auth_token_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444
  1. package authtoken
  2. import (
  3. "testing"
  4. "time"
  5. "github.com/grafana/grafana/pkg/setting"
  6. "github.com/grafana/grafana/pkg/log"
  7. "github.com/grafana/grafana/pkg/services/sqlstore"
  8. . "github.com/smartystreets/goconvey/convey"
  9. )
  10. func TestUserAuthToken(t *testing.T) {
  11. Convey("Test user auth token", t, func() {
  12. ctx := createTestContext(t)
  13. userAuthTokenService := ctx.tokenService
  14. userID := int64(10)
  15. t := time.Date(2018, 12, 13, 13, 45, 0, 0, time.UTC)
  16. getTime = func() time.Time {
  17. return t
  18. }
  19. Convey("When creating token", func() {
  20. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  21. So(err, ShouldBeNil)
  22. model, err := extractModelFromToken(userToken)
  23. So(err, ShouldBeNil)
  24. So(model, ShouldNotBeNil)
  25. So(model.AuthTokenSeen, ShouldBeFalse)
  26. Convey("When lookup unhashed token should return user auth token", func() {
  27. userToken, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  28. So(err, ShouldBeNil)
  29. lookedUpModel, err := extractModelFromToken(userToken)
  30. So(err, ShouldBeNil)
  31. So(lookedUpModel, ShouldNotBeNil)
  32. So(lookedUpModel.UserId, ShouldEqual, userID)
  33. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  34. storedAuthToken, err := ctx.getAuthTokenByID(lookedUpModel.Id)
  35. So(err, ShouldBeNil)
  36. So(storedAuthToken, ShouldNotBeNil)
  37. So(storedAuthToken.AuthTokenSeen, ShouldBeTrue)
  38. })
  39. Convey("When lookup hashed token should return user auth token not found error", func() {
  40. userToken, err := userAuthTokenService.LookupToken(model.AuthToken)
  41. So(err, ShouldEqual, ErrAuthTokenNotFound)
  42. So(userToken, ShouldBeNil)
  43. })
  44. Convey("revoking existing token should delete token", func() {
  45. err = userAuthTokenService.RevokeToken(userToken)
  46. So(err, ShouldBeNil)
  47. model, err := ctx.getAuthTokenByID(model.Id)
  48. So(err, ShouldBeNil)
  49. So(model, ShouldBeNil)
  50. })
  51. Convey("revoking nil token should return error", func() {
  52. err = userAuthTokenService.RevokeToken(nil)
  53. So(err, ShouldEqual, ErrAuthTokenNotFound)
  54. })
  55. Convey("revoking non-existing token should return error", func() {
  56. model.Id = 1000
  57. nonExistingToken, err := model.toUserToken()
  58. So(err, ShouldBeNil)
  59. err = userAuthTokenService.RevokeToken(nonExistingToken)
  60. So(err, ShouldEqual, ErrAuthTokenNotFound)
  61. })
  62. })
  63. Convey("expires correctly", func() {
  64. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  65. So(err, ShouldBeNil)
  66. model, err := extractModelFromToken(userToken)
  67. So(err, ShouldBeNil)
  68. So(model, ShouldNotBeNil)
  69. _, err = userAuthTokenService.LookupToken(model.UnhashedToken)
  70. So(err, ShouldBeNil)
  71. model, err = ctx.getAuthTokenByID(model.Id)
  72. So(err, ShouldBeNil)
  73. userToken, err = model.toUserToken()
  74. So(err, ShouldBeNil)
  75. getTime = func() time.Time {
  76. return t.Add(time.Hour)
  77. }
  78. rotated, err := userAuthTokenService.TryRotateToken(userToken, "192.168.10.11:1234", "some user agent")
  79. So(err, ShouldBeNil)
  80. So(rotated, ShouldBeTrue)
  81. _, err = userAuthTokenService.LookupToken(model.UnhashedToken)
  82. So(err, ShouldBeNil)
  83. stillGood, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  84. So(err, ShouldBeNil)
  85. So(stillGood, ShouldNotBeNil)
  86. model, err = ctx.getAuthTokenByID(model.Id)
  87. So(err, ShouldBeNil)
  88. Convey("when rotated_at is 6:59:59 ago should find token", func() {
  89. getTime = func() time.Time {
  90. return time.Unix(model.RotatedAt, 0).Add(24 * 7 * time.Hour).Add(-time.Second)
  91. }
  92. stillGood, err = userAuthTokenService.LookupToken(stillGood.GetToken())
  93. So(err, ShouldBeNil)
  94. So(stillGood, ShouldNotBeNil)
  95. })
  96. Convey("when rotated_at is 7:00:00 ago should not find token", func() {
  97. getTime = func() time.Time {
  98. return time.Unix(model.RotatedAt, 0).Add(24 * 7 * time.Hour)
  99. }
  100. notGood, err := userAuthTokenService.LookupToken(userToken.GetToken())
  101. So(err, ShouldEqual, ErrAuthTokenNotFound)
  102. So(notGood, ShouldBeNil)
  103. })
  104. Convey("when rotated_at is 5 days ago and created_at is 29 days and 23:59:59 ago should not find token", func() {
  105. updated, err := ctx.updateRotatedAt(model.Id, time.Unix(model.CreatedAt, 0).Add(24*25*time.Hour).Unix())
  106. So(err, ShouldBeNil)
  107. So(updated, ShouldBeTrue)
  108. getTime = func() time.Time {
  109. return time.Unix(model.CreatedAt, 0).Add(24 * 30 * time.Hour).Add(-time.Second)
  110. }
  111. stillGood, err = userAuthTokenService.LookupToken(stillGood.GetToken())
  112. So(err, ShouldBeNil)
  113. So(stillGood, ShouldNotBeNil)
  114. })
  115. Convey("when rotated_at is 5 days ago and created_at is 30 days ago should not find token", func() {
  116. updated, err := ctx.updateRotatedAt(model.Id, time.Unix(model.CreatedAt, 0).Add(24*25*time.Hour).Unix())
  117. So(err, ShouldBeNil)
  118. So(updated, ShouldBeTrue)
  119. getTime = func() time.Time {
  120. return time.Unix(model.CreatedAt, 0).Add(24 * 30 * time.Hour)
  121. }
  122. notGood, err := userAuthTokenService.LookupToken(userToken.GetToken())
  123. So(err, ShouldEqual, ErrAuthTokenNotFound)
  124. So(notGood, ShouldBeNil)
  125. })
  126. })
  127. Convey("can properly rotate tokens", func() {
  128. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  129. So(err, ShouldBeNil)
  130. model, err := extractModelFromToken(userToken)
  131. So(err, ShouldBeNil)
  132. So(model, ShouldNotBeNil)
  133. prevToken := model.AuthToken
  134. unhashedPrev := model.UnhashedToken
  135. rotated, err := userAuthTokenService.TryRotateToken(userToken, "192.168.10.12:1234", "a new user agent")
  136. So(err, ShouldBeNil)
  137. So(rotated, ShouldBeFalse)
  138. updated, err := ctx.markAuthTokenAsSeen(model.Id)
  139. So(err, ShouldBeNil)
  140. So(updated, ShouldBeTrue)
  141. model, err = ctx.getAuthTokenByID(model.Id)
  142. So(err, ShouldBeNil)
  143. tok, err := model.toUserToken()
  144. So(err, ShouldBeNil)
  145. getTime = func() time.Time {
  146. return t.Add(time.Hour)
  147. }
  148. rotated, err = userAuthTokenService.TryRotateToken(tok, "192.168.10.12:1234", "a new user agent")
  149. So(err, ShouldBeNil)
  150. So(rotated, ShouldBeTrue)
  151. unhashedToken := model.UnhashedToken
  152. model, err = ctx.getAuthTokenByID(model.Id)
  153. So(err, ShouldBeNil)
  154. model.UnhashedToken = unhashedToken
  155. So(model.RotatedAt, ShouldEqual, getTime().Unix())
  156. So(model.ClientIp, ShouldEqual, "192.168.10.12")
  157. So(model.UserAgent, ShouldEqual, "a new user agent")
  158. So(model.AuthTokenSeen, ShouldBeFalse)
  159. So(model.SeenAt, ShouldEqual, 0)
  160. So(model.PrevAuthToken, ShouldEqual, prevToken)
  161. // ability to auth using an old token
  162. lookedUpUserToken, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  163. So(err, ShouldBeNil)
  164. lookedUpModel, err := extractModelFromToken(lookedUpUserToken)
  165. So(err, ShouldBeNil)
  166. So(lookedUpModel, ShouldNotBeNil)
  167. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  168. So(lookedUpModel.SeenAt, ShouldEqual, getTime().Unix())
  169. lookedUpUserToken, err = userAuthTokenService.LookupToken(unhashedPrev)
  170. So(err, ShouldBeNil)
  171. So(lookedUpModel, ShouldNotBeNil)
  172. So(lookedUpModel.Id, ShouldEqual, model.Id)
  173. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  174. getTime = func() time.Time {
  175. return t.Add(time.Hour + (2 * time.Minute))
  176. }
  177. lookedUpUserToken, err = userAuthTokenService.LookupToken(unhashedPrev)
  178. So(err, ShouldBeNil)
  179. lookedUpModel, err = extractModelFromToken(lookedUpUserToken)
  180. So(err, ShouldBeNil)
  181. So(lookedUpModel, ShouldNotBeNil)
  182. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  183. lookedUpModel, err = ctx.getAuthTokenByID(lookedUpModel.Id)
  184. So(err, ShouldBeNil)
  185. So(lookedUpModel, ShouldNotBeNil)
  186. So(lookedUpModel.AuthTokenSeen, ShouldBeFalse)
  187. rotated, err = userAuthTokenService.TryRotateToken(userToken, "192.168.10.12:1234", "a new user agent")
  188. So(err, ShouldBeNil)
  189. So(rotated, ShouldBeTrue)
  190. model, err = ctx.getAuthTokenByID(model.Id)
  191. So(err, ShouldBeNil)
  192. So(model, ShouldNotBeNil)
  193. So(model.SeenAt, ShouldEqual, 0)
  194. })
  195. Convey("keeps prev token valid for 1 minute after it is confirmed", func() {
  196. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  197. So(err, ShouldBeNil)
  198. model, err := extractModelFromToken(userToken)
  199. So(err, ShouldBeNil)
  200. So(model, ShouldNotBeNil)
  201. lookedUpUserToken, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  202. So(err, ShouldBeNil)
  203. So(lookedUpUserToken, ShouldNotBeNil)
  204. getTime = func() time.Time {
  205. return t.Add(10 * time.Minute)
  206. }
  207. prevToken := model.UnhashedToken
  208. rotated, err := userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  209. So(err, ShouldBeNil)
  210. So(rotated, ShouldBeTrue)
  211. getTime = func() time.Time {
  212. return t.Add(20 * time.Minute)
  213. }
  214. currentUserToken, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  215. So(err, ShouldBeNil)
  216. So(currentUserToken, ShouldNotBeNil)
  217. prevUserToken, err := userAuthTokenService.LookupToken(prevToken)
  218. So(err, ShouldBeNil)
  219. So(prevUserToken, ShouldNotBeNil)
  220. })
  221. Convey("will not mark token unseen when prev and current are the same", func() {
  222. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  223. So(err, ShouldBeNil)
  224. model, err := extractModelFromToken(userToken)
  225. So(err, ShouldBeNil)
  226. So(model, ShouldNotBeNil)
  227. lookedUpUserToken, err := userAuthTokenService.LookupToken(model.UnhashedToken)
  228. So(err, ShouldBeNil)
  229. lookedUpModel, err := extractModelFromToken(lookedUpUserToken)
  230. So(err, ShouldBeNil)
  231. So(lookedUpModel, ShouldNotBeNil)
  232. lookedUpUserToken, err = userAuthTokenService.LookupToken(model.UnhashedToken)
  233. So(err, ShouldBeNil)
  234. lookedUpModel, err = extractModelFromToken(lookedUpUserToken)
  235. So(err, ShouldBeNil)
  236. So(lookedUpModel, ShouldNotBeNil)
  237. lookedUpModel, err = ctx.getAuthTokenByID(lookedUpModel.Id)
  238. So(err, ShouldBeNil)
  239. So(lookedUpModel, ShouldNotBeNil)
  240. So(lookedUpModel.AuthTokenSeen, ShouldBeTrue)
  241. })
  242. Convey("Rotate token", func() {
  243. userToken, err := userAuthTokenService.CreateToken(userID, "192.168.10.11:1234", "some user agent")
  244. So(err, ShouldBeNil)
  245. model, err := extractModelFromToken(userToken)
  246. So(err, ShouldBeNil)
  247. So(model, ShouldNotBeNil)
  248. prevToken := model.AuthToken
  249. Convey("Should rotate current token and previous token when auth token seen", func() {
  250. updated, err := ctx.markAuthTokenAsSeen(model.Id)
  251. So(err, ShouldBeNil)
  252. So(updated, ShouldBeTrue)
  253. getTime = func() time.Time {
  254. return t.Add(10 * time.Minute)
  255. }
  256. rotated, err := userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  257. So(err, ShouldBeNil)
  258. So(rotated, ShouldBeTrue)
  259. storedToken, err := ctx.getAuthTokenByID(model.Id)
  260. So(err, ShouldBeNil)
  261. So(storedToken, ShouldNotBeNil)
  262. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  263. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  264. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  265. prevToken = storedToken.AuthToken
  266. updated, err = ctx.markAuthTokenAsSeen(model.Id)
  267. So(err, ShouldBeNil)
  268. So(updated, ShouldBeTrue)
  269. getTime = func() time.Time {
  270. return t.Add(20 * time.Minute)
  271. }
  272. rotated, err = userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  273. So(err, ShouldBeNil)
  274. So(rotated, ShouldBeTrue)
  275. storedToken, err = ctx.getAuthTokenByID(model.Id)
  276. So(err, ShouldBeNil)
  277. So(storedToken, ShouldNotBeNil)
  278. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  279. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  280. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  281. })
  282. Convey("Should rotate current token, but keep previous token when auth token not seen", func() {
  283. model.RotatedAt = getTime().Add(-2 * time.Minute).Unix()
  284. getTime = func() time.Time {
  285. return t.Add(2 * time.Minute)
  286. }
  287. rotated, err := userAuthTokenService.TryRotateToken(userToken, "1.1.1.1", "firefox")
  288. So(err, ShouldBeNil)
  289. So(rotated, ShouldBeTrue)
  290. storedToken, err := ctx.getAuthTokenByID(model.Id)
  291. So(err, ShouldBeNil)
  292. So(storedToken, ShouldNotBeNil)
  293. So(storedToken.AuthTokenSeen, ShouldBeFalse)
  294. So(storedToken.PrevAuthToken, ShouldEqual, prevToken)
  295. So(storedToken.AuthToken, ShouldNotEqual, prevToken)
  296. })
  297. })
  298. Reset(func() {
  299. getTime = time.Now
  300. })
  301. })
  302. }
  303. func createTestContext(t *testing.T) *testContext {
  304. t.Helper()
  305. sqlstore := sqlstore.InitTestDB(t)
  306. tokenService := &UserAuthTokenServiceImpl{
  307. SQLStore: sqlstore,
  308. Cfg: &setting.Cfg{
  309. LoginMaxInactiveLifetimeDays: 7,
  310. LoginMaxLifetimeDays: 30,
  311. TokenRotationIntervalMinutes: 10,
  312. ExpiredTokensCleanupIntervalDays: 1,
  313. },
  314. log: log.New("test-logger"),
  315. }
  316. return &testContext{
  317. sqlstore: sqlstore,
  318. tokenService: tokenService,
  319. }
  320. }
  321. type testContext struct {
  322. sqlstore *sqlstore.SqlStore
  323. tokenService *UserAuthTokenServiceImpl
  324. }
  325. func (c *testContext) getAuthTokenByID(id int64) (*userAuthToken, error) {
  326. sess := c.sqlstore.NewSession()
  327. var t userAuthToken
  328. found, err := sess.ID(id).Get(&t)
  329. if err != nil || !found {
  330. return nil, err
  331. }
  332. return &t, nil
  333. }
  334. func (c *testContext) markAuthTokenAsSeen(id int64) (bool, error) {
  335. sess := c.sqlstore.NewSession()
  336. res, err := sess.Exec("UPDATE user_auth_token SET auth_token_seen = ? WHERE id = ?", c.sqlstore.Dialect.BooleanStr(true), id)
  337. if err != nil {
  338. return false, err
  339. }
  340. rowsAffected, err := res.RowsAffected()
  341. if err != nil {
  342. return false, err
  343. }
  344. return rowsAffected == 1, nil
  345. }
  346. func (c *testContext) updateRotatedAt(id, rotatedAt int64) (bool, error) {
  347. sess := c.sqlstore.NewSession()
  348. res, err := sess.Exec("UPDATE user_auth_token SET rotated_at = ? WHERE id = ?", rotatedAt, id)
  349. if err != nil {
  350. return false, err
  351. }
  352. rowsAffected, err := res.RowsAffected()
  353. if err != nil {
  354. return false, err
  355. }
  356. return rowsAffected == 1, nil
  357. }