middleware_basic_auth_test.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. package middleware
  2. import (
  3. "encoding/json"
  4. "testing"
  5. . "github.com/smartystreets/goconvey/convey"
  6. "github.com/grafana/grafana/pkg/bus"
  7. authLogin "github.com/grafana/grafana/pkg/login"
  8. "github.com/grafana/grafana/pkg/models"
  9. "github.com/grafana/grafana/pkg/setting"
  10. "github.com/grafana/grafana/pkg/util"
  11. )
  12. func TestMiddlewareBasicAuth(t *testing.T) {
  13. Convey("Given the basic auth", t, func() {
  14. var oldBasicAuthEnabled = setting.BasicAuthEnabled
  15. var oldDisableBruteForceLoginProtection = setting.DisableBruteForceLoginProtection
  16. var id int64 = 12
  17. Convey("Setup", func() {
  18. setting.BasicAuthEnabled = true
  19. setting.DisableBruteForceLoginProtection = true
  20. bus.ClearBusHandlers()
  21. })
  22. middlewareScenario(t, "Valid API key", func(sc *scenarioContext) {
  23. var orgID int64 = 2
  24. keyhash := util.EncodePassword("v5nAwpMafFP6znaS4urhdWDLS5511M42", "asd")
  25. bus.AddHandler("test", func(query *models.GetApiKeyByNameQuery) error {
  26. query.Result = &models.ApiKey{OrgId: orgID, Role: models.ROLE_EDITOR, Key: keyhash}
  27. return nil
  28. })
  29. authHeader := util.GetBasicAuthHeader("api_key", "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9")
  30. sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
  31. Convey("Should return 200", func() {
  32. So(sc.resp.Code, ShouldEqual, 200)
  33. })
  34. Convey("Should init middleware context", func() {
  35. So(sc.context.IsSignedIn, ShouldEqual, true)
  36. So(sc.context.OrgId, ShouldEqual, orgID)
  37. So(sc.context.OrgRole, ShouldEqual, models.ROLE_EDITOR)
  38. })
  39. })
  40. middlewareScenario(t, "Handle auth", func(sc *scenarioContext) {
  41. var password = "MyPass"
  42. var salt = "Salt"
  43. var orgID int64 = 2
  44. bus.AddHandler("grafana-auth", func(query *models.LoginUserQuery) error {
  45. query.User = &models.User{
  46. Password: util.EncodePassword(password, salt),
  47. Salt: salt,
  48. }
  49. return nil
  50. })
  51. bus.AddHandler("get-sign-user", func(query *models.GetSignedInUserQuery) error {
  52. query.Result = &models.SignedInUser{OrgId: orgID, UserId: id}
  53. return nil
  54. })
  55. authHeader := util.GetBasicAuthHeader("myUser", password)
  56. sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
  57. Convey("Should init middleware context with users", func() {
  58. So(sc.context.IsSignedIn, ShouldEqual, true)
  59. So(sc.context.OrgId, ShouldEqual, orgID)
  60. So(sc.context.UserId, ShouldEqual, id)
  61. })
  62. bus.ClearBusHandlers()
  63. })
  64. middlewareScenario(t, "Auth sequence", func(sc *scenarioContext) {
  65. var password = "MyPass"
  66. var salt = "Salt"
  67. authLogin.Init()
  68. bus.AddHandler("user-query", func(query *models.GetUserByLoginQuery) error {
  69. query.Result = &models.User{
  70. Password: util.EncodePassword(password, salt),
  71. Id: id,
  72. Salt: salt,
  73. }
  74. return nil
  75. })
  76. bus.AddHandler("get-sign-user", func(query *models.GetSignedInUserQuery) error {
  77. query.Result = &models.SignedInUser{UserId: query.UserId}
  78. return nil
  79. })
  80. authHeader := util.GetBasicAuthHeader("myUser", password)
  81. sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
  82. Convey("Should init middleware context with user", func() {
  83. So(sc.context.IsSignedIn, ShouldEqual, true)
  84. So(sc.context.UserId, ShouldEqual, id)
  85. })
  86. })
  87. middlewareScenario(t, "Should return error if user is not found", func(sc *scenarioContext) {
  88. sc.fakeReq("GET", "/")
  89. sc.req.SetBasicAuth("user", "password")
  90. sc.exec()
  91. err := json.NewDecoder(sc.resp.Body).Decode(&sc.respJson)
  92. So(err, ShouldNotBeNil)
  93. So(sc.resp.Code, ShouldEqual, 401)
  94. So(sc.respJson["message"], ShouldEqual, errStringInvalidUsernamePassword)
  95. })
  96. middlewareScenario(t, "Should return error if user & password do not match", func(sc *scenarioContext) {
  97. bus.AddHandler("user-query", func(loginUserQuery *models.GetUserByLoginQuery) error {
  98. return nil
  99. })
  100. sc.fakeReq("GET", "/")
  101. sc.req.SetBasicAuth("killa", "gorilla")
  102. sc.exec()
  103. err := json.NewDecoder(sc.resp.Body).Decode(&sc.respJson)
  104. So(err, ShouldNotBeNil)
  105. So(sc.resp.Code, ShouldEqual, 401)
  106. So(sc.respJson["message"], ShouldEqual, errStringInvalidUsernamePassword)
  107. })
  108. Convey("Destroy", func() {
  109. setting.BasicAuthEnabled = oldBasicAuthEnabled
  110. setting.DisableBruteForceLoginProtection = oldDisableBruteForceLoginProtection
  111. })
  112. })
  113. }