1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
|
package authz
import (
"context"
"net"
"strings"
"testing"
auth "github.com/envoyproxy/go-control-plane/envoy/service/auth/v3"
"github.com/oauth2-proxy/mockoidc"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/pkg/pls"
"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/pkg/web"
"google.golang.org/grpc"
"google.golang.org/grpc/codes"
"google.golang.org/grpc/credentials/insecure"
"google.golang.org/grpc/test/bufconn"
)
func TestServer(t *testing.T) {
idp := web.NewOIDCServer(t)
defer idp.Close()
socket := bufconn.Listen(1024 * 1024)
srv := New(t.Context())
defer srv.GracefulStop()
go func() {
require.NoError(t, srv.Serve(socket))
}()
connection, err := grpc.DialContext(
t.Context(),
"bufnet",
grpc.WithContextDialer(func(context.Context, string) (net.Conn, error) {
return socket.Dial()
}),
grpc.WithTransportCredentials(insecure.NewCredentials()),
)
require.NoError(t, err)
defer connection.Close()
client := auth.NewAuthorizationClient(connection)
user := mockoidc.DefaultUser()
_, rawIDToken := idp.CreateTokensFor(user)
cookies := []string{
"bearer_token=" + pls.GenerateRandomHex(32) + ";",
"id_token=" + rawIDToken + ";",
"refresh_token=" + pls.GenerateRandomHex(32),
}
loggedInHeaders := map[string]string{"cookie": strings.Join(cookies, "; ")}
t.Run("CheckRequest", func(t *testing.T) {
tt := []struct {
http *auth.AttributeContext_HttpRequest
status codes.Code
}{
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/application.js"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/callback"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/dashboard", Headers: loggedInHeaders}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/dashboard/nav"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/favicon.ico"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/favicon.png"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/health"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/index.html"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/logo.png"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/signout"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/sparkles"}},
{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "POST", Path: "/sparkles/restore"}},
{status: codes.PermissionDenied, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/dashboard"}},
{status: codes.PermissionDenied, http: &auth.AttributeContext_HttpRequest{Method: "POST", Path: "/sparkles"}},
}
for _, example := range tt {
t.Run(example.http.Path, func(t *testing.T) {
response, err := client.Check(t.Context(), &auth.CheckRequest{
Attributes: &auth.AttributeContext{
Request: &auth.AttributeContext_Request{
Http: example.http,
},
},
})
require.NoError(t, err)
assert.Equal(t, int32(example.status), response.Status.Code)
})
}
})
}
|