diff options
Diffstat (limited to 'src/couch/test/eunit/couch_auth_cache_tests.erl')
-rw-r--r-- | src/couch/test/eunit/couch_auth_cache_tests.erl | 384 |
1 files changed, 384 insertions, 0 deletions
diff --git a/src/couch/test/eunit/couch_auth_cache_tests.erl b/src/couch/test/eunit/couch_auth_cache_tests.erl new file mode 100644 index 000000000..706c0cee9 --- /dev/null +++ b/src/couch/test/eunit/couch_auth_cache_tests.erl @@ -0,0 +1,384 @@ +% Licensed under the Apache License, Version 2.0 (the "License"); you may not +% use this file except in compliance with the License. You may obtain a copy of +% the License at +% +% http://www.apache.org/licenses/LICENSE-2.0 +% +% Unless required by applicable law or agreed to in writing, software +% distributed under the License is distributed on an "AS IS" BASIS, WITHOUT +% WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the +% License for the specific language governing permissions and limitations under +% the License. + +-module(couch_auth_cache_tests). + +-include_lib("couch/include/couch_eunit.hrl"). +-include_lib("couch/include/couch_db.hrl"). + +-define(SALT, <<"SALT">>). +-define(DB_TIMEOUT, 15000). + +start() -> + test_util:start_couch([ioq]). + + +setup() -> + DbName = ?tempdb(), + config:set("couch_httpd_auth", "authentication_db", + ?b2l(DbName), false), + DbName. + +teardown(DbName) -> + ok = couch_server:delete(DbName, [?ADMIN_CTX]), + ok. + + +couch_auth_cache_test_() -> + { + "CouchDB auth cache tests", + { + setup, + fun start/0, fun test_util:stop_couch/1, + { + foreach, + fun setup/0, fun teardown/1, + [ + fun should_get_nil_on_missed_cache/1, + fun should_get_right_password_hash/1, + fun should_ensure_doc_hash_equals_cached_one/1, + fun should_update_password/1, + fun should_cleanup_cache_after_userdoc_deletion/1, + fun should_restore_cache_after_userdoc_recreation/1, + fun should_drop_cache_on_auth_db_change/1, + fun should_restore_cache_on_auth_db_change/1, + fun should_recover_cache_after_shutdown/1, + fun should_close_old_db_on_auth_db_change/1, + fun should_get_admin_from_config/1 + ] + } + } + }. + +auth_vdu_test_() -> + Cases = [ + %% Old , New , Result + %% [Roles, Type] , [Roles, Type] , + + %% Updating valid user doc with valid one + {[custom, user], [custom, user], "ok"}, + + %% Updating invalid doc (missing type or roles field) with valid one + {[missing, missing], [custom, user], "ok"}, + {[missing, user], [custom, user], "ok"}, + {[custom, missing], [custom, user], "ok"}, + + %% Updating invalid doc (wrong type) with valid one + {[missing, other], [custom, user], "ok"}, + {[custom, other], [custom, user], "ok"}, + + %% Updating valid document with invalid one + {[custom, user], [missing, missing], "doc.type must be user"}, + {[custom, user], [missing, user], "doc.roles must exist"}, + {[custom, user], [custom, missing], "doc.type must be user"}, + {[custom, user], [missing, other], "doc.type must be user"}, + {[custom, user], [custom, other], "doc.type must be user"}, + + %% Updating invalid doc with invalid one + {[missing, missing], [missing, missing], "doc.type must be user"}, + {[missing, missing], [missing, user], "doc.roles must exist"}, + {[missing, missing], [custom, missing], "doc.type must be user"}, + {[missing, missing], [missing, other], "doc.type must be user"}, + {[missing, missing], [custom, other], "doc.type must be user"}, + + {[missing, user], [missing, missing], "doc.type must be user"}, + {[missing, user], [missing, user], "doc.roles must exist"}, + {[missing, user], [custom, missing], "doc.type must be user"}, + {[missing, user], [missing, other], "doc.type must be user"}, + {[missing, user], [custom, other], "doc.type must be user"}, + + {[missing, other], [missing, missing], "doc.type must be user"}, + {[missing, other], [missing, user], "doc.roles must exist"}, + {[missing, other], [custom, missing], "doc.type must be user"}, + {[missing, other], [missing, other], "doc.type must be user"}, + {[missing, other], [custom, other], "doc.type must be user"}, + + {[custom, missing], [missing, missing], "doc.type must be user"}, + {[custom, missing], [missing, user], "doc.roles must exist"}, + {[custom, missing], [custom, missing], "doc.type must be user"}, + {[custom, missing], [missing, other], "doc.type must be user"}, + {[custom, missing], [custom, other], "doc.type must be user"}, + + {[custom, other], [missing, missing], "doc.type must be user"}, + {[custom, other], [missing, user], "doc.roles must exist"}, + {[custom, other], [custom, missing], "doc.type must be user"}, + {[custom, other], [missing, other], "doc.type must be user"}, + {[custom, other], [custom, other], "doc.type must be user"} + ], + + %% Make sure we covered all combinations + AllPossibleDocs = couch_tests_combinatorics:product([ + [missing, custom], + [missing, user, other] + ]), + AllPossibleCases = couch_tests_combinatorics:product( + [AllPossibleDocs, AllPossibleDocs]), + ?assertEqual([], AllPossibleCases -- [[A, B] || {A, B, _} <- Cases]), + + { + "Check User doc validation", + { + setup, + fun test_util:start_couch/0, fun test_util:stop_couch/1, + [ + make_validate_test(Case) || Case <- Cases + ] + } + }. + +should_get_nil_on_missed_cache(_) -> + ?_assertEqual(nil, couch_auth_cache:get_user_creds("joe")). + +should_get_right_password_hash(DbName) -> + ?_test(begin + PasswordHash = hash_password("pass1"), + {ok, _} = update_user_doc(DbName, "joe", "pass1"), + {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"), + ?assertEqual(PasswordHash, + couch_util:get_value(<<"password_sha">>, Creds)) + end). + +should_ensure_doc_hash_equals_cached_one(DbName) -> + ?_test(begin + {ok, _} = update_user_doc(DbName, "joe", "pass1"), + {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"), + + CachedHash = couch_util:get_value(<<"password_sha">>, Creds), + StoredHash = get_user_doc_password_sha(DbName, "joe"), + ?assertEqual(StoredHash, CachedHash) + end). + +should_update_password(DbName) -> + ?_test(begin + PasswordHash = hash_password("pass2"), + {ok, Rev} = update_user_doc(DbName, "joe", "pass1"), + {ok, _} = update_user_doc(DbName, "joe", "pass2", Rev), + {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"), + ?assertEqual(PasswordHash, + couch_util:get_value(<<"password_sha">>, Creds)) + end). + +should_cleanup_cache_after_userdoc_deletion(DbName) -> + ?_test(begin + {ok, _} = update_user_doc(DbName, "joe", "pass1"), + delete_user_doc(DbName, "joe"), + ?assertEqual(nil, couch_auth_cache:get_user_creds("joe")) + end). + +should_restore_cache_after_userdoc_recreation(DbName) -> + ?_test(begin + PasswordHash = hash_password("pass5"), + {ok, _} = update_user_doc(DbName, "joe", "pass1"), + delete_user_doc(DbName, "joe"), + ?assertEqual(nil, couch_auth_cache:get_user_creds("joe")), + + {ok, _} = update_user_doc(DbName, "joe", "pass5"), + {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"), + + ?assertEqual(PasswordHash, + couch_util:get_value(<<"password_sha">>, Creds)) + end). + +should_drop_cache_on_auth_db_change(DbName) -> + ?_test(begin + {ok, _} = update_user_doc(DbName, "joe", "pass1"), + full_commit(DbName), + config:set("couch_httpd_auth", "authentication_db", + ?b2l(?tempdb()), false), + ?assertEqual(nil, couch_auth_cache:get_user_creds("joe")) + end). + +should_restore_cache_on_auth_db_change(DbName) -> + ?_test(begin + PasswordHash = hash_password("pass1"), + {ok, _} = update_user_doc(DbName, "joe", "pass1"), + {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"), + full_commit(DbName), + + DbName1 = ?tempdb(), + config:set("couch_httpd_auth", "authentication_db", + ?b2l(DbName1), false), + + {ok, _} = update_user_doc(DbName1, "joe", "pass5"), + full_commit(DbName1), + + config:set("couch_httpd_auth", "authentication_db", + ?b2l(DbName), false), + + {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"), + ?assertEqual(PasswordHash, + couch_util:get_value(<<"password_sha">>, Creds)) + end). + +should_recover_cache_after_shutdown(DbName) -> + ?_test(begin + PasswordHash = hash_password("pass2"), + {ok, Rev0} = update_user_doc(DbName, "joe", "pass1"), + {ok, Rev1} = update_user_doc(DbName, "joe", "pass2", Rev0), + full_commit(DbName), + shutdown_db(DbName), + {ok, Rev1} = get_doc_rev(DbName, "joe"), + ?assertEqual(PasswordHash, get_user_doc_password_sha(DbName, "joe")) + end). + +should_close_old_db_on_auth_db_change(DbName) -> + {timeout, ?DB_TIMEOUT, ?_test(begin + ?assertEqual(ok, wait_db(DbName, fun is_opened/1)), + config:set("couch_httpd_auth", "authentication_db", + ?b2l(?tempdb()), false), + ?assertEqual(ok, wait_db(DbName, fun is_closed/1)) + end)}. + +should_get_admin_from_config(_DbName) -> + ?_test(begin + config:set("admins", "testadmin", "password", false), + Creds = test_util:wait(fun() -> + case couch_auth_cache:get_user_creds("testadmin") of + {ok, Creds0, _} -> Creds0; + nil -> wait + end + end), + Roles = couch_util:get_value(<<"roles">>, Creds), + ?assertEqual([<<"_admin">>], Roles) + end). + +update_user_doc(DbName, UserName, Password) -> + update_user_doc(DbName, UserName, Password, nil). + +update_user_doc(DbName, UserName, Password, Rev) -> + User = iolist_to_binary(UserName), + Doc = couch_doc:from_json_obj({[ + {<<"_id">>, <<"org.couchdb.user:", User/binary>>}, + {<<"name">>, User}, + {<<"type">>, <<"user">>}, + {<<"salt">>, ?SALT}, + {<<"password_sha">>, hash_password(Password)}, + {<<"roles">>, []} + ] ++ case Rev of + nil -> []; + _ -> [{<<"_rev">>, Rev}] + end + }), + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + {ok, NewRev} = couch_db:update_doc(AuthDb, Doc, []), + ok = couch_db:close(AuthDb), + {ok, couch_doc:rev_to_str(NewRev)}. + +wait_db(Db, DbFun) -> + test_util:wait(fun() -> + case DbFun(Db) of + true -> + ok; + false -> + wait + end + end, ?DB_TIMEOUT, 500). + + +hash_password(Password) -> + ?l2b(couch_util:to_hex(crypto:hash(sha, iolist_to_binary([Password, ?SALT])))). + +shutdown_db(DbName) -> + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + ok = couch_db:close(AuthDb), + couch_util:shutdown_sync(couch_db:get_pid(AuthDb)), + ok = timer:sleep(1000). + +get_doc_rev(DbName, UserName) -> + DocId = iolist_to_binary([<<"org.couchdb.user:">>, UserName]), + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + UpdateRev = + case couch_db:open_doc(AuthDb, DocId, []) of + {ok, Doc} -> + {Props} = couch_doc:to_json_obj(Doc, []), + couch_util:get_value(<<"_rev">>, Props); + {not_found, missing} -> + nil + end, + ok = couch_db:close(AuthDb), + {ok, UpdateRev}. + +get_user_doc_password_sha(DbName, UserName) -> + DocId = iolist_to_binary([<<"org.couchdb.user:">>, UserName]), + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + {ok, Doc} = couch_db:open_doc(AuthDb, DocId, []), + ok = couch_db:close(AuthDb), + {Props} = couch_doc:to_json_obj(Doc, []), + couch_util:get_value(<<"password_sha">>, Props). + +delete_user_doc(DbName, UserName) -> + DocId = iolist_to_binary([<<"org.couchdb.user:">>, UserName]), + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + {ok, Doc} = couch_db:open_doc(AuthDb, DocId, []), + {Props} = couch_doc:to_json_obj(Doc, []), + DeletedDoc = couch_doc:from_json_obj({[ + {<<"_id">>, DocId}, + {<<"_rev">>, couch_util:get_value(<<"_rev">>, Props)}, + {<<"_deleted">>, true} + ]}), + {ok, _} = couch_db:update_doc(AuthDb, DeletedDoc, []), + ok = couch_db:close(AuthDb). + +full_commit(DbName) -> + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + {ok, _} = couch_db:ensure_full_commit(AuthDb), + ok = couch_db:close(AuthDb). + +is_opened(DbName) -> + {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]), + Monitors = couch_db:monitored_by(AuthDb) -- [self()], + ok = couch_db:close(AuthDb), + Monitors /= []. + +is_closed(DbName) -> + not is_opened(DbName). + +make_validate_test({Old, New, "ok"} = Case) -> + {test_id(Case), ?_assertEqual(ok, validate(doc(Old), doc(New)))}; +make_validate_test({Old, New, Reason} = Case) -> + Failure = ?l2b(Reason), + {test_id(Case), ?_assertThrow({forbidden, Failure}, validate(doc(Old), doc(New)))}. + +test_id({[OldRoles, OldType], [NewRoles, NewType], Result}) -> + lists:flatten(io_lib:format( + "(roles: ~w, type: ~w) -> (roles: ~w, type: ~w) ==> \"~s\"", + [OldRoles, OldType, NewRoles, NewType, Result])). + +doc([Roles, Type]) -> + couch_doc:from_json_obj({[ + {<<"_id">>,<<"org.couchdb.user:foo">>}, + {<<"_rev">>,<<"1-281c81adb1bf10927a6160f246dc0468">>}, + {<<"name">>,<<"foo">>}, + {<<"password_scheme">>,<<"simple">>}, + {<<"salt">>,<<"00000000000000000000000000000000">>}, + {<<"password_sha">>, <<"111111111111111111111111111111111111">>}] + ++ type(Type) ++ roles(Roles)}). + +roles(custom) -> [{<<"roles">>, [<<"custom">>]}]; +roles(missing) -> []. + +type(user) -> [{<<"type">>, <<"user">>}]; +type(other) -> [{<<"type">>, <<"other">>}]; +type(missing) -> []. + +validate(DiskDoc, NewDoc) -> + JSONCtx = {[ + {<<"db">>, <<"foo/bar">>}, + {<<"name">>, <<"foo">>}, + {<<"roles">>, [<<"_admin">>]} + ]}, + validate(DiskDoc, NewDoc, JSONCtx). + +validate(DiskDoc, NewDoc, JSONCtx) -> + {ok, DDoc0} = couch_auth_cache:auth_design_doc(<<"_design/anything">>), + DDoc = DDoc0#doc{revs = {1, [<<>>]}}, + couch_query_servers:validate_doc_update(DDoc, NewDoc, DiskDoc, JSONCtx, []). |