user_test.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435
  1. package controller
  2. import (
  3. "bytes"
  4. "github.com/go-jose/go-jose/v3/json"
  5. "github.com/gorilla/mux"
  6. "io"
  7. "net/http"
  8. "net/http/httptest"
  9. "testing"
  10. "github.com/stretchr/testify/assert"
  11. "github.com/gravitl/netmaker/logic"
  12. "github.com/gravitl/netmaker/models"
  13. )
  14. func deleteAllUsers(t *testing.T) {
  15. t.Helper()
  16. users, _ := logic.GetUsers()
  17. for _, user := range users {
  18. if _, err := logic.DeleteUser(user.UserName); err != nil {
  19. t.Fatal(err)
  20. }
  21. }
  22. }
  23. func TestGetUserNoHashedPassword(t *testing.T) {
  24. // prepare existing user base
  25. user := models.User{UserName: "freddie", Password: "password"}
  26. haveOnlyOneUser(t, user)
  27. // prepare request
  28. rec, req := prepareUserRequest(t, models.User{}, user.UserName)
  29. // test response
  30. getUser(rec, req)
  31. assertUserNameButNoPassword(t, rec.Body, user.UserName)
  32. }
  33. func TestCreateAdminNoHashedPassword(t *testing.T) {
  34. // prepare existing user base
  35. deleteAllUsers(t)
  36. // prepare request
  37. user := models.User{UserName: "jonathan", Password: "password"}
  38. rec, req := prepareUserRequest(t, user, "")
  39. // test response
  40. createAdmin(rec, req)
  41. assertUserNameButNoPassword(t, rec.Body, user.UserName)
  42. }
  43. func TestCreateUserNoHashedPassword(t *testing.T) {
  44. // prepare existing user base
  45. deleteAllUsers(t)
  46. // prepare request
  47. user := models.User{UserName: "jonathan", Password: "password"}
  48. rec, req := prepareUserRequest(t, user, "")
  49. // test response
  50. createUser(rec, req)
  51. assertUserNameButNoPassword(t, rec.Body, user.UserName)
  52. }
  53. func TestUpdateUserNetworksNoHashedPassword(t *testing.T) {
  54. // prepare existing user base
  55. user1 := models.User{UserName: "joestar", Password: "jonathan"}
  56. haveOnlyOneUser(t, user1)
  57. // prepare request
  58. user2 := models.User{UserName: "joestar", Password: "joseph"}
  59. rec, req := prepareUserRequest(t, user2, user1.UserName)
  60. // test response
  61. updateUserNetworks(rec, req)
  62. assertUserNameButNoPassword(t, rec.Body, user1.UserName)
  63. }
  64. func TestUpdateUserNoHashedPassword(t *testing.T) {
  65. // prepare existing user base
  66. user1 := models.User{UserName: "dio", Password: "brando"}
  67. haveOnlyOneUser(t, user1)
  68. // prepare request
  69. user2 := models.User{UserName: "giorno", Password: "giovanna"}
  70. rec, req := prepareUserRequest(t, user2, user1.UserName)
  71. // mock the jwt verification
  72. oldVerify := verifyJWT
  73. verifyJWT = func(bearerToken string) (username string, networks []string, isadmin bool, err error) {
  74. return user1.UserName, user1.Networks, user1.IsAdmin, nil
  75. }
  76. defer func() { verifyJWT = oldVerify }()
  77. // test response
  78. updateUser(rec, req)
  79. assertUserNameButNoPassword(t, rec.Body, user2.UserName)
  80. }
  81. func TestUpdateUserAdmNoHashedPassword(t *testing.T) {
  82. // prepare existing user base
  83. user1 := models.User{UserName: "dio", Password: "brando", IsAdmin: true}
  84. haveOnlyOneUser(t, user1)
  85. // prepare request
  86. user2 := models.User{UserName: "giorno", Password: "giovanna"}
  87. rec, req := prepareUserRequest(t, user2, user1.UserName)
  88. // test response
  89. updateUserAdm(rec, req)
  90. assertUserNameButNoPassword(t, rec.Body, user2.UserName)
  91. }
  92. func prepareUserRequest(t *testing.T, userForBody models.User, userNameForParam string) (*httptest.ResponseRecorder, *http.Request) {
  93. bits, err := json.Marshal(userForBody)
  94. assert.Nil(t, err)
  95. body := bytes.NewReader(bits)
  96. rec := httptest.NewRecorder()
  97. req := httptest.NewRequest("ANY", "https://example.com", body) // only the body matters here
  98. req = mux.SetURLVars(req, map[string]string{"username": userNameForParam})
  99. return rec, req
  100. }
  101. func haveOnlyOneUser(t *testing.T, user models.User) {
  102. deleteAllUsers(t)
  103. var err error
  104. if user.IsAdmin {
  105. err = logic.CreateAdmin(&user)
  106. } else {
  107. err = logic.CreateUser(&user)
  108. }
  109. assert.Nil(t, err)
  110. }
  111. func assertUserNameButNoPassword(t *testing.T, r io.Reader, userName string) {
  112. var resp models.User
  113. err := json.NewDecoder(r).Decode(&resp)
  114. assert.Nil(t, err)
  115. assert.Equal(t, userName, resp.UserName)
  116. assert.Empty(t, resp.Password)
  117. }
  118. func TestHasAdmin(t *testing.T) {
  119. // delete all current users
  120. users, _ := logic.GetUsers()
  121. for _, user := range users {
  122. success, err := logic.DeleteUser(user.UserName)
  123. assert.Nil(t, err)
  124. assert.True(t, success)
  125. }
  126. t.Run("NoUser", func(t *testing.T) {
  127. found, err := logic.HasAdmin()
  128. assert.Nil(t, err)
  129. assert.False(t, found)
  130. })
  131. t.Run("No admin user", func(t *testing.T) {
  132. var user = models.User{UserName: "noadmin", Password: "password"}
  133. err := logic.CreateUser(&user)
  134. assert.Nil(t, err)
  135. found, err := logic.HasAdmin()
  136. assert.Nil(t, err)
  137. assert.False(t, found)
  138. })
  139. t.Run("admin user", func(t *testing.T) {
  140. var user = models.User{UserName: "admin", Password: "password", IsAdmin: true}
  141. err := logic.CreateUser(&user)
  142. assert.Nil(t, err)
  143. found, err := logic.HasAdmin()
  144. assert.Nil(t, err)
  145. assert.True(t, found)
  146. })
  147. t.Run("multiple admins", func(t *testing.T) {
  148. var user = models.User{UserName: "admin1", Password: "password", IsAdmin: true}
  149. err := logic.CreateUser(&user)
  150. assert.Nil(t, err)
  151. found, err := logic.HasAdmin()
  152. assert.Nil(t, err)
  153. assert.True(t, found)
  154. })
  155. }
  156. func TestCreateUser(t *testing.T) {
  157. deleteAllUsers(t)
  158. user := models.User{UserName: "admin", Password: "password", IsAdmin: true}
  159. t.Run("NoUser", func(t *testing.T) {
  160. err := logic.CreateUser(&user)
  161. assert.Nil(t, err)
  162. })
  163. t.Run("UserExists", func(t *testing.T) {
  164. err := logic.CreateUser(&user)
  165. assert.NotNil(t, err)
  166. assert.EqualError(t, err, "user exists")
  167. })
  168. }
  169. func TestCreateAdmin(t *testing.T) {
  170. deleteAllUsers(t)
  171. var user models.User
  172. t.Run("NoAdmin", func(t *testing.T) {
  173. user.UserName = "admin"
  174. user.Password = "password"
  175. err := logic.CreateAdmin(&user)
  176. assert.Nil(t, err)
  177. })
  178. t.Run("AdminExists", func(t *testing.T) {
  179. user.UserName = "admin2"
  180. user.Password = "password1"
  181. err := logic.CreateAdmin(&user)
  182. assert.EqualError(t, err, "admin user already exists")
  183. })
  184. }
  185. func TestDeleteUser(t *testing.T) {
  186. deleteAllUsers(t)
  187. t.Run("NonExistent User", func(t *testing.T) {
  188. deleted, err := logic.DeleteUser("admin")
  189. assert.EqualError(t, err, "user does not exist")
  190. assert.False(t, deleted)
  191. })
  192. t.Run("Existing User", func(t *testing.T) {
  193. user := models.User{UserName: "admin", Password: "password", IsAdmin: true}
  194. if err := logic.CreateUser(&user); err != nil {
  195. t.Fatal(err)
  196. }
  197. deleted, err := logic.DeleteUser("admin")
  198. assert.Nil(t, err)
  199. assert.True(t, deleted)
  200. })
  201. }
  202. func TestValidateUser(t *testing.T) {
  203. var user models.User
  204. t.Run("Valid Create", func(t *testing.T) {
  205. user.UserName = "admin"
  206. user.Password = "validpass"
  207. err := logic.ValidateUser(&user)
  208. assert.Nil(t, err)
  209. })
  210. t.Run("Valid Update", func(t *testing.T) {
  211. user.UserName = "admin"
  212. user.Password = "password"
  213. err := logic.ValidateUser(&user)
  214. assert.Nil(t, err)
  215. })
  216. t.Run("Invalid UserName", func(t *testing.T) {
  217. t.Skip()
  218. user.UserName = "*invalid"
  219. err := logic.ValidateUser(&user)
  220. assert.Error(t, err)
  221. // assert.Contains(t, err.Error(), "Field validation for 'UserName' failed")
  222. })
  223. t.Run("Short UserName", func(t *testing.T) {
  224. t.Skip()
  225. user.UserName = "1"
  226. err := logic.ValidateUser(&user)
  227. assert.NotNil(t, err)
  228. // assert.Contains(t, err.Error(), "Field validation for 'UserName' failed")
  229. })
  230. t.Run("Empty UserName", func(t *testing.T) {
  231. t.Skip()
  232. user.UserName = ""
  233. err := logic.ValidateUser(&user)
  234. assert.EqualError(t, err, "some string")
  235. // assert.Contains(t, err.Error(), "Field validation for 'UserName' failed")
  236. })
  237. t.Run("EmptyPassword", func(t *testing.T) {
  238. user.Password = ""
  239. err := logic.ValidateUser(&user)
  240. assert.EqualError(t, err, "Key: 'User.Password' Error:Field validation for 'Password' failed on the 'required' tag")
  241. })
  242. t.Run("ShortPassword", func(t *testing.T) {
  243. user.Password = "123"
  244. err := logic.ValidateUser(&user)
  245. assert.EqualError(t, err, "Key: 'User.Password' Error:Field validation for 'Password' failed on the 'min' tag")
  246. })
  247. }
  248. func TestGetUser(t *testing.T) {
  249. deleteAllUsers(t)
  250. user := models.User{UserName: "admin", Password: "password", Networks: nil, IsAdmin: true, Groups: nil}
  251. t.Run("NonExistantUser", func(t *testing.T) {
  252. admin, err := logic.GetUser("admin")
  253. assert.EqualError(t, err, "could not find any records")
  254. assert.Equal(t, "", admin.UserName)
  255. })
  256. t.Run("UserExisits", func(t *testing.T) {
  257. if err := logic.CreateUser(&user); err != nil {
  258. t.Error(err)
  259. }
  260. admin, err := logic.GetUser("admin")
  261. assert.Nil(t, err)
  262. assert.Equal(t, user.UserName, admin.UserName)
  263. })
  264. }
  265. func TestGetUsers(t *testing.T) {
  266. deleteAllUsers(t)
  267. adminUser := models.User{UserName: "admin", Password: "password", IsAdmin: true}
  268. user := models.User{UserName: "admin", Password: "password", IsAdmin: false}
  269. t.Run("NonExistantUser", func(t *testing.T) {
  270. admin, err := logic.GetUsers()
  271. assert.EqualError(t, err, "could not find any records")
  272. assert.Equal(t, []models.ReturnUser(nil), admin)
  273. })
  274. t.Run("UserExisits", func(t *testing.T) {
  275. user.UserName = "anotheruser"
  276. if err := logic.CreateUser(&adminUser); err != nil {
  277. t.Error(err)
  278. }
  279. admins, err := logic.GetUsers()
  280. assert.Nil(t, err)
  281. assert.Equal(t, adminUser.UserName, admins[0].UserName)
  282. })
  283. t.Run("MulipleUsers", func(t *testing.T) {
  284. if err := logic.CreateUser(&user); err != nil {
  285. t.Error(err)
  286. }
  287. admins, err := logic.GetUsers()
  288. assert.Nil(t, err)
  289. for _, u := range admins {
  290. if u.UserName == "admin" {
  291. assert.Equal(t, true, u.IsAdmin)
  292. } else {
  293. assert.Equal(t, user.UserName, u.UserName)
  294. assert.Equal(t, user.IsAdmin, u.IsAdmin)
  295. }
  296. }
  297. })
  298. }
  299. func TestUpdateUser(t *testing.T) {
  300. deleteAllUsers(t)
  301. user := models.User{UserName: "admin", Password: "password", IsAdmin: true}
  302. newuser := models.User{UserName: "hello", Password: "world", Networks: []string{"wirecat, netmaker"}, IsAdmin: true, Groups: []string{}}
  303. t.Run("NonExistantUser", func(t *testing.T) {
  304. admin, err := logic.UpdateUser(&newuser, &user)
  305. assert.EqualError(t, err, "could not find any records")
  306. assert.Equal(t, "", admin.UserName)
  307. })
  308. t.Run("UserExists", func(t *testing.T) {
  309. if err := logic.CreateUser(&user); err != nil {
  310. t.Error(err)
  311. }
  312. admin, err := logic.UpdateUser(&newuser, &user)
  313. assert.Nil(t, err)
  314. assert.Equal(t, newuser.UserName, admin.UserName)
  315. })
  316. }
  317. // func TestValidateUserToken(t *testing.T) {
  318. // t.Run("EmptyToken", func(t *testing.T) {
  319. // err := ValidateUserToken("", "", false)
  320. // assert.NotNil(t, err)
  321. // assert.Equal(t, "Missing Auth Token.", err.Error())
  322. // })
  323. // t.Run("InvalidToken", func(t *testing.T) {
  324. // err := ValidateUserToken("Bearer: badtoken", "", false)
  325. // assert.NotNil(t, err)
  326. // assert.Equal(t, "Error Verifying Auth Token", err.Error())
  327. // })
  328. // t.Run("InvalidUser", func(t *testing.T) {
  329. // t.Skip()
  330. // err := ValidateUserToken("Bearer: secretkey", "baduser", false)
  331. // assert.NotNil(t, err)
  332. // assert.Equal(t, "Error Verifying Auth Token", err.Error())
  333. // //need authorization
  334. // })
  335. // t.Run("ValidToken", func(t *testing.T) {
  336. // err := ValidateUserToken("Bearer: secretkey", "", true)
  337. // assert.Nil(t, err)
  338. // })
  339. // }
  340. func TestVerifyAuthRequest(t *testing.T) {
  341. deleteAllUsers(t)
  342. user := models.User{UserName: "admin", Password: "password", Networks: nil, IsAdmin: true, Groups: nil}
  343. var authRequest models.UserAuthParams
  344. t.Run("EmptyUserName", func(t *testing.T) {
  345. authRequest.UserName = ""
  346. authRequest.Password = "Password"
  347. jwt, err := logic.VerifyAuthRequest(authRequest)
  348. assert.Equal(t, "", jwt)
  349. assert.EqualError(t, err, "username can't be empty")
  350. })
  351. t.Run("EmptyPassword", func(t *testing.T) {
  352. authRequest.UserName = "admin"
  353. authRequest.Password = ""
  354. jwt, err := logic.VerifyAuthRequest(authRequest)
  355. assert.Equal(t, "", jwt)
  356. assert.EqualError(t, err, "password can't be empty")
  357. })
  358. t.Run("NonExistantUser", func(t *testing.T) {
  359. authRequest.UserName = "admin"
  360. authRequest.Password = "password"
  361. jwt, err := logic.VerifyAuthRequest(authRequest)
  362. assert.Equal(t, "", jwt)
  363. assert.EqualError(t, err, "error retrieving user from db: could not find any records")
  364. })
  365. t.Run("Non-Admin", func(t *testing.T) {
  366. user.IsAdmin = false
  367. user.Password = "somepass"
  368. user.UserName = "nonadmin"
  369. if err := logic.CreateUser(&user); err != nil {
  370. t.Error(err)
  371. }
  372. authRequest := models.UserAuthParams{UserName: "nonadmin", Password: "somepass"}
  373. jwt, err := logic.VerifyAuthRequest(authRequest)
  374. assert.NotNil(t, jwt)
  375. assert.Nil(t, err)
  376. })
  377. t.Run("WrongPassword", func(t *testing.T) {
  378. user := models.User{UserName: "admin", Password: "password", Groups: []string{}}
  379. if err := logic.CreateUser(&user); err != nil {
  380. t.Error(err)
  381. }
  382. authRequest := models.UserAuthParams{UserName: "admin", Password: "badpass"}
  383. jwt, err := logic.VerifyAuthRequest(authRequest)
  384. assert.Equal(t, "", jwt)
  385. assert.EqualError(t, err, "incorrect credentials")
  386. })
  387. t.Run("Success", func(t *testing.T) {
  388. authRequest := models.UserAuthParams{UserName: "admin", Password: "password"}
  389. jwt, err := logic.VerifyAuthRequest(authRequest)
  390. assert.Nil(t, err)
  391. assert.NotNil(t, jwt)
  392. })
  393. }