mirror of
https://github.com/steveiliop56/tinyauth.git
synced 2026-03-15 03:02:08 +00:00
tests: rework tests for proxy controller
This commit is contained in:
@@ -388,7 +388,11 @@ func (controller *ProxyController) getExtAuthzContext(c *gin.Context) (ProxyCont
|
|||||||
}
|
}
|
||||||
|
|
||||||
// It sets the host to the original host, not the forwarded host
|
// It sets the host to the original host, not the forwarded host
|
||||||
host := c.Request.URL.Host
|
host := c.Request.Host
|
||||||
|
|
||||||
|
if strings.TrimSpace(host) == "" {
|
||||||
|
return ProxyContext{}, errors.New("host not found")
|
||||||
|
}
|
||||||
|
|
||||||
// We get the path from the query string
|
// We get the path from the query string
|
||||||
path := c.Query("path")
|
path := c.Query("path")
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package controller_test
|
package controller_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
@@ -9,21 +10,26 @@ import (
|
|||||||
"github.com/steveiliop56/tinyauth/internal/controller"
|
"github.com/steveiliop56/tinyauth/internal/controller"
|
||||||
"github.com/steveiliop56/tinyauth/internal/repository"
|
"github.com/steveiliop56/tinyauth/internal/repository"
|
||||||
"github.com/steveiliop56/tinyauth/internal/service"
|
"github.com/steveiliop56/tinyauth/internal/service"
|
||||||
"github.com/steveiliop56/tinyauth/internal/utils/tlog"
|
|
||||||
|
|
||||||
"github.com/gin-gonic/gin"
|
"github.com/gin-gonic/gin"
|
||||||
"gotest.tools/v3/assert"
|
"gotest.tools/v3/assert"
|
||||||
)
|
)
|
||||||
|
|
||||||
func setupProxyController(t *testing.T, middlewares *[]gin.HandlerFunc) (*gin.Engine, *httptest.ResponseRecorder, *service.AuthService) {
|
var loggedInCtx = config.UserContext{
|
||||||
tlog.NewSimpleLogger().Init()
|
Username: "test",
|
||||||
|
Name: "Test",
|
||||||
|
Email: "test@example.com",
|
||||||
|
IsLoggedIn: true,
|
||||||
|
Provider: "local",
|
||||||
|
}
|
||||||
|
|
||||||
|
func setupProxyController(t *testing.T, middlewares []gin.HandlerFunc) (*gin.Engine, *httptest.ResponseRecorder) {
|
||||||
// Setup
|
// Setup
|
||||||
gin.SetMode(gin.TestMode)
|
gin.SetMode(gin.TestMode)
|
||||||
router := gin.Default()
|
router := gin.Default()
|
||||||
|
|
||||||
if middlewares != nil {
|
if len(middlewares) > 0 {
|
||||||
for _, m := range *middlewares {
|
for _, m := range middlewares {
|
||||||
router.Use(m)
|
router.Use(m)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -48,7 +54,13 @@ func setupProxyController(t *testing.T, middlewares *[]gin.HandlerFunc) (*gin.En
|
|||||||
assert.NilError(t, dockerService.Init())
|
assert.NilError(t, dockerService.Init())
|
||||||
|
|
||||||
// Access controls
|
// Access controls
|
||||||
accessControlsService := service.NewAccessControlsService(dockerService, map[string]config.App{})
|
accessControlsService := service.NewAccessControlsService(dockerService, map[string]config.App{
|
||||||
|
"whoami": {
|
||||||
|
Path: config.AppPath{
|
||||||
|
Allow: "/allow",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
assert.NilError(t, accessControlsService.Init())
|
assert.NilError(t, accessControlsService.Init())
|
||||||
|
|
||||||
@@ -77,107 +89,214 @@ func setupProxyController(t *testing.T, middlewares *[]gin.HandlerFunc) (*gin.En
|
|||||||
|
|
||||||
// Controller
|
// Controller
|
||||||
ctrl := controller.NewProxyController(controller.ProxyControllerConfig{
|
ctrl := controller.NewProxyController(controller.ProxyControllerConfig{
|
||||||
AppURL: "http://localhost:8080",
|
AppURL: "http://tinyauth.example.com",
|
||||||
}, group, accessControlsService, authService)
|
}, group, accessControlsService, authService)
|
||||||
ctrl.SetupRoutes()
|
ctrl.SetupRoutes()
|
||||||
|
|
||||||
return router, recorder, authService
|
return router, recorder
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Needs tests for context middleware
|
// TODO: Needs tests for context middleware
|
||||||
|
|
||||||
func TestProxyHandler(t *testing.T) {
|
func TestProxyHandler(t *testing.T) {
|
||||||
// Setup
|
// Test logged out user traefik/caddy (forward_auth)
|
||||||
router, recorder, _ := setupProxyController(t, nil)
|
router, recorder := setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err := http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/")
|
||||||
|
|
||||||
// Test invalid proxy
|
|
||||||
req := httptest.NewRequest("GET", "/api/auth/invalidproxy", nil)
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
assert.Equal(t, 400, recorder.Code)
|
// Test logged out user nginx (auth_request)
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-original-url", "http://whoami.example.com/")
|
||||||
|
|
||||||
// Test invalid method for non-envoy proxy
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("POST", "/api/auth/traefik", nil)
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
assert.Equal(t, 405, recorder.Code)
|
// Test logged out user envoy (ext_authz)
|
||||||
assert.Equal(t, "GET", recorder.Header().Get("Allow"))
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy?path=/", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
// Test logged out user (traefik/caddy)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("GET", "/api/auth/traefik", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Forwarded-Uri", "/somepath")
|
|
||||||
req.Header.Set("Accept", "text/html")
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
assert.Equal(t, 307, recorder.Code)
|
// Test logged in user traefik/caddy (forward_auth)
|
||||||
assert.Equal(t, "http://localhost:8080/login?redirect_uri=https%3A%2F%2Fexample.com%2Fsomepath", recorder.Header().Get("Location"))
|
router, recorder = setupProxyController(t, []gin.HandlerFunc{
|
||||||
|
|
||||||
// Test logged out user (envoy - POST method)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("POST", "/api/auth/envoy", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Forwarded-Uri", "/somepath")
|
|
||||||
req.Header.Set("Accept", "text/html")
|
|
||||||
router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
assert.Equal(t, 307, recorder.Code)
|
|
||||||
assert.Equal(t, "http://localhost:8080/login?redirect_uri=https%3A%2F%2Fexample.com%2Fsomepath", recorder.Header().Get("Location"))
|
|
||||||
|
|
||||||
// Test logged out user (envoy - DELETE method)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("DELETE", "/api/auth/envoy", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Forwarded-Uri", "/somepath")
|
|
||||||
req.Header.Set("Accept", "text/html")
|
|
||||||
router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
assert.Equal(t, 307, recorder.Code)
|
|
||||||
assert.Equal(t, "http://localhost:8080/login?redirect_uri=https%3A%2F%2Fexample.com%2Fsomepath", recorder.Header().Get("Location"))
|
|
||||||
|
|
||||||
// Test logged out user (nginx)
|
|
||||||
recorder = httptest.NewRecorder()
|
|
||||||
req = httptest.NewRequest("GET", "/api/auth/nginx", nil)
|
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
// we won't set X-Forwarded-Uri to test that the controller can work without it
|
|
||||||
router.ServeHTTP(recorder, req)
|
|
||||||
|
|
||||||
assert.Equal(t, 401, recorder.Code)
|
|
||||||
|
|
||||||
// Test logged in user
|
|
||||||
router, recorder, _ = setupProxyController(t, &[]gin.HandlerFunc{
|
|
||||||
func(c *gin.Context) {
|
func(c *gin.Context) {
|
||||||
c.Set("context", &config.UserContext{
|
c.Set("context", &loggedInCtx)
|
||||||
Username: "testuser",
|
|
||||||
Name: "testuser",
|
|
||||||
Email: "testuser@example.com",
|
|
||||||
IsLoggedIn: true,
|
|
||||||
OAuth: false,
|
|
||||||
Provider: "local",
|
|
||||||
TotpPending: false,
|
|
||||||
OAuthGroups: "",
|
|
||||||
TotpEnabled: false,
|
|
||||||
})
|
|
||||||
c.Next()
|
c.Next()
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
|
||||||
req = httptest.NewRequest("GET", "/api/auth/traefik", nil)
|
req, err = http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
req.Header.Set("X-Forwarded-Proto", "https")
|
assert.NilError(t, err)
|
||||||
req.Header.Set("X-Forwarded-Host", "example.com")
|
|
||||||
req.Header.Set("X-Original-Uri", "/somepath") // Test with original URI for kubernetes ingress
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
req.Header.Set("Accept", "text/html")
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/")
|
||||||
|
|
||||||
router.ServeHTTP(recorder, req)
|
router.ServeHTTP(recorder, req)
|
||||||
assert.Equal(t, 200, recorder.Code)
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
assert.Equal(t, "testuser", recorder.Header().Get("Remote-User"))
|
// Test logged in user nginx (auth_request)
|
||||||
assert.Equal(t, "testuser", recorder.Header().Get("Remote-Name"))
|
router, recorder = setupProxyController(t, []gin.HandlerFunc{
|
||||||
assert.Equal(t, "testuser@example.com", recorder.Header().Get("Remote-Email"))
|
func(c *gin.Context) {
|
||||||
|
c.Set("context", &loggedInCtx)
|
||||||
|
c.Next()
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-original-url", "http://whoami.example.com/")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test logged in user envoy (ext_authz)
|
||||||
|
router, recorder = setupProxyController(t, []gin.HandlerFunc{
|
||||||
|
func(c *gin.Context) {
|
||||||
|
c.Set("context", &loggedInCtx)
|
||||||
|
c.Next()
|
||||||
|
},
|
||||||
|
})
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy?path=/", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test ACL allow caddy/traefik (forward_auth)
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test ACL allow nginx
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-original-url", "http://whoami.example.com/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test ACL allow envoy
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy?path=/allow", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test traefik/caddy (forward_auth) without required headers
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/traefik", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusBadRequest)
|
||||||
|
|
||||||
|
// Test nginx (forward_auth) without required headers
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusBadRequest)
|
||||||
|
|
||||||
|
// Test envoy (forward_auth) without required headers
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusBadRequest)
|
||||||
|
|
||||||
|
// Test nginx (auth_request) with forward_auth fallback with ACLs
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/nginx", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test envoy (ext_authz) with forward_auth fallback with ACLs
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
|
|
||||||
|
// Test envoy (ext_authz) with empty path
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/envoy", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Host = "whoami.example.com"
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusUnauthorized)
|
||||||
|
|
||||||
|
// Ensure forward_auth fallback works with path (should ignore)
|
||||||
|
router, recorder = setupProxyController(t, nil)
|
||||||
|
|
||||||
|
req, err = http.NewRequest("GET", "/api/auth/traefik?path=/allow", nil)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
|
||||||
|
req.Header.Set("x-forwarded-proto", "http")
|
||||||
|
req.Header.Set("x-forwarded-host", "whoami.example.com")
|
||||||
|
req.Header.Set("x-forwarded-uri", "/allow")
|
||||||
|
|
||||||
|
router.ServeHTTP(recorder, req)
|
||||||
|
assert.Equal(t, recorder.Code, http.StatusOK)
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user