2016-07-26 01:30:28 +05:30
|
|
|
// +build go1.7
|
|
|
|
|
2016-09-18 06:14:53 +05:30
|
|
|
// Package conformance provides conformance tests for storage implementations.
|
|
|
|
package conformance
|
2016-07-26 01:30:28 +05:30
|
|
|
|
|
|
|
import (
|
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2016-10-15 00:26:31 +05:30
|
|
|
jose "gopkg.in/square/go-jose.v2"
|
|
|
|
|
2016-10-06 04:33:53 +05:30
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
|
2016-08-11 11:01:42 +05:30
|
|
|
"github.com/coreos/dex/storage"
|
2016-09-19 21:11:54 +05:30
|
|
|
|
|
|
|
"github.com/kylelemons/godebug/pretty"
|
2016-07-26 01:30:28 +05:30
|
|
|
)
|
|
|
|
|
2016-09-19 21:11:54 +05:30
|
|
|
// ensure that values being tested on never expire.
|
|
|
|
var neverExpire = time.Now().UTC().Add(time.Hour * 24 * 365 * 100)
|
2016-07-26 01:30:28 +05:30
|
|
|
|
2016-10-13 07:17:15 +05:30
|
|
|
// RunTests runs a set of conformance tests against a storage. newStorage should
|
|
|
|
// return an initialized but empty storage. The storage will be closed at the
|
|
|
|
// end of each test run.
|
|
|
|
func RunTests(t *testing.T, newStorage func() storage.Storage) {
|
2016-09-18 06:31:15 +05:30
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
run func(t *testing.T, s storage.Storage)
|
|
|
|
}{
|
2016-09-19 21:11:54 +05:30
|
|
|
{"AuthCodeCRUD", testAuthCodeCRUD},
|
|
|
|
{"AuthRequestCRUD", testAuthRequestCRUD},
|
|
|
|
{"ClientCRUD", testClientCRUD},
|
|
|
|
{"RefreshTokenCRUD", testRefreshTokenCRUD},
|
2016-10-06 04:33:53 +05:30
|
|
|
{"PasswordCRUD", testPasswordCRUD},
|
2016-10-15 00:26:31 +05:30
|
|
|
{"KeysCRUD", testKeysCRUD},
|
2016-10-13 07:17:15 +05:30
|
|
|
{"GarbageCollection", testGC},
|
2016-09-18 06:31:15 +05:30
|
|
|
}
|
|
|
|
for _, test := range tests {
|
|
|
|
t.Run(test.name, func(t *testing.T) {
|
2016-10-13 07:17:15 +05:30
|
|
|
s := newStorage()
|
|
|
|
test.run(t, s)
|
|
|
|
s.Close()
|
2016-09-18 06:31:15 +05:30
|
|
|
})
|
|
|
|
}
|
2016-07-26 01:30:28 +05:30
|
|
|
}
|
|
|
|
|
2016-10-15 00:26:31 +05:30
|
|
|
func mustLoadJWK(b string) *jose.JSONWebKey {
|
|
|
|
var jwt jose.JSONWebKey
|
|
|
|
if err := jwt.UnmarshalJSON([]byte(b)); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return &jwt
|
|
|
|
}
|
|
|
|
|
2016-09-19 21:11:54 +05:30
|
|
|
func mustBeErrNotFound(t *testing.T, kind string, err error) {
|
|
|
|
switch {
|
|
|
|
case err == nil:
|
|
|
|
t.Errorf("deleting non-existant %s should return an error", kind)
|
|
|
|
case err != storage.ErrNotFound:
|
|
|
|
t.Errorf("deleting %s expected storage.ErrNotFound, got %v", kind, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testAuthRequestCRUD(t *testing.T, s storage.Storage) {
|
2016-07-26 01:30:28 +05:30
|
|
|
a := storage.AuthRequest{
|
2016-09-19 21:11:54 +05:30
|
|
|
ID: storage.NewID(),
|
|
|
|
ClientID: "foobar",
|
|
|
|
ResponseTypes: []string{"code"},
|
|
|
|
Scopes: []string{"openid", "email"},
|
|
|
|
RedirectURI: "https://localhost:80/callback",
|
|
|
|
Nonce: "foo",
|
|
|
|
State: "bar",
|
|
|
|
ForceApprovalPrompt: true,
|
|
|
|
LoggedIn: true,
|
|
|
|
Expiry: neverExpire,
|
|
|
|
ConnectorID: "ldap",
|
|
|
|
ConnectorData: []byte(`{"some":"data"}`),
|
|
|
|
Claims: storage.Claims{
|
|
|
|
UserID: "1",
|
|
|
|
Username: "jane",
|
|
|
|
Email: "jane.doe@example.com",
|
|
|
|
EmailVerified: true,
|
|
|
|
Groups: []string{"a", "b"},
|
|
|
|
},
|
2016-07-26 01:30:28 +05:30
|
|
|
}
|
|
|
|
|
2016-08-03 10:27:36 +05:30
|
|
|
identity := storage.Claims{Email: "foobar"}
|
2016-07-26 01:30:28 +05:30
|
|
|
|
|
|
|
if err := s.CreateAuthRequest(a); err != nil {
|
|
|
|
t.Fatalf("failed creating auth request: %v", err)
|
|
|
|
}
|
|
|
|
if err := s.UpdateAuthRequest(a.ID, func(old storage.AuthRequest) (storage.AuthRequest, error) {
|
2016-09-15 05:08:12 +05:30
|
|
|
old.Claims = identity
|
2016-07-26 01:30:28 +05:30
|
|
|
old.ConnectorID = "connID"
|
|
|
|
return old, nil
|
|
|
|
}); err != nil {
|
|
|
|
t.Fatalf("failed to update auth request: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
got, err := s.GetAuthRequest(a.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get auth req: %v", err)
|
|
|
|
}
|
2016-09-15 05:08:12 +05:30
|
|
|
if !reflect.DeepEqual(got.Claims, identity) {
|
|
|
|
t.Fatalf("update failed, wanted identity=%#v got %#v", identity, got.Claims)
|
2016-07-26 01:30:28 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-19 21:11:54 +05:30
|
|
|
func testAuthCodeCRUD(t *testing.T, s storage.Storage) {
|
|
|
|
a := storage.AuthCode{
|
|
|
|
ID: storage.NewID(),
|
|
|
|
ClientID: "foobar",
|
|
|
|
RedirectURI: "https://localhost:80/callback",
|
|
|
|
Nonce: "foobar",
|
|
|
|
Scopes: []string{"openid", "email"},
|
|
|
|
Expiry: neverExpire,
|
|
|
|
ConnectorID: "ldap",
|
|
|
|
ConnectorData: []byte(`{"some":"data"}`),
|
|
|
|
Claims: storage.Claims{
|
|
|
|
UserID: "1",
|
|
|
|
Username: "jane",
|
|
|
|
Email: "jane.doe@example.com",
|
|
|
|
EmailVerified: true,
|
|
|
|
Groups: []string{"a", "b"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.CreateAuthCode(a); err != nil {
|
|
|
|
t.Fatalf("failed creating auth code: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
got, err := s.GetAuthCode(a.ID)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to get auth req: %v", err)
|
|
|
|
}
|
|
|
|
if a.Expiry.Unix() != got.Expiry.Unix() {
|
|
|
|
t.Errorf("auth code expiry did not match want=%s vs got=%s", a.Expiry, got.Expiry)
|
|
|
|
}
|
|
|
|
got.Expiry = a.Expiry // time fields do not compare well
|
|
|
|
if diff := pretty.Compare(a, got); diff != "" {
|
|
|
|
t.Errorf("auth code retrieved from storage did not match: %s", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.DeleteAuthCode(a.ID); err != nil {
|
|
|
|
t.Fatalf("delete auth code: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = s.GetAuthCode(a.ID)
|
|
|
|
mustBeErrNotFound(t, "auth code", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testClientCRUD(t *testing.T, s storage.Storage) {
|
|
|
|
id := storage.NewID()
|
|
|
|
c := storage.Client{
|
|
|
|
ID: id,
|
|
|
|
Secret: "foobar",
|
|
|
|
RedirectURIs: []string{"foo://bar.com/", "https://auth.example.com"},
|
|
|
|
Name: "dex client",
|
|
|
|
LogoURL: "https://goo.gl/JIyzIC",
|
|
|
|
}
|
|
|
|
err := s.DeleteClient(id)
|
|
|
|
mustBeErrNotFound(t, "client", err)
|
|
|
|
|
|
|
|
if err := s.CreateClient(c); err != nil {
|
|
|
|
t.Fatalf("create client: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getAndCompare := func(id string, want storage.Client) {
|
|
|
|
gc, err := s.GetClient(id)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("get client: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if diff := pretty.Compare(want, gc); diff != "" {
|
|
|
|
t.Errorf("client retrieved from storage did not match: %s", diff)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getAndCompare(id, c)
|
|
|
|
|
|
|
|
newSecret := "barfoo"
|
|
|
|
err = s.UpdateClient(id, func(old storage.Client) (storage.Client, error) {
|
|
|
|
old.Secret = newSecret
|
|
|
|
return old, nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("update client: %v", err)
|
|
|
|
}
|
|
|
|
c.Secret = newSecret
|
|
|
|
getAndCompare(id, c)
|
|
|
|
|
|
|
|
if err := s.DeleteClient(id); err != nil {
|
|
|
|
t.Fatalf("delete client: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = s.GetClient(id)
|
|
|
|
mustBeErrNotFound(t, "client", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testRefreshTokenCRUD(t *testing.T, s storage.Storage) {
|
2016-08-03 10:27:36 +05:30
|
|
|
id := storage.NewID()
|
|
|
|
refresh := storage.RefreshToken{
|
2016-07-26 01:30:28 +05:30
|
|
|
RefreshToken: id,
|
|
|
|
ClientID: "client_id",
|
|
|
|
ConnectorID: "client_secret",
|
|
|
|
Scopes: []string{"openid", "email", "profile"},
|
2016-09-19 21:11:54 +05:30
|
|
|
Claims: storage.Claims{
|
|
|
|
UserID: "1",
|
|
|
|
Username: "jane",
|
|
|
|
Email: "jane.doe@example.com",
|
|
|
|
EmailVerified: true,
|
|
|
|
Groups: []string{"a", "b"},
|
|
|
|
},
|
2016-07-26 01:30:28 +05:30
|
|
|
}
|
|
|
|
if err := s.CreateRefresh(refresh); err != nil {
|
|
|
|
t.Fatalf("create refresh token: %v", err)
|
|
|
|
}
|
2016-09-19 21:11:54 +05:30
|
|
|
|
|
|
|
getAndCompare := func(id string, want storage.RefreshToken) {
|
|
|
|
gr, err := s.GetRefresh(id)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("get refresh: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if diff := pretty.Compare(want, gr); diff != "" {
|
|
|
|
t.Errorf("refresh token retrieved from storage did not match: %s", diff)
|
|
|
|
}
|
2016-07-26 01:30:28 +05:30
|
|
|
}
|
|
|
|
|
2016-09-19 21:11:54 +05:30
|
|
|
getAndCompare(id, refresh)
|
|
|
|
|
2016-07-26 01:30:28 +05:30
|
|
|
if err := s.DeleteRefresh(id); err != nil {
|
|
|
|
t.Fatalf("failed to delete refresh request: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.GetRefresh(id); err != storage.ErrNotFound {
|
|
|
|
t.Errorf("after deleting refresh expected storage.ErrNotFound, got %v", err)
|
|
|
|
}
|
2016-10-06 04:33:53 +05:30
|
|
|
}
|
2016-07-26 01:30:28 +05:30
|
|
|
|
2016-10-06 04:33:53 +05:30
|
|
|
func testPasswordCRUD(t *testing.T, s storage.Storage) {
|
|
|
|
// Use bcrypt.MinCost to keep the tests short.
|
|
|
|
passwordHash, err := bcrypt.GenerateFromPassword([]byte("secret"), bcrypt.MinCost)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
password := storage.Password{
|
|
|
|
Email: "jane@example.com",
|
|
|
|
Hash: passwordHash,
|
|
|
|
Username: "jane",
|
|
|
|
UserID: "foobar",
|
|
|
|
}
|
|
|
|
if err := s.CreatePassword(password); err != nil {
|
|
|
|
t.Fatalf("create password token: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getAndCompare := func(id string, want storage.Password) {
|
|
|
|
gr, err := s.GetPassword(id)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("get password %q: %v", id, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if diff := pretty.Compare(want, gr); diff != "" {
|
|
|
|
t.Errorf("password retrieved from storage did not match: %s", diff)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
getAndCompare("jane@example.com", password)
|
|
|
|
getAndCompare("JANE@example.com", password) // Emails should be case insensitive
|
|
|
|
|
|
|
|
if err := s.UpdatePassword(password.Email, func(old storage.Password) (storage.Password, error) {
|
|
|
|
old.Username = "jane doe"
|
|
|
|
return old, nil
|
|
|
|
}); err != nil {
|
|
|
|
t.Fatalf("failed to update auth request: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
password.Username = "jane doe"
|
|
|
|
getAndCompare("jane@example.com", password)
|
|
|
|
|
|
|
|
if err := s.DeletePassword(password.Email); err != nil {
|
|
|
|
t.Fatalf("failed to delete password: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.GetPassword(password.Email); err != storage.ErrNotFound {
|
|
|
|
t.Errorf("after deleting password expected storage.ErrNotFound, got %v", err)
|
|
|
|
}
|
2016-07-26 01:30:28 +05:30
|
|
|
}
|
2016-10-13 07:17:15 +05:30
|
|
|
|
2016-10-15 00:26:31 +05:30
|
|
|
func testKeysCRUD(t *testing.T, s storage.Storage) {
|
|
|
|
updateAndCompare := func(k storage.Keys) {
|
|
|
|
err := s.UpdateKeys(func(oldKeys storage.Keys) (storage.Keys, error) {
|
|
|
|
return k, nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("failed to update keys: %v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if got, err := s.GetKeys(); err != nil {
|
|
|
|
t.Errorf("failed to get keys: %v", err)
|
|
|
|
} else {
|
|
|
|
got.NextRotation = got.NextRotation.UTC()
|
|
|
|
if diff := pretty.Compare(k, got); diff != "" {
|
|
|
|
t.Errorf("got keys did not equal expected: %s", diff)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Postgres isn't as accurate with nano seconds as we'd like
|
|
|
|
n := time.Now().UTC().Round(time.Second)
|
|
|
|
|
|
|
|
keys1 := storage.Keys{
|
|
|
|
SigningKey: jsonWebKeys[0].Private,
|
|
|
|
SigningKeyPub: jsonWebKeys[0].Public,
|
|
|
|
NextRotation: n,
|
|
|
|
}
|
|
|
|
|
|
|
|
keys2 := storage.Keys{
|
|
|
|
SigningKey: jsonWebKeys[2].Private,
|
|
|
|
SigningKeyPub: jsonWebKeys[2].Public,
|
|
|
|
NextRotation: n.Add(time.Hour),
|
|
|
|
VerificationKeys: []storage.VerificationKey{
|
|
|
|
{
|
|
|
|
PublicKey: jsonWebKeys[0].Public,
|
|
|
|
Expiry: n.Add(time.Hour),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
PublicKey: jsonWebKeys[1].Public,
|
|
|
|
Expiry: n.Add(time.Hour * 2),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
updateAndCompare(keys1)
|
|
|
|
updateAndCompare(keys2)
|
|
|
|
}
|
|
|
|
|
2016-10-13 07:17:15 +05:30
|
|
|
func testGC(t *testing.T, s storage.Storage) {
|
2016-10-15 00:26:31 +05:30
|
|
|
n := time.Now().UTC()
|
2016-10-13 07:17:15 +05:30
|
|
|
c := storage.AuthCode{
|
|
|
|
ID: storage.NewID(),
|
|
|
|
ClientID: "foobar",
|
|
|
|
RedirectURI: "https://localhost:80/callback",
|
|
|
|
Nonce: "foobar",
|
|
|
|
Scopes: []string{"openid", "email"},
|
|
|
|
Expiry: n.Add(time.Second),
|
|
|
|
ConnectorID: "ldap",
|
|
|
|
ConnectorData: []byte(`{"some":"data"}`),
|
|
|
|
Claims: storage.Claims{
|
|
|
|
UserID: "1",
|
|
|
|
Username: "jane",
|
|
|
|
Email: "jane.doe@example.com",
|
|
|
|
EmailVerified: true,
|
|
|
|
Groups: []string{"a", "b"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.CreateAuthCode(c); err != nil {
|
|
|
|
t.Fatalf("failed creating auth code: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.GarbageCollect(n); err != nil {
|
|
|
|
t.Errorf("garbage collection failed: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := s.GetAuthCode(c.ID); err != nil {
|
|
|
|
t.Errorf("expected to be able to get auth code after GC: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if r, err := s.GarbageCollect(n.Add(time.Minute)); err != nil {
|
|
|
|
t.Errorf("garbage collection failed: %v", err)
|
|
|
|
} else if r.AuthCodes != 1 {
|
|
|
|
t.Errorf("expected to garbage collect 1 objects, got %d", r.AuthCodes)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.GetAuthCode(c.ID); err == nil {
|
|
|
|
t.Errorf("expected auth code to be GC'd")
|
|
|
|
} else if err != storage.ErrNotFound {
|
|
|
|
t.Errorf("expected storage.ErrNotFound, got %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
a := storage.AuthRequest{
|
|
|
|
ID: storage.NewID(),
|
|
|
|
ClientID: "foobar",
|
|
|
|
ResponseTypes: []string{"code"},
|
|
|
|
Scopes: []string{"openid", "email"},
|
|
|
|
RedirectURI: "https://localhost:80/callback",
|
|
|
|
Nonce: "foo",
|
|
|
|
State: "bar",
|
|
|
|
ForceApprovalPrompt: true,
|
|
|
|
LoggedIn: true,
|
|
|
|
Expiry: n,
|
|
|
|
ConnectorID: "ldap",
|
|
|
|
ConnectorData: []byte(`{"some":"data"}`),
|
|
|
|
Claims: storage.Claims{
|
|
|
|
UserID: "1",
|
|
|
|
Username: "jane",
|
|
|
|
Email: "jane.doe@example.com",
|
|
|
|
EmailVerified: true,
|
|
|
|
Groups: []string{"a", "b"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s.CreateAuthRequest(a); err != nil {
|
|
|
|
t.Fatalf("failed creating auth request: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.GarbageCollect(n); err != nil {
|
|
|
|
t.Errorf("garbage collection failed: %v", err)
|
|
|
|
}
|
|
|
|
if _, err := s.GetAuthRequest(a.ID); err != nil {
|
|
|
|
t.Errorf("expected to be able to get auth code after GC: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if r, err := s.GarbageCollect(n.Add(time.Minute)); err != nil {
|
|
|
|
t.Errorf("garbage collection failed: %v", err)
|
|
|
|
} else if r.AuthRequests != 1 {
|
|
|
|
t.Errorf("expected to garbage collect 1 objects, got %d", r.AuthRequests)
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := s.GetAuthRequest(a.ID); err == nil {
|
|
|
|
t.Errorf("expected auth code to be GC'd")
|
|
|
|
} else if err != storage.ErrNotFound {
|
|
|
|
t.Errorf("expected storage.ErrNotFound, got %v", err)
|
|
|
|
}
|
|
|
|
}
|