store_test.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. // Copyright 2016 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package auth
  15. import (
  16. "os"
  17. "testing"
  18. pb "github.com/coreos/etcd/etcdserver/etcdserverpb"
  19. "github.com/coreos/etcd/mvcc/backend"
  20. "golang.org/x/crypto/bcrypt"
  21. "golang.org/x/net/context"
  22. )
  23. func init() { BcryptCost = bcrypt.MinCost }
  24. func TestUserAdd(t *testing.T) {
  25. b, tPath := backend.NewDefaultTmpBackend()
  26. defer func() {
  27. b.Close()
  28. os.Remove(tPath)
  29. }()
  30. as := NewAuthStore(b)
  31. ua := &pb.AuthUserAddRequest{Name: "foo"}
  32. _, err := as.UserAdd(ua) // add a non-existing user
  33. if err != nil {
  34. t.Fatal(err)
  35. }
  36. _, err = as.UserAdd(ua) // add an existing user
  37. if err == nil {
  38. t.Fatalf("expected %v, got %v", ErrUserAlreadyExist, err)
  39. }
  40. if err != ErrUserAlreadyExist {
  41. t.Fatalf("expected %v, got %v", ErrUserAlreadyExist, err)
  42. }
  43. ua = &pb.AuthUserAddRequest{Name: ""}
  44. _, err = as.UserAdd(ua) // add a user with empty name
  45. if err != ErrUserEmpty {
  46. t.Fatal(err)
  47. }
  48. }
  49. func enableAuthAndCreateRoot(as *authStore) error {
  50. _, err := as.UserAdd(&pb.AuthUserAddRequest{Name: "root", Password: "root"})
  51. if err != nil {
  52. return err
  53. }
  54. _, err = as.RoleAdd(&pb.AuthRoleAddRequest{Name: "root"})
  55. if err != nil {
  56. return err
  57. }
  58. _, err = as.UserGrantRole(&pb.AuthUserGrantRoleRequest{User: "root", Role: "root"})
  59. if err != nil {
  60. return err
  61. }
  62. return as.AuthEnable()
  63. }
  64. func TestCheckPassword(t *testing.T) {
  65. b, tPath := backend.NewDefaultTmpBackend()
  66. defer func() {
  67. b.Close()
  68. os.Remove(tPath)
  69. }()
  70. as := NewAuthStore(b)
  71. defer as.Close()
  72. err := enableAuthAndCreateRoot(as)
  73. if err != nil {
  74. t.Fatal(err)
  75. }
  76. ua := &pb.AuthUserAddRequest{Name: "foo", Password: "bar"}
  77. _, err = as.UserAdd(ua)
  78. if err != nil {
  79. t.Fatal(err)
  80. }
  81. // auth a non-existing user
  82. _, err = as.CheckPassword("foo-test", "bar")
  83. if err == nil {
  84. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  85. }
  86. if err != ErrAuthFailed {
  87. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  88. }
  89. // auth an existing user with correct password
  90. _, err = as.CheckPassword("foo", "bar")
  91. if err != nil {
  92. t.Fatal(err)
  93. }
  94. // auth an existing user but with wrong password
  95. _, err = as.CheckPassword("foo", "")
  96. if err == nil {
  97. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  98. }
  99. if err != ErrAuthFailed {
  100. t.Fatalf("expected %v, got %v", ErrAuthFailed, err)
  101. }
  102. }
  103. func TestUserDelete(t *testing.T) {
  104. b, tPath := backend.NewDefaultTmpBackend()
  105. defer func() {
  106. b.Close()
  107. os.Remove(tPath)
  108. }()
  109. as := NewAuthStore(b)
  110. defer as.Close()
  111. err := enableAuthAndCreateRoot(as)
  112. if err != nil {
  113. t.Fatal(err)
  114. }
  115. ua := &pb.AuthUserAddRequest{Name: "foo"}
  116. _, err = as.UserAdd(ua)
  117. if err != nil {
  118. t.Fatal(err)
  119. }
  120. // delete an existing user
  121. ud := &pb.AuthUserDeleteRequest{Name: "foo"}
  122. _, err = as.UserDelete(ud)
  123. if err != nil {
  124. t.Fatal(err)
  125. }
  126. // delete a non-existing user
  127. _, err = as.UserDelete(ud)
  128. if err == nil {
  129. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  130. }
  131. if err != ErrUserNotFound {
  132. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  133. }
  134. }
  135. func TestUserChangePassword(t *testing.T) {
  136. b, tPath := backend.NewDefaultTmpBackend()
  137. defer func() {
  138. b.Close()
  139. os.Remove(tPath)
  140. }()
  141. as := NewAuthStore(b)
  142. defer as.Close()
  143. err := enableAuthAndCreateRoot(as)
  144. if err != nil {
  145. t.Fatal(err)
  146. }
  147. _, err = as.UserAdd(&pb.AuthUserAddRequest{Name: "foo"})
  148. if err != nil {
  149. t.Fatal(err)
  150. }
  151. ctx1 := context.WithValue(context.WithValue(context.TODO(), "index", uint64(1)), "simpleToken", "dummy")
  152. _, err = as.Authenticate(ctx1, "foo", "")
  153. if err != nil {
  154. t.Fatal(err)
  155. }
  156. _, err = as.UserChangePassword(&pb.AuthUserChangePasswordRequest{Name: "foo", Password: "bar"})
  157. if err != nil {
  158. t.Fatal(err)
  159. }
  160. ctx2 := context.WithValue(context.WithValue(context.TODO(), "index", uint64(2)), "simpleToken", "dummy")
  161. _, err = as.Authenticate(ctx2, "foo", "bar")
  162. if err != nil {
  163. t.Fatal(err)
  164. }
  165. // change a non-existing user
  166. _, err = as.UserChangePassword(&pb.AuthUserChangePasswordRequest{Name: "foo-test", Password: "bar"})
  167. if err == nil {
  168. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  169. }
  170. if err != ErrUserNotFound {
  171. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  172. }
  173. }
  174. func TestRoleAdd(t *testing.T) {
  175. b, tPath := backend.NewDefaultTmpBackend()
  176. defer func() {
  177. b.Close()
  178. os.Remove(tPath)
  179. }()
  180. as := NewAuthStore(b)
  181. defer as.Close()
  182. err := enableAuthAndCreateRoot(as)
  183. if err != nil {
  184. t.Fatal(err)
  185. }
  186. // adds a new role
  187. _, err = as.RoleAdd(&pb.AuthRoleAddRequest{Name: "role-test"})
  188. if err != nil {
  189. t.Fatal(err)
  190. }
  191. }
  192. func TestUserGrant(t *testing.T) {
  193. b, tPath := backend.NewDefaultTmpBackend()
  194. defer func() {
  195. b.Close()
  196. os.Remove(tPath)
  197. }()
  198. as := NewAuthStore(b)
  199. defer as.Close()
  200. err := enableAuthAndCreateRoot(as)
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. _, err = as.UserAdd(&pb.AuthUserAddRequest{Name: "foo"})
  205. if err != nil {
  206. t.Fatal(err)
  207. }
  208. // adds a new role
  209. _, err = as.RoleAdd(&pb.AuthRoleAddRequest{Name: "role-test"})
  210. if err != nil {
  211. t.Fatal(err)
  212. }
  213. // grants a role to the user
  214. _, err = as.UserGrantRole(&pb.AuthUserGrantRoleRequest{User: "foo", Role: "role-test"})
  215. if err != nil {
  216. t.Fatal(err)
  217. }
  218. // grants a role to a non-existing user
  219. _, err = as.UserGrantRole(&pb.AuthUserGrantRoleRequest{User: "foo-test", Role: "role-test"})
  220. if err == nil {
  221. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  222. }
  223. if err != ErrUserNotFound {
  224. t.Fatalf("expected %v, got %v", ErrUserNotFound, err)
  225. }
  226. }