2021-12-25 02:16:58 +01:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
2022-06-19 21:56:10 +02:00
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
2021-12-25 02:16:58 +01:00
|
|
|
"fmt"
|
2022-06-19 21:56:10 +02:00
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"strings"
|
2021-12-25 02:16:58 +01:00
|
|
|
"testing"
|
2022-06-22 17:17:09 +02:00
|
|
|
|
|
|
|
"orblivion/lbry-id/auth"
|
|
|
|
"orblivion/lbry-id/store"
|
|
|
|
"orblivion/lbry-id/wallet"
|
2021-12-25 02:16:58 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Implementing interfaces for stubbed out packages
|
|
|
|
|
|
|
|
type TestAuth struct {
|
2022-06-21 17:52:03 +02:00
|
|
|
TestNewTokenString auth.TokenString
|
|
|
|
FailGenToken bool
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-07 19:25:14 +02:00
|
|
|
func (a *TestAuth) NewToken(userId auth.UserId, deviceId auth.DeviceId, scope auth.AuthScope) (*auth.AuthToken, error) {
|
2021-12-25 02:16:58 +01:00
|
|
|
if a.FailGenToken {
|
|
|
|
return nil, fmt.Errorf("Test error: fail to generate token")
|
|
|
|
}
|
2022-06-21 17:52:03 +02:00
|
|
|
return &auth.AuthToken{Token: a.TestNewTokenString, UserId: userId, DeviceId: deviceId, Scope: scope}, nil
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-21 22:59:20 +02:00
|
|
|
type SetWalletCall struct {
|
|
|
|
EncryptedWallet wallet.EncryptedWallet
|
|
|
|
Sequence wallet.Sequence
|
|
|
|
Hmac wallet.WalletHmac
|
|
|
|
}
|
|
|
|
|
2022-06-21 00:10:54 +02:00
|
|
|
// Whether functions are called, and sometimes what they're called with
|
2022-06-19 22:40:16 +02:00
|
|
|
type TestStoreFunctionsCalled struct {
|
2022-06-21 00:10:54 +02:00
|
|
|
SaveToken auth.TokenString
|
|
|
|
GetToken auth.TokenString
|
2022-06-17 18:52:17 +02:00
|
|
|
GetUserId bool
|
|
|
|
CreateAccount bool
|
2022-06-21 22:59:20 +02:00
|
|
|
SetWallet SetWalletCall
|
2022-06-17 18:52:17 +02:00
|
|
|
GetWallet bool
|
|
|
|
}
|
|
|
|
|
2022-06-19 22:40:16 +02:00
|
|
|
type TestStoreFunctionsErrors struct {
|
|
|
|
SaveToken error
|
|
|
|
GetToken error
|
|
|
|
GetUserId error
|
|
|
|
CreateAccount error
|
|
|
|
SetWallet error
|
|
|
|
GetWallet error
|
|
|
|
}
|
|
|
|
|
2021-12-25 02:16:58 +01:00
|
|
|
type TestStore struct {
|
2022-06-17 18:52:17 +02:00
|
|
|
// Fake store functions will set these to `true` as they are called
|
2022-06-19 22:40:16 +02:00
|
|
|
Called TestStoreFunctionsCalled
|
2021-12-25 02:16:58 +01:00
|
|
|
|
2022-06-19 22:40:16 +02:00
|
|
|
// Fake store functions will return the errors (including `nil`) specified in
|
|
|
|
// the test setup
|
|
|
|
Errors TestStoreFunctionsErrors
|
2022-06-20 00:54:59 +02:00
|
|
|
|
|
|
|
TestAuthToken auth.AuthToken
|
|
|
|
|
|
|
|
TestEncryptedWallet wallet.EncryptedWallet
|
|
|
|
TestSequence wallet.Sequence
|
|
|
|
TestHmac wallet.WalletHmac
|
2022-06-21 22:59:20 +02:00
|
|
|
TestSequenceCorrect bool
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-21 00:10:54 +02:00
|
|
|
func (s *TestStore) SaveToken(authToken *auth.AuthToken) error {
|
|
|
|
s.Called.SaveToken = authToken.Token
|
2022-06-19 22:40:16 +02:00
|
|
|
return s.Errors.SaveToken
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-21 00:10:54 +02:00
|
|
|
func (s *TestStore) GetToken(token auth.TokenString) (*auth.AuthToken, error) {
|
|
|
|
s.Called.GetToken = token
|
2022-06-20 00:54:59 +02:00
|
|
|
return &s.TestAuthToken, s.Errors.GetToken
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-07 19:25:14 +02:00
|
|
|
func (s *TestStore) GetUserId(auth.Email, auth.Password) (auth.UserId, error) {
|
2022-06-17 18:52:17 +02:00
|
|
|
s.Called.GetUserId = true
|
2022-06-19 22:40:16 +02:00
|
|
|
return 0, s.Errors.GetUserId
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-07 19:25:14 +02:00
|
|
|
func (s *TestStore) CreateAccount(auth.Email, auth.Password) error {
|
2022-06-17 18:52:17 +02:00
|
|
|
s.Called.CreateAccount = true
|
2022-06-19 22:40:16 +02:00
|
|
|
return s.Errors.CreateAccount
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
2022-06-09 23:04:49 +02:00
|
|
|
func (s *TestStore) SetWallet(
|
2022-06-07 19:25:14 +02:00
|
|
|
UserId auth.UserId,
|
2022-06-09 23:04:49 +02:00
|
|
|
encryptedWallet wallet.EncryptedWallet,
|
|
|
|
sequence wallet.Sequence,
|
|
|
|
hmac wallet.WalletHmac,
|
|
|
|
) (latestEncryptedWallet wallet.EncryptedWallet, latestSequence wallet.Sequence, latestHmac wallet.WalletHmac, sequenceCorrect bool, err error) {
|
2022-06-21 22:59:20 +02:00
|
|
|
s.Called.SetWallet = SetWalletCall{encryptedWallet, sequence, hmac}
|
2022-06-19 22:40:16 +02:00
|
|
|
err = s.Errors.SetWallet
|
2022-06-21 22:59:20 +02:00
|
|
|
if err == nil {
|
|
|
|
latestEncryptedWallet = s.TestEncryptedWallet
|
|
|
|
latestSequence = s.TestSequence
|
|
|
|
latestHmac = s.TestHmac
|
|
|
|
sequenceCorrect = s.TestSequenceCorrect
|
|
|
|
}
|
2021-12-25 02:16:58 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-06-09 23:04:49 +02:00
|
|
|
func (s *TestStore) GetWallet(userId auth.UserId) (encryptedWallet wallet.EncryptedWallet, sequence wallet.Sequence, hmac wallet.WalletHmac, err error) {
|
2022-06-17 18:52:17 +02:00
|
|
|
s.Called.GetWallet = true
|
2022-06-19 22:40:16 +02:00
|
|
|
err = s.Errors.GetWallet
|
2022-06-20 00:54:59 +02:00
|
|
|
if err == nil {
|
|
|
|
encryptedWallet = s.TestEncryptedWallet
|
|
|
|
sequence = s.TestSequence
|
|
|
|
hmac = s.TestHmac
|
|
|
|
}
|
2021-12-25 02:16:58 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2022-06-21 17:52:03 +02:00
|
|
|
// expectStatusCode: A helper to call in functions that test that request
|
|
|
|
// handlers responded with a certain status code. Cuts down on noise.
|
|
|
|
func expectStatusCode(t *testing.T, w *httptest.ResponseRecorder, expectedStatusCode int) {
|
2022-06-19 22:57:37 +02:00
|
|
|
if want, got := expectedStatusCode, w.Result().StatusCode; want != got {
|
2022-06-21 17:52:03 +02:00
|
|
|
t.Errorf("StatusCode: expected %s (%d), got %s (%d)", http.StatusText(want), want, http.StatusText(got), got)
|
2022-06-19 22:57:37 +02:00
|
|
|
}
|
2022-06-21 17:52:03 +02:00
|
|
|
}
|
2022-06-19 22:57:37 +02:00
|
|
|
|
2022-06-21 17:52:03 +02:00
|
|
|
// expectErrorString: A helper to call in functions that test that request
|
|
|
|
// handlers failed with a certain error string. Cuts down on noise.
|
|
|
|
func expectErrorString(t *testing.T, w *httptest.ResponseRecorder, expectedErrorString string) {
|
2022-06-19 22:57:37 +02:00
|
|
|
body, _ := ioutil.ReadAll(w.Body)
|
|
|
|
|
|
|
|
var result ErrorResponse
|
|
|
|
if err := json.Unmarshal(body, &result); err != nil {
|
2022-06-21 17:52:03 +02:00
|
|
|
t.Fatalf("Error decoding error message: %s: `%s`", err, body)
|
2022-06-19 22:57:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if want, got := expectedErrorString, result.Error; want != got {
|
|
|
|
t.Errorf("Error String: expected %s, got %s", want, got)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-22 17:17:09 +02:00
|
|
|
func TestServerHelperCheckAuth(t *testing.T) {
|
|
|
|
tt := []struct {
|
|
|
|
name string
|
|
|
|
requiredScope auth.AuthScope
|
|
|
|
userScope auth.AuthScope
|
|
|
|
|
|
|
|
tokenExpected bool
|
|
|
|
expectedStatusCode int
|
|
|
|
expectedErrorString string
|
|
|
|
|
|
|
|
storeErrors TestStoreFunctionsErrors
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "success",
|
|
|
|
// Just check that scope checks exist. The more detailed specific tests
|
|
|
|
// go in the auth module
|
|
|
|
requiredScope: auth.AuthScope("banana"),
|
|
|
|
userScope: auth.AuthScope("*"),
|
|
|
|
|
|
|
|
// not that it's a full request but as of now no error yet means 200 by default
|
|
|
|
expectedStatusCode: 200,
|
|
|
|
tokenExpected: true,
|
|
|
|
}, {
|
|
|
|
name: "auth token not found",
|
|
|
|
requiredScope: auth.AuthScope("banana"),
|
|
|
|
userScope: auth.AuthScope("*"),
|
|
|
|
|
|
|
|
expectedStatusCode: http.StatusUnauthorized,
|
|
|
|
expectedErrorString: http.StatusText(http.StatusUnauthorized) + ": Token Not Found",
|
|
|
|
|
|
|
|
storeErrors: TestStoreFunctionsErrors{GetToken: store.ErrNoToken},
|
|
|
|
}, {
|
|
|
|
name: "unknown auth token db error",
|
|
|
|
requiredScope: auth.AuthScope("banana"),
|
|
|
|
userScope: auth.AuthScope("*"),
|
|
|
|
|
|
|
|
expectedStatusCode: http.StatusInternalServerError,
|
|
|
|
expectedErrorString: http.StatusText(http.StatusInternalServerError),
|
|
|
|
|
|
|
|
storeErrors: TestStoreFunctionsErrors{GetToken: fmt.Errorf("Some random DB Error!")},
|
|
|
|
}, {
|
|
|
|
name: "auth scope failure",
|
|
|
|
requiredScope: auth.AuthScope("banana"),
|
|
|
|
userScope: auth.AuthScope("carrot"),
|
|
|
|
|
|
|
|
expectedStatusCode: http.StatusForbidden,
|
|
|
|
expectedErrorString: http.StatusText(http.StatusForbidden) + ": Scope",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range tt {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
testStore := TestStore{
|
|
|
|
Errors: tc.storeErrors,
|
|
|
|
TestAuthToken: auth.AuthToken{Token: auth.TokenString("seekrit"), Scope: tc.userScope},
|
|
|
|
}
|
|
|
|
s := Server{&TestAuth{}, &testStore}
|
|
|
|
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
authToken := s.checkAuth(w, testStore.TestAuthToken.Token, tc.requiredScope)
|
|
|
|
if tc.tokenExpected && (*authToken != testStore.TestAuthToken) {
|
|
|
|
t.Errorf("Expected checkAuth to return a valid AuthToken")
|
|
|
|
}
|
|
|
|
if !tc.tokenExpected && (authToken != nil) {
|
|
|
|
t.Errorf("Expected checkAuth not to return a valid AuthToken")
|
|
|
|
}
|
|
|
|
expectStatusCode(t, w, tc.expectedStatusCode)
|
|
|
|
if len(tc.expectedErrorString) > 0 {
|
|
|
|
expectErrorString(t, w, tc.expectedErrorString)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestServerHelperGetGetDataSuccess(t *testing.T) {
|
|
|
|
t.Fatalf("Test me: getGetData success")
|
|
|
|
}
|
|
|
|
func TestServerHelperGetGetDataErrors(t *testing.T) {
|
|
|
|
t.Fatalf("Test me: getGetData failure")
|
|
|
|
}
|
|
|
|
|
2022-06-19 21:56:10 +02:00
|
|
|
type TestReqStruct struct{ key string }
|
|
|
|
|
|
|
|
func (t *TestReqStruct) validate() bool { return t.key != "" }
|
|
|
|
|
2021-12-25 02:16:58 +01:00
|
|
|
func TestServerHelperGetPostDataSuccess(t *testing.T) {
|
2022-06-19 21:56:10 +02:00
|
|
|
requestBody := []byte(`{}`)
|
|
|
|
req := httptest.NewRequest(http.MethodPost, "/test", bytes.NewBuffer(requestBody))
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
success := getPostData(w, req, &TestReqStruct{key: "hi"})
|
|
|
|
if !success {
|
|
|
|
t.Errorf("getPostData failed unexpectedly")
|
|
|
|
}
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|
2022-06-19 21:56:10 +02:00
|
|
|
|
2022-06-19 23:51:40 +02:00
|
|
|
// Test getPostData, including requestOverhead and any other mini-helpers it calls.
|
2021-12-25 02:16:58 +01:00
|
|
|
func TestServerHelperGetPostDataErrors(t *testing.T) {
|
2022-06-19 21:56:10 +02:00
|
|
|
tt := []struct {
|
|
|
|
name string
|
|
|
|
method string
|
|
|
|
requestBody string
|
|
|
|
expectedStatusCode int
|
|
|
|
expectedErrorString string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "bad method",
|
|
|
|
method: http.MethodGet,
|
|
|
|
requestBody: "",
|
|
|
|
expectedStatusCode: http.StatusMethodNotAllowed,
|
|
|
|
expectedErrorString: http.StatusText(http.StatusMethodNotAllowed),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "request body too large",
|
|
|
|
method: http.MethodPost,
|
2022-06-19 23:49:05 +02:00
|
|
|
requestBody: fmt.Sprintf(`{"key": "%s"}`, strings.Repeat("a", 100000)),
|
2022-06-19 21:56:10 +02:00
|
|
|
expectedStatusCode: http.StatusRequestEntityTooLarge,
|
|
|
|
expectedErrorString: http.StatusText(http.StatusRequestEntityTooLarge),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "malformed request body JSON",
|
|
|
|
method: http.MethodPost,
|
|
|
|
requestBody: "{",
|
|
|
|
expectedStatusCode: http.StatusBadRequest,
|
2022-06-19 23:49:05 +02:00
|
|
|
expectedErrorString: http.StatusText(http.StatusBadRequest) + ": Error parsing JSON",
|
2022-06-19 21:56:10 +02:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "body JSON failed validation",
|
|
|
|
method: http.MethodPost,
|
|
|
|
requestBody: "{}",
|
|
|
|
expectedStatusCode: http.StatusBadRequest,
|
|
|
|
expectedErrorString: http.StatusText(http.StatusBadRequest) + ": Request failed validation",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range tt {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
// Make request
|
|
|
|
req := httptest.NewRequest(tc.method, PathAuthToken, bytes.NewBuffer([]byte(tc.requestBody)))
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
|
|
|
|
success := getPostData(w, req, &TestReqStruct{})
|
|
|
|
if success {
|
|
|
|
t.Errorf("getPostData succeeded unexpectedly")
|
|
|
|
}
|
|
|
|
|
2022-06-21 17:52:03 +02:00
|
|
|
expectStatusCode(t, w, tc.expectedStatusCode)
|
|
|
|
expectErrorString(t, w, tc.expectedErrorString)
|
2022-06-19 21:56:10 +02:00
|
|
|
})
|
|
|
|
}
|
2021-12-25 02:16:58 +01:00
|
|
|
}
|