fleet/auth_test.go
Mike Arpaia 24638413c4 Endpoint integration tests (#28)
* Quick fix where JWTRenewalMiddleware wasn't saving the update session to the client

* integration tests for all user/account management HTTP endpoints

close #15

* Combine checks in CheckUser

* Moving t.Fatals into utility functions

* Simplifying get user by id or username flow

* Fixing incorrect error log message

* Simplifying checkUser compare
2016-08-02 15:39:20 -07:00

199 lines
4.2 KiB
Go

package main
import (
"net/http"
"net/http/httptest"
"testing"
"unicode/utf8"
"github.com/dgrijalva/jwt-go"
"github.com/gin-gonic/gin"
)
func TestGenerateRandomText(t *testing.T) {
text := generateRandomText(12)
if utf8.RuneCountInString(text) != 12 {
t.Fatal("generateRandomText generated the wrong length string")
}
}
func TestGenerateVC(t *testing.T) {
db, err := openTestDB()
if err != nil {
t.Fatal(err)
}
user, err := NewUser(db, "marpaia", "foobar", "mike@kolide.co", true, false)
if err != nil {
t.Fatal(err.Error())
}
tokenString, err := GenerateVC(user).JWT()
if err != nil {
t.Fatal(err.Error())
}
token, err := ParseJWT(tokenString)
if err != nil {
t.Fatal(err.Error())
}
claims, ok := token.Claims.(jwt.MapClaims)
if !ok || !token.Valid {
t.Fatal("Token is invalid")
}
userID := uint(claims["user_id"].(float64))
if userID != user.ID {
t.Fatal("Claims are incorrect. userID is %d", userID)
}
}
func TestVC(t *testing.T) {
r := createTestServer()
r.Use(testSessionMiddleware)
r.Use(JWTRenewalMiddleware)
db, err := openTestDB()
if err != nil {
t.Fatal(err.Error())
}
user, err := NewUser(db, "marpaia", "foobar", "mike@kolide.co", false, false)
if err != nil {
t.Fatal(err.Error())
}
admin, err := NewUser(db, "admin", "foobar", "admin@kolide.co", true, false)
if err != nil {
t.Fatal(err.Error())
}
r.GET("/admin_login", func(c *gin.Context) {
token, err := GenerateVC(admin).JWT()
if err != nil {
t.Fatal(err.Error())
}
session := GetSession(c)
session.Set("jwt", token)
session.Save()
c.JSON(200, nil)
})
r.GET("/user_login", func(c *gin.Context) {
token, err := GenerateVC(user).JWT()
if err != nil {
t.Fatal(err.Error())
}
session := GetSession(c)
session.Set("jwt", token)
session.Save()
c.JSON(200, nil)
})
r.GET("/admin", func(c *gin.Context) {
vc, err := VC(c, db)
if err != nil {
t.Fatal(err.Error())
}
if !vc.IsAdmin() {
t.Fatal("Not admin")
}
c.String(200, "OK")
})
r.GET("/user", func(c *gin.Context) {
vc, err := VC(c, db)
if err != nil {
t.Fatal(err.Error())
}
if vc.IsAdmin() {
t.Fatal("Not user")
}
c.String(200, "OK")
})
res1 := httptest.NewRecorder()
req1, _ := http.NewRequest("GET", "/admin_login", nil)
r.ServeHTTP(res1, req1)
res2 := httptest.NewRecorder()
req2, _ := http.NewRequest("GET", "/admin", nil)
req2.Header.Set("Cookie", res1.Header().Get("Set-Cookie"))
r.ServeHTTP(res2, req2)
res3 := httptest.NewRecorder()
req3, _ := http.NewRequest("GET", "/user_login", nil)
r.ServeHTTP(res3, req3)
res4 := httptest.NewRecorder()
req4, _ := http.NewRequest("GET", "/user", nil)
req4.Header.Set("Cookie", res3.Header().Get("Set-Cookie"))
r.ServeHTTP(res4, req4)
}
func TestIsUserID(t *testing.T) {
db, err := openTestDB()
if err != nil {
t.Fatal(err)
}
user1, err := NewUser(db, "marpaia", "foobar", "mike@kolide.co", false, false)
if err != nil {
t.Fatal(err.Error())
}
vc := GenerateVC(user1)
if !vc.IsUserID(user1.ID) {
t.Fatal("IsUserID failed on same user object")
}
if vc.IsUserID(user1.ID + 1) {
t.Fatal("IsUserID passed for incorrect ID")
}
}
func TestCanPerformActionsOnUser(t *testing.T) {
db, err := openTestDB()
if err != nil {
t.Fatal(err)
}
user1, err := NewUser(db, "marpaia", "foobar", "mike@kolide.co", false, false)
if err != nil {
t.Fatal(err.Error())
}
user2, err := NewUser(db, "zwass", "foobar", "zwass@kolide.co", false, false)
if err != nil {
t.Fatal(err.Error())
}
admin, err := NewUser(db, "admin", "foobar", "admin@kolide.co", true, false)
if err != nil {
t.Fatal(err.Error())
}
adminVC := GenerateVC(admin)
user1VC := GenerateVC(user1)
if !adminVC.CanPerformWriteActionOnUser(user1) || !adminVC.CanPerformWriteActionOnUser(user2) {
t.Fatal("Admin should be able to perform writes on users")
}
if !adminVC.CanPerformReadActionOnUser(user1) || !adminVC.CanPerformReadActionOnUser(user2) {
t.Fatal("Admin should be able to perform reads on users")
}
if user1VC.CanPerformWriteActionOnUser(user2) {
t.Fatal("user1 shouldn't be able to perform writes on user2")
}
if !user1VC.CanPerformReadActionOnUser(user2) {
t.Fatal("user1 should be able to perform reads on user2")
}
}