| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557 |
- package middleware
- import (
- "context"
- "encoding/json"
- "fmt"
- "net/http"
- "net/http/httptest"
- "path/filepath"
- "testing"
- "time"
- "github.com/grafana/grafana/pkg/api/dtos"
- "github.com/grafana/grafana/pkg/bus"
- "github.com/grafana/grafana/pkg/infra/remotecache"
- m "github.com/grafana/grafana/pkg/models"
- "github.com/grafana/grafana/pkg/services/auth"
- "github.com/grafana/grafana/pkg/setting"
- "github.com/grafana/grafana/pkg/util"
- . "github.com/smartystreets/goconvey/convey"
- "gopkg.in/macaron.v1"
- )
- func TestMiddlewareContext(t *testing.T) {
- setting.ERR_TEMPLATE_NAME = "error-template"
- Convey("Given the grafana middleware", t, func() {
- middlewareScenario(t, "middleware should add context to injector", func(sc *scenarioContext) {
- sc.fakeReq("GET", "/").exec()
- So(sc.context, ShouldNotBeNil)
- })
- middlewareScenario(t, "Default middleware should allow get request", func(sc *scenarioContext) {
- sc.fakeReq("GET", "/").exec()
- So(sc.resp.Code, ShouldEqual, 200)
- })
- middlewareScenario(t, "middleware should add Cache-Control header for requests to API", func(sc *scenarioContext) {
- sc.fakeReq("GET", "/api/search").exec()
- So(sc.resp.Header().Get("Cache-Control"), ShouldEqual, "no-cache")
- So(sc.resp.Header().Get("Pragma"), ShouldEqual, "no-cache")
- So(sc.resp.Header().Get("Expires"), ShouldEqual, "-1")
- })
- middlewareScenario(t, "middleware should not add Cache-Control header for requests to datasource proxy API", func(sc *scenarioContext) {
- sc.fakeReq("GET", "/api/datasources/proxy/1/test").exec()
- So(sc.resp.Header().Get("Cache-Control"), ShouldBeEmpty)
- So(sc.resp.Header().Get("Pragma"), ShouldBeEmpty)
- So(sc.resp.Header().Get("Expires"), ShouldBeEmpty)
- })
- middlewareScenario(t, "middleware should add Cache-Control header for requests with html response", func(sc *scenarioContext) {
- sc.handler(func(c *m.ReqContext) {
- data := &dtos.IndexViewData{
- User: &dtos.CurrentUser{},
- Settings: map[string]interface{}{},
- NavTree: []*dtos.NavLink{},
- }
- c.HTML(200, "index-template", data)
- })
- sc.fakeReq("GET", "/").exec()
- So(sc.resp.Code, ShouldEqual, 200)
- So(sc.resp.Header().Get("Cache-Control"), ShouldEqual, "no-cache")
- So(sc.resp.Header().Get("Pragma"), ShouldEqual, "no-cache")
- So(sc.resp.Header().Get("Expires"), ShouldEqual, "-1")
- })
- middlewareScenario(t, "middleware should add X-Frame-Options header with deny for request when not allowing embedding", func(sc *scenarioContext) {
- sc.fakeReq("GET", "/api/search").exec()
- So(sc.resp.Header().Get("X-Frame-Options"), ShouldEqual, "deny")
- })
- middlewareScenario(t, "middleware should not add X-Frame-Options header for request when allowing embedding", func(sc *scenarioContext) {
- setting.AllowEmbedding = true
- sc.fakeReq("GET", "/api/search").exec()
- So(sc.resp.Header().Get("X-Frame-Options"), ShouldBeEmpty)
- })
- middlewareScenario(t, "Invalid api key", func(sc *scenarioContext) {
- sc.apiKey = "invalid_key_test"
- sc.fakeReq("GET", "/").exec()
- Convey("Should not init session", func() {
- So(sc.resp.Header().Get("Set-Cookie"), ShouldBeEmpty)
- })
- Convey("Should return 401", func() {
- So(sc.resp.Code, ShouldEqual, 401)
- So(sc.respJson["message"], ShouldEqual, "Invalid API key")
- })
- })
- middlewareScenario(t, "Using basic auth", func(sc *scenarioContext) {
- bus.AddHandler("test", func(query *m.GetUserByLoginQuery) error {
- query.Result = &m.User{
- Password: util.EncodePassword("myPass", "salt"),
- Salt: "salt",
- }
- return nil
- })
- bus.AddHandler("test", func(loginUserQuery *m.LoginUserQuery) error {
- return nil
- })
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
- return nil
- })
- setting.BasicAuthEnabled = true
- authHeader := util.GetBasicAuthHeader("myUser", "myPass")
- sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
- Convey("Should init middleware context with user", func() {
- So(sc.context.IsSignedIn, ShouldEqual, true)
- So(sc.context.OrgId, ShouldEqual, 2)
- So(sc.context.UserId, ShouldEqual, 12)
- })
- })
- middlewareScenario(t, "Valid api key", func(sc *scenarioContext) {
- keyhash := util.EncodePassword("v5nAwpMafFP6znaS4urhdWDLS5511M42", "asd")
- bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
- query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
- return nil
- })
- sc.fakeReq("GET", "/").withValidApiKey().exec()
- Convey("Should return 200", func() {
- So(sc.resp.Code, ShouldEqual, 200)
- })
- Convey("Should init middleware context", func() {
- So(sc.context.IsSignedIn, ShouldEqual, true)
- So(sc.context.OrgId, ShouldEqual, 12)
- So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
- })
- })
- middlewareScenario(t, "Valid api key, but does not match db hash", func(sc *scenarioContext) {
- keyhash := "something_not_matching"
- bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
- query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
- return nil
- })
- sc.fakeReq("GET", "/").withValidApiKey().exec()
- Convey("Should return api key invalid", func() {
- So(sc.resp.Code, ShouldEqual, 401)
- So(sc.respJson["message"], ShouldEqual, "Invalid API key")
- })
- })
- middlewareScenario(t, "Valid api key via Basic auth", func(sc *scenarioContext) {
- keyhash := util.EncodePassword("v5nAwpMafFP6znaS4urhdWDLS5511M42", "asd")
- bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
- query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
- return nil
- })
- authHeader := util.GetBasicAuthHeader("api_key", "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9")
- sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
- Convey("Should return 200", func() {
- So(sc.resp.Code, ShouldEqual, 200)
- })
- Convey("Should init middleware context", func() {
- So(sc.context.IsSignedIn, ShouldEqual, true)
- So(sc.context.OrgId, ShouldEqual, 12)
- So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
- })
- })
- middlewareScenario(t, "Non-expired auth token in cookie which not are being rotated", func(sc *scenarioContext) {
- sc.withTokenSessionCookie("token")
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
- return nil
- })
- sc.userAuthTokenService.LookupTokenProvider = func(ctx context.Context, unhashedToken string) (*m.UserToken, error) {
- return &m.UserToken{
- UserId: 12,
- UnhashedToken: unhashedToken,
- }, nil
- }
- sc.fakeReq("GET", "/").exec()
- Convey("should init context with user info", func() {
- So(sc.context.IsSignedIn, ShouldBeTrue)
- So(sc.context.UserId, ShouldEqual, 12)
- So(sc.context.UserToken.UserId, ShouldEqual, 12)
- So(sc.context.UserToken.UnhashedToken, ShouldEqual, "token")
- })
- Convey("should not set cookie", func() {
- So(sc.resp.Header().Get("Set-Cookie"), ShouldEqual, "")
- })
- })
- middlewareScenario(t, "Non-expired auth token in cookie which are being rotated", func(sc *scenarioContext) {
- sc.withTokenSessionCookie("token")
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
- return nil
- })
- sc.userAuthTokenService.LookupTokenProvider = func(ctx context.Context, unhashedToken string) (*m.UserToken, error) {
- return &m.UserToken{
- UserId: 12,
- UnhashedToken: "",
- }, nil
- }
- sc.userAuthTokenService.TryRotateTokenProvider = func(ctx context.Context, userToken *m.UserToken, clientIP, userAgent string) (bool, error) {
- userToken.UnhashedToken = "rotated"
- return true, nil
- }
- maxAgeHours := (time.Duration(setting.LoginMaxLifetimeDays) * 24 * time.Hour)
- maxAge := (maxAgeHours + time.Hour).Seconds()
- expectedCookie := &http.Cookie{
- Name: setting.LoginCookieName,
- Value: "rotated",
- Path: setting.AppSubUrl + "/",
- HttpOnly: true,
- MaxAge: int(maxAge),
- Secure: setting.CookieSecure,
- SameSite: setting.CookieSameSite,
- }
- sc.fakeReq("GET", "/").exec()
- Convey("should init context with user info", func() {
- So(sc.context.IsSignedIn, ShouldBeTrue)
- So(sc.context.UserId, ShouldEqual, 12)
- So(sc.context.UserToken.UserId, ShouldEqual, 12)
- So(sc.context.UserToken.UnhashedToken, ShouldEqual, "rotated")
- })
- Convey("should set cookie", func() {
- So(sc.resp.Header().Get("Set-Cookie"), ShouldEqual, expectedCookie.String())
- })
- })
- middlewareScenario(t, "Invalid/expired auth token in cookie", func(sc *scenarioContext) {
- sc.withTokenSessionCookie("token")
- sc.userAuthTokenService.LookupTokenProvider = func(ctx context.Context, unhashedToken string) (*m.UserToken, error) {
- return nil, m.ErrUserTokenNotFound
- }
- sc.fakeReq("GET", "/").exec()
- Convey("should not init context with user info", func() {
- So(sc.context.IsSignedIn, ShouldBeFalse)
- So(sc.context.UserId, ShouldEqual, 0)
- So(sc.context.UserToken, ShouldBeNil)
- })
- })
- middlewareScenario(t, "When anonymous access is enabled", func(sc *scenarioContext) {
- setting.AnonymousEnabled = true
- setting.AnonymousOrgName = "test"
- setting.AnonymousOrgRole = string(m.ROLE_EDITOR)
- bus.AddHandler("test", func(query *m.GetOrgByNameQuery) error {
- So(query.Name, ShouldEqual, "test")
- query.Result = &m.Org{Id: 2, Name: "test"}
- return nil
- })
- sc.fakeReq("GET", "/").exec()
- Convey("should init context with org info", func() {
- So(sc.context.UserId, ShouldEqual, 0)
- So(sc.context.OrgId, ShouldEqual, 2)
- So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
- })
- Convey("context signed in should be false", func() {
- So(sc.context.IsSignedIn, ShouldBeFalse)
- })
- })
- Convey("auth_proxy", func() {
- setting.AuthProxyEnabled = true
- setting.AuthProxyWhitelist = ""
- setting.AuthProxyAutoSignUp = true
- setting.LDAPEnabled = true
- setting.AuthProxyHeaderName = "X-WEBAUTH-USER"
- setting.AuthProxyHeaderProperty = "username"
- name := "markelog"
- middlewareScenario(t, "should not sync the user if it's in the cache", func(sc *scenarioContext) {
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 4, UserId: query.UserId}
- return nil
- })
- key := fmt.Sprintf(cachePrefix, name)
- sc.remoteCacheService.Set(key, int64(33), 0)
- sc.fakeReq("GET", "/")
- sc.req.Header.Add(setting.AuthProxyHeaderName, name)
- sc.exec()
- Convey("Should init user via cache", func() {
- So(sc.context.IsSignedIn, ShouldBeTrue)
- So(sc.context.UserId, ShouldEqual, 33)
- So(sc.context.OrgId, ShouldEqual, 4)
- })
- })
- middlewareScenario(t, "should create an user from a header", func(sc *scenarioContext) {
- setting.LDAPEnabled = false
- setting.AuthProxyAutoSignUp = true
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- if query.UserId > 0 {
- query.Result = &m.SignedInUser{OrgId: 4, UserId: 33}
- return nil
- }
- return m.ErrUserNotFound
- })
- bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
- cmd.Result = &m.User{Id: 33}
- return nil
- })
- sc.fakeReq("GET", "/")
- sc.req.Header.Add(setting.AuthProxyHeaderName, name)
- sc.exec()
- Convey("Should create user from header info", func() {
- So(sc.context.IsSignedIn, ShouldBeTrue)
- So(sc.context.UserId, ShouldEqual, 33)
- So(sc.context.OrgId, ShouldEqual, 4)
- })
- })
- middlewareScenario(t, "should get an existing user from header", func(sc *scenarioContext) {
- setting.LDAPEnabled = false
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
- return nil
- })
- bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
- cmd.Result = &m.User{Id: 12}
- return nil
- })
- sc.fakeReq("GET", "/")
- sc.req.Header.Add(setting.AuthProxyHeaderName, name)
- sc.exec()
- Convey("should init context with user info", func() {
- So(sc.context.IsSignedIn, ShouldBeTrue)
- So(sc.context.UserId, ShouldEqual, 12)
- So(sc.context.OrgId, ShouldEqual, 2)
- })
- })
- middlewareScenario(t, "should allow the request from whitelist IP", func(sc *scenarioContext) {
- setting.AuthProxyWhitelist = "192.168.1.0/24, 2001::0/120"
- setting.LDAPEnabled = false
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 4, UserId: 33}
- return nil
- })
- bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
- cmd.Result = &m.User{Id: 33}
- return nil
- })
- sc.fakeReq("GET", "/")
- sc.req.Header.Add(setting.AuthProxyHeaderName, name)
- sc.req.RemoteAddr = "[2001::23]:12345"
- sc.exec()
- Convey("Should init context with user info", func() {
- So(sc.context.IsSignedIn, ShouldBeTrue)
- So(sc.context.UserId, ShouldEqual, 33)
- So(sc.context.OrgId, ShouldEqual, 4)
- })
- })
- middlewareScenario(t, "should not allow the request from whitelist IP", func(sc *scenarioContext) {
- setting.AuthProxyWhitelist = "8.8.8.8"
- setting.LDAPEnabled = false
- bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
- query.Result = &m.SignedInUser{OrgId: 4, UserId: 33}
- return nil
- })
- bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
- cmd.Result = &m.User{Id: 33}
- return nil
- })
- sc.fakeReq("GET", "/")
- sc.req.Header.Add(setting.AuthProxyHeaderName, name)
- sc.req.RemoteAddr = "[2001::23]:12345"
- sc.exec()
- Convey("should return 407 status code", func() {
- So(sc.resp.Code, ShouldEqual, 407)
- So(sc.context, ShouldBeNil)
- })
- })
- })
- })
- }
- func middlewareScenario(t *testing.T, desc string, fn scenarioFunc) {
- Convey(desc, func() {
- defer bus.ClearBusHandlers()
- setting.LoginCookieName = "grafana_session"
- setting.LoginMaxLifetimeDays = 30
- sc := &scenarioContext{}
- viewsPath, _ := filepath.Abs("../../public/views")
- sc.m = macaron.New()
- sc.m.Use(AddDefaultResponseHeaders())
- sc.m.Use(macaron.Renderer(macaron.RenderOptions{
- Directory: viewsPath,
- Delims: macaron.Delims{Left: "[[", Right: "]]"},
- }))
- sc.userAuthTokenService = auth.NewFakeUserAuthTokenService()
- sc.remoteCacheService = remotecache.NewFakeStore(t)
- sc.m.Use(GetContextHandler(sc.userAuthTokenService, sc.remoteCacheService))
- sc.m.Use(OrgRedirect())
- sc.defaultHandler = func(c *m.ReqContext) {
- sc.context = c
- if sc.handlerFunc != nil {
- sc.handlerFunc(sc.context)
- }
- }
- sc.m.Get("/", sc.defaultHandler)
- fn(sc)
- })
- }
- type scenarioContext struct {
- m *macaron.Macaron
- context *m.ReqContext
- resp *httptest.ResponseRecorder
- apiKey string
- authHeader string
- tokenSessionCookie string
- respJson map[string]interface{}
- handlerFunc handlerFunc
- defaultHandler macaron.Handler
- url string
- userAuthTokenService *auth.FakeUserAuthTokenService
- remoteCacheService *remotecache.RemoteCache
- req *http.Request
- }
- func (sc *scenarioContext) withValidApiKey() *scenarioContext {
- sc.apiKey = "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9"
- return sc
- }
- func (sc *scenarioContext) withTokenSessionCookie(unhashedToken string) *scenarioContext {
- sc.tokenSessionCookie = unhashedToken
- return sc
- }
- func (sc *scenarioContext) withAuthorizationHeader(authHeader string) *scenarioContext {
- sc.authHeader = authHeader
- return sc
- }
- func (sc *scenarioContext) fakeReq(method, url string) *scenarioContext {
- sc.resp = httptest.NewRecorder()
- req, err := http.NewRequest(method, url, nil)
- So(err, ShouldBeNil)
- sc.req = req
- return sc
- }
- func (sc *scenarioContext) fakeReqWithParams(method, url string, queryParams map[string]string) *scenarioContext {
- sc.resp = httptest.NewRecorder()
- req, err := http.NewRequest(method, url, nil)
- q := req.URL.Query()
- for k, v := range queryParams {
- q.Add(k, v)
- }
- req.URL.RawQuery = q.Encode()
- So(err, ShouldBeNil)
- sc.req = req
- return sc
- }
- func (sc *scenarioContext) handler(fn handlerFunc) *scenarioContext {
- sc.handlerFunc = fn
- return sc
- }
- func (sc *scenarioContext) exec() {
- if sc.apiKey != "" {
- sc.req.Header.Add("Authorization", "Bearer "+sc.apiKey)
- }
- if sc.authHeader != "" {
- sc.req.Header.Add("Authorization", sc.authHeader)
- }
- if sc.tokenSessionCookie != "" {
- sc.req.AddCookie(&http.Cookie{
- Name: setting.LoginCookieName,
- Value: sc.tokenSessionCookie,
- })
- }
- sc.m.ServeHTTP(sc.resp, sc.req)
- if sc.resp.Header().Get("Content-Type") == "application/json; charset=UTF-8" {
- err := json.NewDecoder(sc.resp.Body).Decode(&sc.respJson)
- So(err, ShouldBeNil)
- }
- }
- type scenarioFunc func(c *scenarioContext)
- type handlerFunc func(c *m.ReqContext)
|