summaryrefslogtreecommitdiff
path: root/src/couch/test/eunit/couch_auth_cache_tests.erl
diff options
context:
space:
mode:
Diffstat (limited to 'src/couch/test/eunit/couch_auth_cache_tests.erl')
-rw-r--r--src/couch/test/eunit/couch_auth_cache_tests.erl384
1 files changed, 384 insertions, 0 deletions
diff --git a/src/couch/test/eunit/couch_auth_cache_tests.erl b/src/couch/test/eunit/couch_auth_cache_tests.erl
new file mode 100644
index 000000000..706c0cee9
--- /dev/null
+++ b/src/couch/test/eunit/couch_auth_cache_tests.erl
@@ -0,0 +1,384 @@
+% Licensed under the Apache License, Version 2.0 (the "License"); you may not
+% use this file except in compliance with the License. You may obtain a copy of
+% the License at
+%
+% http://www.apache.org/licenses/LICENSE-2.0
+%
+% Unless required by applicable law or agreed to in writing, software
+% distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+% WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+% License for the specific language governing permissions and limitations under
+% the License.
+
+-module(couch_auth_cache_tests).
+
+-include_lib("couch/include/couch_eunit.hrl").
+-include_lib("couch/include/couch_db.hrl").
+
+-define(SALT, <<"SALT">>).
+-define(DB_TIMEOUT, 15000).
+
+start() ->
+ test_util:start_couch([ioq]).
+
+
+setup() ->
+ DbName = ?tempdb(),
+ config:set("couch_httpd_auth", "authentication_db",
+ ?b2l(DbName), false),
+ DbName.
+
+teardown(DbName) ->
+ ok = couch_server:delete(DbName, [?ADMIN_CTX]),
+ ok.
+
+
+couch_auth_cache_test_() ->
+ {
+ "CouchDB auth cache tests",
+ {
+ setup,
+ fun start/0, fun test_util:stop_couch/1,
+ {
+ foreach,
+ fun setup/0, fun teardown/1,
+ [
+ fun should_get_nil_on_missed_cache/1,
+ fun should_get_right_password_hash/1,
+ fun should_ensure_doc_hash_equals_cached_one/1,
+ fun should_update_password/1,
+ fun should_cleanup_cache_after_userdoc_deletion/1,
+ fun should_restore_cache_after_userdoc_recreation/1,
+ fun should_drop_cache_on_auth_db_change/1,
+ fun should_restore_cache_on_auth_db_change/1,
+ fun should_recover_cache_after_shutdown/1,
+ fun should_close_old_db_on_auth_db_change/1,
+ fun should_get_admin_from_config/1
+ ]
+ }
+ }
+ }.
+
+auth_vdu_test_() ->
+ Cases = [
+ %% Old , New , Result
+ %% [Roles, Type] , [Roles, Type] ,
+
+ %% Updating valid user doc with valid one
+ {[custom, user], [custom, user], "ok"},
+
+ %% Updating invalid doc (missing type or roles field) with valid one
+ {[missing, missing], [custom, user], "ok"},
+ {[missing, user], [custom, user], "ok"},
+ {[custom, missing], [custom, user], "ok"},
+
+ %% Updating invalid doc (wrong type) with valid one
+ {[missing, other], [custom, user], "ok"},
+ {[custom, other], [custom, user], "ok"},
+
+ %% Updating valid document with invalid one
+ {[custom, user], [missing, missing], "doc.type must be user"},
+ {[custom, user], [missing, user], "doc.roles must exist"},
+ {[custom, user], [custom, missing], "doc.type must be user"},
+ {[custom, user], [missing, other], "doc.type must be user"},
+ {[custom, user], [custom, other], "doc.type must be user"},
+
+ %% Updating invalid doc with invalid one
+ {[missing, missing], [missing, missing], "doc.type must be user"},
+ {[missing, missing], [missing, user], "doc.roles must exist"},
+ {[missing, missing], [custom, missing], "doc.type must be user"},
+ {[missing, missing], [missing, other], "doc.type must be user"},
+ {[missing, missing], [custom, other], "doc.type must be user"},
+
+ {[missing, user], [missing, missing], "doc.type must be user"},
+ {[missing, user], [missing, user], "doc.roles must exist"},
+ {[missing, user], [custom, missing], "doc.type must be user"},
+ {[missing, user], [missing, other], "doc.type must be user"},
+ {[missing, user], [custom, other], "doc.type must be user"},
+
+ {[missing, other], [missing, missing], "doc.type must be user"},
+ {[missing, other], [missing, user], "doc.roles must exist"},
+ {[missing, other], [custom, missing], "doc.type must be user"},
+ {[missing, other], [missing, other], "doc.type must be user"},
+ {[missing, other], [custom, other], "doc.type must be user"},
+
+ {[custom, missing], [missing, missing], "doc.type must be user"},
+ {[custom, missing], [missing, user], "doc.roles must exist"},
+ {[custom, missing], [custom, missing], "doc.type must be user"},
+ {[custom, missing], [missing, other], "doc.type must be user"},
+ {[custom, missing], [custom, other], "doc.type must be user"},
+
+ {[custom, other], [missing, missing], "doc.type must be user"},
+ {[custom, other], [missing, user], "doc.roles must exist"},
+ {[custom, other], [custom, missing], "doc.type must be user"},
+ {[custom, other], [missing, other], "doc.type must be user"},
+ {[custom, other], [custom, other], "doc.type must be user"}
+ ],
+
+ %% Make sure we covered all combinations
+ AllPossibleDocs = couch_tests_combinatorics:product([
+ [missing, custom],
+ [missing, user, other]
+ ]),
+ AllPossibleCases = couch_tests_combinatorics:product(
+ [AllPossibleDocs, AllPossibleDocs]),
+ ?assertEqual([], AllPossibleCases -- [[A, B] || {A, B, _} <- Cases]),
+
+ {
+ "Check User doc validation",
+ {
+ setup,
+ fun test_util:start_couch/0, fun test_util:stop_couch/1,
+ [
+ make_validate_test(Case) || Case <- Cases
+ ]
+ }
+ }.
+
+should_get_nil_on_missed_cache(_) ->
+ ?_assertEqual(nil, couch_auth_cache:get_user_creds("joe")).
+
+should_get_right_password_hash(DbName) ->
+ ?_test(begin
+ PasswordHash = hash_password("pass1"),
+ {ok, _} = update_user_doc(DbName, "joe", "pass1"),
+ {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"),
+ ?assertEqual(PasswordHash,
+ couch_util:get_value(<<"password_sha">>, Creds))
+ end).
+
+should_ensure_doc_hash_equals_cached_one(DbName) ->
+ ?_test(begin
+ {ok, _} = update_user_doc(DbName, "joe", "pass1"),
+ {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"),
+
+ CachedHash = couch_util:get_value(<<"password_sha">>, Creds),
+ StoredHash = get_user_doc_password_sha(DbName, "joe"),
+ ?assertEqual(StoredHash, CachedHash)
+ end).
+
+should_update_password(DbName) ->
+ ?_test(begin
+ PasswordHash = hash_password("pass2"),
+ {ok, Rev} = update_user_doc(DbName, "joe", "pass1"),
+ {ok, _} = update_user_doc(DbName, "joe", "pass2", Rev),
+ {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"),
+ ?assertEqual(PasswordHash,
+ couch_util:get_value(<<"password_sha">>, Creds))
+ end).
+
+should_cleanup_cache_after_userdoc_deletion(DbName) ->
+ ?_test(begin
+ {ok, _} = update_user_doc(DbName, "joe", "pass1"),
+ delete_user_doc(DbName, "joe"),
+ ?assertEqual(nil, couch_auth_cache:get_user_creds("joe"))
+ end).
+
+should_restore_cache_after_userdoc_recreation(DbName) ->
+ ?_test(begin
+ PasswordHash = hash_password("pass5"),
+ {ok, _} = update_user_doc(DbName, "joe", "pass1"),
+ delete_user_doc(DbName, "joe"),
+ ?assertEqual(nil, couch_auth_cache:get_user_creds("joe")),
+
+ {ok, _} = update_user_doc(DbName, "joe", "pass5"),
+ {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"),
+
+ ?assertEqual(PasswordHash,
+ couch_util:get_value(<<"password_sha">>, Creds))
+ end).
+
+should_drop_cache_on_auth_db_change(DbName) ->
+ ?_test(begin
+ {ok, _} = update_user_doc(DbName, "joe", "pass1"),
+ full_commit(DbName),
+ config:set("couch_httpd_auth", "authentication_db",
+ ?b2l(?tempdb()), false),
+ ?assertEqual(nil, couch_auth_cache:get_user_creds("joe"))
+ end).
+
+should_restore_cache_on_auth_db_change(DbName) ->
+ ?_test(begin
+ PasswordHash = hash_password("pass1"),
+ {ok, _} = update_user_doc(DbName, "joe", "pass1"),
+ {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"),
+ full_commit(DbName),
+
+ DbName1 = ?tempdb(),
+ config:set("couch_httpd_auth", "authentication_db",
+ ?b2l(DbName1), false),
+
+ {ok, _} = update_user_doc(DbName1, "joe", "pass5"),
+ full_commit(DbName1),
+
+ config:set("couch_httpd_auth", "authentication_db",
+ ?b2l(DbName), false),
+
+ {ok, Creds, _} = couch_auth_cache:get_user_creds("joe"),
+ ?assertEqual(PasswordHash,
+ couch_util:get_value(<<"password_sha">>, Creds))
+ end).
+
+should_recover_cache_after_shutdown(DbName) ->
+ ?_test(begin
+ PasswordHash = hash_password("pass2"),
+ {ok, Rev0} = update_user_doc(DbName, "joe", "pass1"),
+ {ok, Rev1} = update_user_doc(DbName, "joe", "pass2", Rev0),
+ full_commit(DbName),
+ shutdown_db(DbName),
+ {ok, Rev1} = get_doc_rev(DbName, "joe"),
+ ?assertEqual(PasswordHash, get_user_doc_password_sha(DbName, "joe"))
+ end).
+
+should_close_old_db_on_auth_db_change(DbName) ->
+ {timeout, ?DB_TIMEOUT, ?_test(begin
+ ?assertEqual(ok, wait_db(DbName, fun is_opened/1)),
+ config:set("couch_httpd_auth", "authentication_db",
+ ?b2l(?tempdb()), false),
+ ?assertEqual(ok, wait_db(DbName, fun is_closed/1))
+ end)}.
+
+should_get_admin_from_config(_DbName) ->
+ ?_test(begin
+ config:set("admins", "testadmin", "password", false),
+ Creds = test_util:wait(fun() ->
+ case couch_auth_cache:get_user_creds("testadmin") of
+ {ok, Creds0, _} -> Creds0;
+ nil -> wait
+ end
+ end),
+ Roles = couch_util:get_value(<<"roles">>, Creds),
+ ?assertEqual([<<"_admin">>], Roles)
+ end).
+
+update_user_doc(DbName, UserName, Password) ->
+ update_user_doc(DbName, UserName, Password, nil).
+
+update_user_doc(DbName, UserName, Password, Rev) ->
+ User = iolist_to_binary(UserName),
+ Doc = couch_doc:from_json_obj({[
+ {<<"_id">>, <<"org.couchdb.user:", User/binary>>},
+ {<<"name">>, User},
+ {<<"type">>, <<"user">>},
+ {<<"salt">>, ?SALT},
+ {<<"password_sha">>, hash_password(Password)},
+ {<<"roles">>, []}
+ ] ++ case Rev of
+ nil -> [];
+ _ -> [{<<"_rev">>, Rev}]
+ end
+ }),
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ {ok, NewRev} = couch_db:update_doc(AuthDb, Doc, []),
+ ok = couch_db:close(AuthDb),
+ {ok, couch_doc:rev_to_str(NewRev)}.
+
+wait_db(Db, DbFun) ->
+ test_util:wait(fun() ->
+ case DbFun(Db) of
+ true ->
+ ok;
+ false ->
+ wait
+ end
+ end, ?DB_TIMEOUT, 500).
+
+
+hash_password(Password) ->
+ ?l2b(couch_util:to_hex(crypto:hash(sha, iolist_to_binary([Password, ?SALT])))).
+
+shutdown_db(DbName) ->
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ ok = couch_db:close(AuthDb),
+ couch_util:shutdown_sync(couch_db:get_pid(AuthDb)),
+ ok = timer:sleep(1000).
+
+get_doc_rev(DbName, UserName) ->
+ DocId = iolist_to_binary([<<"org.couchdb.user:">>, UserName]),
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ UpdateRev =
+ case couch_db:open_doc(AuthDb, DocId, []) of
+ {ok, Doc} ->
+ {Props} = couch_doc:to_json_obj(Doc, []),
+ couch_util:get_value(<<"_rev">>, Props);
+ {not_found, missing} ->
+ nil
+ end,
+ ok = couch_db:close(AuthDb),
+ {ok, UpdateRev}.
+
+get_user_doc_password_sha(DbName, UserName) ->
+ DocId = iolist_to_binary([<<"org.couchdb.user:">>, UserName]),
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ {ok, Doc} = couch_db:open_doc(AuthDb, DocId, []),
+ ok = couch_db:close(AuthDb),
+ {Props} = couch_doc:to_json_obj(Doc, []),
+ couch_util:get_value(<<"password_sha">>, Props).
+
+delete_user_doc(DbName, UserName) ->
+ DocId = iolist_to_binary([<<"org.couchdb.user:">>, UserName]),
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ {ok, Doc} = couch_db:open_doc(AuthDb, DocId, []),
+ {Props} = couch_doc:to_json_obj(Doc, []),
+ DeletedDoc = couch_doc:from_json_obj({[
+ {<<"_id">>, DocId},
+ {<<"_rev">>, couch_util:get_value(<<"_rev">>, Props)},
+ {<<"_deleted">>, true}
+ ]}),
+ {ok, _} = couch_db:update_doc(AuthDb, DeletedDoc, []),
+ ok = couch_db:close(AuthDb).
+
+full_commit(DbName) ->
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ {ok, _} = couch_db:ensure_full_commit(AuthDb),
+ ok = couch_db:close(AuthDb).
+
+is_opened(DbName) ->
+ {ok, AuthDb} = couch_db:open_int(DbName, [?ADMIN_CTX]),
+ Monitors = couch_db:monitored_by(AuthDb) -- [self()],
+ ok = couch_db:close(AuthDb),
+ Monitors /= [].
+
+is_closed(DbName) ->
+ not is_opened(DbName).
+
+make_validate_test({Old, New, "ok"} = Case) ->
+ {test_id(Case), ?_assertEqual(ok, validate(doc(Old), doc(New)))};
+make_validate_test({Old, New, Reason} = Case) ->
+ Failure = ?l2b(Reason),
+ {test_id(Case), ?_assertThrow({forbidden, Failure}, validate(doc(Old), doc(New)))}.
+
+test_id({[OldRoles, OldType], [NewRoles, NewType], Result}) ->
+ lists:flatten(io_lib:format(
+ "(roles: ~w, type: ~w) -> (roles: ~w, type: ~w) ==> \"~s\"",
+ [OldRoles, OldType, NewRoles, NewType, Result])).
+
+doc([Roles, Type]) ->
+ couch_doc:from_json_obj({[
+ {<<"_id">>,<<"org.couchdb.user:foo">>},
+ {<<"_rev">>,<<"1-281c81adb1bf10927a6160f246dc0468">>},
+ {<<"name">>,<<"foo">>},
+ {<<"password_scheme">>,<<"simple">>},
+ {<<"salt">>,<<"00000000000000000000000000000000">>},
+ {<<"password_sha">>, <<"111111111111111111111111111111111111">>}]
+ ++ type(Type) ++ roles(Roles)}).
+
+roles(custom) -> [{<<"roles">>, [<<"custom">>]}];
+roles(missing) -> [].
+
+type(user) -> [{<<"type">>, <<"user">>}];
+type(other) -> [{<<"type">>, <<"other">>}];
+type(missing) -> [].
+
+validate(DiskDoc, NewDoc) ->
+ JSONCtx = {[
+ {<<"db">>, <<"foo/bar">>},
+ {<<"name">>, <<"foo">>},
+ {<<"roles">>, [<<"_admin">>]}
+ ]},
+ validate(DiskDoc, NewDoc, JSONCtx).
+
+validate(DiskDoc, NewDoc, JSONCtx) ->
+ {ok, DDoc0} = couch_auth_cache:auth_design_doc(<<"_design/anything">>),
+ DDoc = DDoc0#doc{revs = {1, [<<>>]}},
+ couch_query_servers:validate_doc_update(DDoc, NewDoc, DiskDoc, JSONCtx, []).