mirror of https://github.com/grafana/grafana.git
				
				
				
			
		
			
				
	
	
		
			582 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			582 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			Go
		
	
	
	
| package middleware
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"net/http/httptest"
 | |
| 	"path/filepath"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	msession "github.com/go-macaron/session"
 | |
| 	"github.com/grafana/grafana/pkg/bus"
 | |
| 	"github.com/grafana/grafana/pkg/infra/remotecache"
 | |
| 	m "github.com/grafana/grafana/pkg/models"
 | |
| 	"github.com/grafana/grafana/pkg/services/auth"
 | |
| 	"github.com/grafana/grafana/pkg/services/session"
 | |
| 	"github.com/grafana/grafana/pkg/setting"
 | |
| 	"github.com/grafana/grafana/pkg/util"
 | |
| 	. "github.com/smartystreets/goconvey/convey"
 | |
| 	"gopkg.in/macaron.v1"
 | |
| )
 | |
| 
 | |
| func TestMiddlewareContext(t *testing.T) {
 | |
| 	setting.ERR_TEMPLATE_NAME = "error-template"
 | |
| 
 | |
| 	Convey("Given the grafana middleware", t, func() {
 | |
| 		middlewareScenario(t, "middleware should add context to injector", func(sc *scenarioContext) {
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 			So(sc.context, ShouldNotBeNil)
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Default middleware should allow get request", func(sc *scenarioContext) {
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 			So(sc.resp.Code, ShouldEqual, 200)
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "middleware should add Cache-Control header for GET requests to API", func(sc *scenarioContext) {
 | |
| 			sc.fakeReq("GET", "/api/search").exec()
 | |
| 			So(sc.resp.Header().Get("Cache-Control"), ShouldEqual, "no-cache")
 | |
| 			So(sc.resp.Header().Get("Pragma"), ShouldEqual, "no-cache")
 | |
| 			So(sc.resp.Header().Get("Expires"), ShouldEqual, "-1")
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "middleware should not add Cache-Control header to for non-API GET requests", func(sc *scenarioContext) {
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 			So(sc.resp.Header().Get("Cache-Control"), ShouldBeEmpty)
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Invalid api key", func(sc *scenarioContext) {
 | |
| 			sc.apiKey = "invalid_key_test"
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 
 | |
| 			Convey("Should not init session", func() {
 | |
| 				So(sc.resp.Header().Get("Set-Cookie"), ShouldBeEmpty)
 | |
| 			})
 | |
| 
 | |
| 			Convey("Should return 401", func() {
 | |
| 				So(sc.resp.Code, ShouldEqual, 401)
 | |
| 				So(sc.respJson["message"], ShouldEqual, "Invalid API key")
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Using basic auth", func(sc *scenarioContext) {
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetUserByLoginQuery) error {
 | |
| 				query.Result = &m.User{
 | |
| 					Password: util.EncodePassword("myPass", "salt"),
 | |
| 					Salt:     "salt",
 | |
| 				}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			bus.AddHandler("test", func(loginUserQuery *m.LoginUserQuery) error {
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 				query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			setting.BasicAuthEnabled = true
 | |
| 			authHeader := util.GetBasicAuthHeader("myUser", "myPass")
 | |
| 			sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
 | |
| 
 | |
| 			Convey("Should init middleware context with user", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldEqual, true)
 | |
| 				So(sc.context.OrgId, ShouldEqual, 2)
 | |
| 				So(sc.context.UserId, ShouldEqual, 12)
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Valid api key", func(sc *scenarioContext) {
 | |
| 			keyhash := util.EncodePassword("v5nAwpMafFP6znaS4urhdWDLS5511M42", "asd")
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
 | |
| 				query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			sc.fakeReq("GET", "/").withValidApiKey().exec()
 | |
| 
 | |
| 			Convey("Should return 200", func() {
 | |
| 				So(sc.resp.Code, ShouldEqual, 200)
 | |
| 			})
 | |
| 
 | |
| 			Convey("Should init middleware context", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldEqual, true)
 | |
| 				So(sc.context.OrgId, ShouldEqual, 12)
 | |
| 				So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Valid api key, but does not match db hash", func(sc *scenarioContext) {
 | |
| 			keyhash := "something_not_matching"
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
 | |
| 				query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			sc.fakeReq("GET", "/").withValidApiKey().exec()
 | |
| 
 | |
| 			Convey("Should return api key invalid", func() {
 | |
| 				So(sc.resp.Code, ShouldEqual, 401)
 | |
| 				So(sc.respJson["message"], ShouldEqual, "Invalid API key")
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Valid api key via Basic auth", func(sc *scenarioContext) {
 | |
| 			keyhash := util.EncodePassword("v5nAwpMafFP6znaS4urhdWDLS5511M42", "asd")
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetApiKeyByNameQuery) error {
 | |
| 				query.Result = &m.ApiKey{OrgId: 12, Role: m.ROLE_EDITOR, Key: keyhash}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			authHeader := util.GetBasicAuthHeader("api_key", "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9")
 | |
| 			sc.fakeReq("GET", "/").withAuthorizationHeader(authHeader).exec()
 | |
| 
 | |
| 			Convey("Should return 200", func() {
 | |
| 				So(sc.resp.Code, ShouldEqual, 200)
 | |
| 			})
 | |
| 
 | |
| 			Convey("Should init middleware context", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldEqual, true)
 | |
| 				So(sc.context.OrgId, ShouldEqual, 12)
 | |
| 				So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Non-expired auth token in cookie which not are being rotated", func(sc *scenarioContext) {
 | |
| 			sc.withTokenSessionCookie("token")
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 				query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			sc.userAuthTokenService.LookupTokenProvider = func(unhashedToken string) (*m.UserToken, error) {
 | |
| 				return &m.UserToken{
 | |
| 					UserId:        12,
 | |
| 					UnhashedToken: unhashedToken,
 | |
| 				}, nil
 | |
| 			}
 | |
| 
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 
 | |
| 			Convey("should init context with user info", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 				So(sc.context.UserId, ShouldEqual, 12)
 | |
| 				So(sc.context.UserToken.UserId, ShouldEqual, 12)
 | |
| 				So(sc.context.UserToken.UnhashedToken, ShouldEqual, "token")
 | |
| 			})
 | |
| 
 | |
| 			Convey("should not set cookie", func() {
 | |
| 				So(sc.resp.Header().Get("Set-Cookie"), ShouldEqual, "")
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Non-expired auth token in cookie which are being rotated", func(sc *scenarioContext) {
 | |
| 			sc.withTokenSessionCookie("token")
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 				query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			sc.userAuthTokenService.LookupTokenProvider = func(unhashedToken string) (*m.UserToken, error) {
 | |
| 				return &m.UserToken{
 | |
| 					UserId:        12,
 | |
| 					UnhashedToken: "",
 | |
| 				}, nil
 | |
| 			}
 | |
| 
 | |
| 			sc.userAuthTokenService.TryRotateTokenProvider = func(userToken *m.UserToken, clientIP, userAgent string) (bool, error) {
 | |
| 				userToken.UnhashedToken = "rotated"
 | |
| 				return true, nil
 | |
| 			}
 | |
| 
 | |
| 			maxAgeHours := (time.Duration(setting.LoginMaxLifetimeDays) * 24 * time.Hour)
 | |
| 			maxAge := (maxAgeHours + time.Hour).Seconds()
 | |
| 
 | |
| 			expectedCookie := &http.Cookie{
 | |
| 				Name:     setting.LoginCookieName,
 | |
| 				Value:    "rotated",
 | |
| 				Path:     setting.AppSubUrl + "/",
 | |
| 				HttpOnly: true,
 | |
| 				MaxAge:   int(maxAge),
 | |
| 				Secure:   setting.CookieSecure,
 | |
| 				SameSite: setting.CookieSameSite,
 | |
| 			}
 | |
| 
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 
 | |
| 			Convey("should init context with user info", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 				So(sc.context.UserId, ShouldEqual, 12)
 | |
| 				So(sc.context.UserToken.UserId, ShouldEqual, 12)
 | |
| 				So(sc.context.UserToken.UnhashedToken, ShouldEqual, "rotated")
 | |
| 			})
 | |
| 
 | |
| 			Convey("should set cookie", func() {
 | |
| 				So(sc.resp.Header().Get("Set-Cookie"), ShouldEqual, expectedCookie.String())
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "Invalid/expired auth token in cookie", func(sc *scenarioContext) {
 | |
| 			sc.withTokenSessionCookie("token")
 | |
| 
 | |
| 			sc.userAuthTokenService.LookupTokenProvider = func(unhashedToken string) (*m.UserToken, error) {
 | |
| 				return nil, m.ErrUserTokenNotFound
 | |
| 			}
 | |
| 
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 
 | |
| 			Convey("should not init context with user info", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldBeFalse)
 | |
| 				So(sc.context.UserId, ShouldEqual, 0)
 | |
| 				So(sc.context.UserToken, ShouldBeNil)
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		middlewareScenario(t, "When anonymous access is enabled", func(sc *scenarioContext) {
 | |
| 			setting.AnonymousEnabled = true
 | |
| 			setting.AnonymousOrgName = "test"
 | |
| 			setting.AnonymousOrgRole = string(m.ROLE_EDITOR)
 | |
| 
 | |
| 			bus.AddHandler("test", func(query *m.GetOrgByNameQuery) error {
 | |
| 				So(query.Name, ShouldEqual, "test")
 | |
| 
 | |
| 				query.Result = &m.Org{Id: 2, Name: "test"}
 | |
| 				return nil
 | |
| 			})
 | |
| 
 | |
| 			sc.fakeReq("GET", "/").exec()
 | |
| 
 | |
| 			Convey("should init context with org info", func() {
 | |
| 				So(sc.context.UserId, ShouldEqual, 0)
 | |
| 				So(sc.context.OrgId, ShouldEqual, 2)
 | |
| 				So(sc.context.OrgRole, ShouldEqual, m.ROLE_EDITOR)
 | |
| 			})
 | |
| 
 | |
| 			Convey("context signed in should be false", func() {
 | |
| 				So(sc.context.IsSignedIn, ShouldBeFalse)
 | |
| 			})
 | |
| 		})
 | |
| 
 | |
| 		Convey("auth_proxy", func() {
 | |
| 			setting.AuthProxyEnabled = true
 | |
| 			setting.AuthProxyWhitelist = ""
 | |
| 			setting.AuthProxyAutoSignUp = true
 | |
| 			setting.LdapEnabled = true
 | |
| 			setting.AuthProxyHeaderName = "X-WEBAUTH-USER"
 | |
| 			setting.AuthProxyHeaderProperty = "username"
 | |
| 			name := "markelog"
 | |
| 
 | |
| 			middlewareScenario(t, "should sync the user if it's not in the cache", func(sc *scenarioContext) {
 | |
| 				called := false
 | |
| 				syncGrafanaUserWithLdapUser = func(query *m.LoginUserQuery) error {
 | |
| 					called = true
 | |
| 					query.User = &m.User{Id: 32}
 | |
| 					return nil
 | |
| 				}
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.UpsertUserCommand) error {
 | |
| 					query.Result = &m.User{Id: 32}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 					query.Result = &m.SignedInUser{OrgId: 4, UserId: 32}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				sc.fakeReq("GET", "/")
 | |
| 
 | |
| 				sc.req.Header.Add(setting.AuthProxyHeaderName, name)
 | |
| 				sc.exec()
 | |
| 
 | |
| 				Convey("Should init user via ldap", func() {
 | |
| 					So(called, ShouldBeTrue)
 | |
| 					So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 					So(sc.context.UserId, ShouldEqual, 32)
 | |
| 					So(sc.context.OrgId, ShouldEqual, 4)
 | |
| 				})
 | |
| 			})
 | |
| 
 | |
| 			middlewareScenario(t, "should not sync the user if it's in the cache", func(sc *scenarioContext) {
 | |
| 				called := false
 | |
| 				syncGrafanaUserWithLdapUser = func(query *m.LoginUserQuery) error {
 | |
| 					called = true
 | |
| 					query.User = &m.User{Id: 32}
 | |
| 					return nil
 | |
| 				}
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.UpsertUserCommand) error {
 | |
| 					query.Result = &m.User{Id: 32}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 					query.Result = &m.SignedInUser{OrgId: 4, UserId: 32}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				key := fmt.Sprintf(cachePrefix, name)
 | |
| 				sc.remoteCacheService.Set(key, int64(33), 0)
 | |
| 				sc.fakeReq("GET", "/")
 | |
| 
 | |
| 				sc.req.Header.Add(setting.AuthProxyHeaderName, name)
 | |
| 				sc.exec()
 | |
| 
 | |
| 				cacheValue, cacheErr := sc.remoteCacheService.Get(key)
 | |
| 
 | |
| 				Convey("Should init user via cache", func() {
 | |
| 					So(called, ShouldBeFalse)
 | |
| 
 | |
| 					So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 					So(sc.context.UserId, ShouldEqual, 32)
 | |
| 					So(sc.context.OrgId, ShouldEqual, 4)
 | |
| 
 | |
| 					So(cacheValue, ShouldEqual, 33)
 | |
| 					So(cacheErr, ShouldBeNil)
 | |
| 				})
 | |
| 			})
 | |
| 
 | |
| 			middlewareScenario(t, "should create an user from a header", func(sc *scenarioContext) {
 | |
| 				setting.LdapEnabled = false
 | |
| 				setting.AuthProxyAutoSignUp = true
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 					if query.UserId > 0 {
 | |
| 						query.Result = &m.SignedInUser{OrgId: 4, UserId: 33}
 | |
| 						return nil
 | |
| 					}
 | |
| 					return m.ErrUserNotFound
 | |
| 				})
 | |
| 
 | |
| 				bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
 | |
| 					cmd.Result = &m.User{Id: 33}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				sc.fakeReq("GET", "/")
 | |
| 				sc.req.Header.Add(setting.AuthProxyHeaderName, name)
 | |
| 				sc.exec()
 | |
| 
 | |
| 				Convey("Should create user from header info", func() {
 | |
| 					So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 					So(sc.context.UserId, ShouldEqual, 33)
 | |
| 					So(sc.context.OrgId, ShouldEqual, 4)
 | |
| 				})
 | |
| 			})
 | |
| 
 | |
| 			middlewareScenario(t, "should get an existing user from header", func(sc *scenarioContext) {
 | |
| 				setting.LdapEnabled = false
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 					query.Result = &m.SignedInUser{OrgId: 2, UserId: 12}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
 | |
| 					cmd.Result = &m.User{Id: 12}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				sc.fakeReq("GET", "/")
 | |
| 				sc.req.Header.Add(setting.AuthProxyHeaderName, name)
 | |
| 				sc.exec()
 | |
| 
 | |
| 				Convey("should init context with user info", func() {
 | |
| 					So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 					So(sc.context.UserId, ShouldEqual, 12)
 | |
| 					So(sc.context.OrgId, ShouldEqual, 2)
 | |
| 				})
 | |
| 			})
 | |
| 
 | |
| 			middlewareScenario(t, "should allow the request from whitelist IP", func(sc *scenarioContext) {
 | |
| 				setting.AuthProxyWhitelist = "192.168.1.0/24, 2001::0/120"
 | |
| 				setting.LdapEnabled = false
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 					query.Result = &m.SignedInUser{OrgId: 4, UserId: 33}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
 | |
| 					cmd.Result = &m.User{Id: 33}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				sc.fakeReq("GET", "/")
 | |
| 				sc.req.Header.Add(setting.AuthProxyHeaderName, name)
 | |
| 				sc.req.RemoteAddr = "[2001::23]:12345"
 | |
| 				sc.exec()
 | |
| 
 | |
| 				Convey("Should init context with user info", func() {
 | |
| 					So(sc.context.IsSignedIn, ShouldBeTrue)
 | |
| 					So(sc.context.UserId, ShouldEqual, 33)
 | |
| 					So(sc.context.OrgId, ShouldEqual, 4)
 | |
| 				})
 | |
| 			})
 | |
| 
 | |
| 			middlewareScenario(t, "should not allow the request from whitelist IP", func(sc *scenarioContext) {
 | |
| 				setting.AuthProxyWhitelist = "8.8.8.8"
 | |
| 				setting.LdapEnabled = false
 | |
| 
 | |
| 				bus.AddHandler("test", func(query *m.GetSignedInUserQuery) error {
 | |
| 					query.Result = &m.SignedInUser{OrgId: 4, UserId: 33}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				bus.AddHandler("test", func(cmd *m.UpsertUserCommand) error {
 | |
| 					cmd.Result = &m.User{Id: 33}
 | |
| 					return nil
 | |
| 				})
 | |
| 
 | |
| 				sc.fakeReq("GET", "/")
 | |
| 				sc.req.Header.Add(setting.AuthProxyHeaderName, name)
 | |
| 				sc.req.RemoteAddr = "[2001::23]:12345"
 | |
| 				sc.exec()
 | |
| 
 | |
| 				Convey("should return 407 status code", func() {
 | |
| 					So(sc.resp.Code, ShouldEqual, 407)
 | |
| 					So(sc.context, ShouldBeNil)
 | |
| 				})
 | |
| 			})
 | |
| 		})
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func middlewareScenario(t *testing.T, desc string, fn scenarioFunc) {
 | |
| 	Convey(desc, func() {
 | |
| 		defer bus.ClearBusHandlers()
 | |
| 
 | |
| 		setting.LoginCookieName = "grafana_session"
 | |
| 		setting.LoginMaxLifetimeDays = 30
 | |
| 
 | |
| 		sc := &scenarioContext{}
 | |
| 
 | |
| 		viewsPath, _ := filepath.Abs("../../public/views")
 | |
| 
 | |
| 		sc.m = macaron.New()
 | |
| 		sc.m.Use(macaron.Renderer(macaron.RenderOptions{
 | |
| 			Directory: viewsPath,
 | |
| 			Delims:    macaron.Delims{Left: "[[", Right: "]]"},
 | |
| 		}))
 | |
| 
 | |
| 		sc.userAuthTokenService = auth.NewFakeUserAuthTokenService()
 | |
| 		sc.remoteCacheService = remotecache.NewFakeStore(t)
 | |
| 
 | |
| 		sc.m.Use(GetContextHandler(sc.userAuthTokenService, sc.remoteCacheService))
 | |
| 		// mock out gc goroutine
 | |
| 		session.StartSessionGC = func() {}
 | |
| 		setting.SessionOptions = msession.Options{}
 | |
| 
 | |
| 		sc.m.Use(OrgRedirect())
 | |
| 		sc.m.Use(AddDefaultResponseHeaders())
 | |
| 
 | |
| 		sc.defaultHandler = func(c *m.ReqContext) {
 | |
| 			sc.context = c
 | |
| 			if sc.handlerFunc != nil {
 | |
| 				sc.handlerFunc(sc.context)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		sc.m.Get("/", sc.defaultHandler)
 | |
| 
 | |
| 		fn(sc)
 | |
| 	})
 | |
| }
 | |
| 
 | |
| type scenarioContext struct {
 | |
| 	m                    *macaron.Macaron
 | |
| 	context              *m.ReqContext
 | |
| 	resp                 *httptest.ResponseRecorder
 | |
| 	apiKey               string
 | |
| 	authHeader           string
 | |
| 	tokenSessionCookie   string
 | |
| 	respJson             map[string]interface{}
 | |
| 	handlerFunc          handlerFunc
 | |
| 	defaultHandler       macaron.Handler
 | |
| 	url                  string
 | |
| 	userAuthTokenService *auth.FakeUserAuthTokenService
 | |
| 	remoteCacheService   *remotecache.RemoteCache
 | |
| 
 | |
| 	req *http.Request
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) withValidApiKey() *scenarioContext {
 | |
| 	sc.apiKey = "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9"
 | |
| 	return sc
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) withTokenSessionCookie(unhashedToken string) *scenarioContext {
 | |
| 	sc.tokenSessionCookie = unhashedToken
 | |
| 	return sc
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) withAuthorizationHeader(authHeader string) *scenarioContext {
 | |
| 	sc.authHeader = authHeader
 | |
| 	return sc
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) fakeReq(method, url string) *scenarioContext {
 | |
| 	sc.resp = httptest.NewRecorder()
 | |
| 	req, err := http.NewRequest(method, url, nil)
 | |
| 	So(err, ShouldBeNil)
 | |
| 	sc.req = req
 | |
| 
 | |
| 	return sc
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) fakeReqWithParams(method, url string, queryParams map[string]string) *scenarioContext {
 | |
| 	sc.resp = httptest.NewRecorder()
 | |
| 	req, err := http.NewRequest(method, url, nil)
 | |
| 	q := req.URL.Query()
 | |
| 	for k, v := range queryParams {
 | |
| 		q.Add(k, v)
 | |
| 	}
 | |
| 	req.URL.RawQuery = q.Encode()
 | |
| 	So(err, ShouldBeNil)
 | |
| 	sc.req = req
 | |
| 
 | |
| 	return sc
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) handler(fn handlerFunc) *scenarioContext {
 | |
| 	sc.handlerFunc = fn
 | |
| 	return sc
 | |
| }
 | |
| 
 | |
| func (sc *scenarioContext) exec() {
 | |
| 	if sc.apiKey != "" {
 | |
| 		sc.req.Header.Add("Authorization", "Bearer "+sc.apiKey)
 | |
| 	}
 | |
| 
 | |
| 	if sc.authHeader != "" {
 | |
| 		sc.req.Header.Add("Authorization", sc.authHeader)
 | |
| 	}
 | |
| 
 | |
| 	if sc.tokenSessionCookie != "" {
 | |
| 		sc.req.AddCookie(&http.Cookie{
 | |
| 			Name:  setting.LoginCookieName,
 | |
| 			Value: sc.tokenSessionCookie,
 | |
| 		})
 | |
| 	}
 | |
| 
 | |
| 	sc.m.ServeHTTP(sc.resp, sc.req)
 | |
| 
 | |
| 	if sc.resp.Header().Get("Content-Type") == "application/json; charset=UTF-8" {
 | |
| 		err := json.NewDecoder(sc.resp.Body).Decode(&sc.respJson)
 | |
| 		So(err, ShouldBeNil)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type scenarioFunc func(c *scenarioContext)
 | |
| type handlerFunc func(c *m.ReqContext)
 |