store_test.go 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package auth
  15. import (
  16. "os"
  17. "testing"
  18. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  19. "github.com/coreos/etcd/mvcc/backend"
  20. "golang.org/x/crypto/bcrypt"
  21. "golang.org/x/net/context"
  22. )
  23. func init() { BcryptCost = bcrypt.MinCost }
  24. func TestUserAdd(t *testing.T) {
  25. b, tPath := backend.NewDefaultTmpBackend()
  26. defer func() {
  27. b.Close()
  28. os.Remove(tPath)
  29. }()
  30. as := NewAuthStore(b)
  31. ua := &pb.AuthUserAddRequest{Name: "foo"}
  32. _, err := as.UserAdd(ua) // add a non-existing user
  33. if err != nil {
  34. t.Fatal(err)
  35. }
  36. _, err = as.UserAdd(ua) // add an existing user
  37. if err == nil {
  38. t.Fatalf("expected %v, got %v", ErrUserAlreadyExist, err)
  39. }
  40. if err != ErrUserAlreadyExist {
  41. t.Fatalf("expected %v, got %v", ErrUserAlreadyExist, err)
  42. }
  43. }
  44. func enableAuthAndCreateRoot(as *authStore) error {
  45. _, err := as.UserAdd(&pb.AuthUserAddRequest{Name: "root", Password: "root"})
  46. if err != nil {
  47. return err
  48. }
  49. _, err = as.RoleAdd(&pb.AuthRoleAddRequest{Name: "root"})
  50. if err != nil {
  51. return err
  52. }
  53. _, err = as.UserGrantRole(&pb.AuthUserGrantRoleRequest{User: "root", Role: "root"})
  54. if err != nil {
  55. return err
  56. }
  57. return as.AuthEnable()
  58. }
  59. func TestCheckPassword(t *testing.T) {
  60. b, tPath := backend.NewDefaultTmpBackend()
  61. defer func() {
  62. b.Close()
  63. os.Remove(tPath)
  64. }()
  65. as := NewAuthStore(b)
  66. err := enableAuthAndCreateRoot(as)
  67. if err != nil {
  68. t.Fatal(err)
  69. }
  70. ua := &pb.AuthUserAddRequest{Name: "foo", Password: "bar"}
  71. _, err = as.UserAdd(ua)
  72. if err != nil {
  73. t.Fatal(err)
  74. }
  75. // auth a non-existing user
  76. _, err = as.CheckPassword("foo-test", "bar")
  77. if err == nil {
  78. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  79. }
  80. if err != ErrAuthFailed {
  81. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  82. }
  83. // auth an existing user with correct password
  84. _, err = as.CheckPassword("foo", "bar")
  85. if err != nil {
  86. t.Fatal(err)
  87. }
  88. // auth an existing user but with wrong password
  89. _, err = as.CheckPassword("foo", "")
  90. if err == nil {
  91. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  92. }
  93. if err != ErrAuthFailed {
  94. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  95. }
  96. }
  97. func TestUserDelete(t *testing.T) {
  98. b, tPath := backend.NewDefaultTmpBackend()
  99. defer func() {
  100. b.Close()
  101. os.Remove(tPath)
  102. }()
  103. as := NewAuthStore(b)
  104. err := enableAuthAndCreateRoot(as)
  105. if err != nil {
  106. t.Fatal(err)
  107. }
  108. ua := &pb.AuthUserAddRequest{Name: "foo"}
  109. _, err = as.UserAdd(ua)
  110. if err != nil {
  111. t.Fatal(err)
  112. }
  113. // delete an existing user
  114. ud := &pb.AuthUserDeleteRequest{Name: "foo"}
  115. _, err = as.UserDelete(ud)
  116. if err != nil {
  117. t.Fatal(err)
  118. }
  119. // delete a non-existing user
  120. _, err = as.UserDelete(ud)
  121. if err == nil {
  122. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  123. }
  124. if err != ErrUserNotFound {
  125. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  126. }
  127. }
  128. func TestUserChangePassword(t *testing.T) {
  129. b, tPath := backend.NewDefaultTmpBackend()
  130. defer func() {
  131. b.Close()
  132. os.Remove(tPath)
  133. }()
  134. as := NewAuthStore(b)
  135. err := enableAuthAndCreateRoot(as)
  136. if err != nil {
  137. t.Fatal(err)
  138. }
  139. _, err = as.UserAdd(&pb.AuthUserAddRequest{Name: "foo"})
  140. if err != nil {
  141. t.Fatal(err)
  142. }
  143. ctx1 := context.WithValue(context.WithValue(context.TODO(), "index", uint64(1)), "simpleToken", "dummy")
  144. _, err = as.Authenticate(ctx1, "foo", "")
  145. if err != nil {
  146. t.Fatal(err)
  147. }
  148. _, err = as.UserChangePassword(&pb.AuthUserChangePasswordRequest{Name: "foo", Password: "bar"})
  149. if err != nil {
  150. t.Fatal(err)
  151. }
  152. ctx2 := context.WithValue(context.WithValue(context.TODO(), "index", uint64(2)), "simpleToken", "dummy")
  153. _, err = as.Authenticate(ctx2, "foo", "bar")
  154. if err != nil {
  155. t.Fatal(err)
  156. }
  157. // change a non-existing user
  158. _, err = as.UserChangePassword(&pb.AuthUserChangePasswordRequest{Name: "foo-test", Password: "bar"})
  159. if err == nil {
  160. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  161. }
  162. if err != ErrUserNotFound {
  163. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  164. }
  165. }
  166. func TestRoleAdd(t *testing.T) {
  167. b, tPath := backend.NewDefaultTmpBackend()
  168. defer func() {
  169. b.Close()
  170. os.Remove(tPath)
  171. }()
  172. as := NewAuthStore(b)
  173. err := enableAuthAndCreateRoot(as)
  174. if err != nil {
  175. t.Fatal(err)
  176. }
  177. // adds a new role
  178. _, err = as.RoleAdd(&pb.AuthRoleAddRequest{Name: "role-test"})
  179. if err != nil {
  180. t.Fatal(err)
  181. }
  182. }
  183. func TestUserGrant(t *testing.T) {
  184. b, tPath := backend.NewDefaultTmpBackend()
  185. defer func() {
  186. b.Close()
  187. os.Remove(tPath)
  188. }()
  189. as := NewAuthStore(b)
  190. err := enableAuthAndCreateRoot(as)
  191. if err != nil {
  192. t.Fatal(err)
  193. }
  194. _, err = as.UserAdd(&pb.AuthUserAddRequest{Name: "foo"})
  195. if err != nil {
  196. t.Fatal(err)
  197. }
  198. // adds a new role
  199. _, err = as.RoleAdd(&pb.AuthRoleAddRequest{Name: "role-test"})
  200. if err != nil {
  201. t.Fatal(err)
  202. }
  203. // grants a role to the user
  204. _, err = as.UserGrantRole(&pb.AuthUserGrantRoleRequest{User: "foo", Role: "role-test"})
  205. if err != nil {
  206. t.Fatal(err)
  207. }
  208. // grants a role to a non-existing user
  209. _, err = as.UserGrantRole(&pb.AuthUserGrantRoleRequest{User: "foo-test", Role: "role-test"})
  210. if err == nil {
  211. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  212. }
  213. if err != ErrUserNotFound {
  214. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  215. }
  216. }