2
0

user_test.go.bak 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. package main
  2. import (
  3. "encoding/json"
  4. "io/ioutil"
  5. "net/http"
  6. "testing"
  7. "github.com/gravitl/netmaker/models"
  8. "github.com/stretchr/testify/assert"
  9. )
  10. func TestAdminCreation(t *testing.T) {
  11. var admin models.UserAuthParams
  12. var user models.User
  13. admin.UserName = "admin"
  14. admin.Password = "password"
  15. t.Run("AdminCreationSuccess", func(t *testing.T) {
  16. if adminExists(t) {
  17. deleteAdmin(t)
  18. }
  19. response, err := api(t, admin, http.MethodPost, "http://localhost:8081/api/users/adm/createadmin", "")
  20. assert.Nil(t, err, err)
  21. defer response.Body.Close()
  22. err = json.NewDecoder(response.Body).Decode(&user)
  23. assert.Nil(t, err, err)
  24. assert.Equal(t, admin.UserName, user.UserName)
  25. assert.Equal(t, true, user.IsAdmin)
  26. assert.Equal(t, http.StatusOK, response.StatusCode)
  27. assert.True(t, adminExists(t), "Admin creation failed")
  28. })
  29. t.Run("AdminCreationFailure", func(t *testing.T) {
  30. if !adminExists(t) {
  31. addAdmin(t)
  32. }
  33. response, err := api(t, admin, http.MethodPost, "http://localhost:8081/api/users/adm/createadmin", "")
  34. assert.Nil(t, err, err)
  35. defer response.Body.Close()
  36. var message models.ErrorResponse
  37. err = json.NewDecoder(response.Body).Decode(&message)
  38. assert.Nil(t, err, err)
  39. assert.Equal(t, http.StatusBadRequest, response.StatusCode)
  40. assert.Contains(t, message.Message, "Admin already Exists")
  41. })
  42. }
  43. func TestGetUser(t *testing.T) {
  44. if !adminExists(t) {
  45. addAdmin(t)
  46. }
  47. t.Run("GetUserWithValidToken", func(t *testing.T) {
  48. token, err := authenticate(t)
  49. assert.Nil(t, err, err)
  50. response, err := api(t, "", http.MethodGet, "http://localhost:8081/api/users/admin", token)
  51. assert.Nil(t, err, err)
  52. defer response.Body.Close()
  53. var user models.User
  54. json.NewDecoder(response.Body).Decode(&user)
  55. assert.Equal(t, http.StatusOK, response.StatusCode)
  56. assert.Equal(t, "admin", user.UserName)
  57. assert.Equal(t, true, user.IsAdmin)
  58. })
  59. t.Run("GetUserWithInvalidToken", func(t *testing.T) {
  60. response, err := api(t, "", http.MethodGet, "http://localhost:8081/api/users/admin", "badkey")
  61. assert.Nil(t, err, err)
  62. defer response.Body.Close()
  63. var message models.ErrorResponse
  64. err = json.NewDecoder(response.Body).Decode(&message)
  65. assert.Nil(t, err, err)
  66. assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
  67. assert.Equal(t, http.StatusUnauthorized, message.Code)
  68. assert.Contains(t, message.Message, "Error Verifying Auth Token")
  69. })
  70. }
  71. func TestUpdateUser(t *testing.T) {
  72. deleteAdmin(t)
  73. if !adminExists(t) {
  74. addAdmin(t)
  75. }
  76. token, err := authenticate(t)
  77. assert.Nil(t, err, err)
  78. var admin models.UserAuthParams
  79. var user models.User
  80. var message models.ErrorResponse
  81. t.Run("UpdateWrongToken", func(t *testing.T) {
  82. admin.UserName = "admin"
  83. admin.Password = "admin"
  84. response, err := api(t, admin, http.MethodPut, "http://localhost:8081/api/users/admin", "badkey")
  85. assert.Nil(t, err, err)
  86. defer response.Body.Close()
  87. err = json.NewDecoder(response.Body).Decode(&message)
  88. assert.Nil(t, err, err)
  89. assert.Equal(t, "Error Verifying Auth Token", message.Message)
  90. assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
  91. })
  92. t.Run("UpdateSuccess", func(t *testing.T) {
  93. admin.UserName = "admin"
  94. admin.Password = "password"
  95. response, err := api(t, admin, http.MethodPut, "http://localhost:8081/api/users/admin", token)
  96. assert.Nil(t, err, err)
  97. defer response.Body.Close()
  98. err = json.NewDecoder(response.Body).Decode(&user)
  99. assert.Nil(t, err, err)
  100. assert.Equal(t, admin.UserName, user.UserName)
  101. assert.Equal(t, true, user.IsAdmin)
  102. assert.Equal(t, http.StatusOK, response.StatusCode)
  103. })
  104. t.Run("ShortPassword", func(t *testing.T) {
  105. admin.UserName = "user"
  106. admin.Password = "123"
  107. response, err := api(t, admin, http.MethodPut, "http://localhost:8081/api/users/admin", token)
  108. assert.Nil(t, err, err)
  109. defer response.Body.Close()
  110. message, err := ioutil.ReadAll(response.Body)
  111. assert.Nil(t, err, err)
  112. assert.Contains(t, string(message), "Field validation for 'Password' failed")
  113. assert.Equal(t, http.StatusBadRequest, response.StatusCode)
  114. })
  115. }
  116. func TestDeleteUser(t *testing.T) {
  117. if !adminExists(t) {
  118. t.Log("Creating Admin")
  119. addAdmin(t)
  120. }
  121. token, err := authenticate(t)
  122. assert.Nil(t, err, err)
  123. t.Run("DeleteUser-InvalidCredentials", func(t *testing.T) {
  124. response, err := api(t, "", http.MethodDelete, "http://localhost:8081/api/users/admin", "badcredentials")
  125. assert.Nil(t, err, err)
  126. assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
  127. var message models.ErrorResponse
  128. json.NewDecoder(response.Body).Decode(&message)
  129. assert.Equal(t, "Error Verifying Auth Token", message.Message)
  130. assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
  131. })
  132. t.Run("DeleteUser-ValidCredentials", func(t *testing.T) {
  133. response, err := api(t, "", http.MethodDelete, "http://localhost:8081/api/users/admin", token)
  134. assert.Nil(t, err, err)
  135. var body string
  136. json.NewDecoder(response.Body).Decode(&body)
  137. assert.Equal(t, "admin deleted.", body)
  138. assert.Equal(t, http.StatusOK, response.StatusCode)
  139. })
  140. t.Run("DeleteUser-NonExistantAdmin", func(t *testing.T) {
  141. response, err := api(t, "", http.MethodDelete, "http://localhost:8081/api/users/admin", token)
  142. assert.Nil(t, err, err)
  143. assert.Equal(t, http.StatusBadRequest, response.StatusCode)
  144. var message models.ErrorResponse
  145. defer response.Body.Close()
  146. json.NewDecoder(response.Body).Decode(&message)
  147. assert.Equal(t, http.StatusBadRequest, message.Code)
  148. assert.Equal(t, "Delete unsuccessful.", message.Message)
  149. })
  150. }
  151. func TestAuthenticateUser(t *testing.T) {
  152. cases := []AuthorizeTestCase{
  153. AuthorizeTestCase{
  154. testname: "Invalid User",
  155. name: "invaliduser",
  156. password: "password",
  157. code: http.StatusBadRequest,
  158. tokenExpected: false,
  159. errMessage: "User invaliduser not found",
  160. },
  161. AuthorizeTestCase{
  162. testname: "empty user",
  163. name: "",
  164. password: "password",
  165. code: http.StatusBadRequest,
  166. tokenExpected: false,
  167. errMessage: "Username can't be empty",
  168. },
  169. AuthorizeTestCase{
  170. testname: "empty password",
  171. name: "admin",
  172. password: "",
  173. code: http.StatusBadRequest,
  174. tokenExpected: false,
  175. errMessage: "Password can't be empty",
  176. },
  177. AuthorizeTestCase{
  178. testname: "Invalid Password",
  179. name: "admin",
  180. password: "xxxxxxx",
  181. code: http.StatusBadRequest,
  182. tokenExpected: false,
  183. errMessage: "Incorrect Credentials",
  184. },
  185. AuthorizeTestCase{
  186. testname: "Valid User",
  187. name: "admin",
  188. password: "password",
  189. code: http.StatusOK,
  190. tokenExpected: true,
  191. errMessage: "W1R3: Device Admin Authorized",
  192. },
  193. }
  194. if !adminExists(t) {
  195. addAdmin(t)
  196. }
  197. for _, tc := range cases {
  198. t.Run(tc.testname, func(t *testing.T) {
  199. var admin models.UserAuthParams
  200. admin.UserName = tc.name
  201. admin.Password = tc.password
  202. response, err := api(t, admin, http.MethodPost, "http://localhost:8081/api/users/adm/authenticate", "secretkey")
  203. assert.Nil(t, err, err)
  204. defer response.Body.Close()
  205. if tc.tokenExpected {
  206. var body Success
  207. err = json.NewDecoder(response.Body).Decode(&body)
  208. assert.Nil(t, err, err)
  209. assert.NotEmpty(t, body.Response.AuthToken, "token not returned")
  210. assert.Equal(t, "W1R3: Device admin Authorized", body.Message)
  211. } else {
  212. var bad models.ErrorResponse
  213. json.NewDecoder(response.Body).Decode(&bad)
  214. assert.Equal(t, tc.errMessage, bad.Message)
  215. }
  216. assert.Equal(t, tc.code, response.StatusCode)
  217. })
  218. }
  219. }