2019-08-29 12:34:07 +03:00
|
|
|
package home
|
|
|
|
|
|
|
|
import (
|
2021-03-01 20:37:28 +03:00
|
|
|
"bytes"
|
|
|
|
"crypto/rand"
|
2019-08-29 12:34:07 +03:00
|
|
|
"encoding/hex"
|
2019-10-11 12:41:01 +03:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
2019-08-29 12:34:07 +03:00
|
|
|
"os"
|
2019-10-02 17:02:16 +03:00
|
|
|
"path/filepath"
|
2019-08-29 12:34:07 +03:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2021-02-04 20:35:13 +03:00
|
|
|
"github.com/AdguardTeam/AdGuardHome/internal/aghtest"
|
2019-08-29 12:34:07 +03:00
|
|
|
"github.com/stretchr/testify/assert"
|
2021-03-01 20:37:28 +03:00
|
|
|
"github.com/stretchr/testify/require"
|
2019-08-29 12:34:07 +03:00
|
|
|
)
|
|
|
|
|
2020-11-16 15:52:05 +03:00
|
|
|
func TestMain(m *testing.M) {
|
2021-02-04 20:35:13 +03:00
|
|
|
aghtest.DiscardLogOutput(m)
|
2020-11-16 15:52:05 +03:00
|
|
|
}
|
|
|
|
|
2021-03-11 17:32:58 +03:00
|
|
|
func prepareTestDir(t *testing.T) string {
|
|
|
|
t.Helper()
|
|
|
|
|
2019-10-11 12:41:01 +03:00
|
|
|
const dir = "./agh-test"
|
2021-03-11 17:32:58 +03:00
|
|
|
|
|
|
|
require.Nil(t, os.RemoveAll(dir))
|
|
|
|
// TODO(e.burkov): Replace with testing.TempDir after updating Go
|
|
|
|
// version to 1.16.
|
|
|
|
require.Nil(t, os.MkdirAll(dir, 0o755))
|
|
|
|
|
|
|
|
t.Cleanup(func() { require.Nil(t, os.RemoveAll(dir)) })
|
|
|
|
|
2019-10-11 12:41:01 +03:00
|
|
|
return dir
|
|
|
|
}
|
2019-10-02 17:02:16 +03:00
|
|
|
|
2021-03-01 20:37:28 +03:00
|
|
|
func TestNewSessionToken(t *testing.T) {
|
|
|
|
// Successful case.
|
|
|
|
token, err := newSessionToken()
|
|
|
|
require.Nil(t, err)
|
|
|
|
assert.Len(t, token, sessionTokenSize)
|
|
|
|
|
|
|
|
// Break the rand.Reader.
|
|
|
|
prevReader := rand.Reader
|
|
|
|
t.Cleanup(func() {
|
|
|
|
rand.Reader = prevReader
|
|
|
|
})
|
|
|
|
rand.Reader = &bytes.Buffer{}
|
|
|
|
|
|
|
|
// Unsuccessful case.
|
|
|
|
token, err = newSessionToken()
|
|
|
|
require.NotNil(t, err)
|
|
|
|
assert.Empty(t, token)
|
|
|
|
}
|
|
|
|
|
2019-10-11 12:41:01 +03:00
|
|
|
func TestAuth(t *testing.T) {
|
2021-03-11 17:32:58 +03:00
|
|
|
dir := prepareTestDir(t)
|
2019-10-11 12:41:01 +03:00
|
|
|
fn := filepath.Join(dir, "sessions.db")
|
2019-10-02 17:02:16 +03:00
|
|
|
|
2021-03-01 20:37:28 +03:00
|
|
|
users := []User{{
|
|
|
|
Name: "name",
|
|
|
|
PasswordHash: "$2y$05$..vyzAECIhJPfaQiOK17IukcQnqEgKJHy0iETyYqxn3YXJl8yZuo2",
|
|
|
|
}}
|
2019-11-12 14:23:00 +03:00
|
|
|
a := InitAuth(fn, nil, 60)
|
2019-10-21 17:44:07 +03:00
|
|
|
s := session{}
|
2019-08-29 12:34:07 +03:00
|
|
|
|
2019-10-11 12:41:01 +03:00
|
|
|
user := User{Name: "name"}
|
|
|
|
a.UserAdd(&user, "password")
|
2019-08-29 12:34:07 +03:00
|
|
|
|
2020-12-22 21:05:12 +03:00
|
|
|
assert.Equal(t, checkSessionNotFound, a.checkSession("notfound"))
|
2019-08-29 12:34:07 +03:00
|
|
|
a.RemoveSession("notfound")
|
|
|
|
|
2021-03-01 20:37:28 +03:00
|
|
|
sess, err := newSessionToken()
|
2020-11-20 17:32:41 +03:00
|
|
|
assert.Nil(t, err)
|
2019-08-29 12:34:07 +03:00
|
|
|
sessStr := hex.EncodeToString(sess)
|
|
|
|
|
2019-10-21 17:44:07 +03:00
|
|
|
now := time.Now().UTC().Unix()
|
2019-08-29 12:34:07 +03:00
|
|
|
// check expiration
|
2019-10-21 17:44:07 +03:00
|
|
|
s.expire = uint32(now)
|
|
|
|
a.addSession(sess, &s)
|
2020-12-22 21:05:12 +03:00
|
|
|
assert.Equal(t, checkSessionExpired, a.checkSession(sessStr))
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
// add session with TTL = 2 sec
|
2019-10-21 17:44:07 +03:00
|
|
|
s = session{}
|
2020-04-24 14:04:36 +03:00
|
|
|
s.expire = uint32(time.Now().UTC().Unix() + 2)
|
2019-10-21 17:44:07 +03:00
|
|
|
a.addSession(sess, &s)
|
2020-12-22 21:05:12 +03:00
|
|
|
assert.Equal(t, checkSessionOK, a.checkSession(sessStr))
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
a.Close()
|
|
|
|
|
|
|
|
// load saved session
|
2019-11-12 14:23:00 +03:00
|
|
|
a = InitAuth(fn, users, 60)
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
// the session is still alive
|
2020-12-22 21:05:12 +03:00
|
|
|
assert.Equal(t, checkSessionOK, a.checkSession(sessStr))
|
|
|
|
// reset our expiration time because checkSession() has just updated it
|
2020-04-24 14:04:36 +03:00
|
|
|
s.expire = uint32(time.Now().UTC().Unix() + 2)
|
2019-10-21 17:44:07 +03:00
|
|
|
a.storeSession(sess, &s)
|
2019-08-29 12:34:07 +03:00
|
|
|
a.Close()
|
|
|
|
|
|
|
|
u := a.UserFind("name", "password")
|
2021-01-13 16:56:05 +03:00
|
|
|
assert.NotEmpty(t, u.Name)
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
time.Sleep(3 * time.Second)
|
|
|
|
|
|
|
|
// load and remove expired sessions
|
2019-11-12 14:23:00 +03:00
|
|
|
a = InitAuth(fn, users, 60)
|
2020-12-22 21:05:12 +03:00
|
|
|
assert.Equal(t, checkSessionNotFound, a.checkSession(sessStr))
|
2019-08-29 12:34:07 +03:00
|
|
|
|
|
|
|
a.Close()
|
|
|
|
}
|
2019-10-11 12:41:01 +03:00
|
|
|
|
|
|
|
// implements http.ResponseWriter
|
|
|
|
type testResponseWriter struct {
|
|
|
|
hdr http.Header
|
|
|
|
statusCode int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *testResponseWriter) Header() http.Header {
|
|
|
|
return w.hdr
|
|
|
|
}
|
2020-11-16 15:52:05 +03:00
|
|
|
|
2019-10-11 12:41:01 +03:00
|
|
|
func (w *testResponseWriter) Write([]byte) (int, error) {
|
|
|
|
return 0, nil
|
|
|
|
}
|
2020-11-16 15:52:05 +03:00
|
|
|
|
2019-10-11 12:41:01 +03:00
|
|
|
func (w *testResponseWriter) WriteHeader(statusCode int) {
|
|
|
|
w.statusCode = statusCode
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAuthHTTP(t *testing.T) {
|
2021-03-11 17:32:58 +03:00
|
|
|
dir := prepareTestDir(t)
|
2019-10-11 12:41:01 +03:00
|
|
|
fn := filepath.Join(dir, "sessions.db")
|
|
|
|
|
|
|
|
users := []User{
|
2020-12-07 16:04:53 +03:00
|
|
|
{Name: "name", PasswordHash: "$2y$05$..vyzAECIhJPfaQiOK17IukcQnqEgKJHy0iETyYqxn3YXJl8yZuo2"},
|
2019-10-11 12:41:01 +03:00
|
|
|
}
|
2020-02-13 18:42:07 +03:00
|
|
|
Context.auth = InitAuth(fn, users, 60)
|
2019-10-11 12:41:01 +03:00
|
|
|
|
|
|
|
handlerCalled := false
|
2020-12-22 21:05:12 +03:00
|
|
|
handler := func(_ http.ResponseWriter, _ *http.Request) {
|
2019-10-11 12:41:01 +03:00
|
|
|
handlerCalled = true
|
|
|
|
}
|
|
|
|
handler2 := optionalAuth(handler)
|
|
|
|
w := testResponseWriter{}
|
|
|
|
w.hdr = make(http.Header)
|
|
|
|
r := http.Request{}
|
|
|
|
r.Header = make(http.Header)
|
2021-01-13 17:26:57 +03:00
|
|
|
r.Method = http.MethodGet
|
2019-10-11 12:41:01 +03:00
|
|
|
|
|
|
|
// get / - we're redirected to login page
|
|
|
|
r.URL = &url.URL{Path: "/"}
|
|
|
|
handlerCalled = false
|
|
|
|
handler2(&w, &r)
|
2021-01-13 16:56:05 +03:00
|
|
|
assert.Equal(t, http.StatusFound, w.statusCode)
|
|
|
|
assert.NotEmpty(t, w.hdr.Get("Location"))
|
|
|
|
assert.False(t, handlerCalled)
|
2019-10-11 12:41:01 +03:00
|
|
|
|
|
|
|
// go to login page
|
|
|
|
loginURL := w.hdr.Get("Location")
|
|
|
|
r.URL = &url.URL{Path: loginURL}
|
|
|
|
handlerCalled = false
|
|
|
|
handler2(&w, &r)
|
|
|
|
assert.True(t, handlerCalled)
|
|
|
|
|
|
|
|
// perform login
|
2020-11-20 17:32:41 +03:00
|
|
|
cookie, err := Context.auth.httpCookie(loginJSON{Name: "name", Password: "password"})
|
|
|
|
assert.Nil(t, err)
|
2021-01-13 16:56:05 +03:00
|
|
|
assert.NotEmpty(t, cookie)
|
2019-10-11 12:41:01 +03:00
|
|
|
|
|
|
|
// get /
|
|
|
|
handler2 = optionalAuth(handler)
|
|
|
|
w.hdr = make(http.Header)
|
|
|
|
r.Header.Set("Cookie", cookie)
|
|
|
|
r.URL = &url.URL{Path: "/"}
|
|
|
|
handlerCalled = false
|
|
|
|
handler2(&w, &r)
|
|
|
|
assert.True(t, handlerCalled)
|
|
|
|
r.Header.Del("Cookie")
|
|
|
|
|
|
|
|
// get / with basic auth
|
|
|
|
handler2 = optionalAuth(handler)
|
|
|
|
w.hdr = make(http.Header)
|
|
|
|
r.URL = &url.URL{Path: "/"}
|
|
|
|
r.SetBasicAuth("name", "password")
|
|
|
|
handlerCalled = false
|
|
|
|
handler2(&w, &r)
|
|
|
|
assert.True(t, handlerCalled)
|
|
|
|
r.Header.Del("Authorization")
|
|
|
|
|
|
|
|
// get login page with a valid cookie - we're redirected to /
|
|
|
|
handler2 = optionalAuth(handler)
|
|
|
|
w.hdr = make(http.Header)
|
|
|
|
r.Header.Set("Cookie", cookie)
|
|
|
|
r.URL = &url.URL{Path: loginURL}
|
|
|
|
handlerCalled = false
|
|
|
|
handler2(&w, &r)
|
2021-01-13 16:56:05 +03:00
|
|
|
assert.NotEmpty(t, w.hdr.Get("Location"))
|
|
|
|
assert.False(t, handlerCalled)
|
2019-10-11 12:41:01 +03:00
|
|
|
r.Header.Del("Cookie")
|
|
|
|
|
|
|
|
// get login page with an invalid cookie
|
|
|
|
handler2 = optionalAuth(handler)
|
|
|
|
w.hdr = make(http.Header)
|
|
|
|
r.Header.Set("Cookie", "bad")
|
|
|
|
r.URL = &url.URL{Path: loginURL}
|
|
|
|
handlerCalled = false
|
|
|
|
handler2(&w, &r)
|
|
|
|
assert.True(t, handlerCalled)
|
|
|
|
r.Header.Del("Cookie")
|
|
|
|
|
2020-02-13 18:42:07 +03:00
|
|
|
Context.auth.Close()
|
2019-10-11 12:41:01 +03:00
|
|
|
}
|