summaryrefslogtreecommitdiff
path: root/pkg/authz/server_test.go
blob: ffc00c53897cd1fb7e7375a8b8b9d690fd05ac7d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
package authz

import (
	"context"
	"net"
	"strings"
	"testing"

	auth "github.com/envoyproxy/go-control-plane/envoy/service/auth/v3"
	"github.com/oauth2-proxy/mockoidc"
	"github.com/stretchr/testify/assert"
	"github.com/stretchr/testify/require"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/pkg/pls"
	"gitlab.com/gitlab-org/software-supply-chain-security/authorization/sparkled/pkg/web"
	"google.golang.org/grpc"
	"google.golang.org/grpc/codes"
	"google.golang.org/grpc/credentials/insecure"
	"google.golang.org/grpc/test/bufconn"
)

func TestServer(t *testing.T) {
	idp := web.NewOIDCServer(t)
	defer idp.Close()

	socket := bufconn.Listen(1024 * 1024)
	srv := New(t.Context())

	defer srv.GracefulStop()
	go func() {
		require.NoError(t, srv.Serve(socket))
	}()

	connection, err := grpc.DialContext(
		t.Context(),
		"bufnet",
		grpc.WithContextDialer(func(context.Context, string) (net.Conn, error) {
			return socket.Dial()
		}),
		grpc.WithTransportCredentials(insecure.NewCredentials()),
	)
	require.NoError(t, err)
	defer connection.Close()

	client := auth.NewAuthorizationClient(connection)
	user := mockoidc.DefaultUser()
	_, rawIDToken := idp.CreateTokensFor(user)

	cookies := []string{
		"bearer_token=" + pls.GenerateRandomHex(32) + ";",
		"id_token=" + rawIDToken + ";",
		"refresh_token=" + pls.GenerateRandomHex(32),
	}

	loggedInHeaders := map[string]string{"cookie": strings.Join(cookies, "; ")}

	t.Run("CheckRequest", func(t *testing.T) {
		tt := []struct {
			http   *auth.AttributeContext_HttpRequest
			status codes.Code
		}{
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/application.js"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/callback"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/dashboard", Headers: loggedInHeaders}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/dashboard/nav"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/favicon.ico"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/favicon.png"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/health"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/index.html"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/logo.png"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/signout"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/sparkles"}},
			{status: codes.OK, http: &auth.AttributeContext_HttpRequest{Method: "POST", Path: "/sparkles/restore"}},
			{status: codes.PermissionDenied, http: &auth.AttributeContext_HttpRequest{Method: "GET", Path: "/dashboard"}},
			{status: codes.PermissionDenied, http: &auth.AttributeContext_HttpRequest{Method: "POST", Path: "/sparkles"}},
		}

		for _, example := range tt {
			t.Run(example.http.Path, func(t *testing.T) {
				response, err := client.Check(t.Context(), &auth.CheckRequest{
					Attributes: &auth.AttributeContext{
						Request: &auth.AttributeContext_Request{
							Http: example.http,
						},
					},
				})
				require.NoError(t, err)
				assert.Equal(t, int32(example.status), response.Status.Code)
			})
		}
	})
}