server_admin_test.go 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288
  1. package server
  2. import (
  3. "github.com/stretchr/testify/require"
  4. "heckel.io/ntfy/v2/user"
  5. "heckel.io/ntfy/v2/util"
  6. "sync/atomic"
  7. "testing"
  8. "time"
  9. )
  10. func TestUser_AddRemove(t *testing.T) {
  11. s := newTestServer(t, newTestConfigWithAuthFile(t))
  12. defer s.closeDatabases()
  13. // Create admin, tier
  14. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  15. require.Nil(t, s.userManager.AddTier(&user.Tier{
  16. Code: "tier1",
  17. }))
  18. // Create user via API
  19. rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password":"ben"}`, map[string]string{
  20. "Authorization": util.BasicAuth("phil", "phil"),
  21. })
  22. require.Equal(t, 200, rr.Code)
  23. // Create user with tier via API
  24. rr = request(t, s, "PUT", "/v1/users", `{"username": "emma", "password":"emma", "tier": "tier1"}`, map[string]string{
  25. "Authorization": util.BasicAuth("phil", "phil"),
  26. })
  27. require.Equal(t, 200, rr.Code)
  28. // Check users
  29. users, err := s.userManager.Users()
  30. require.Nil(t, err)
  31. require.Equal(t, 4, len(users))
  32. require.Equal(t, "phil", users[0].Name)
  33. require.Equal(t, "ben", users[1].Name)
  34. require.Equal(t, user.RoleUser, users[1].Role)
  35. require.Nil(t, users[1].Tier)
  36. require.Equal(t, "emma", users[2].Name)
  37. require.Equal(t, user.RoleUser, users[2].Role)
  38. require.Equal(t, "tier1", users[2].Tier.Code)
  39. require.Equal(t, user.Everyone, users[3].Name)
  40. // Delete user via API
  41. rr = request(t, s, "DELETE", "/v1/users", `{"username": "ben"}`, map[string]string{
  42. "Authorization": util.BasicAuth("phil", "phil"),
  43. })
  44. require.Equal(t, 200, rr.Code)
  45. // Check user was deleted
  46. users, err = s.userManager.Users()
  47. require.Nil(t, err)
  48. require.Equal(t, 3, len(users))
  49. require.Equal(t, "phil", users[0].Name)
  50. require.Equal(t, "emma", users[1].Name)
  51. require.Equal(t, user.Everyone, users[2].Name)
  52. // Reject invalid user change
  53. rr = request(t, s, "PUT", "/v1/users", `{"username": "ben"}`, map[string]string{
  54. "Authorization": util.BasicAuth("phil", "phil"),
  55. })
  56. require.Equal(t, 400, rr.Code)
  57. }
  58. func TestUser_ChangeUserPassword(t *testing.T) {
  59. s := newTestServer(t, newTestConfigWithAuthFile(t))
  60. defer s.closeDatabases()
  61. // Create admin
  62. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  63. // Create user via API
  64. rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password": "ben"}`, map[string]string{
  65. "Authorization": util.BasicAuth("phil", "phil"),
  66. })
  67. require.Equal(t, 200, rr.Code)
  68. // Try to login with first password
  69. rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
  70. "Authorization": util.BasicAuth("ben", "ben"),
  71. })
  72. require.Equal(t, 200, rr.Code)
  73. // Change password via API
  74. rr = request(t, s, "PUT", "/v1/users", `{"username": "ben", "password": "ben-two"}`, map[string]string{
  75. "Authorization": util.BasicAuth("phil", "phil"),
  76. })
  77. require.Equal(t, 200, rr.Code)
  78. // Make sure first password fails
  79. rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
  80. "Authorization": util.BasicAuth("ben", "ben"),
  81. })
  82. require.Equal(t, 401, rr.Code)
  83. // Try to login with second password
  84. rr = request(t, s, "POST", "/v1/account/token", "", map[string]string{
  85. "Authorization": util.BasicAuth("ben", "ben-two"),
  86. })
  87. require.Equal(t, 200, rr.Code)
  88. }
  89. func TestUser_ChangeUserTier(t *testing.T) {
  90. s := newTestServer(t, newTestConfigWithAuthFile(t))
  91. defer s.closeDatabases()
  92. // Create admin, tier
  93. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  94. require.Nil(t, s.userManager.AddTier(&user.Tier{
  95. Code: "tier1",
  96. }))
  97. require.Nil(t, s.userManager.AddTier(&user.Tier{
  98. Code: "tier2",
  99. }))
  100. // Create user with tier via API
  101. rr := request(t, s, "POST", "/v1/users", `{"username": "ben", "password":"ben", "tier": "tier1"}`, map[string]string{
  102. "Authorization": util.BasicAuth("phil", "phil"),
  103. })
  104. require.Equal(t, 200, rr.Code)
  105. // Check users
  106. users, err := s.userManager.Users()
  107. require.Nil(t, err)
  108. require.Equal(t, 3, len(users))
  109. require.Equal(t, "phil", users[0].Name)
  110. require.Equal(t, "ben", users[1].Name)
  111. require.Equal(t, user.RoleUser, users[1].Role)
  112. require.Equal(t, "tier1", users[1].Tier.Code)
  113. // Change user tier via API
  114. rr = request(t, s, "PUT", "/v1/users", `{"username": "ben", "tier": "tier2"}`, map[string]string{
  115. "Authorization": util.BasicAuth("phil", "phil"),
  116. })
  117. require.Equal(t, 200, rr.Code)
  118. // Check users again
  119. users, err = s.userManager.Users()
  120. require.Nil(t, err)
  121. require.Equal(t, "tier2", users[1].Tier.Code)
  122. }
  123. func TestUser_DontChangeAdminPassword(t *testing.T) {
  124. s := newTestServer(t, newTestConfigWithAuthFile(t))
  125. defer s.closeDatabases()
  126. // Create admin
  127. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  128. require.Nil(t, s.userManager.AddUser("admin", "admin", user.RoleAdmin))
  129. // Try to change password via API
  130. rr := request(t, s, "PUT", "/v1/users", `{"username": "admin", "password": "admin-new"}`, map[string]string{
  131. "Authorization": util.BasicAuth("phil", "phil"),
  132. })
  133. require.Equal(t, 403, rr.Code)
  134. }
  135. func TestUser_AddRemove_Failures(t *testing.T) {
  136. s := newTestServer(t, newTestConfigWithAuthFile(t))
  137. defer s.closeDatabases()
  138. // Create admin
  139. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  140. require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser))
  141. // Cannot create user with invalid username
  142. rr := request(t, s, "POST", "/v1/users", `{"username": "not valid", "password":"ben"}`, map[string]string{
  143. "Authorization": util.BasicAuth("phil", "phil"),
  144. })
  145. require.Equal(t, 400, rr.Code)
  146. // Cannot create user if user already exists
  147. rr = request(t, s, "POST", "/v1/users", `{"username": "phil", "password":"phil"}`, map[string]string{
  148. "Authorization": util.BasicAuth("phil", "phil"),
  149. })
  150. require.Equal(t, 40901, toHTTPError(t, rr.Body.String()).Code)
  151. // Cannot create user with invalid tier
  152. rr = request(t, s, "POST", "/v1/users", `{"username": "emma", "password":"emma", "tier": "invalid"}`, map[string]string{
  153. "Authorization": util.BasicAuth("phil", "phil"),
  154. })
  155. require.Equal(t, 40030, toHTTPError(t, rr.Body.String()).Code)
  156. // Cannot delete user as non-admin
  157. rr = request(t, s, "DELETE", "/v1/users", `{"username": "ben"}`, map[string]string{
  158. "Authorization": util.BasicAuth("ben", "ben"),
  159. })
  160. require.Equal(t, 401, rr.Code)
  161. // Delete user via API
  162. rr = request(t, s, "DELETE", "/v1/users", `{"username": "ben"}`, map[string]string{
  163. "Authorization": util.BasicAuth("phil", "phil"),
  164. })
  165. require.Equal(t, 200, rr.Code)
  166. }
  167. func TestAccess_AllowReset(t *testing.T) {
  168. c := newTestConfigWithAuthFile(t)
  169. c.AuthDefault = user.PermissionDenyAll
  170. s := newTestServer(t, c)
  171. defer s.closeDatabases()
  172. // User and admin
  173. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  174. require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser))
  175. // Subscribing not allowed
  176. rr := request(t, s, "GET", "/gold/json?poll=1", "", map[string]string{
  177. "Authorization": util.BasicAuth("ben", "ben"),
  178. })
  179. require.Equal(t, 403, rr.Code)
  180. // Grant access
  181. rr = request(t, s, "POST", "/v1/users/access", `{"username": "ben", "topic":"gold", "permission":"ro"}`, map[string]string{
  182. "Authorization": util.BasicAuth("phil", "phil"),
  183. })
  184. require.Equal(t, 200, rr.Code)
  185. // Now subscribing is allowed
  186. rr = request(t, s, "GET", "/gold/json?poll=1", "", map[string]string{
  187. "Authorization": util.BasicAuth("ben", "ben"),
  188. })
  189. require.Equal(t, 200, rr.Code)
  190. // Reset access
  191. rr = request(t, s, "DELETE", "/v1/users/access", `{"username": "ben", "topic":"gold"}`, map[string]string{
  192. "Authorization": util.BasicAuth("phil", "phil"),
  193. })
  194. require.Equal(t, 200, rr.Code)
  195. // Subscribing not allowed (again)
  196. rr = request(t, s, "GET", "/gold/json?poll=1", "", map[string]string{
  197. "Authorization": util.BasicAuth("ben", "ben"),
  198. })
  199. require.Equal(t, 403, rr.Code)
  200. }
  201. func TestAccess_AllowReset_NonAdminAttempt(t *testing.T) {
  202. c := newTestConfigWithAuthFile(t)
  203. c.AuthDefault = user.PermissionDenyAll
  204. s := newTestServer(t, c)
  205. defer s.closeDatabases()
  206. // User
  207. require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser))
  208. // Grant access fails, because non-admin
  209. rr := request(t, s, "POST", "/v1/users/access", `{"username": "ben", "topic":"gold", "permission":"ro"}`, map[string]string{
  210. "Authorization": util.BasicAuth("ben", "ben"),
  211. })
  212. require.Equal(t, 401, rr.Code)
  213. }
  214. func TestAccess_AllowReset_KillConnection(t *testing.T) {
  215. c := newTestConfigWithAuthFile(t)
  216. c.AuthDefault = user.PermissionDenyAll
  217. s := newTestServer(t, c)
  218. defer s.closeDatabases()
  219. // User and admin, grant access to "gol*" topics
  220. require.Nil(t, s.userManager.AddUser("phil", "phil", user.RoleAdmin))
  221. require.Nil(t, s.userManager.AddUser("ben", "ben", user.RoleUser))
  222. require.Nil(t, s.userManager.AllowAccess("ben", "gol*", user.PermissionRead)) // Wildcard!
  223. start, timeTaken := time.Now(), atomic.Int64{}
  224. go func() {
  225. rr := request(t, s, "GET", "/gold/json", "", map[string]string{
  226. "Authorization": util.BasicAuth("ben", "ben"),
  227. })
  228. require.Equal(t, 200, rr.Code)
  229. timeTaken.Store(time.Since(start).Milliseconds())
  230. }()
  231. time.Sleep(500 * time.Millisecond)
  232. // Reset access
  233. rr := request(t, s, "DELETE", "/v1/users/access", `{"username": "ben", "topic":"gol*"}`, map[string]string{
  234. "Authorization": util.BasicAuth("phil", "phil"),
  235. })
  236. require.Equal(t, 200, rr.Code)
  237. // Wait for connection to be killed; this will fail if the connection is never killed
  238. waitFor(t, func() bool {
  239. return timeTaken.Load() >= 500
  240. })
  241. }