
  1. package auth
  2. import (
  3. "encoding/json"
  4. "testing"
  5. "time"
  6. "github.com/grafana/grafana/pkg/components/simplejson"
  7. "github.com/grafana/grafana/pkg/setting"
  8. "github.com/grafana/grafana/pkg/log"
  9. "github.com/grafana/grafana/pkg/models"
  10. "github.com/grafana/grafana/pkg/services/sqlstore"
  11. . "github.com/smartystreets/goconvey/convey"
  12. )
  13. func TestUserAuthToken(t *testing.T) {
  14. Convey("Test user auth token", t, func() {
  15. ctx := createTestContext(t)
  16. userAuthTokenService := ctx.tokenService
  17. userID := int64(10)
  18. t := time.Date(2018, 12, 13, 13, 45, 0, 0, time.UTC)
  19. getTime = func() time.Time {
  20. return t
  21. }
  22. Convey("When creating token", func() {
  23. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  24. So(err, ShouldBeNil)
  25. So(userToken, ShouldNotBeNil)
  26. So(userToken.AuthTokenSeen, ShouldBeFalse)
  27. Convey("Can count active tokens", func() {
  28. count, err := userAuthTokenService.ActiveTokenCount()
  29. So(err, ShouldBeNil)
  30. So(count, ShouldEqual, 1)
  31. })
  32. Convey("When lookup unhashed token should return user auth token", func() {
  33. userToken, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  34. So(err, ShouldBeNil)
  35. So(userToken, ShouldNotBeNil)
  36. So(userToken.UserId, ShouldEqual, userID)
  37. So(userToken.AuthTokenSeen, ShouldBeTrue)
  38. storedAuthToken, err := ctx.getAuthTokenByID(userToken.Id)
  39. So(err, ShouldBeNil)
  40. So(storedAuthToken, ShouldNotBeNil)
  41. So(storedAuthToken.AuthTokenSeen, ShouldBeTrue)
  42. })
  43. Convey("When lookup hashed token should return user auth token not found error", func() {
  44. userToken, err := userAuthTokenService.LookupToken(userToken.AuthToken)
  45. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  46. So(userToken, ShouldBeNil)
  47. })
  48. Convey("revoking existing token should delete token", func() {
  49. err = userAuthTokenService.RevokeToken(userToken)
  50. So(err, ShouldBeNil)
  51. model, err := ctx.getAuthTokenByID(userToken.Id)
  52. So(err, ShouldBeNil)
  53. So(model, ShouldBeNil)
  54. })
  55. Convey("revoking nil token should return error", func() {
  56. err = userAuthTokenService.RevokeToken(nil)
  57. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  58. })
  59. Convey("revoking non-existing token should return error", func() {
  60. userToken.Id = 1000
  61. err = userAuthTokenService.RevokeToken(userToken)
  62. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  63. })
  64. Convey("When creating an additional token", func() {
  65. userToken2, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  66. So(err, ShouldBeNil)
  67. So(userToken2, ShouldNotBeNil)
  68. Convey("Can get first user token", func() {
  69. token, err := userAuthTokenService.GetUserToken(userID, userToken.Id)
  70. So(err, ShouldBeNil)
  71. So(token, ShouldNotBeNil)
  72. So(token.Id, ShouldEqual, userToken.Id)
  73. })
  74. Convey("Can get second user token", func() {
  75. token, err := userAuthTokenService.GetUserToken(userID, userToken2.Id)
  76. So(err, ShouldBeNil)
  77. So(token, ShouldNotBeNil)
  78. So(token.Id, ShouldEqual, userToken2.Id)
  79. })
  80. Convey("Can get user tokens", func() {
  81. tokens, err := userAuthTokenService.GetUserTokens(userID)
  82. So(err, ShouldBeNil)
  83. So(tokens, ShouldHaveLength, 2)
  84. So(tokens[0].Id, ShouldEqual, userToken.Id)
  85. So(tokens[1].Id, ShouldEqual, userToken2.Id)
  86. })
  87. Convey("Can revoke all user tokens", func() {
  88. err := userAuthTokenService.RevokeAllUserTokens(userID)
  89. So(err, ShouldBeNil)
  90. model, err := ctx.getAuthTokenByID(userToken.Id)
  91. So(err, ShouldBeNil)
  92. So(model, ShouldBeNil)
  93. model2, err := ctx.getAuthTokenByID(userToken2.Id)
  94. So(err, ShouldBeNil)
  95. So(model2, ShouldBeNil)
  96. })
  97. })
  98. })
  99. Convey("expires correctly", func() {
  100. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  101. So(err, ShouldBeNil)
  102. userToken, err = userAuthTokenService.LookupToken(userToken.UnhashedToken)
  103. So(err, ShouldBeNil)
  104. getTime = func() time.Time {
  105. return t.Add(time.Hour)
  106. }
  107. rotated, err := userAuthTokenService.TryRotateToken(userToken, "192.168.10.11:1234", "some user agent")
  108. So(err, ShouldBeNil)
  109. So(rotated, ShouldBeTrue)
  110. userToken, err = userAuthTokenService.LookupToken(userToken.UnhashedToken)
  111. So(err, ShouldBeNil)
  112. stillGood, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  113. So(err, ShouldBeNil)
  114. So(stillGood, ShouldNotBeNil)
  115. model, err := ctx.getAuthTokenByID(userToken.Id)
  116. So(err, ShouldBeNil)
  117. Convey("when rotated_at is 6:59:59 ago should find token", func() {
  118. getTime = func() time.Time {
  119. return time.Unix(model.RotatedAt, 0).Add(24 * 7 * time.Hour).Add(-time.Second)
  120. }
  121. stillGood, err = userAuthTokenService.LookupToken(stillGood.UnhashedToken)
  122. So(err, ShouldBeNil)
  123. So(stillGood, ShouldNotBeNil)
  124. })
  125. Convey("when rotated_at is 7:00:00 ago should not find token", func() {
  126. getTime = func() time.Time {
  127. return time.Unix(model.RotatedAt, 0).Add(24 * 7 * time.Hour)
  128. }
  129. notGood, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  130. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  131. So(notGood, ShouldBeNil)
  132. Convey("should not find active token when expired", func() {
  133. count, err := userAuthTokenService.ActiveTokenCount()
  134. So(err, ShouldBeNil)
  135. So(count, ShouldEqual, 0)
  136. })
  137. })
  138. Convey("when rotated_at is 5 days ago and created_at is 29 days and 23:59:59 ago should not find token", func() {
  139. updated, err := ctx.updateRotatedAt(model.Id, time.Unix(model.CreatedAt, 0).Add(24*25*time.Hour).Unix())
  140. So(err, ShouldBeNil)
  141. So(updated, ShouldBeTrue)
  142. getTime = func() time.Time {
  143. return time.Unix(model.CreatedAt, 0).Add(24 * 30 * time.Hour).Add(-time.Second)
  144. }
  145. stillGood, err = userAuthTokenService.LookupToken(stillGood.UnhashedToken)
  146. So(err, ShouldBeNil)
  147. So(stillGood, ShouldNotBeNil)
  148. })
  149. Convey("when rotated_at is 5 days ago and created_at is 30 days ago should not find token", func() {
  150. updated, err := ctx.updateRotatedAt(model.Id, time.Unix(model.CreatedAt, 0).Add(24*25*time.Hour).Unix())
  151. So(err, ShouldBeNil)
  152. So(updated, ShouldBeTrue)
  153. getTime = func() time.Time {
  154. return time.Unix(model.CreatedAt, 0).Add(24 * 30 * time.Hour)
  155. }
  156. notGood, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  157. So(err, ShouldEqual, models.ErrUserTokenNotFound)
  158. So(notGood, ShouldBeNil)
  159. })
  160. })
  161. Convey("can properly rotate tokens", func() {
  162. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  163. So(err, ShouldBeNil)
  164. prevToken := userToken.AuthToken
  165. unhashedPrev := userToken.UnhashedToken
  166. rotated, err := userAuthTokenService.TryRotateToken(userToken, "192.168.10.12:1234", "a new user agent")
  167. So(err, ShouldBeNil)
  168. So(rotated, ShouldBeFalse)
  169. updated, err := ctx.markAuthTokenAsSeen(userToken.Id)
  170. So(err, ShouldBeNil)
  171. So(updated, ShouldBeTrue)
  172. model, err := ctx.getAuthTokenByID(userToken.Id)
  173. So(err, ShouldBeNil)
  174. var tok models.UserToken
  175. err = model.toUserToken(&tok)
  176. So(err, ShouldBeNil)
  177. getTime = func() time.Time {
  178. return t.Add(time.Hour)
  179. }
  180. rotated, err = userAuthTokenService.TryRotateToken(&tok, "192.168.10.12:1234", "a new user agent")
  181. So(err, ShouldBeNil)
  182. So(rotated, ShouldBeTrue)
  183. unhashedToken := tok.UnhashedToken
  184. model, err = ctx.getAuthTokenByID(tok.Id)
  185. So(err, ShouldBeNil)
  186. model.UnhashedToken = unhashedToken
  187. So(model.RotatedAt, ShouldEqual, getTime().Unix())
  188. So(model.ClientIp, ShouldEqual, "192.168.10.12")
  189. So(model.UserAgent, ShouldEqual, "a new user agent")
  190. So(model.AuthTokenSeen, ShouldBeFalse)
  191. So(model.SeenAt, ShouldEqual, 0)
  192. So(model.PrevAuthToken, ShouldEqual, prevToken)
  193. // ability to auth using an old token
  194. lookedUpUserToken, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  195. So(err, ShouldBeNil)
  196. So(lookedUpUserToken, ShouldNotBeNil)
  197. So(lookedUpUserToken.AuthTokenSeen, ShouldBeTrue)
  198. So(lookedUpUserToken.SeenAt, ShouldEqual, getTime().Unix())
  199. lookedUpUserToken, err = userAuthTokenService.LookupToken(unhashedPrev)
  200. So(err, ShouldBeNil)
  201. So(lookedUpUserToken, ShouldNotBeNil)
  202. So(lookedUpUserToken.Id, ShouldEqual, model.Id)
  203. So(lookedUpUserToken.AuthTokenSeen, ShouldBeTrue)
  204. getTime = func() time.Time {
  205. return t.Add(time.Hour + (2 * time.Minute))
  206. }
  207. lookedUpUserToken, err = userAuthTokenService.LookupToken(unhashedPrev)
  208. So(err, ShouldBeNil)
  209. So(lookedUpUserToken, ShouldNotBeNil)
  210. So(lookedUpUserToken.AuthTokenSeen, ShouldBeTrue)
  211. lookedUpModel, err := ctx.getAuthTokenByID(lookedUpUserToken.Id)
  212. So(err, ShouldBeNil)
  213. So(lookedUpModel, ShouldNotBeNil)
  214. So(lookedUpModel.AuthTokenSeen, ShouldBeFalse)
  215. rotated, err = userAuthTokenService.TryRotateToken(userToken, "192.168.10.12:1234", "a new user agent")
  216. So(err, ShouldBeNil)
  217. So(rotated, ShouldBeTrue)
  218. model, err = ctx.getAuthTokenByID(userToken.Id)
  219. So(err, ShouldBeNil)
  220. So(model, ShouldNotBeNil)
  221. So(model.SeenAt, ShouldEqual, 0)
  222. })
  223. Convey("keeps prev token valid for 1 minute after it is confirmed", func() {
  224. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  225. So(err, ShouldBeNil)
  226. So(userToken, ShouldNotBeNil)
  227. lookedUpUserToken, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  228. So(err, ShouldBeNil)
  229. So(lookedUpUserToken, ShouldNotBeNil)
  230. getTime = func() time.Time {
  231. return t.Add(10 * time.Minute)
  232. }
  233. prevToken := userToken.UnhashedToken
  234. rotated, err := userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  235. So(err, ShouldBeNil)
  236. So(rotated, ShouldBeTrue)
  237. getTime = func() time.Time {
  238. return t.Add(20 * time.Minute)
  239. }
  240. currentUserToken, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  241. So(err, ShouldBeNil)
  242. So(currentUserToken, ShouldNotBeNil)
  243. prevUserToken, err := userAuthTokenService.LookupToken(prevToken)
  244. So(err, ShouldBeNil)
  245. So(prevUserToken, ShouldNotBeNil)
  246. })
  247. Convey("will not mark token unseen when prev and current are the same", func() {
  248. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  249. So(err, ShouldBeNil)
  250. So(userToken, ShouldNotBeNil)
  251. lookedUpUserToken, err := userAuthTokenService.LookupToken(userToken.UnhashedToken)
  252. So(err, ShouldBeNil)
  253. So(lookedUpUserToken, ShouldNotBeNil)
  254. lookedUpUserToken, err = userAuthTokenService.LookupToken(userToken.UnhashedToken)
  255. So(err, ShouldBeNil)
  256. So(lookedUpUserToken, ShouldNotBeNil)
  257. lookedUpModel, err := ctx.getAuthTokenByID(lookedUpUserToken.Id)
  258. So(err, ShouldBeNil)
  259. So(lookedUpModel, ShouldNotBeNil)
  260. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  261. })
  262. Convey("Rotate token", func() {
  263. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  264. So(err, ShouldBeNil)
  265. So(userToken, ShouldNotBeNil)
  266. prevToken := userToken.AuthToken
  267. Convey("Should rotate current token and previous token when auth token seen", func() {
  268. updated, err := ctx.markAuthTokenAsSeen(userToken.Id)
  269. So(err, ShouldBeNil)
  270. So(updated, ShouldBeTrue)
  271. getTime = func() time.Time {
  272. return t.Add(10 * time.Minute)
  273. }
  274. rotated, err := userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  275. So(err, ShouldBeNil)
  276. So(rotated, ShouldBeTrue)
  277. storedToken, err := ctx.getAuthTokenByID(userToken.Id)
  278. So(err, ShouldBeNil)
  279. So(storedToken, ShouldNotBeNil)
  280. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  281. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  282. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  283. prevToken = storedToken.AuthToken
  284. updated, err = ctx.markAuthTokenAsSeen(userToken.Id)
  285. So(err, ShouldBeNil)
  286. So(updated, ShouldBeTrue)
  287. getTime = func() time.Time {
  288. return t.Add(20 * time.Minute)
  289. }
  290. rotated, err = userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  291. So(err, ShouldBeNil)
  292. So(rotated, ShouldBeTrue)
  293. storedToken, err = ctx.getAuthTokenByID(userToken.Id)
  294. So(err, ShouldBeNil)
  295. So(storedToken, ShouldNotBeNil)
  296. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  297. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  298. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  299. })
  300. Convey("Should rotate current token, but keep previous token when auth token not seen", func() {
  301. userToken.RotatedAt = getTime().Add(-2 * time.Minute).Unix()
  302. getTime = func() time.Time {
  303. return t.Add(2 * time.Minute)
  304. }
  305. rotated, err := userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  306. So(err, ShouldBeNil)
  307. So(rotated, ShouldBeTrue)
  308. storedToken, err := ctx.getAuthTokenByID(userToken.Id)
  309. So(err, ShouldBeNil)
  310. So(storedToken, ShouldNotBeNil)
  311. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  312. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  313. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  314. })
  315. })
  316. Convey("When populating userAuthToken from UserToken should copy all properties", func() {
  317. ut := models.UserToken{
  318. Id: 1,
  319. UserId: 2,
  320. AuthToken: "a",
  321. PrevAuthToken: "b",
  322. UserAgent: "c",
  323. ClientIp: "d",
  324. AuthTokenSeen: true,
  325. SeenAt: 3,
  326. RotatedAt: 4,
  327. CreatedAt: 5,
  328. UpdatedAt: 6,
  329. UnhashedToken: "e",
  330. }
  331. utBytes, err := json.Marshal(ut)
  332. So(err, ShouldBeNil)
  333. utJSON, err := simplejson.NewJson(utBytes)
  334. So(err, ShouldBeNil)
  335. utMap := utJSON.MustMap()
  336. var uat userAuthToken
  337. uat.fromUserToken(&ut)
  338. uatBytes, err := json.Marshal(uat)
  339. So(err, ShouldBeNil)
  340. uatJSON, err := simplejson.NewJson(uatBytes)
  341. So(err, ShouldBeNil)
  342. uatMap := uatJSON.MustMap()
  343. So(uatMap, ShouldResemble, utMap)
  344. })
  345. Convey("When populating userToken from userAuthToken should copy all properties", func() {
  346. uat := userAuthToken{
  347. Id: 1,
  348. UserId: 2,
  349. AuthToken: "a",
  350. PrevAuthToken: "b",
  351. UserAgent: "c",
  352. ClientIp: "d",
  353. AuthTokenSeen: true,
  354. SeenAt: 3,
  355. RotatedAt: 4,
  356. CreatedAt: 5,
  357. UpdatedAt: 6,
  358. UnhashedToken: "e",
  359. }
  360. uatBytes, err := json.Marshal(uat)
  361. So(err, ShouldBeNil)
  362. uatJSON, err := simplejson.NewJson(uatBytes)
  363. So(err, ShouldBeNil)
  364. uatMap := uatJSON.MustMap()
  365. var ut models.UserToken
  366. err = uat.toUserToken(&ut)
  367. So(err, ShouldBeNil)
  368. utBytes, err := json.Marshal(ut)
  369. So(err, ShouldBeNil)
  370. utJSON, err := simplejson.NewJson(utBytes)
  371. So(err, ShouldBeNil)
  372. utMap := utJSON.MustMap()
  373. So(utMap, ShouldResemble, uatMap)
  374. })
  375. Reset(func() {
  376. getTime = time.Now
  377. })
  378. })
  379. }
  380. func createTestContext(t *testing.T) *testContext {
  381. t.Helper()
  382. sqlstore := sqlstore.InitTestDB(t)
  383. tokenService := &UserAuthTokenService{
  384. SQLStore: sqlstore,
  385. Cfg: &setting.Cfg{
  386. LoginMaxInactiveLifetimeDays: 7,
  387. LoginMaxLifetimeDays: 30,
  388. TokenRotationIntervalMinutes: 10,
  389. },
  390. log: log.New("test-logger"),
  391. }
  392. return &testContext{
  393. sqlstore: sqlstore,
  394. tokenService: tokenService,
  395. }
  396. }
  397. type testContext struct {
  398. sqlstore *sqlstore.SqlStore
  399. tokenService *UserAuthTokenService
  400. }
  401. func (c *testContext) getAuthTokenByID(id int64) (*userAuthToken, error) {
  402. sess := c.sqlstore.NewSession()
  403. var t userAuthToken
  404. found, err := sess.ID(id).Get(&t)
  405. if err != nil || !found {
  406. return nil, err
  407. }
  408. return &t, nil
  409. }
  410. func (c *testContext) markAuthTokenAsSeen(id int64) (bool, error) {
  411. sess := c.sqlstore.NewSession()
  412. res, err := sess.Exec("UPDATE user_auth_token SET auth_token_seen = ? WHERE id = ?", c.sqlstore.Dialect.BooleanStr(true), id)
  413. if err != nil {
  414. return false, err
  415. }
  416. rowsAffected, err := res.RowsAffected()
  417. if err != nil {
  418. return false, err
  419. }
  420. return rowsAffected == 1, nil
  421. }
  422. func (c *testContext) updateRotatedAt(id, rotatedAt int64) (bool, error) {
  423. sess := c.sqlstore.NewSession()
  424. res, err := sess.Exec("UPDATE user_auth_token SET rotated_at = ? WHERE id = ?", rotatedAt, id)
  425. if err != nil {
  426. return false, err
  427. }
  428. rowsAffected, err := res.RowsAffected()
  429. if err != nil {
  430. return false, err
  431. }
  432. return rowsAffected == 1, nil
  433. }